-
On the consistency of hyper-parameter selection in value-based deep reinforcement learning
Authors:
Johan Obando-Ceron,
João G. M. Araújo,
Aaron Courville,
Pablo Samuel Castro
Abstract:
Deep reinforcement learning (deep RL) has achieved tremendous success on various domains through a combination of algorithmic design and careful selection of hyper-parameters. Algorithmic improvements are often the result of iterative enhancements built upon prior approaches, while hyper-parameter choices are typically inherited from previous methods or fine-tuned specifically for the proposed tec…
▽ More
Deep reinforcement learning (deep RL) has achieved tremendous success on various domains through a combination of algorithmic design and careful selection of hyper-parameters. Algorithmic improvements are often the result of iterative enhancements built upon prior approaches, while hyper-parameter choices are typically inherited from previous methods or fine-tuned specifically for the proposed technique. Despite their crucial impact on performance, hyper-parameter choices are frequently overshadowed by algorithmic advancements. This paper conducts an extensive empirical study focusing on the reliability of hyper-parameter selection for value-based deep reinforcement learning agents, including the introduction of a new score to quantify the consistency and reliability of various hyper-parameters. Our findings not only help establish which hyper-parameters are most critical to tune, but also help clarify which tunings remain consistent across different training regimes.
△ Less
Submitted 2 July, 2024; v1 submitted 25 June, 2024;
originally announced June 2024.
-
Introducing Moment: A toolkit for semi-definite programming with moment matrices
Authors:
Andrew J. P. Garner,
Mateus Araújo
Abstract:
Non-commutative polynomial optimization is a powerful technique with numerous applications in quantum nonlocality, quantum key distribution, causal inference, many-body physics, amongst others. The standard approach is to reduce such optimizations to a hierarchy of semi-definite programs, which can be solved numerically using well-understood interior-point methods. A key, but computationally costl…
▽ More
Non-commutative polynomial optimization is a powerful technique with numerous applications in quantum nonlocality, quantum key distribution, causal inference, many-body physics, amongst others. The standard approach is to reduce such optimizations to a hierarchy of semi-definite programs, which can be solved numerically using well-understood interior-point methods. A key, but computationally costly, step is the formulation of moment matrices, whose size (and hence cost) grows exponentially with the depth of the hierarchy. It is therefore essential to have highly-optimized software to construct moment matrices. Here, we introduce Moment: a toolkit that produces moment matrix relaxations from the specification of a non-commutative optimization problem. In order to obtain the absolute best performance, Moment is written in C++, and for convenience of use provides an interface via MATLAB. We benchmark Moment's performance, and see that it can be up to four orders of magnitude faster than current software with similar functionality.
△ Less
Submitted 21 June, 2024;
originally announced June 2024.
-
Transformers need glasses! Information over-squashing in language tasks
Authors:
Federico Barbero,
Andrea Banino,
Steven Kapturowski,
Dharshan Kumaran,
João G. M. Araújo,
Alex Vitvitskyi,
Razvan Pascanu,
Petar Veličković
Abstract:
We study how information propagates in decoder-only Transformers, which are the architectural backbone of most existing frontier large language models (LLMs). We rely on a theoretical signal propagation analysis -- specifically, we analyse the representations of the last token in the final layer of the Transformer, as this is the representation used for next-token prediction. Our analysis reveals…
▽ More
We study how information propagates in decoder-only Transformers, which are the architectural backbone of most existing frontier large language models (LLMs). We rely on a theoretical signal propagation analysis -- specifically, we analyse the representations of the last token in the final layer of the Transformer, as this is the representation used for next-token prediction. Our analysis reveals a representational collapse phenomenon: we prove that certain distinct sequences of inputs to the Transformer can yield arbitrarily close representations in the final token. This effect is exacerbated by the low-precision floating-point formats frequently used in modern LLMs. As a result, the model is provably unable to respond to these sequences in different ways -- leading to errors in, e.g., tasks involving counting or copying. Further, we show that decoder-only Transformer language models can lose sensitivity to specific tokens in the input, which relates to the well-known phenomenon of over-squashing in graph neural networks. We provide empirical evidence supporting our claims on contemporary LLMs. Our theory also points to simple solutions towards ameliorating these issues.
△ Less
Submitted 6 June, 2024;
originally announced June 2024.
-
Are Large Language Models Moral Hypocrites? A Study Based on Moral Foundations
Authors:
José Luiz Nunes,
Guilherme F. C. F. Almeida,
Marcelo de Araujo,
Simone D. J. Barbosa
Abstract:
Large language models (LLMs) have taken centre stage in debates on Artificial Intelligence. Yet there remains a gap in how to assess LLMs' conformity to important human values. In this paper, we investigate whether state-of-the-art LLMs, GPT-4 and Claude 2.1 (Gemini Pro and LLAMA 2 did not generate valid results) are moral hypocrites. We employ two research instruments based on the Moral Foundatio…
▽ More
Large language models (LLMs) have taken centre stage in debates on Artificial Intelligence. Yet there remains a gap in how to assess LLMs' conformity to important human values. In this paper, we investigate whether state-of-the-art LLMs, GPT-4 and Claude 2.1 (Gemini Pro and LLAMA 2 did not generate valid results) are moral hypocrites. We employ two research instruments based on the Moral Foundations Theory: (i) the Moral Foundations Questionnaire (MFQ), which investigates which values are considered morally relevant in abstract moral judgements; and (ii) the Moral Foundations Vignettes (MFVs), which evaluate moral cognition in concrete scenarios related to each moral foundation. We characterise conflicts in values between these different abstractions of moral evaluation as hypocrisy. We found that both models displayed reasonable consistency within each instrument compared to humans, but they displayed contradictory and hypocritical behaviour when we compared the abstract values present in the MFQ to the evaluation of concrete moral violations of the MFV.
△ Less
Submitted 17 May, 2024;
originally announced May 2024.
-
A guideline for the methodology chapter in computer science dissertations
Authors:
Marco Araujo
Abstract:
Rather than simply offering suggestions, this guideline for the methodology chapter in computer science dissertations provides thorough insights on how to develop a strong research methodology within the area of computer science. The method is structured into several parts starting with an overview of research strategies which include experiments, surveys, interviews and case studies. The guide hi…
▽ More
Rather than simply offering suggestions, this guideline for the methodology chapter in computer science dissertations provides thorough insights on how to develop a strong research methodology within the area of computer science. The method is structured into several parts starting with an overview of research strategies which include experiments, surveys, interviews and case studies. The guide highlights the significance of defining a research philosophy and reasoning by talking about paradigms such as positivism, constructivism and pragmatism. Besides, it reveals the importance of types of research including deductive and inductive methodologies; basic versus applied research approaches. Moreover, this guideline discusses data collection and analysis intricacies that divide data into quantitative and qualitative typologies. It explains different ways in which data can be collected from observation to experimentation, interviews or surveys. It also mentions ethical considerations in research emphasizing ethical behavior like following academic principles. In general, this guideline is an essential tool for undertaking computer science dissertations that help researchers structure their work while maintaining ethical standards in their study design.
△ Less
Submitted 29 March, 2024;
originally announced May 2024.
