823 resultados para trust graph
Resumo:
An earlier Case-based Reasoning (CBR) approach developed by the authors for educational course timetabling problems employed structured cases to represent the complex relationships between courses. Previous solved cases represented by attribute graphs were organized hierarchically into a decision tree. The retrieval searches for graph isomorphism among these attribute graphs. In this paper, the approach is further developed to solve a wider range of problems. We also attempt to retrieve those graphs that have common similar structures but also have some differences. Costs that are assigned to these differences have an input upon the similarity measure. A large number of experiments are performed consisting of different randomly produced timetabling problems and the results presented here strongly indicate that a CBR approach could provide a significant step forward in the development of automated system to solve difficult timetabling problems. They show that using relatively little effort, we can retrieve these structurally similar cases to provide high quality timetables for new timetabling problems.
Resumo:
This paper presents an investigation of a simple generic hyper-heuristic approach upon a set of widely used constructive heuristics (graph coloring heuristics) in timetabling. Within the hyperheuristic framework, a Tabu Search approach is employed to search for permutations of graph heuristics which are used for constructing timetables in exam and course timetabling problems. This underpins a multi-stage hyper-heuristic where the Tabu Search employs permutations upon a different number of graph heuristics in two stages. We study this graph-based hyper-heuristic approach within the context of exploring fundamental issues concerning the search space of the hyper-heuristic (the heuristic space) and the solution space. Such issues have not been addressed in other hyper-heuristic research. These approaches are tested on both exam and course benchmark timetabling problems and are compared with the fine-tuned bespoke state-of-the-art approaches. The results are within the range of the best results reported in the literature. The approach described here represents a significantly more generally applicable approach than the current state of the art in the literature. Future work will extend this hyper-heuristic framework by employing methodologies which are applicable on a wider range of timetabling and scheduling problems.
Resumo:
In this paper we use concepts from graph theory and cellular biology represented as ontologies, to carry out semantic mining tasks on signaling pathway networks. Specifically, the paper describes the semantic enrichment of signaling pathway networks. A cell signaling network describes the basic cellular activities and their interactions. The main contribution of this paper is in the signaling pathway research area, it proposes a new technique to analyze and understand how changes in these networks may affect the transmission and flow of information, which produce diseases such as cancer and diabetes. Our approach is based on three concepts from graph theory (modularity, clustering and centrality) frequently used on social networks analysis. Our approach consists into two phases: the first uses the graph theory concepts to determine the cellular groups in the network, which we will call them communities; the second uses ontologies for the semantic enrichment of the cellular communities. The measures used from the graph theory allow us to determine the set of cells that are close (for example, in a disease), and the main cells in each community. We analyze our approach in two cases: TGF-β and the Alzheimer Disease.
Resumo:
Edge-labeled graphs have proliferated rapidly over the last decade due to the increased popularity of social networks and the Semantic Web. In social networks, relationships between people are represented by edges and each edge is labeled with a semantic annotation. Hence, a huge single graph can express many different relationships between entities. The Semantic Web represents each single fragment of knowledge as a triple (subject, predicate, object), which is conceptually identical to an edge from subject to object labeled with predicates. A set of triples constitutes an edge-labeled graph on which knowledge inference is performed. Subgraph matching has been extensively used as a query language for patterns in the context of edge-labeled graphs. For example, in social networks, users can specify a subgraph matching query to find all people that have certain neighborhood relationships. Heavily used fragments of the SPARQL query language for the Semantic Web and graph queries of other graph DBMS can also be viewed as subgraph matching over large graphs. Though subgraph matching has been extensively studied as a query paradigm in the Semantic Web and in social networks, a user can get a large number of answers in response to a query. These answers can be shown to the user in accordance with an importance ranking. In this thesis proposal, we present four different scoring models along with scalable algorithms to find the top-k answers via a suite of intelligent pruning techniques. The suggested models consist of a practically important subset of the SPARQL query language augmented with some additional useful features. The first model called Substitution Importance Query (SIQ) identifies the top-k answers whose scores are calculated from matched vertices' properties in each answer in accordance with a user-specified notion of importance. The second model called Vertex Importance Query (VIQ) identifies important vertices in accordance with a user-defined scoring method that builds on top of various subgraphs articulated by the user. Approximate Importance Query (AIQ), our third model, allows partial and inexact matchings and returns top-k of them with a user-specified approximation terms and scoring functions. In the fourth model called Probabilistic Importance Query (PIQ), a query consists of several sub-blocks: one mandatory block that must be mapped and other blocks that can be opportunistically mapped. The probability is calculated from various aspects of answers such as the number of mapped blocks, vertices' properties in each block and so on and the most top-k probable answers are returned. An important distinguishing feature of our work is that we allow the user a huge amount of freedom in specifying: (i) what pattern and approximation he considers important, (ii) how to score answers - irrespective of whether they are vertices or substitution, and (iii) how to combine and aggregate scores generated by multiple patterns and/or multiple substitutions. Because so much power is given to the user, indexing is more challenging than in situations where additional restrictions are imposed on the queries the user can ask. The proposed algorithms for the first model can also be used for answering SPARQL queries with ORDER BY and LIMIT, and the method for the second model also works for SPARQL queries with GROUP BY, ORDER BY and LIMIT. We test our algorithms on multiple real-world graph databases, showing that our algorithms are far more efficient than popular triple stores.
