597 research outputs found

    Artificial Intelligence Approaches in Student Modeling: Half Decade Review (2010-2015)

    Get PDF
    Intelligent Tutoring Systems (ITSs) are special classes of E-learning systems designed using Artificial Intelligence (AI) approaches to provide adaptive and personalized tutoring based on the individuality of students. The student model is an important component of an ITS that provides the base for this personalization. During the course of interaction between student and the ITS, the system observe studentā€™s actions and other behavioral properties, create a quantitative representation of these studentā€™s attributes called a student model

    A comparison of the CAR and DAGAR spatial random effects models with an application to diabetics rate estimation in Belgium

    Get PDF
    When hierarchically modelling an epidemiological phenomenon on a finite collection of sites in space, one must always take a latent spatial effect into account in order to capture the correlation structure that links the phenomenon to the territory. In this work, we compare two autoregressive spatial models that can be used for this purpose: the classical CAR model and the more recent DAGAR model. Differently from the former, the latter has a desirable property: its Ļ parameter can be naturally interpreted as the average neighbor pair correlation and, in addition, this parameter can be directly estimated when the effect is modelled using a DAGAR rather than a CAR structure. As an application, we model the diabetics rate in Belgium in 2014 and show the adequacy of these models in predicting the response variable when no covariates are available

    A Statistical Approach to the Alignment of fMRI Data

    Get PDF
    Multi-subject functional Magnetic Resonance Image studies are critical. The anatomical and functional structure varies across subjects, so the image alignment is necessary. We define a probabilistic model to describe functional alignment. Imposing a prior distribution, as the matrix Fisher Von Mises distribution, of the orthogonal transformation parameter, the anatomical information is embedded in the estimation of the parameters, i.e., penalizing the combination of spatially distant voxels. Real applications show an improvement in the classification and interpretability of the results compared to various functional alignment methods

    A matter of timing : A modelling-based investigation of the dynamic behaviour of reproductive hormones in girls and women

    Get PDF
    Hypothalamus-hypofyse-gonade aksen er en del av det kvinnelige endokrine systemet, og regulerer evnen til reproduksjon. Hormoner produsert og utskilt fra tre kjertler (hypotalamus, hypofysen, eggstokkene) pĆ„virker hverandre via tilbakemeldingsinteraksjoner, som er nĆødvendige for Ć„ etablere en regelmessig menstruasjonssyklus hos kvinner. Matematiske modeller som forutsier utviklingen av slike hormonkonsentrasjoner og modning av eggstokkfollikler er nyttige verktĆøy for Ć„ forstĆ„ menstruasjonssyklusens dynamiske oppfĆørsel. Slike modeller kan for eksempel hjelpe oss med Ć„ undersĆøke patologiske tilstander som endometriose og polycystisk ovariesyndrom. Videre kan de brukes til systematiske undersĆøkelser av effekten av medikamenter pĆ„ det kvinnelige endokrine systemet. Derfor kan vi potensielt bruke slike menstruasjonsyklusmodeller som kliniske beslutningsstĆøttessystemer. Vi trenger modeller som forutsier hormonkonsentrasjoner sammen med modningen av eggstokkfollikler hos enkeltindivider gjennom pĆ„fĆølgende sykluser. Dette for Ć„ kunne simulere hormonelle behandlinger som stimulerer vekst av eggstokkfolliklene (eggstokkstimuleringsprotokoller). Her legger jeg fram et forslag til en matematisk menstruasjonsyklusmodell og viser modellens evne til Ć„ forutsi resultatet av eggstokkstimuleringsprotokoller. For Ć„ kalibrere denne typen modell trenges individuelle tidsseriedata. Innsamling av slike data er tidskrevende, og forutsetter hĆøy grad av engasjement fra deltakerne i studien. Det er derfor viktig Ć„ finne brukbare datatyper som er mindre tid- og ressurskrevende Ć„ samle inn, og som likevel kan brukes til modellkalibrering. En type data som er enklere Ć„ samle inn er tversnittdata. I denne avhandlingen har jeg utviklet en prosedyre for Ć„ bruke tversnittpopulasjonsdata i modellens kalibreringsprosess, og viser hvordan en modell kalibrert med tversnittdata kan brukes til Ć„ forutsi individuelle resultater ved oppdatering av en del av modellens parametere. I tillegg til det vitenskapelige bidraget, hĆ„per jeg at avhandlingen min skaper oppmerksomhet rundt viktigheten av forskning pĆ„ kvinners reproduktive helse, og at avhandlingen underbygger verdien av matematiske modeller i forskning pĆ„ kvinnehelse.The hypothalamic-pituitary-gonadal axis (HPG axis), a part of the human endocrine system, regulates the female reproductive function. Feedback interactions between hormones secreted from the glands forming the HPG axis are essential for establishing a regular menstrual cycle. Mathematical models predicting the time evolution of hormone concentrations and the maturation of ovarian follicles are useful tools for understanding the dynamic behaviour of the menstrual cycle. Such models can, for example, help us to investigate pathological conditions, such as endometriosis or Polycystic Ovary Syndrome. Furthermore, they can be used to systematically study the effects of drugs on the endocrine system. In doing so, menstrual cycle models could potentially be integrated into clinical routines as clinical decision support systems. For the simulation-based investigation of hormonal treatments aiming to stimulate the growth of ovarian follicles (Controlled Ovarian Stimulation (COS)), we need models that predict hormone concentrations and the maturation of ovarian follicles in biological units throughout consecutive cycles. Here, I propose such a mechanistic menstrual cycle model. I also demonstrate its capability to predict the outcome of COS. Individual time series data is usually used to calibrate mechanistic models having clinical implications. Collecting these data, however, is time-consuming and requires a high commitment from study participants. Therefore, integrating different data sets into the model calibration process is of interest. One type of data that is often more feasible to collect than individual time series is cross-sectional data. As part of my thesis, I developed a workflow based on Bayesian updating to integrate cross-sectional data into the model calibration process. I demonstrate the workflow using a mechanistic model describing the time evolution of reproductive hormones during puberty in girls. Exemplary, I show that a model calibrated with cross-sectional data can be used to predict individual dynamics after updating a subset of model parameters. In addition to the scientific contributions of this thesis, I hope that it creates attention for the importance of research in the area of women's reproductive health and underpins the value of mathematical modelling for this field.Doktorgradsavhandlin