-
Position: Categorical Deep Learning is an Algebraic Theory of All Architectures
Authors:
Bruno Gavranović,
Paul Lessard,
Andrew Dudzik,
Tamara von Glehn,
João G. M. Araújo,
Petar Veličković
Abstract:
We present our position on the elusive quest for a general-purpose framework for specifying and studying deep learning architectures. Our opinion is that the key attempts made so far lack a coherent bridge between specifying constraints which models must satisfy and specifying their implementations. Focusing on building a such a bridge, we propose to apply category theory -- precisely, the univers…
▽ More
We present our position on the elusive quest for a general-purpose framework for specifying and studying deep learning architectures. Our opinion is that the key attempts made so far lack a coherent bridge between specifying constraints which models must satisfy and specifying their implementations. Focusing on building a such a bridge, we propose to apply category theory -- precisely, the universal algebra of monads valued in a 2-category of parametric maps -- as a single theory elegantly subsuming both of these flavours of neural network design. To defend our position, we show how this theory recovers constraints induced by geometric deep learning, as well as implementations of many architectures drawn from the diverse landscape of neural networks, such as RNNs. We also illustrate how the theory naturally encodes many standard constructs in computer science and automata theory.
△ Less
Submitted 5 June, 2024; v1 submitted 23 February, 2024;
originally announced February 2024.
-
Open RL Benchmark: Comprehensive Tracked Experiments for Reinforcement Learning
Authors:
Shengyi Huang,
Quentin Gallouédec,
Florian Felten,
Antonin Raffin,
Rousslan Fernand Julien Dossa,
Yanxiao Zhao,
Ryan Sullivan,
Viktor Makoviychuk,
Denys Makoviichuk,
Mohamad H. Danesh,
Cyril Roumégous,
Jiayi Weng,
Chufan Chen,
Md Masudur Rahman,
João G. M. Araújo,
Guorui Quan,
Daniel Tan,
Timo Klein,
Rujikorn Charakorn,
Mark Towers,
Yann Berthelot,
Kinal Mehta,
Dipam Chakraborty,
Arjun KG,
Valentin Charraut
, et al. (8 additional authors not shown)
Abstract:
In many Reinforcement Learning (RL) papers, learning curves are useful indicators to measure the effectiveness of RL algorithms. However, the complete raw data of the learning curves are rarely available. As a result, it is usually necessary to reproduce the experiments from scratch, which can be time-consuming and error-prone. We present Open RL Benchmark, a set of fully tracked RL experiments, i…
▽ More
In many Reinforcement Learning (RL) papers, learning curves are useful indicators to measure the effectiveness of RL algorithms. However, the complete raw data of the learning curves are rarely available. As a result, it is usually necessary to reproduce the experiments from scratch, which can be time-consuming and error-prone. We present Open RL Benchmark, a set of fully tracked RL experiments, including not only the usual data such as episodic return, but also all algorithm-specific and system metrics. Open RL Benchmark is community-driven: anyone can download, use, and contribute to the data. At the time of writing, more than 25,000 runs have been tracked, for a cumulative duration of more than 8 years. Open RL Benchmark covers a wide range of RL libraries and reference implementations. Special care is taken to ensure that each experiment is precisely reproducible by providing not only the full parameters, but also the versions of the dependencies used to generate it. In addition, Open RL Benchmark comes with a command-line interface (CLI) for easy fetching and generating figures to present the results. In this document, we include two case studies to demonstrate the usefulness of Open RL Benchmark in practice. To the best of our knowledge, Open RL Benchmark is the first RL benchmark of its kind, and the authors hope that it will improve and facilitate the work of researchers in the field.
△ Less
Submitted 5 February, 2024;
originally announced February 2024.
-
Exploring the psychology of LLMs' Moral and Legal Reasoning
Authors:
Guilherme F. C. F. Almeida,
José Luiz Nunes,
Neele Engelmann,
Alex Wiegmann,
Marcelo de Araújo
Abstract:
Large language models (LLMs) exhibit expert-level performance in tasks across a wide range of different domains. Ethical issues raised by LLMs and the need to align future versions makes it important to know how state of the art models reason about moral and legal issues. In this paper, we employ the methods of experimental psychology to probe into this question. We replicate eight studies from th…
▽ More
Large language models (LLMs) exhibit expert-level performance in tasks across a wide range of different domains. Ethical issues raised by LLMs and the need to align future versions makes it important to know how state of the art models reason about moral and legal issues. In this paper, we employ the methods of experimental psychology to probe into this question. We replicate eight studies from the experimental literature with instances of Google's Gemini Pro, Anthropic's Claude 2.1, OpenAI's GPT-4, and Meta's Llama 2 Chat 70b. We find that alignment with human responses shifts from one experiment to another, and that models differ amongst themselves as to their overall alignment, with GPT-4 taking a clear lead over all other models we tested. Nonetheless, even when LLM-generated responses are highly correlated to human responses, there are still systematic differences, with a tendency for models to exaggerate effects that are present among humans, in part by reducing variance. This recommends caution with regards to proposals of replacing human participants with current state-of-the-art LLMs in psychological research and highlights the need for further research about the distinctive aspects of machine psychology.
△ Less
Submitted 4 March, 2024; v1 submitted 2 August, 2023;
originally announced August 2023.
-
Membership Inference Attack for Beluga Whales Discrimination
Authors:
Voncarlos Marcelo Araújo,
Sébastien Gambs,
Clément Chion,
Robert Michaud,
Léo Schneider,
Hadrien Lautraite
Abstract:
To efficiently monitor the growth and evolution of a particular wildlife population, one of the main fundamental challenges to address in animal ecology is the re-identification of individuals that have been previously encountered but also the discrimination between known and unknown individuals (the so-called "open-set problem"), which is the first step to realize before re-identification. In par…
▽ More
To efficiently monitor the growth and evolution of a particular wildlife population, one of the main fundamental challenges to address in animal ecology is the re-identification of individuals that have been previously encountered but also the discrimination between known and unknown individuals (the so-called "open-set problem"), which is the first step to realize before re-identification. In particular, in this work, we are interested in the discrimination within digital photos of beluga whales, which are known to be among the most challenging marine species to discriminate due to their lack of distinctive features. To tackle this problem, we propose a novel approach based on the use of Membership Inference Attacks (MIAs), which are normally used to assess the privacy risks associated with releasing a particular machine learning model. More precisely, we demonstrate that the problem of discriminating between known and unknown individuals can be solved efficiently using state-of-the-art approaches for MIAs. Extensive experiments on three benchmark datasets related to whales, two different neural network architectures, and three MIA clearly demonstrate the performance of the approach. In addition, we have also designed a novel MIA strategy that we coined as ensemble MIA, which combines the outputs of different MIAs to increase the attack accuracy while diminishing the false positive rate. Overall, one of our main objectives is also to show that the research on privacy attacks can also be leveraged "for good" by hel** to address practical challenges encountered in animal ecology.
△ Less
Submitted 28 February, 2023;
originally announced February 2023.