Resumo:
In this thesis, we define the spectrum problem for packings (coverings) of G to be the problem of finding all graphs H such that a maximum G-packing (minimum G- covering) of the complete graph with the leave (excess) graph H exists. The set of achievable leave (excess) graphs in G-packings (G-coverings) of the complete graph is called the spectrum of leave (excess) graphs for G. Then, we consider this problem for trees with up to five edges. We will prove that for any tree T with up to five edges, if the leave graph in a maximum T-packing of the complete graph Kn has i edges, then the spectrum of leave graphs for T is the set of all simple graphs with i edges. In fact, for these T and i and H any simple graph with i edges, we will construct a maximum T-packing of Kn with the leave graph H. We will also show that for any tree T with k ≤ 5 edges, if the excess graph in a minimum T-covering of the complete graph Kn has i edges, then the spectrum of excess graphs for T is the set of all simple graphs and multigraphs with i edges, except for the case that T is a 5-star, for which the graph formed by four multiple edges is not achievable when n = 12.
Resumo:
This thesis presents an in-depth case study of a superdiverse neighbourhood in Glasgow where long-term white and ethnic minority communities reside alongside Roma migrants, asylum seekers and refugees, young professionals and other recent arrivals in traditional tenement housing. It focuses on the nature and extent of social contact and trust and on the role of context in shaping social relations. Employing the concepts of social milieu and intersectionality to identify social differences the research examines the relationships between five broad groupings of residents in the neighbourhood: Nostalgic Working Class, Scottish Asian, Liberal Homeowners, Kinship-sited Roma and Global Migrants. Ethnographic fieldwork was carried out in contexts within the neighbourhood, theorised as being potential sites for intergroup contact. Three types of interactions were examined: Group-based Interactions, Neighbour Interactions and Street Interactions. The data comprised documentary evidence, participant and direct observations, in-depth qualitative and walk-along interviews with residents and local organisations. Findings show that rather than individualising and isolating residents, superdiversity can stimulate community activism, yet there remains a preference for interaction within one’s own social milieu. The research has found that the concentration of poverty and material conditions has a more profound effect on social relations than historical diversity and the extent to which diversity is normalised within local discourses. Trust judgements in a superdiverse context may rely more on shared interests, moral outlook and assessments of the context rather than the extent of social contact. The quasi-private spaces of shared residential spaces and community activities can facilitate encounters with the potential to build trust, yet for this to occur cooperation through shared activities may not be sufficient. Interactions may need to move beyond co-presence and conviviality to increased understanding and empathy through dialogue. At an aggregate level, the extent to which superdiversity contributes to social contact and trust within the neighbourhood is strongly influenced by contextual factors and wider economic processes influencing housing tenure mix, private renting, property maintenance, residential churn and environmental conditions. Through examining different types of social contacts, the dynamics of trust as well as contextual influences, this thesis offers insights into the causal processes and factors that influence social relations at a local level.
