Talk presented at BRACIS 2012. A discussion about the Grand Challenges in Natural Computing Research and two real-world applications, one in Social Media Mining and another in E-Commerce.
Deep Learning has taken the digital world by storm. As a general purpose technology, it is now present in all walks of life. Although the fundamental developments in methodology have been slowing down in the past few years, applications are flourishing with major breakthroughs in Computer Vision, NLP and Biomedical Sciences. The primary successes can be attributed to the availability of large labelled data, powerful GPU servers and programming frameworks, and advances in neural architecture engineering. This combination enables rapid construction of large, efficient neural networks that scale to the real world. But the fundamental questions of unsupervised learning, deep reasoning, and rapid contextual adaptation remain unsolved. We shall call what we currently have Deep Learning 1.0, and the next possible breakthroughs as Deep Learning 2.0.
This is part 2 of the Tutorial delivered at IEEE SSCI 2020, Canberra, December 1st (Virtual).
Conjunto de slides com algumas notas relevantes sobre liderança. Material utilizado nos cursos de Empreendedorismo da Faculdade de Computação e Informática da Universidade Presbiteriana Mackenzie.
Deep Learning has taken the digital world by storm. As a general purpose technology, it is now present in all walks of life. Although the fundamental developments in methodology have been slowing down in the past few years, applications are flourishing with major breakthroughs in Computer Vision, NLP and Biomedical Sciences. The primary successes can be attributed to the availability of large labelled data, powerful GPU servers and programming frameworks, and advances in neural architecture engineering. This combination enables rapid construction of large, efficient neural networks that scale to the real world. But the fundamental questions of unsupervised learning, deep reasoning, and rapid contextual adaptation remain unsolved. We shall call what we currently have Deep Learning 1.0, and the next possible breakthroughs as Deep Learning 2.0.
This is part 2 of the Tutorial delivered at IEEE SSCI 2020, Canberra, December 1st (Virtual).
Conjunto de slides com algumas notas relevantes sobre liderança. Material utilizado nos cursos de Empreendedorismo da Faculdade de Computação e Informática da Universidade Presbiteriana Mackenzie.
Slides do curso completo de Introdução à Mineração de Dados. Esse material foi inicialmente gerado em 2008 para o primeiro curso sobre o assunto no Programa de Pós-Graduação em Engenharia Elétrica do Mackenzie e vem sendo continuamente atualizado e melhorado para atender às demandas do curso, do aluno e as rápidas mudanças do mercado. Última atualização em 2016.
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...Leandro de Castro
Conjunto de slides desenvolvido como material de apoio disponível para uso por professores e alunos da disciplina Mineração de Dados, assim como demais interessados no tema. Apresenta de forma sucinta o conteúdo do livro e os principais conceitos da área.
Apostila sobre "Análise de Mercado e Plano de Marketing" apresentado no curso "Primeiros Passos em Empreendedorismo e Inovação Tecnológica" da INTEC-UEFS em maio de 2015.
Slides dos cursos de Empreendedorismo e Planejamento Estratégico do Bacharelado em Ciência da Computação e Sistemas de Informação da Universidade Mackenzie.
Slides do painel "The E-Commerce Checkout Análise das Influências para Conversão nas Telas de Checkout", realizado no Congresso Search & Vendas do projeto E-commerce Brasil, 15/03, São Paulo.
Conjunto completo de slides usado na disciplina Computação Natural do Programa de Pós-Graduação em Engenharia Elétrica da Universidade Mackenzie. Fonte de referência: L. N. de Castro, "Fundamentals of Natural Computing: Basic Concepts, Algorithms, and Applications", CRC Press, 2006.
Realidade virtual e o Comportamento Humano - by Taynah MiyagawaUX Overdrive
Somos o time de UX & Design do SIDIA - Samsung Instituto de P&D da Amazônia!
Pensando na construção e propagação do conhecimento multidiplinar, o evento busca reunir especialistas das mais diversas áreas para problematização dos elementos que compõe o cenário tecnológico emergente - pessoas, interfaces e negócios!
::Nesta edição - Virtual Reality::
O evento discutirá os desafios e possibilidades de uso da realidade virtual no cotidiano e as tecnologias envolvidas nessa área.
Interface do Olho - by Alvaro LourençoUX Overdrive
Somos o time de UX & Design do SIDIA - Samsung Instituto de P&D da Amazônia!
Pensando na construção e propagação do conhecimento multidiplinar, o evento busca reunir especialistas das mais diversas áreas para problematização dos elementos que compõe o cenário tecnológico emergente - pessoas, interfaces e negócios!