-
Computer vision application for improved product traceability in the granite manufacturing industry
Authors:
Xurxo Rigueira,
Javier Martinez,
Maria Araujo,
Antonio Recaman
Abstract:
The traceability of granite blocks consists in identifying each block with a finite number of color bands which represent a numerical code. This code has to be read several times throughout the manufacturing process, but its accuracy is subject to human errors, leading to cause faults in the traceability system. A computer vision system is presented to address this problem through color detection…
▽ More
The traceability of granite blocks consists in identifying each block with a finite number of color bands which represent a numerical code. This code has to be read several times throughout the manufacturing process, but its accuracy is subject to human errors, leading to cause faults in the traceability system. A computer vision system is presented to address this problem through color detection and the decryption of the associated code. The system developed makes use of color space transformations, and several thresholds for the isolation of the colors. Computer vision methods are implemented, along with contour detection procedures for color identification. Lastly, the analysis of geometrical features is used to decrypt the color code captured. The proposed algorithm is trained on a set of 109 pictures taken in different environmental conditions and validated on a set of 21 images. The outcome shows promising results with an accuracy rate of 75.00% in the validation process. Therefore, the application presented can help employees reduce the number of mistakes on product tracking.
△ Less
Submitted 4 July, 2022;
originally announced July 2022.
-
Scalable Training of Language Models using JAX pjit and TPUv4
Authors:
Joanna Yoo,
Kuba Perlin,
Siddhartha Rao Kamalakara,
João G. M. Araújo
Abstract:
Modern large language models require distributed training strategies due to their size. The challenges of efficiently and robustly training them are met with rapid developments on both software and hardware frontiers. In this technical report, we explore challenges and design decisions associated with develo** a scalable training framework, and present a quantitative analysis of efficiency impro…
▽ More
Modern large language models require distributed training strategies due to their size. The challenges of efficiently and robustly training them are met with rapid developments on both software and hardware frontiers. In this technical report, we explore challenges and design decisions associated with develo** a scalable training framework, and present a quantitative analysis of efficiency improvements coming from adopting new software and hardware solutions.
△ Less
Submitted 13 April, 2022;
originally announced April 2022.
-
Bias and unfairness in machine learning models: a systematic literature review
Authors:
Tiago Palma Pagano,
Rafael Bessa Loureiro,
Fernanda Vitória Nascimento Lisboa,
Gustavo Oliveira Ramos Cruz,
Rodrigo Matos Peixoto,
Guilherme Aragão de Sousa Guimarães,
Lucas Lisboa dos Santos,
Maira Matos Araujo,
Marco Cruz,
Ewerton Lopes Silva de Oliveira,
Ingrid Winkler,
Erick Giovani Sperandio Nascimento
Abstract:
One of the difficulties of artificial intelligence is to ensure that model decisions are fair and free of bias. In research, datasets, metrics, techniques, and tools are applied to detect and mitigate algorithmic unfairness and bias. This study aims to examine existing knowledge on bias and unfairness in Machine Learning models, identifying mitigation methods, fairness metrics, and supporting tool…
▽ More
One of the difficulties of artificial intelligence is to ensure that model decisions are fair and free of bias. In research, datasets, metrics, techniques, and tools are applied to detect and mitigate algorithmic unfairness and bias. This study aims to examine existing knowledge on bias and unfairness in Machine Learning models, identifying mitigation methods, fairness metrics, and supporting tools. A Systematic Literature Review found 40 eligible articles published between 2017 and 2022 in the Scopus, IEEE Xplore, Web of Science, and Google Scholar knowledge bases. The results show numerous bias and unfairness detection and mitigation approaches for ML technologies, with clearly defined metrics in the literature, and varied metrics can be highlighted. We recommend further research to define the techniques and metrics that should be employed in each case to standardize and ensure the impartiality of the machine learning model, thus, allowing the most appropriate metric to detect bias and unfairness in a given context.
△ Less
Submitted 3 November, 2022; v1 submitted 16 February, 2022;
originally announced February 2022.
-
No News is Good News: A Critique of the One Billion Word Benchmark
Authors:
Helen Ngo,
João G. M. Araújo,
Jeffrey Hui,
Nicholas Frosst
Abstract:
The One Billion Word Benchmark is a dataset derived from the WMT 2011 News Crawl, commonly used to measure language modeling ability in natural language processing. We train models solely on Common Crawl web scrapes partitioned by year, and demonstrate that they perform worse on this task over time due to distributional shift. Analysis of this corpus reveals that it contains several examples of ha…
▽ More
The One Billion Word Benchmark is a dataset derived from the WMT 2011 News Crawl, commonly used to measure language modeling ability in natural language processing. We train models solely on Common Crawl web scrapes partitioned by year, and demonstrate that they perform worse on this task over time due to distributional shift. Analysis of this corpus reveals that it contains several examples of harmful text, as well as outdated references to current events. We suggest that the temporal nature of news and its distribution shift over time makes it poorly suited for measuring language modeling ability, and discuss potential impact and considerations for researchers building language models and evaluation datasets.
△ Less
Submitted 24 October, 2021;
originally announced October 2021.
-
Mitigating harm in language models with conditional-likelihood filtration
Authors:
Helen Ngo,
Cooper Raterink,
João G. M. Araújo,
Ivan Zhang,
Carol Chen,
Adrien Morisot,
Nicholas Frosst
Abstract:
Language models trained on large-scale unfiltered datasets curated from the open web acquire systemic biases, prejudices, and harmful views from their training data. We present a methodology for programmatically identifying and removing harmful text from web-scale datasets. A pretrained language model is used to calculate the log-likelihood of researcher-written trigger phrases conditioned on a sp…
▽ More
Language models trained on large-scale unfiltered datasets curated from the open web acquire systemic biases, prejudices, and harmful views from their training data. We present a methodology for programmatically identifying and removing harmful text from web-scale datasets. A pretrained language model is used to calculate the log-likelihood of researcher-written trigger phrases conditioned on a specific document, which is used to identify and filter documents from the dataset. We demonstrate that models trained on this filtered dataset exhibit lower propensity to generate harmful text, with a marginal decrease in performance on standard language modeling benchmarks compared to unfiltered baselines. We provide a partial explanation for this performance gap by surfacing examples of hate speech and other undesirable content from standard language modeling benchmarks. Finally, we discuss the generalization of this method and how trigger phrases which reflect specific values can be used by researchers to build language models which are more closely aligned with their values.
△ Less
Submitted 27 November, 2021; v1 submitted 4 August, 2021;
originally announced August 2021.
-
A New State-of-the-Art Transformers-Based Load Forecaster on the Smart Grid Domain
Authors:
Andre Luiz Farias Novaes,
Rui Alexandre de Matos Araujo,
Jose Figueiredo,
Lucas Aguiar Pavanelli
Abstract:
Meter-level load forecasting is crucial for efficient energy management and power system planning for Smart Grids (SGs), in tasks associated with regulation, dispatching, scheduling, and unit commitment of power grids. Although a variety of algorithms have been proposed and applied on the field, more accurate and robust models are still required: the overall utility cost of operations in SGs incre…
▽ More
Meter-level load forecasting is crucial for efficient energy management and power system planning for Smart Grids (SGs), in tasks associated with regulation, dispatching, scheduling, and unit commitment of power grids. Although a variety of algorithms have been proposed and applied on the field, more accurate and robust models are still required: the overall utility cost of operations in SGs increases 10 million currency units if the load forecasting error increases 1%, and the mean absolute percentage error (MAPE) in forecasting is still much higher than 1%. Transformers have become the new state-of-the-art in a variety of tasks, including the ones in computer vision, natural language processing and time series forecasting, surpassing alternative neural models such as convolutional and recurrent neural networks. In this letter, we present a new state-of-the-art Transformer-based algorithm for the meter-level load forecasting task, which has surpassed the former state-of-the-art, LSTM, and the traditional benchmark, vanilla RNN, in all experiments by a margin of at least 13% in MAPE.