Resumo:
This dissertation investigates the connection between spectral analysis and frame theory. When considering the spectral properties of a frame, we present a few novel results relating to the spectral decomposition. We first show that scalable frames have the property that the inner product of the scaling coefficients and the eigenvectors must equal the inverse eigenvalues. From this, we prove a similar result when an approximate scaling is obtained. We then focus on the optimization problems inherent to the scalable frames by first showing that there is an equivalence between scaling a frame and optimization problems with a non-restrictive objective function. Various objective functions are considered, and an analysis of the solution type is presented. For linear objectives, we can encourage sparse scalings, and with barrier objective functions, we force dense solutions. We further consider frames in high dimensions, and derive various solution techniques. From here, we restrict ourselves to various frame classes, to add more specificity to the results. Using frames generated from distributions allows for the placement of probabilistic bounds on scalability. For discrete distributions (Bernoulli and Rademacher), we bound the probability of encountering an ONB, and for continuous symmetric distributions (Uniform and Gaussian), we show that symmetry is retained in the transformed domain. We also prove several hyperplane-separation results. With the theory developed, we discuss graph applications of the scalability framework. We make a connection with graph conditioning, and show the in-feasibility of the problem in the general case. After a modification, we show that any complete graph can be conditioned. We then present a modification of standard PCA (robust PCA) developed by Cand\`es, and give some background into Electron Energy-Loss Spectroscopy (EELS). We design a novel scheme for the processing of EELS through robust PCA and least-squares regression, and test this scheme on biological samples. Finally, we take the idea of robust PCA and apply the technique of kernel PCA to perform robust manifold learning. We derive the problem and present an algorithm for its solution. There is also discussion of the differences with RPCA that make theoretical guarantees difficult.
Resumo:
Graphs are powerful tools to describe social, technological and biological networks, with nodes representing agents (people, websites, gene, etc.) and edges (or links) representing relations (or interactions) between agents. Examples of real-world networks include social networks, the World Wide Web, collaboration networks, protein networks, etc. Researchers often model these networks as random graphs. In this dissertation, we study a recently introduced social network model, named the Multiplicative Attribute Graph model (MAG), which takes into account the randomness of nodal attributes in the process of link formation (i.e., the probability of a link existing between two nodes depends on their attributes). Kim and Lesckovec, who defined the model, have claimed that this model exhibit some of the properties a real world social network is expected to have. Focusing on a homogeneous version of this model, we investigate the existence of zero-one laws for graph properties, e.g., the absence of isolated nodes, graph connectivity and the emergence of triangles. We obtain conditions on the parameters of the model, so that these properties occur with high or vanishingly probability as the number of nodes becomes unboundedly large. In that regime, we also investigate the property of triadic closure and the nodal degree distribution.
Resumo:
In this dissertation I draw a connection between quantum adiabatic optimization, spectral graph theory, heat-diffusion, and sub-stochastic processes through the operators that govern these processes and their associated spectra. In particular, we study Hamiltonians which have recently become known as ``stoquastic'' or, equivalently, the generators of sub-stochastic processes. The operators corresponding to these Hamiltonians are of interest in all of the settings mentioned above. I predominantly explore the connection between the spectral gap of an operator, or the difference between the two lowest energies of that operator, and certain equilibrium behavior. In the context of adiabatic optimization, this corresponds to the likelihood of solving the optimization problem of interest. I will provide an instance of an optimization problem that is easy to solve classically, but leaves open the possibility to being difficult adiabatically. Aside from this concrete example, the work in this dissertation is predominantly mathematical and we focus on bounding the spectral gap. Our primary tool for doing this is spectral graph theory, which provides the most natural approach to this task by simply considering Dirichlet eigenvalues of subgraphs of host graphs. I will derive tight bounds for the gap of one-dimensional, hypercube, and general convex subgraphs. The techniques used will also adapt methods recently used by Andrews and Clutterbuck to prove the long-standing ``Fundamental Gap Conjecture''.
