32 research outputs found

    Optimal leader-following consensus of fractional opinion formation models

    Get PDF
    This paper deals with a control strategy enforcing consensus in a fractional opinion formation model with leadership, where the interaction rates between followers and the influence rate of the leader are functions of deviations of opinions between agents. The fractional-order derivative determines the impact of the memory during the opinion evolution. The problem of leader-following consensus control is cast in the framework of nonlinear optimal control theory. We study a finite horizon optimal control problem, in which deviations of opinions between agents and with respect to the leader are penalized along with the control that is applied only to the leader. The existence conditions for optimal consensus control are proved and necessary optimality conditions for the considered problem are derived. The results of the paper are illustrated by some examples.publishe

    Using Agent-Based Modelling to Investigate Intervention Algorithms to Reduce Polarisation in Online Social Networks

    Get PDF
    Across much of the western world, political polarisation is on the rise. This has the effect of hindering political discourse, stifling open discussion, and in extreme cases has led to violence. The process of polarising and radicalising vulnerable individuals has migrated to social media websites, which have been implicated in several high profile terror attacks. Within this thesis we model and investigate various algorithms to prevent the spread of polarisation and extremist ideology by employing agent-based modelling techniques from the field of opinion dynamics. The contributions of our work include the following aspects. Firstly, we have developed a unified framework for opinion dynamics, allowing us to experiment easily on a number of different existing models and bringing together sometimes disparate innovations from across the field into one system. Secondly, this unified framework has been implemented in a modular simulator able to perfectly replicate results from purpose-built, stand-alone simulators for two widely used models, namely Relative Agreement and CODA, and then released to the public as the first general-purpose opinion dynamics simulator. Thirdly, we have developed two new intervention algorithms, along with a new metric for measuring the effectiveness of an intervention strategy, which aim to reduce the spread of polarisation across a network with low computational cost. These methods are compared to existing centrality-based methods upon a random network. The experimental results show our proposed approaches outperform centrality measures. We find that our ii iii algorithms are able to prevent up to 40% of non-extremist agents becoming extreme by removing only 10% of the network’s edges. Fourthly, we have investigated the efficacy of these intervention algorithms on polarisation under different scenarios (e.g. variable costs, different network structures). The experimental validation proves the proposed approach is robust and has performed favourably compared existing methods such as centrality-based methods especially on the second type of network. Finally, we have developed a broadcast-based communication system for agents, designed to mimic the one-way broadcast nature of a public social media post such as Twitter, in contrast to the existing model which emulates a two-way private conversation. The experimental result shows a lessening of the impact of our interventions, demonstrating the need for further investigation of such communication methods

    Vaccination strategies against COVID-19 and the diffusion of anti-vaccination views

    Get PDF
    Miss-information is usually adjusted to fit distinct narratives and can propagate rapidly through communities of interest, which work as echo chambers, cause reinforcement and foster confirmation bias. False beliefs, once adopted, are rarely corrected. Amidst the COVID-19 crisis, pandemic-deniers and people who oppose wearing face masks or quarantines have already been a substantial aspect of the development of the pandemic. With a potential vaccine for COVID-19, different anti-vaccine narratives will be created and, likely, adopted by large population groups, with critical consequences. Here, we analyse epidemic spreading and optimal vaccination strategies, measured with the average years of life lost, in two network topologies (scale-free and small-world) assuming full adherence to vaccine administration. We consider the spread of anti-vaccine views in the network, using a similar diffusion model as the one used in epidemics, which are adopted based on a persuasiveness parameter of anti-vaccine views. Results show that even if an anti-vaccine narrative has a small persuasiveness, a large part of the population will be rapidly exposed to them. Assuming that all individuals are equally likely to adopt anti-vaccine views after being exposed, more central nodes in the network are more exposed and therefore are more likely to adopt them. Comparing years of life lost, anti-vaccine views could have a significant cost not only on those who share them, since the core social benefits of a limited vaccination strategy (reduction of susceptible hosts, network disruptions and slowing the spread of the disease) are substantially shortened.Comment: 13 pages, 3 figure

    Unveiling AI Aversion: Understanding Antecedents and Task Complexity Effects

    Get PDF
    Artificial Intelligence (AI) has generated significant interest due to its potential to augment human intelligence. However, user attitudes towards AI are diverse, with some individuals embracing it enthusiastically while others harbor concerns and actively avoid its use. This two essays\u27 dissertation explores the reasons behind user aversion to AI. In the first essay, I develop a concise research model to explain users\u27 AI aversion based on the theory of effective use and the adaptive structuration theory. I then employ an online experiment to test my hypotheses empirically. The multigroup analysis by Structural Equation Modeling shows that users\u27 perceptions of human dissimilarity, AI bias, and social influence strongly drive AI aversion. Moreover, I find a significant difference between the simple and the complex task groups. This study reveals why users avert using AI by systematically examining the factors related to technology, user, task, and environment, thus making a significant contribution to the emerging field of AI aversion research. Next, while trust and distrust have been recognized as influential factors shaping users\u27 attitudes towards IT artifacts, their intricate relationship with task characteristics and their impact on AI aversion remains largely unexplored. In my second essay, I conduct an online randomized controlled experiment on Amazon Mechanical Turk to bridge this critical research gap. My comprehensive analytic approach, including structural equation modeling (SEM), ANOVA, and PROCESS conditional analysis, allowed me to shed light on the intricate web of factors influencing users\u27 AI aversion. I discovered that distrust and trust mediate between task complexity and AI aversion. Moreover, this study unveiled intriguing differences in these mediated relationships between subjective and objective task groups. Specifically, my findings demonstrate that, for objective tasks, task complexity can significantly increase aversion by reducing trust and significantly decrease aversion by reducing distrust. In contrast, for subjective tasks, task complexity only significantly increases aversion by enhancing distrust. By considering various task characteristics and recognizing trust and distrust as vital mediators, my research not only pushes the boundaries of the human-AI literature but also significantly contributes to the field of AI aversion