△ Less
Submitted 5 August, 2021;
originally announced August 2021.
-
A Data-Driven Biophysical Computational Model of Parkinson's Disease based on Marmoset Monkeys
Authors:
Caetano M. Ranieri,
Jhielson M. Pimentel,
Marcelo R. Romano,
Leonardo A. Elias,
Roseli A. F. Romero,
Michael A. Lones,
Mariana F. P. Araujo,
Patricia A. Vargas,
Renan C. Moioli
Abstract:
In this work we propose a new biophysical computational model of brain regions relevant to Parkinson's Disease based on local field potential data collected from the brain of marmoset monkeys. Parkinson's disease is a neurodegenerative disorder, linked to the death of dopaminergic neurons at the substantia nigra pars compacta, which affects the normal dynamics of the basal ganglia-thalamus-cortex…
▽ More
In this work we propose a new biophysical computational model of brain regions relevant to Parkinson's Disease based on local field potential data collected from the brain of marmoset monkeys. Parkinson's disease is a neurodegenerative disorder, linked to the death of dopaminergic neurons at the substantia nigra pars compacta, which affects the normal dynamics of the basal ganglia-thalamus-cortex neuronal circuit of the brain. Although there are multiple mechanisms underlying the disease, a complete description of those mechanisms and molecular pathogenesis are still missing, and there is still no cure. To address this gap, computational models that resemble neurobiological aspects found in animal models have been proposed. In our model, we performed a data-driven approach in which a set of biologically constrained parameters is optimised using differential evolution. Evolved models successfully resembled single-neuron mean firing rates and spectral signatures of local field potentials from healthy and parkinsonian marmoset brain data. As far as we are concerned, this is the first computational model of Parkinson's Disease based on simultaneous electrophysiological recordings from seven brain regions of Marmoset monkeys. Results show that the proposed model could facilitate the investigation of the mechanisms of PD and support the development of techniques that can indicate new therapies. It could also be applied to other computational neuroscience problems in which biological data could be used to fit multi-scale models of brain circuits.
△ Less
Submitted 1 September, 2021; v1 submitted 26 July, 2021;
originally announced July 2021.
-
BreachRadar: Automatic Detection of Points-of-Compromise
Authors:
Miguel Araujo,
Miguel Almeida,
Jaime Ferreira,
Luis Silva,
Pedro Bizarro
Abstract:
Bank transaction fraud results in over $13B annual losses for banks, merchants, and card holders worldwide. Much of this fraud starts with a Point-of-Compromise (a data breach or a skimming operation) where credit and debit card digital information is stolen, resold, and later used to perform fraud. We introduce this problem and present an automatic Points-of-Compromise (POC) detection procedure.…
▽ More
Bank transaction fraud results in over $13B annual losses for banks, merchants, and card holders worldwide. Much of this fraud starts with a Point-of-Compromise (a data breach or a skimming operation) where credit and debit card digital information is stolen, resold, and later used to perform fraud. We introduce this problem and present an automatic Points-of-Compromise (POC) detection procedure. BreachRadar is a distributed alternating algorithm that assigns a probability of being compromised to the different possible locations. We implement this method using Apache Spark and show its linear scalability in the number of machines and transactions. BreachRadar is applied to two datasets with billions of real transaction records and fraud labels where we provide multiple examples of real Points-of-Compromise we are able to detect. We further show the effectiveness of our method when injecting Points-of-Compromise in one of these datasets, simultaneously achieving over 90% precision and recall when only 10% of the cards have been victims of fraud.
△ Less
Submitted 24 September, 2020;
originally announced September 2020.
-
Automatic Detection of Aedes aegypti Breeding Grounds Based on Deep Networks with Spatio-Temporal Consistency
Authors:
Wesley L. Passos,
Gabriel M. Araujo,
Amaro A. de Lima,
Sergio L. Netto,
Eduardo A. B. da Silva
Abstract:
Every year, the Aedes aegypti mosquito infects millions of people with diseases such as dengue, zika, chikungunya, and urban yellow fever. The main form to combat these diseases is to avoid mosquito reproduction by searching for and eliminating the potential mosquito breeding grounds. In this work, we introduce a comprehensive dataset of aerial videos, acquired with an unmanned aerial vehicle, con…
▽ More
Every year, the Aedes aegypti mosquito infects millions of people with diseases such as dengue, zika, chikungunya, and urban yellow fever. The main form to combat these diseases is to avoid mosquito reproduction by searching for and eliminating the potential mosquito breeding grounds. In this work, we introduce a comprehensive dataset of aerial videos, acquired with an unmanned aerial vehicle, containing possible mosquito breeding sites. All frames of the video dataset were manually annotated with bounding boxes identifying all objects of interest. This dataset was employed to develop an automatic detection system of such objects based on deep convolutional networks. We propose the exploitation of the temporal information contained in the videos by the incorporation, in the object detection pipeline, of a spatio-temporal consistency module that can register the detected objects, minimizing most false-positive and false-negative occurrences. Also, we experimentally show that using videos is more beneficial than only composing a mosaic using the frames. Using the ResNet-50-FPN as a backbone, we achieve F$_1$-scores of 0.65 and 0.77 on the object-level detection of `tires' and `water tanks', respectively, illustrating the system capabilities to properly locate potential mosquito breeding objects.
△ Less
Submitted 27 November, 2021; v1 submitted 29 July, 2020;
originally announced July 2020.
-
Application of Statistical Methods in Software Engineering: Theory and Practice
Authors:
T. F. M. Sirqueira,
M. A. Miguel,
H. L. O. Dalpra,
M. A. P. Araujo,
J. M. N. David
Abstract:
The experimental evaluation of the methods and concepts covered in software engineering has been increasingly valued. This value indicates the constant search for new forms of assessment and validation of the results obtained in Software Engineering research. Results are validated in studies through evaluations, which in turn become increasingly stringent. As an alternative to aid in the verificat…
▽ More
The experimental evaluation of the methods and concepts covered in software engineering has been increasingly valued. This value indicates the constant search for new forms of assessment and validation of the results obtained in Software Engineering research. Results are validated in studies through evaluations, which in turn become increasingly stringent. As an alternative to aid in the verification of the results, that is, whether they are positive or negative, we suggest the use of statistical methods. This article presents some of the main statistical techniques available, as well as their use in carrying out the implementation of data analysis in experimental studies in Software Engineering. This paper presents a practical approach proving statistical techniques through a decision tree, which was created in order to facilitate the understanding of the appropriate statistical method for each data analysis situation. Actual data from the software projects were employed to demonstrate the use of these statistical methods. Although it is not the aim of this work, basic experimentation and statistics concepts will be presented, as well as a concrete indication of the applicability of these techniques.