::Nesta edição - Virtual Reality::
O evento discutirá os desafios e possibilidades de uso da realidade virtual no cotidiano e as tecnologias envolvidas nessa área.
NG2S: A Study of Pro-Environmental Tipping Point via ABMsKan Yuenyong
A study of tipping point: much less is known about the most efficient ways to reach such transitions or how self-reinforcing systemic transformations might be instigated through policy. We employ an agent-based model to study the emergence of social tipping points through various feedback loops that have been previously identified to constitute an ecological approach to human behavior. Our model suggests that even a linear introduction of pro-environmental affordances (action opportunities) to a social system can have non-linear positive effects on the emergence of collective pro-environmental behavior patterns.
Slides do curso completo de Introdução à Mineração de Dados. Esse material foi inicialmente gerado em 2008 para o primeiro curso sobre o assunto no Programa de Pós-Graduação em Engenharia Elétrica do Mackenzie e vem sendo continuamente atualizado e melhorado para atender às demandas do curso, do aluno e as rápidas mudanças do mercado. Última atualização em 2016.
2016: Introdução à Mineração de Dados: Conceitos Básicos, Algoritmos e Aplica...Leandro de Castro
Conjunto de slides desenvolvido como material de apoio disponível para uso por professores e alunos da disciplina Mineração de Dados, assim como demais interessados no tema. Apresenta de forma sucinta o conteúdo do livro e os principais conceitos da área.
Apostila sobre "Análise de Mercado e Plano de Marketing" apresentado no curso "Primeiros Passos em Empreendedorismo e Inovação Tecnológica" da INTEC-UEFS em maio de 2015.
Slides dos cursos de Empreendedorismo e Planejamento Estratégico do Bacharelado em Ciência da Computação e Sistemas de Informação da Universidade Mackenzie.
Slides do painel "The E-Commerce Checkout Análise das Influências para Conversão nas Telas de Checkout", realizado no Congresso Search & Vendas do projeto E-commerce Brasil, 15/03, São Paulo.
Conjunto completo de slides usado na disciplina Computação Natural do Programa de Pós-Graduação em Engenharia Elétrica da Universidade Mackenzie. Fonte de referência: L. N. de Castro, "Fundamentals of Natural Computing: Basic Concepts, Algorithms, and Applications", CRC Press, 2006.
Realidade virtual e o Comportamento Humano - by Taynah MiyagawaUX Overdrive
Somos o time de UX & Design do SIDIA - Samsung Instituto de P&D da Amazônia!
Pensando na construção e propagação do conhecimento multidiplinar, o evento busca reunir especialistas das mais diversas áreas para problematização dos elementos que compõe o cenário tecnológico emergente - pessoas, interfaces e negócios!
::Nesta edição - Virtual Reality::
O evento discutirá os desafios e possibilidades de uso da realidade virtual no cotidiano e as tecnologias envolvidas nessa área.
Interface do Olho - by Alvaro LourençoUX Overdrive
Somos o time de UX & Design do SIDIA - Samsung Instituto de P&D da Amazônia!
Pensando na construção e propagação do conhecimento multidiplinar, o evento busca reunir especialistas das mais diversas áreas para problematização dos elementos que compõe o cenário tecnológico emergente - pessoas, interfaces e negócios!
::Nesta edição - Virtual Reality::
O evento discutirá os desafios e possibilidades de uso da realidade virtual no cotidiano e as tecnologias envolvidas nessa área.
NG2S: A Study of Pro-Environmental Tipping Point via ABMsKan Yuenyong
A study of tipping point: much less is known about the most efficient ways to reach such transitions or how self-reinforcing systemic transformations might be instigated through policy. We employ an agent-based model to study the emergence of social tipping points through various feedback loops that have been previously identified to constitute an ecological approach to human behavior. Our model suggests that even a linear introduction of pro-environmental affordances (action opportunities) to a social system can have non-linear positive effects on the emergence of collective pro-environmental behavior patterns.
Context, Causality, and Information Flow: Implications for Privacy Engineerin...Sebastian Benthall
The creators of technical infrastructure are under social and legal pressure to comply with expectations that can be difficult to translate into computational and business logics. The dissertation presented in this talk bridges this gap through three projects that focus on privacy engineering, information security, and data economics, respectively. These projects culminate in a new formal method for evaluating the strategic and tactical value of data. This method relies on a core theoretical contribution building on the work of Shannon, Dretske, Pearl, Koller, and Nissenbaum: a definition of information flow as a channel situated in a context of causal relations.
This talk presents areas of investigation underway at the Rensselaer Institute for Data Exploration and Applications. First presented at Flipkart, Bangalore India, 3/2015.