    Surgical Data Science - from Concepts toward Clinical Translation

    Get PDF
    Recent developments in data science in general and machine learning in particular have transformed the way experts envision the future of surgery. Surgical Data Science (SDS) is a new research field that aims to improve the quality of interventional healthcare through the capture, organization, analysis and modeling of data. While an increasing number of data-driven approaches and clinical applications have been studied in the fields of radiological and clinical data science, translational success stories are still lacking in surgery. In this publication, we shed light on the underlying reasons and provide a roadmap for future advances in the field. Based on an international workshop involving leading researchers in the field of SDS, we review current practice, key achievements and initiatives as well as available standards and tools for a number of topics relevant to the field, namely (1) infrastructure for data acquisition, storage and access in the presence of regulatory constraints, (2) data annotation and sharing and (3) data analytics. We further complement this technical perspective with (4) a review of currently available SDS products and the translational progress from academia and (5) a roadmap for faster clinical translation and exploitation of the full potential of SDS, based on an international multi-round Delphi process

    The Phillip island penguin parade (A mathematical treatment)

    Get PDF
    Penguins are flightless, so they are forced to walk while on land. In particular, they show rather specific behaviours in their homecoming, which are interesting to observe and to describe analytically. We observed that penguins have the tendency to waddle back and forth on the shore to create a sufficiently large group, and then walk home compactly together. The mathematical framework that we introduce describes this phenomenon, by taking into account "natural parameters", such as the eyesight of the penguins and their cruising speed. The model that we propose favours the formation of conglomerates of penguins that gather together, but, on the other hand, it also allows the possibility of isolated and exposed individuals. The model that we propose is based on a set of ordinary differential equations. Due to the discontinuous behaviour of the speed of the penguins, the mathematical treatment (to get existence and uniqueness of the solution) is based on a "stop-and-go" procedure. We use this setting to provide rigorous examples in which at least some penguins manage to safely return home (there are also cases in which some penguins remain isolated). To facilitate the intuition of the model, we also present some simple numerical simulations that can be compared with the actual movement of the penguin parade

    Analysis and design of security mechanisms in the context of Advanced Persistent Threats against critical infrastructures

    Get PDF
    Industry 4.0 can be defined as the digitization of all components within the industry, by combining productive processes with leading information and communication technologies. Whereas this integration has several benefits, it has also facilitated the emergence of several attack vectors. These can be leveraged to perpetrate sophisticated attacks such as an Advanced Persistent Threat (APT), that ultimately disrupts and damages critical infrastructural operations with a severe impact. This doctoral thesis aims to study and design security mechanisms capable of detecting and tracing APTs to ensure the continuity of the production line. Although the basic tools to detect individual attack vectors of an APT have already been developed, it is important to integrate holistic defense solutions in existing critical infrastructures that are capable of addressing all potential threats. Additionally, it is necessary to prospectively analyze the requirements that these systems have to satisfy after the integration of novel services in the upcoming years. To fulfill these goals, we define a framework for the detection and traceability of APTs in Industry 4.0, which is aimed to fill the gap between classic security mechanisms and APTs. The premise is to retrieve data about the production chain at all levels to correlate events in a distributed way, enabling the traceability of an APT throughout its entire life cycle. Ultimately, these mechanisms make it possible to holistically detect and anticipate attacks in a timely and autonomous way, to deter the propagation and minimize their impact. As a means to validate this framework, we propose some correlation algorithms that implement it (such as the Opinion Dynamics solution) and carry out different experiments that compare the accuracy of response techniques that take advantage of these traceability features. Similarly, we conduct a study on the feasibility of these detection systems in various Industry 4.0 scenarios

    Women in Artificial intelligence (AI)

    Get PDF
    This Special Issue, entitled "Women in Artificial Intelligence" includes 17 papers from leading women scientists. The papers cover a broad scope of research areas within Artificial Intelligence, including machine learning, perception, reasoning or planning, among others. The papers have applications to relevant fields, such as human health, finance, or education. It is worth noting that the Issue includes three papers that deal with different aspects of gender bias in Artificial Intelligence. All the papers have a woman as the first author. We can proudly say that these women are from countries worldwide, such as France, Czech Republic, United Kingdom, Australia, Bangladesh, Yemen, Romania, India, Cuba, Bangladesh and Spain. In conclusion, apart from its intrinsic scientific value as a Special Issue, combining interesting research works, this Special Issue intends to increase the invisibility of women in AI, showing where they are, what they do, and how they contribute to developments in Artificial Intelligence from their different places, positions, research branches and application fields. We planned to issue this book on the on Ada Lovelace Day (11/10/2022), a date internationally dedicated to the first computer programmer, a woman who had to fight the gender difficulties of her times, in the XIX century. We also thank the publisher for making this possible, thus allowing for this book to become a part of the international activities dedicated to celebrating the value of women in ICT all over the world. With this book, we want to pay homage to all the women that contributed over the years to the field of AI
    corecore