Resumo:
An organization trusted by consumers enjoys a number of benefits. Unfortunately, instances of trust-damaging events involving organizations happen often. Damaged consumer trust in an organization has numerous negative consequences for the organization and for consumers. Currently, there is a paucity of theory about consumer trust recovery. So, understanding why and how consumer trust recovery occurs is timely, and theoretically and practically relevant. However, the findings from this study suggest that we need to distinguish between two kinds of consumer trust recovery. The first (I call it unconscious consumer trust recovery) refers to trust recovery that occurs without the consumer being fully conscious of it. In other words, a consumer is aware of their damaged trust during the scandal, but is not aware that their trust in the organization has improved. The consumer does not think about his or her recovered trust, just as they did not think about their level of trust before the scandal. The consumer trust is habitual. The second (I call it conscious consumer trust recovery) refers to an improvement in damaged trust where the consumer is fully conscious of their trust recovery. In other words, in conscious trust recovery the consumer is aware that the scandal damaged their trust in the organization. Also, after the scandal, in contrast to unconscious trust recovery, in conscious trust recovery the consumer is also fully aware that he trusts the organization as much or more than during the scandal. My aim is to inductively develop a theory explaining each type of consumer trust recovery. To do so, I use Charmazian grounded theory methodology, because this methodology is developed for theory-building from data and is aligned with the philosophical underpinnings of this study. The empirical context for this study is the meat adulteration scandal (“the horse meat scandal”) in 2013 in the UK. I collect and analyse empirical data about both types of trust recovery in an organization from 31 consumers that experienced both types. My analysis shows that when consumers perceive the scandal as less important, they experience unconscious trust recovery. This happens because the reduced importance of the scandal leads to a shift in consumers’ attention, which in turn leads to their inattentiveness to the scandal. Consumer inattentiveness is an immediate antecedent of unconscious trust recovery. Conscious consumer trust recovery occurs because consumers see cues indicating to them that the food retailer has improved product control systems, which in turn leads to consumer perceptions of the organization’s renewed ability. Consumer perception of renewed ability is an immediate antecedent of their conscious trust recovery. My findings lead me to make three main theoretical contributions to the theory of trust recovery in general and to consumer trust recovery in particular. The first contribution lies in showing that there are two types of consumer trust recovery in an organization, not one, as previously conceptualised, and that the same consumers can experience both types. The second contribution is a theory of unconscious consumer trust recovery in an organization that involves three concepts: consumers’ perceived importance of the scandal, consumers’ shift of attention, and consumer inattentiveness. The third contribution is the finding that conscious recovery of consumer trust occurs even when existing theory of trust recovery would predict that it would not. This study can help managers aiming to repair consumer trust in an organization by identifying a set of antecedents and underlying mechanisms that can guide such trust repair.
Resumo:
Verbal fluency is the ability to produce a satisfying sequence of spoken words during a given time interval. The core of verbal fluency lies in the capacity to manage the executive aspects of language. The standard scores of the semantic verbal fluency test are broadly used in the neuropsychological assessment of the elderly, and different analytical methods are likely to extract even more information from the data generated in this test. Graph theory, a mathematical approach to analyze relations between items, represents a promising tool to understand a variety of neuropsychological states. This study reports a graph analysis of data generated by the semantic verbal fluency test by cognitively healthy elderly (NC), patients with Mild Cognitive Impairment – subtypes amnestic(aMCI) and amnestic multiple domain (a+mdMCI) - and patients with Alzheimer’s disease (AD). Sequences of words were represented as a speech graph in which every word corresponded to a node and temporal links between words were represented by directed edges. To characterize the structure of the data we calculated 13 speech graph attributes (SGAs). The individuals were compared when divided in three (NC – MCI – AD) and four (NC – aMCI – a+mdMCI – AD) groups. When the three groups were compared, significant differences were found in the standard measure of correct words produced, and three SGA: diameter, average shortest path, and network density. SGA sorted the elderly groups with good specificity and sensitivity. When the four groups were compared, the groups differed significantly in network density, except between the two MCI subtypes and NC and aMCI. The diameter of the network and the average shortest path were significantly different between the NC and AD, and between aMCI and AD. SGA sorted the elderly in their groups with good specificity and sensitivity, performing better than the standard score of the task. These findings provide support for a new methodological frame to assess the strength of semantic memory through the verbal fluency task, with potential to amplify the predictive power of this test. Graph analysis is likely to become clinically relevant in neurology and psychiatry, and may be particularly useful for the differential diagnosis of the elderly.
Resumo:
In this article, we advocate for the use of a social-technical model of trust to support interaction designers in further reflecting on trust-enabling interaction design values that foster participation. Our rationale is built upon the believe that technological-mediated social participation needs trust, and it is with trust-enabling interactions that we foster the will for collaborate and share—the two key elements of participation. This article starts by briefly presenting a social-technical model of trust and then moves on with establishing authors rational that interconnects trust with technological-mediated social participation. It continues by linking the trust value to the context of design critique and critical design, and ends by illustrating how to incorporate the trust value into design. This is achieved by proposing an analytical tool that can serve to inform interaction designers to better understand the potential design options and reasons for choosing them.
Resumo:
"Prepared by G. Joachim [i.e. Joachim G.] Elterich and Linda Graham"--Prelim. p.