The Impact of Information Technology on Chemistry and Related SciencesAshutosh Jogalekar
This is a copy of an invited talk I gave at the ACS meeting in Dallas in March 2014. The talk was about the impact of information technology on chemistry and related sciences. I interpreted 'information technology' broadly and divided the talk into three sections: Data, Simulation and Sociology.
'Data' talks about how chemical information has grown exponentially and how chemists are coming up with new techniques to store, organize and understand this information.
'Simulation' talks about how chemists are using the last two decades' spectacular progress in hardware and software to understand the behavior of molecules in a variety of applications ranging from drug design to new materials.
'Sociology' talks about the impact of blogs and social media on the practice of chemistry. More specifically I talk about how social media is serving as a 'second tier' of peer review and how this new medium is having an increasingly influential impact on many issues close to chemists' hearts including lab safety, 'chemophobia' and the public appreciation of chemistry.
Cybernetics, human-in-the-loop and probabilistic modelling for recommender sy...Eliezer Silva
Talk presented at BRAIN NTNU event
https://brainntnu.no/portfolio/brain-talks-big-data2-2/
Blog post about the talk https://brainntnu.no/2019/02/05/society-of-minds/
Reflections about cybernetics, bias in recommender systems and future of AI
Research in Computer Science and EngineeringOdiaPua1
Talks about Science and Research in the Computer Science and Engineering domain. The scientific foundations and methods of computer science and computer engineering.
Gordana Dodig-Crnkovic: Participating and Anticipating. Actors and Agents Net...José Nafría
Lecture belonging to the thematic axis: "Cosmological Perspectives of the Possible Worlds"
International Workshop on Social Networks: from communicating to solidary netwoks (an interdisciplinary Approach), Sierra Pambley, León, Spain, Septiembre de 2013
http://primer.unileon.es/eventos/RS2013
Similar to 2012: Natural Computing - The Grand Challenges and Two Case Studies (20)
2021: An Illustrated Journey into Natural ComputingLeandro de Castro
Natural Computing is a subfield of Computer Science and Engineering focused on the interdisciplinarity between computing and nature, and involves the development of new algorithms inspired by nature, computational solutions for the synthesis of natural phenomena, and the use of new natural materials with which to compute. The area has a great success in applications such as optimization, data analytics, robotics, bioinformatics, and many others.
The goal of this book is to spread natural computing mainly to those who are unfamiliar with it or who have little access to this subject field, but who want to know more about what is being investigated in the area. All of this without necessarily entering the technicalities of the specialized scientific literature. The book almost invariably talks about consolidated results, proposals, tools and solutions, already implemented and operating somewhere on the planet, striving to maintain the accuracy of concepts without making them too complicated for readers and, at the same time, without trivializing them.
This volume is an updated translation of the book originally written in Portuguese and titled "Computação Natural: Uma Jornada Ilustrada", published by Livraria da Física in 2010. The main source of reference for both, Portuguese and English versions, is titled “Fundamentals of Natural Computing: Basic Concepts, Algorithms, and Applications”, published by CRC Press in June 2006, from where its structure and some examples were taken, but with an illustrated and lighter presentation.
2019: LCoN - Centro de Excelência em Inteligência ArtificialLeandro de Castro
O Laboratório de Computação Natural e Aprendizagem de Máquina foi reconhecido como um Centro de Excelência em Inteligência Artificial pela Intel Semicondutores do Brasil entre os anos 2017 e 2018. Em fevereiro de 2019 completamos 10 anos de operação e celebramos essa conquista trazendo um novo conjunto de slides institucionais com uma breve descrição do que fazemos e nossos principais resultados.
2018: What did I learn about Innovation and Entrepreneurship in IsraelLeandro de Castro
These slides were prepared based on a mission I did to Israel from 18th to 22nd of March, 2018, organized by Anjos do Brasil, APEX Brasil and ABVCAP. The information presented here were collected from my own writtings during the many visits we made and some material presented in the visits (cited as appropriate).
This set of slides was presented at the 2018 Mission Israel in Tel Aviv, March 21st, as a contribution of my participation in the mission. The mission was organized by ABVCAP, Anjos do Brazil, ApexBrasil and Israel Trade & Investment Brazil, to whom I thank for the opportunity and great knowledge provided.
2017: The Many Faces of Artificial Intelligence: From AI to Big Data - A Hist...Leandro de Castro
This set of slides briefly reviews the history of artificial intelligence from its origins in the early 1950's to the new trend of Big Data. It goes from AI, passing to Machine Learning, Natural Computing and finally reaching Big Data.