△ Less
Submitted 28 June, 2020;
originally announced June 2020.
-
Extracting Spatiotemporal Demand for Public Transit from Mobility Data
Authors:
Trivik Verma,
Mikhail Sirenko,
Itto Kornecki,
Scott Cunningham,
Nuno AM Araújo
Abstract:
With people constantly migrating to different urban areas, our mobility needs for work, services and leisure are transforming rapidly. The changing urban demographics pose several challenges for the efficient management of transit services. To forecast transit demand, planners often resort to sociological investigations or modelling that are either difficult to obtain, inaccurate or outdated. How…
▽ More
With people constantly migrating to different urban areas, our mobility needs for work, services and leisure are transforming rapidly. The changing urban demographics pose several challenges for the efficient management of transit services. To forecast transit demand, planners often resort to sociological investigations or modelling that are either difficult to obtain, inaccurate or outdated. How can we then estimate the variegated demand for mobility? We propose a simple method to identify the spatiotemporal demand for public transit in a city. Using a Gaussian mixture model, we decompose empirical ridership data into a set of temporal demand profiles representative of ridership over any given day. A case of approximately 4.6 million daily transit traces from the Greater London region reveals distinct demand profiles. We find that a weighted mixture of these profiles can generate any station traffic remarkably well, uncovering spatially concentric clusters of mobility needs. Our method of analysing the spatiotemporal geography of a city can be extended to other urban regions with different modes of public transit.
△ Less
Submitted 5 June, 2020;
originally announced June 2020.
-
Two-View Fine-grained Classification of Plant Species
Authors:
Voncarlos M. Araujo,
Alceu S. Britto Jr.,
Luiz E. S. Oliveira,
Alessandro L. Koerich
Abstract:
Automatic plant classification is a challenging problem due to the wide biodiversity of the existing plant species in a fine-grained scenario. Powerful deep learning architectures have been used to improve the classification performance in such a fine-grained problem, but usually building models that are highly dependent on a large training dataset and which are not scalable. In this paper, we pro…
▽ More
Automatic plant classification is a challenging problem due to the wide biodiversity of the existing plant species in a fine-grained scenario. Powerful deep learning architectures have been used to improve the classification performance in such a fine-grained problem, but usually building models that are highly dependent on a large training dataset and which are not scalable. In this paper, we propose a novel method based on a two-view leaf image representation and a hierarchical classification strategy for fine-grained recognition of plant species. It uses the botanical taxonomy as a basis for a coarse-to-fine strategy applied to identify the plant genus and species. The two-view representation provides complementary global and local features of leaf images. A deep metric based on Siamese convolutional neural networks is used to reduce the dependence on a large number of training samples and make the method scalable to new plant species. The experimental results on two challenging fine-grained datasets of leaf images (i.e. LifeCLEF 2015 and LeafSnap) have shown the effectiveness of the proposed method, which achieved recognition accuracy of 0.87 and 0.96 respectively.
△ Less
Submitted 4 October, 2021; v1 submitted 18 May, 2020;
originally announced May 2020.
-
802.11g Signal Strength Evaluation in an Industrial Environment
Authors:
Dalton Cézane Gomes Valadares,
Joseana Macêdo Fechine Régis de Araújo,
Marco Aurélio Spohn,
Angelo Perkusich,
Kyller Costa Gorgônio,
Elmar Uwe Kurt Melcher
Abstract:
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols are emerging or being updated, changes in existing…
▽ More
The advances in wireless network technologies and Industrial Internet of Things (IIoT) devices are easing the establishment of what is called Industry 4.0. For the industrial environments, the wireless networks are more suitable mainly due to their great flexibility, low deployment cost and for being less invasive. Although new wireless protocols are emerging or being updated, changes in existing industries generally can lead to large expenditures. As the well known and accepted IEEE 802.11g standard, mostly used in residential and commercial applications, has a low deployment and maintenance cost, many industries also decide to adopt it. In this scenario, there is a need to evaluate the signal quality to better design the network infrastructure in order to obtain good communication coverage. In this work, we present a practical study about the 802.11g signal strength in a thermoelectric power plant. We collected signal strength values in different points along the engine room and compared our measured values with the estimated ones through the Log-Distance Path Loss model. We concluded that it is possible to use this model in an industrial environment to estimate signal strength with a low error by choosing the right propagation (path loss) exponent.
△ Less
Submitted 7 January, 2020;
originally announced January 2020.
-
Extending Eigentrust with the Max-Plus Algebra
Authors:
Juan Afanador,
Maria Araujo,
Murilo Baptista,
Nir Oren
Abstract:
Eigentrust is a simple and widely used algorithm, which quantifies trust based on the repeated application of an update matrix to a vector of initial trust values. In some cases, however, this procedure is rendered uninformative. Here, we characterise such situations and trace their origin to the algebraic conditions guaranteeing the convergence of the Power Method. We overcome the identified limi…
▽ More
Eigentrust is a simple and widely used algorithm, which quantifies trust based on the repeated application of an update matrix to a vector of initial trust values. In some cases, however, this procedure is rendered uninformative. Here, we characterise such situations and trace their origin to the algebraic conditions guaranteeing the convergence of the Power Method. We overcome the identified limitations by extending Eigentrust's core ideas into the Max-Plus Algebra. The empirical evaluation of our max-plus approach demonstrates improvements over Eigentrust.
△ Less
Submitted 13 June, 2019;
originally announced June 2019.
-
Concave losses for robust dictionary learning
Authors:
Rafael Will M de Araujo,
Roberto Hirata,
Alain Rakotomamonjy
Abstract:
Traditional dictionary learning methods are based on quadratic convex loss function and thus are sensitive to outliers. In this paper, we propose a generic framework for robust dictionary learning based on concave losses. We provide results on composition of concave functions, notably regarding super-gradient computations, that are key for develo** generic dictionary learning algorithms applicab…
▽ More
Traditional dictionary learning methods are based on quadratic convex loss function and thus are sensitive to outliers. In this paper, we propose a generic framework for robust dictionary learning based on concave losses. We provide results on composition of concave functions, notably regarding super-gradient computations, that are key for develo** generic dictionary learning algorithms applicable to smooth and non-smooth losses. In order to improve identification of outliers, we introduce an initialization heuristic based on undercomplete dictionary learning. Experimental results using synthetic and real data demonstrate that our method is able to better detect outliers, is capable of generating better dictionaries, outperforming state-of-the-art methods such as K-SVD and LC-KSVD.
△ Less
Submitted 2 November, 2017;
originally announced November 2017.
-
Finding the optimal nets for self-folding Kirigami
Authors:
N. A. M. Araújo,
R. A. da Costa,
S. N. Dorogovtsev,
J. F. F. Mendes
Abstract:
Three-dimensional shells can be synthesized from the spontaneous self-folding of two-dimensional templates of interconnected panels, called nets. However, some nets are more likely to self-fold into the desired shell under random movements. The optimal nets are the ones that maximize the number of vertex connections, i.e., vertices that have only two of its faces cut away from each other in the ne…
▽ More
Three-dimensional shells can be synthesized from the spontaneous self-folding of two-dimensional templates of interconnected panels, called nets. However, some nets are more likely to self-fold into the desired shell under random movements. The optimal nets are the ones that maximize the number of vertex connections, i.e., vertices that have only two of its faces cut away from each other in the net. Previous methods for finding such nets are based on random search and thus do not guarantee the optimal solution. Here, we propose a deterministic procedure. We map the connectivity of the shell into a shell graph, where the nodes and links of the graph represent the vertices and edges of the shell, respectively. Identifying the nets that maximize the number of vertex connections corresponds to finding the set of maximum leaf spanning trees of the shell graph. This method allows not only to design the self-assembly of much larger shell structures but also to apply additional design criteria, as a complete catalog of the maximum leaf spanning trees is obtained.