    Trust-based algorithms for fusing crowdsourced estimates of continuous quantities

    No full text
    Crowdsourcing has provided a viable way of gathering information at unprecedented volumes and speed by engaging individuals to perform simple microā€“tasks. In particular, the crowdsourcing paradigm has been successfully applied to participatory sensing, in which the users perform sensing tasks and provide data using their mobile devices. In this way, people can help solve complex environmental sensing tasks, such as weather monitoring, nuclear radiation monitoring and cell tower mapping, in a highly decentralised and parallelised fashion. Traditionally, crowdsourcing technologies were primarily used for gathering data for classifications and image labelling tasks. In contrast, such crowdā€“based participatory sensing poses new challenges that relate to (i) dealing with humanā€“reported sensor data that are available in the form of continuous estimates of an observed quantity such as a location, a temperature or a sound reading, (ii) dealing with possible spatial and temporal correlations within the data and (ii) issues of data trustworthiness due to the unknown capabilities and incentives of the participants and their devices. Solutions to these challenges need to be able to combine the data provided by multiple users to ensure the accuracy and the validity of the aggregated results. With this in mind, our goal is to provide methods to better aid the aggregation process of crowdā€“reported sensor estimates of continuous quantities when data are provided by individuals of varying trustworthiness. To achieve this, we develop a trustā€“based in- formation fusion framework that incorporates latent trustworthiness traits of the users within the data fusion process. Through this framework, we develop a set of four novel algorithms (MaxTrust, BACE, TrustGP and TrustLGCP) to compute reliable aggregations of the usersā€™ reports in both the settings of observing a stationary quantity (Max- Trust and BACE) and a spatially distributed phenomenon (TrustGP and TrustLGCP). The key feature of all these algorithm is the ability of (i) learning the trustworthiness of each individual who provide the data and (ii) exploit this latent userā€™s trustworthiness information to compute a more accurate fused estimate. In particular, this is achieved by using a probabilistic framework that allows our methods to simultaneously learn the fused estimate and the usersā€™ trustworthiness from the crowd reports. We validate our algorithms in four key application areas (cell tower mapping, WiFi networks mapping, nuclear radiation monitoring and disaster response) that demonstrate the practical impact of our framework to achieve substantially more accurate and informative predictions compared to the existing fusion methods. We expect that results of this thesis will allow to build more reliable data fusion algorithms for the broad class of humanā€“centred information systems (e.g., recommendation systems, peer reviewing systems, student grading tools) that are based on making decisions upon subjective opinions provided by their users

