36,736 research outputs found
Multiobjective optimization of electromagnetic structures based on self-organizing migration
Práce se zabĂ˝vá popisem novĂ©ho stochastickĂ©ho vĂcekriteriálnĂho optimalizaÄŤnĂho algoritmu MOSOMA (Multiobjective Self-Organizing Migrating Algorithm). Je zde ukázáno, Ĺľe algoritmus je schopen Ĺ™ešit nejrĹŻznÄ›jšà typy optimalizaÄŤnĂch Ăşloh (s jakĂ˝mkoli poÄŤtem kritĂ©riĂ, s i bez omezujĂcĂch podmĂnek, se spojitĂ˝m i diskrĂ©tnĂm stavovĂ˝m prostorem). VĂ˝sledky algoritmu jsou srovnány s dalšĂmi běžnÄ› pouĹľĂvanĂ˝mi metodami pro vĂcekriteriálnĂ optimalizaci na velkĂ© sadÄ› testovacĂch Ăşloh. Uvedli jsme novou techniku pro vĂ˝poÄŤet metriky rozprostĹ™enĂ (spread) zaloĹľenĂ© na hledánĂ minimálnĂ kostry grafu (Minimum Spanning Tree) pro problĂ©my majĂcĂ vĂce neĹľ dvÄ› kritĂ©ria. DoporuÄŤenĂ© hodnoty pro parametry Ĺ™ĂdĂcĂ bÄ›h algoritmu byly urÄŤeny na základÄ› vĂ˝sledkĹŻ jejich citlivostnĂ analĂ˝zy. Algoritmus MOSOMA je dále ĂşspěšnÄ› pouĹľit pro Ĺ™ešenĂ rĹŻznĂ˝ch návrhovĂ˝ch Ăşloh z oblasti elektromagnetismu (návrh Yagi-Uda antĂ©ny a dielektrickĂ˝ch filtrĹŻ, adaptivnĂ Ĺ™ĂzenĂ vyzaĹ™ovanĂ©ho svazku v ÄŤasovĂ© oblasti…).This thesis describes a novel stochastic multi-objective optimization algorithm called MOSOMA (Multi-Objective Self-Organizing Migrating Algorithm). It is shown that MOSOMA is able to solve various types of multi-objective optimization problems (with any number of objectives, unconstrained or constrained problems, with continuous or discrete decision space). The efficiency of MOSOMA is compared with other commonly used optimization techniques on a large suite of test problems. The new procedure based on finding of minimum spanning tree for computing the spread metric for problems with more than two objectives is proposed. Recommended values of parameters controlling the run of MOSOMA are derived according to their sensitivity analysis. The ability of MOSOMA to solve real-life problems from electromagnetics is shown in a few examples (Yagi-Uda and dielectric filters design, adaptive beam forming in time domain…).
A New Framework for Network Disruption
Traditional network disruption approaches focus on disconnecting or
lengthening paths in the network. We present a new framework for network
disruption that attempts to reroute flow through critical vertices via vertex
deletion, under the assumption that this will render those vertices vulnerable
to future attacks. We define the load on a critical vertex to be the number of
paths in the network that must flow through the vertex. We present
graph-theoretic and computational techniques to maximize this load, firstly by
removing either a single vertex from the network, secondly by removing a subset
of vertices.Comment: Submitted for peer review on September 13, 201
From Competition to Complementarity: Comparative Influence Diffusion and Maximization
Influence maximization is a well-studied problem that asks for a small set of
influential users from a social network, such that by targeting them as early
adopters, the expected total adoption through influence cascades over the
network is maximized. However, almost all prior work focuses on cascades of a
single propagating entity or purely-competitive entities. In this work, we
propose the Comparative Independent Cascade (Com-IC) model that covers the full
spectrum of entity interactions from competition to complementarity. In Com-IC,
users' adoption decisions depend not only on edge-level information
propagation, but also on a node-level automaton whose behavior is governed by a
set of model parameters, enabling our model to capture not only competition,
but also complementarity, to any possible degree. We study two natural
optimization problems, Self Influence Maximization and Complementary Influence
Maximization, in a novel setting with complementary entities. Both problems are
NP-hard, and we devise efficient and effective approximation algorithms via
non-trivial techniques based on reverse-reachable sets and a novel "sandwich
approximation". The applicability of both techniques extends beyond our model
and problems. Our experiments show that the proposed algorithms consistently
outperform intuitive baselines in four real-world social networks, often by a
significant margin. In addition, we learn model parameters from real user
action logs.Comment: An abridged of this work is to appear in the Proceedings of VLDB
Endowment (PVDLB), Vol 9, No 2. Also, the paper will be presented in the VLDB
2016 conference in New Delhi, India. This update contains new theoretical and
experimental results, and the paper is now in single-column format (44 pages
An Analysis and Enumeration of the Blockchain and Future Implications
The blockchain is a relatively new technology that has grown in interest and potential research since its inception. Blockchain technology is dominated by cryptocurrency in terms of usage. Research conducted in the past few years, however, reveals blockchain has the potential to revolutionize several different industries. The blockchain consists of three major technologies: a peer-to-peer network, a distributed database, and asymmetrically encrypted transactions. The peer-to-peer network enables a decentralized, consensus-based network structure where various nodes contribute to the overall network performance. A distributed database adds additional security and immutability to the network. The process of cryptographically securing individual transactions forms a core service of the blockchain and enables semi-anonymous user network presence
Core Decomposition in Multilayer Networks: Theory, Algorithms, and Applications
Multilayer networks are a powerful paradigm to model complex systems, where
multiple relations occur between the same entities. Despite the keen interest
in a variety of tasks, algorithms, and analyses in this type of network, the
problem of extracting dense subgraphs has remained largely unexplored so far.
In this work we study the problem of core decomposition of a multilayer
network. The multilayer context is much challenging as no total order exists
among multilayer cores; rather, they form a lattice whose size is exponential
in the number of layers. In this setting we devise three algorithms which
differ in the way they visit the core lattice and in their pruning techniques.
We then move a step forward and study the problem of extracting the
inner-most (also known as maximal) cores, i.e., the cores that are not
dominated by any other core in terms of their core index in all the layers.
Inner-most cores are typically orders of magnitude less than all the cores.
Motivated by this, we devise an algorithm that effectively exploits the
maximality property and extracts inner-most cores directly, without first
computing a complete decomposition.
Finally, we showcase the multilayer core-decomposition tool in a variety of
scenarios and problems. We start by considering the problem of densest-subgraph
extraction in multilayer networks. We introduce a definition of multilayer
densest subgraph that trades-off between high density and number of layers in
which the high density holds, and exploit multilayer core decomposition to
approximate this problem with quality guarantees. As further applications, we
show how to utilize multilayer core decomposition to speed-up the extraction of
frequent cross-graph quasi-cliques and to generalize the community-search
problem to the multilayer setting
- …