△ Less
Submitted 7 July, 2018; v1 submitted 2 October, 2017;
originally announced October 2017.
-
Quantum computation with indefinite causal structures
Authors:
Mateus Araújo,
Philippe Allard Guérin,
Ämin Baumeler
Abstract:
One way to study the physical plausibility of closed timelike curves (CTCs) is to examine their computational power. This has been done for Deutschian CTCs (D-CTCs) and post-selection CTCs (P-CTCs), with the result that they allow for the efficient solution of problems in PSPACE and PP, respectively. Since these are extremely powerful complexity classes, which are not expected to be solvable in re…
▽ More
One way to study the physical plausibility of closed timelike curves (CTCs) is to examine their computational power. This has been done for Deutschian CTCs (D-CTCs) and post-selection CTCs (P-CTCs), with the result that they allow for the efficient solution of problems in PSPACE and PP, respectively. Since these are extremely powerful complexity classes, which are not expected to be solvable in reality, this can be taken as evidence that these models for CTCs are pathological. This problem is closely related to the nonlinearity of this models, which also allows for example cloning quantum states, in the case of D-CTCs, or distinguishing non-orthogonal quantum states, in the case of P-CTCs. In contrast, the process matrix formalism allows one to model indefinite causal structures in a linear way, getting rid of these effects, and raising the possibility that its computational power is rather tame. In this paper we show that process matrices correspond to a linear particular case of P-CTCs, and therefore that its computational power is upperbounded by that of PP. We show, furthermore, a family of processes that can violate causal inequalities but nevertheless can be simulated by a causally ordered quantum circuit with only a constant overhead, showing that indefinite causality is not necessarily hard to simulate.
△ Less
Submitted 8 July, 2020; v1 submitted 29 June, 2017;
originally announced June 2017.
-
Using Facebook Ads Audiences for Global Lifestyle Disease Surveillance: Promises and Limitations
Authors:
Matheus Araujo,
Yelena Mejova,
Ingmar Weber,
Fabricio Benevenuto
Abstract:
Every day, millions of users reveal their interests on Facebook, which are then monetized via targeted advertisement marketing campaigns. In this paper, we explore the use of demographically rich Facebook Ads audience estimates for tracking non-communicable diseases around the world. Across 47 countries, we compute the audiences of marker interests, and evaluate their potential in tracking health…
▽ More
Every day, millions of users reveal their interests on Facebook, which are then monetized via targeted advertisement marketing campaigns. In this paper, we explore the use of demographically rich Facebook Ads audience estimates for tracking non-communicable diseases around the world. Across 47 countries, we compute the audiences of marker interests, and evaluate their potential in tracking health conditions associated with tobacco use, obesity, and diabetes, compared to the performance of placebo interests. Despite its huge potential, we find that, for modeling prevalence of health conditions across countries, differences in these interest audiences are only weakly indicative of the corresponding prevalence rates. Within the countries, however, our approach provides interesting insights on trends of health awareness across demographic groups. Finally, we provide a temporal error analysis to expose the potential pitfalls of using Facebook's Marketing API as a black box.
△ Less
Submitted 11 May, 2017;
originally announced May 2017.
-
Complex Network Tools to Understand the Behavior of Criminality in Urban Areas
Authors:
Gabriel Spadon,
Lucas C. Scabora,
Marcus V. S. Araujo,
Paulo H. Oliveira,
Bruno B. Machado,
Elaine P. M. Sousa,
Caetano Traina-Jr,
Jose F. Rodrigues-Jr
Abstract:
Complex networks are nowadays employed in several applications. Modeling urban street networks is one of them, and in particular to analyze criminal aspects of a city. Several research groups have focused on such application, but until now, there is a lack of a well-defined methodology for employing complex networks in a whole crime analysis process, i.e. from data preparation to a deep analysis o…
▽ More
Complex networks are nowadays employed in several applications. Modeling urban street networks is one of them, and in particular to analyze criminal aspects of a city. Several research groups have focused on such application, but until now, there is a lack of a well-defined methodology for employing complex networks in a whole crime analysis process, i.e. from data preparation to a deep analysis of criminal communities. Furthermore, the "toolset" available for those works is not complete enough, also lacking techniques to maintain up-to-date, complete crime datasets and proper assessment measures. In this sense, we propose a threefold methodology for employing complex networks in the detection of highly criminal areas within a city. Our methodology comprises three tasks: (i) Map** of Urban Crimes; (ii) Criminal Community Identification; and (iii) Crime Analysis. Moreover, it provides a proper set of assessment measures for analyzing intrinsic criminality of communities, especially when considering different crime types. We show our methodology by applying it to a real crime dataset from the city of San Francisco - CA, USA. The results confirm its effectiveness to identify and analyze high criminality areas within a city. Hence, our contributions provide a basis for further developments on complex networks applied to crime analysis.
△ Less
Submitted 24 December, 2016; v1 submitted 19 December, 2016;
originally announced December 2016.
-
Gender differences in scientific collaborations: Women are more egalitarian than men
Authors:
Eduardo B. Araujo,
Nuno A. M. Araujo,
Andre A. Moreira,
Hans J. Herrmann,
J. S. Andrade Jr
Abstract:
By analyzing a unique dataset of more than 270,000 scientists, we discovered substantial gender differences in scientific collaborations. While men are more likely to collaborate with other men, women are more egalitarian. This is consistently observed over all fields and regardless of the number of collaborators a scientist has. The only exception is observed in the field of engineering, where th…
▽ More
By analyzing a unique dataset of more than 270,000 scientists, we discovered substantial gender differences in scientific collaborations. While men are more likely to collaborate with other men, women are more egalitarian. This is consistently observed over all fields and regardless of the number of collaborators a scientist has. The only exception is observed in the field of engineering, where this gender bias disappears with increasing number of collaborators. We also found that the distribution of the number of collaborators follows a truncated power law with a cut-off that is gender dependent and related to the gender differences in the number of published papers. Considering interdisciplinary research, our analysis shows that men and women behave similarly across fields, except in the case of natural sciences, where women with many collaborators are more likely to have collaborators from other fields.
△ Less
Submitted 19 October, 2016;
originally announced October 2016.
-
Systematic Map** Protocol: Have Systematic Reuse Benefits Been Transferred to Real-world Settings?