    Privacy-Preserving Data Collection and Sharing in Modern Mobile Internet Systems

    Get PDF
    With the ubiquity and widespread use of mobile devices such as laptops, smartphones, smartwatches, and IoT devices, large volumes of user data are generated and recorded. While there is great value in collecting, analyzing and sharing this data for improving products and services, data privacy poses a major concern. This dissertation research addresses the problem of privacy-preserving data collection and sharing in the context of both mobile trajectory data and mobile Internet access data. The first contribution of this dissertation research is the design and development of a system for utility-aware synthesis of differentially private and attack-resilient location traces, called AdaTrace. Given a set of real location traces, AdaTrace executes a four-phase process consisting of feature extraction, synopsis construction, noise injection, and generation of synthetic location traces. Compared to representative prior approaches, the location traces generated by AdaTrace offer up to 3-fold improvement in utility, measured using a variety of utility metrics and datasets, while preserving both differential privacy and attack resilience. The second contribution of this dissertation research is the design and development of locally private protocols for privacy-sensitive collection of mobile and Web user data. Motivated by the excessive utility loss of existing Local Differential Privacy (LDP) protocols under small user populations, this dissertation introduces the notion of Condensed Local Differential Privacy (CLDP) and a suite of protocols satisfying CLDP to enable the collection of various types of user data, ranging from ordinal data types in finite metric spaces (malware infection statistics), to non-ordinal items (OS versions and transaction categories), and to sequences of ordinal or non-ordinal items. Using cybersecurity data and case studies from Symantec, a major cybersecurity vendor, we show that proposed CLDP protocols are practical for key tasks including malware outbreak detection, OS vulnerability analysis, and inspecting suspicious activities on infected machines. The third contribution of this dissertation research is the development of a framework and a prototype system for evaluating privacy-utility tradeoffs of different LDP protocols, called LDPLens. LDPLens introduces metrics to evaluate protocol tradeoffs based on factors such as the utility metric, the data collection scenario, and the user-specified adversary metric. We develop a common Bayesian adversary model to analyze LDP protocols, and we formally and experimentally analyze Adversarial Success Rate (ASR) under each protocol. Motivated by the findings that numerous factors impact the ASR and utility behaviors of LDP protocols, we develop LDPLens to provide effective recommendations for finding the most suitable protocol in a given setting. Our three case studies with real-world datasets demonstrate that using the protocol recommended by LDPLens can offer substantial reduction in utility loss or in ASR, compared to using a randomly chosen protocol.Ph.D

    Classification of the Existing Knowledge Base of OR/MS Research and Practice (1990-2019) using a Proposed Classification Scheme

    Get PDF
    This is the author accepted manuscript. The final version is available from Elsevier via the DOI in this recordOperations Research/Management Science (OR/MS) has traditionally been defined as the discipline that applies advanced analytical methods to help make better and more informed decisions. The purpose of this paper is to present an analysis of the existing knowledge base of OR/MS research and practice using a proposed keywords-based approach. A conceptual structure is necessary in order to place in context the findings of our keyword analysis. Towards this we first present a classification scheme that relies on keywords that appeared in articles published in important OR/MS journals from 1990-2019 (over 82,000 articles). Our classification scheme applies a methodological approach towards keyword selection and its systematic classification, wherein approximately 1300 most frequently used keywords (in terms of cumulative percentage, these keywords and their derivations account for more than 45% of the approx. 290,000 keyword occurrences used by the authors to represent the content of their articles) were selected and organised in a classification scheme with seven top-level categories and multiple levels of sub-categories. The scheme identified the most commonly used keywords relating to OR/MS problems, modeling techniques and applications. Next, we use this proposed scheme to present an analysis of the last 30 years, in three distinct time periods, to show the changes in OR/MS literature. The contribution of the paper is thus twofold, (a) the development of a proposed discipline-based classification of keywords (like the ACM Computer Classification System and the AMS Mathematics Subject Classification), and (b) an analysis of OR/MS research and practice using the proposed classification
    • ā€¦
    corecore