Authors:
Jose Luis Barros-Justo,
Fernando Pinciroli,
Santiago Matalonga,
Marco Aurelio Paz Gonzalez,
Nelson Martinez Araujo
Abstract:
This document details the planning phase of a Systematic Map** Study. Our goal is to identify and to understand the benefits that the software engineering community has reported on the application of the different reuse strategies in industrial context, by building a general picture (map) containing: the claimed benefits, the data supporting those claims, the industry's domains and the reuse str…
▽ More
This document details the planning phase of a Systematic Map** Study. Our goal is to identify and to understand the benefits that the software engineering community has reported on the application of the different reuse strategies in industrial context, by building a general picture (map) containing: the claimed benefits, the data supporting those claims, the industry's domains and the reuse strategy employed.
△ Less
Submitted 20 September, 2016;
originally announced September 2016.
-
An electronic-game framework for evaluating coevolutionary algorithms
Authors:
Karine da Silva Miras de Araújo,
Fabrício Olivetti de França
Abstract:
One of the common artificial intelligence applications in electronic games consists of making an artificial agent learn how to execute some determined task successfully in a game environment. One way to perform this task is through machine learning algorithms capable of learning the sequence of actions required to win in a given game environment. There are several supervised learning techniques ab…
▽ More
One of the common artificial intelligence applications in electronic games consists of making an artificial agent learn how to execute some determined task successfully in a game environment. One way to perform this task is through machine learning algorithms capable of learning the sequence of actions required to win in a given game environment. There are several supervised learning techniques able to learn the correct answer for a problem through examples. However, when learning how to play electronic games, the correct answer might only be known by the end of the game, after all the actions were already taken. Thus, not being possible to measure the accuracy of each individual action to be taken at each time step. A way for dealing with this problem is through Neuroevolution, a method which trains Artificial Neural Networks using evolutionary algorithms. In this article, we introduce a framework for testing optimization algorithms with artificial agent controllers in electronic games, called EvoMan, which is inspired in the action-platformer game Mega Man II. The environment can be configured to run in different experiment modes, as single evolution, coevolution and others. To demonstrate some challenges regarding the proposed platform, as initial experiments we applied Neuroevolution using Genetic Algorithms and the NEAT algorithm, in the context of competitively coevolving two distinct agents in this game.
△ Less
Submitted 11 April, 2016; v1 submitted 3 April, 2016;
originally announced April 2016.
-
JADE, TraSMAPI and SUMO: A tool-chain for simulating traffic light control
Authors:
Tiago Azevedo,
Paulo J. M. de Araújo,
Rosaldo J. F. Rossetti,
Ana Paula C. Rocha
Abstract:
Increased stress, fuel consumption, air pollution, accidents and delays are some of the consequences of traffic congestion usually incurring in tremendous economic impacts, which society aims to remedy in order to leverage a sustainable development. Recently, unconventional means for modeling and controlling such complex traffic systems relying on multi-agent systems have arisen. This paper contri…
▽ More
Increased stress, fuel consumption, air pollution, accidents and delays are some of the consequences of traffic congestion usually incurring in tremendous economic impacts, which society aims to remedy in order to leverage a sustainable development. Recently, unconventional means for modeling and controlling such complex traffic systems relying on multi-agent systems have arisen. This paper contributes to the understanding of such complex and highly dynamic systems by proposing an open-source tool-chain to implement multi-agent-based solutions in traffic and transportation. The proposed approach relies on two very popular tools in both domains, with focus on traffic light control. This tool-chain consists in combining JADE (Java Agent DEvelopment Framework), for the implementation of multi-agent systems, with SUMO (Simulation of Urban MObility), for the microscopic simulation of traffic interactions. TraSMAPI (Traffic Simulation Manager Application Programming Interface) is used to combine JADE and SUMO allowing communication between them. A demonstration of the concept is presented to illustrate the main features of this tool-chain, using Q-Learning as the reinforcement learning method for each traffic light agent in a simulated network. Results demonstrate the feasibility of the proposed framework as a practical means to experiment with different agent-based designs of intelligent transportation solutions.
△ Less
Submitted 29 January, 2016;
originally announced January 2016.
-
SentiBench - a benchmark comparison of state-of-the-practice sentiment analysis methods
Authors:
Filipe Nunes Ribeiro,
Matheus Araújo,
Pollyanna Gonçalves,
Fabrício Benevenuto,
Marcos André Gonçalves
Abstract:
In the last few years thousands of scientific papers have investigated sentiment analysis, several startups that measure opinions on real data have emerged and a number of innovative products related to this theme have been developed. There are multiple methods for measuring sentiments, including lexical-based and supervised machine learning methods. Despite the vast interest on the theme and wide…
▽ More
In the last few years thousands of scientific papers have investigated sentiment analysis, several startups that measure opinions on real data have emerged and a number of innovative products related to this theme have been developed. There are multiple methods for measuring sentiments, including lexical-based and supervised machine learning methods. Despite the vast interest on the theme and wide popularity of some methods, it is unclear which one is better for identifying the polarity (i.e., positive or negative) of a message. Accordingly, there is a strong need to conduct a thorough apple-to-apple comparison of sentiment analysis methods, \textit{as they are used in practice}, across multiple datasets originated from different data sources. Such a comparison is key for understanding the potential limitations, advantages, and disadvantages of popular methods. This article aims at filling this gap by presenting a benchmark comparison of twenty-four popular sentiment analysis methods (which we call the state-of-the-practice methods). Our evaluation is based on a benchmark of eighteen labeled datasets, covering messages posted on social networks, movie and product reviews, as well as opinions and comments in news articles. Our results highlight the extent to which the prediction performance of these methods varies considerably across datasets. Aiming at boosting the development of this research area, we open the methods' codes and datasets used in this article, deploying them in a benchmark system, which provides an open API for accessing and comparing sentence-level sentiment analysis methods.
△ Less
Submitted 14 July, 2016; v1 submitted 6 December, 2015;
originally announced December 2015.
-
A Framework for the Evaluation of SaaS Impact
Authors:
Virginia Maria Araujo,
Jose Ayude Vazquez,
Manuel Perez Cota
Abstract:
Nowadays the technological progress allows us to have highly flexible solutions, easily accessible with lower levels of investment, which leads to many companies adopting SaaS (Software-as-a-Service) to support their business processes. Associated with this movement and considering the advantages of SaaS, it is important to understand whether work is being developed that is underutilized because c…
▽ More
Nowadays the technological progress allows us to have highly flexible solutions, easily accessible with lower levels of investment, which leads to many companies adopting SaaS (Software-as-a-Service) to support their business processes. Associated with this movement and considering the advantages of SaaS, it is important to understand whether work is being developed that is underutilized because companies are not taking advantage of it, and in this case it is necessary to understand the reasons thereof. This knowledge is important even for people who do not use or do not develop/provide SaaS, since sooner or later it will be unavoidable due to current trends. In the near future, nearly all decision-makers of IT strategies will be forced to consider adopting SaaS as an IT solution for the convenience benefits associated with technology or market competition. At that time they will have to know how to evaluate impacts and decide. Often, decision-makers of business strategies consider only the attractive incentives of using SaaS ignoring the impacts associated with new technologies. The need for tools and processes to assess these impacts before adopting a SaaS solution is crucial to ensure the sustainability of the information system, reduce uncertainty and facilitate decision making. This article presents a framework for evaluating impacts of SaaS called SIE (SaaS Impact Evaluation) which in addition to guidance for the present research, aims to provide guidelines for the collection, data analysis, impact assessment and decision making about including SaaS on the organizations strategic plans.
△ Less
Submitted 11 June, 2014;
originally announced June 2014.
-
Comparing and Combining Sentiment Analysis Methods
Authors:
Pollyanna Gonçalves,
Matheus Araújo,
Fabrício Benevenuto,
Meeyoung Cha
Abstract:
Several messages express opinions about events, products, and services, political views or even their author's emotional state and mood. Sentiment analysis has been used in several applications including analysis of the repercussions of events in social networks, analysis of opinions about products and services, and simply to better understand aspects of social communication in Online Social Netwo…
▽ More
Several messages express opinions about events, products, and services, political views or even their author's emotional state and mood. Sentiment analysis has been used in several applications including analysis of the repercussions of events in social networks, analysis of opinions about products and services, and simply to better understand aspects of social communication in Online Social Networks (OSNs). There are multiple methods for measuring sentiments, including lexical-based approaches and supervised machine learning methods. Despite the wide use and popularity of some methods, it is unclear which method is better for identifying the polarity (i.e., positive or negative) of a message as the current literature does not provide a method of comparison among existing methods. Such a comparison is crucial for understanding the potential limitations, advantages, and disadvantages of popular methods in analyzing the content of OSNs messages. Our study aims at filling this gap by presenting comparisons of eight popular sentiment analysis methods in terms of coverage (i.e., the fraction of messages whose sentiment is identified) and agreement (i.e., the fraction of identified sentiments that are in tune with ground truth). We develop a new method that combines existing approaches, providing the best coverage results and competitive agreement. We also present a free Web service called iFeel, which provides an open API for accessing and comparing results across different sentiment methods for a given text.
△ Less
Submitted 30 May, 2014;
originally announced June 2014.
-
Revealing the structure of the world airline network
Authors:
Trivik Verma,
Nuno A. M. Araújo,
Hans J Herrmann
Abstract:
Resilience of most critical infrastructures against failure of elements that appear insignificant is usually taken for granted. The World Airline Network (WAN) is an infrastructure that reduces the geographical gap between societies, both small and large, and brings forth economic gains. With the extensive use of a publicly maintained data set that contains information about airports and alternati…
▽ More
Resilience of most critical infrastructures against failure of elements that appear insignificant is usually taken for granted. The World Airline Network (WAN) is an infrastructure that reduces the geographical gap between societies, both small and large, and brings forth economic gains. With the extensive use of a publicly maintained data set that contains information about airports and alternative connections between these airports, we empirically reveal that the WAN is a redundant and resilient network for long distance air travel, but otherwise breaks down completely due to removal of short and apparently insignificant connections. These short range connections with moderate number of passengers and alternate flights are the connections that keep remote parts of the world accessible. It is surprising, insofar as there exists a highly resilient and strongly connected core consisting of a small fraction of airports (around 2.3%) together with an extremely fragile star-like periphery. Yet, in spite of their relevance, more than 90% of the world airports are still interconnected upon removal of this core. With standard and unconventional removal measures we compare both empirical and topological perceptions for the fragmentation of the world. We identify how the WAN is organized into different classes of clusters based on the physical proximity of airports and analyze the consequence of this fragmentation.
△ Less
Submitted 4 April, 2014;
originally announced April 2014.
-
Business and technical requirements of Software-as-a-Service: Implications in portuguese enterprise business context
Authors:
Virginia Maria Araujo,
Jose Ayude Vazquez
Abstract:
Software-as-a-Service (SaaS) is a viable option for some companies bearing their business processes. There is a considerable adoption rate, with companies already using more than two services for over two years. However, while some companies have plans to put more business processes supported by these services in the near future, others do not know if they will. They have several concerns regardin…
▽ More
Software-as-a-Service (SaaS) is a viable option for some companies bearing their business processes. There is a considerable adoption rate, with companies already using more than two services for over two years. However, while some companies have plans to put more business processes supported by these services in the near future, others do not know if they will. They have several concerns regarding the software providers service level. These concerns are mainly technical and functional issues, service availability and payment models. There are major changes compared to the traditional software that have implications on how the software is developed and made available to the users. The existing research addresses specific aspects and few studies give a broader view of the implications of SaaS for anyone who develops and provides software, and also for those who consumes it as an end user. What are the real needs of the Portuguese market? What fears and what is being done to mitigate them? Where should we focus our attention related to the SaaS offering in order to create more value? Thus, to analyze these questions four exploratory case studiesare used to assess the possible implications of SaaS on software developers or software providers based in Portugal and also on end-users. This article appears in the context of a realistic and deep research that includes the involvement of managers, leaders and decision makers of Portuguese companies, to realize what actually constitutes a problem in SaaS and what effectively companies would like to have available in this offer. The results of this study reveal that SaaS effectively constitutes a very interesting and solid solution for the development of Portuguese companies, however there is a lack for greater efforts particularly in terms of customization for each customer (tenant) and integration with the back-end on-premise applications.
△ Less
Submitted 8 December, 2013;
originally announced December 2013.
-
Efficient algorithm to study interconnected networks
Authors:
Christian M. Schneider,
Nuno A. M. Araújo,
Hans J. Herrmann
Abstract:
Interconnected networks have been shown to be much more vulnerable to random and targeted failures than isolated ones, raising several interesting questions regarding the identification and mitigation of their risk. The paradigm to address these questions is the percolation model, where the resilience of the system is quantified by the dependence of the size of the largest cluster on the number of…
▽ More
Interconnected networks have been shown to be much more vulnerable to random and targeted failures than isolated ones, raising several interesting questions regarding the identification and mitigation of their risk. The paradigm to address these questions is the percolation model, where the resilience of the system is quantified by the dependence of the size of the largest cluster on the number of failures. Numerically, the major challenge is the identification of this cluster and the calculation of its size. Here, we propose an efficient algorithm to tackle this problem. We show that the algorithm scales as O(N log N), where N is the number of nodes in the network, a significant improvement compared to O(N^2) for a greedy algorithm, what permits studying much larger networks. Our new strategy can be applied to any network topology and distribution of interdependencies, as well as any sequence of failures.
△ Less
Submitted 13 January, 2013;
originally announced January 2013.
-
Catastrophic Cascade of Failures in Interdependent Networks
Authors:
S. Havlin,
N. A. M. Araujo,
S. V. Buldyrev,
C. S. Dias,
R. Parshani,
G. Paul,
H. E. Stanley
Abstract:
Modern network-like systems are usually coupled in such a way that failures in one network can affect the entire system. In infrastructures, biology, sociology, and economy, systems are interconnected and events taking place in one system can propagate to any other coupled system. Recent studies on such coupled systems show that the coupling increases their vulnerability to random failure. Propert…
▽ More
Modern network-like systems are usually coupled in such a way that failures in one network can affect the entire system. In infrastructures, biology, sociology, and economy, systems are interconnected and events taking place in one system can propagate to any other coupled system. Recent studies on such coupled systems show that the coupling increases their vulnerability to random failure. Properties for interdependent networks differ significantly from those of single-network systems. In this article, these results are reviewed and the main properties discussed.
△ Less
Submitted 1 December, 2010;
originally announced December 2010.