2016: Fundamentos Matemáticos para Inteligência ArtificialLeandro de Castro
Esse arquivo contém um resumo de alguns conceitos matemáticos importantes para aqueles interessados em áreas como inteligência artificial, computação natural, heurística em pesquisa operacional e logística, mineração de dados, big data, e demais temas associados. O material inclui uma revisão de álgebra linear, teoria de grafos, probabilidade e resolução de problemas via métodos de busca.
# Internet Security: Safeguarding Your Digital World
In the contemporary digital age, the internet is a cornerstone of our daily lives. It connects us to vast amounts of information, provides platforms for communication, enables commerce, and offers endless entertainment. However, with these conveniences come significant security challenges. Internet security is essential to protect our digital identities, sensitive data, and overall online experience. This comprehensive guide explores the multifaceted world of internet security, providing insights into its importance, common threats, and effective strategies to safeguard your digital world.
## Understanding Internet Security
Internet security encompasses the measures and protocols used to protect information, devices, and networks from unauthorized access, attacks, and damage. It involves a wide range of practices designed to safeguard data confidentiality, integrity, and availability. Effective internet security is crucial for individuals, businesses, and governments alike, as cyber threats continue to evolve in complexity and scale.
### Key Components of Internet Security
1. **Confidentiality**: Ensuring that information is accessible only to those authorized to access it.
2. **Integrity**: Protecting information from being altered or tampered with by unauthorized parties.
3. **Availability**: Ensuring that authorized users have reliable access to information and resources when needed.
## Common Internet Security Threats
Cyber threats are numerous and constantly evolving. Understanding these threats is the first step in protecting against them. Some of the most common internet security threats include:
### Malware
Malware, or malicious software, is designed to harm, exploit, or otherwise compromise a device, network, or service. Common types of malware include:
- **Viruses**: Programs that attach themselves to legitimate software and replicate, spreading to other programs and files.
- **Worms**: Standalone malware that replicates itself to spread to other computers.
- **Trojan Horses**: Malicious software disguised as legitimate software.
- **Ransomware**: Malware that encrypts a user's files and demands a ransom for the decryption key.
- **Spyware**: Software that secretly monitors and collects user information.
### Phishing
Phishing is a social engineering attack that aims to steal sensitive information such as usernames, passwords, and credit card details. Attackers often masquerade as trusted entities in email or other communication channels, tricking victims into providing their information.
### Man-in-the-Middle (MitM) Attacks
MitM attacks occur when an attacker intercepts and potentially alters communication between two parties without their knowledge. This can lead to the unauthorized acquisition of sensitive information.
### Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBrad Spiegel Macon GA
Brad Spiegel Macon GA’s journey exemplifies the profound impact that one individual can have on their community. Through his unwavering dedication to digital inclusion, he’s not only bridging the gap in Macon but also setting an example for others to follow.
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC
Ellisha Heppner, Grant Management Lead, presented an update on APNIC Foundation to the PNG DNS Forum held from 6 to 10 May, 2024 in Port Moresby, Papua New Guinea.
1.Wireless Communication System_Wireless communication is a broad term that i...JeyaPerumal1
Wireless communication involves the transmission of information over a distance without the help of wires, cables or any other forms of electrical conductors.
Wireless communication is a broad term that incorporates all procedures and forms of connecting and communicating between two or more devices using a wireless signal through wireless communication technologies and devices.
Features of Wireless Communication
The evolution of wireless technology has brought many advancements with its effective features.
The transmitted distance can be anywhere between a few meters (for example, a television's remote control) and thousands of kilometers (for example, radio communication).
Wireless communication can be used for cellular telephony, wireless access to the internet, wireless home networking, and so on.
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesSanjeev Rampal
Talk presented at Kubernetes Community Day, New York, May 2024.
Technical summary of Multi-Cluster Kubernetes Networking architectures with focus on 4 key topics.
1) Key patterns for Multi-cluster architectures
2) Architectural comparison of several OSS/ CNCF projects to address these patterns
3) Evolution trends for the APIs of these projects
4) Some design recommendations & guidelines for adopting/ deploying these solutions.
This 7-second Brain Wave Ritual Attracts Money To You.!nirahealhty
Discover the power of a simple 7-second brain wave ritual that can attract wealth and abundance into your life. By tapping into specific brain frequencies, this technique helps you manifest financial success effortlessly. Ready to transform your financial future? Try this powerful ritual and start attracting money today!
2012: Natural Computing - The Grand Challenges and Two Case Studies
1. Natural Computing: The Grand Challenges and
Two Case Studies Leandro Nunes de Castro Lnunes@mackenzie.br @lndecastro
Computing and Informatics Faculty & Graduate Program in Electrical Engineering Natural Computing Laboratory (LCoN) www.mackenzie.br/lcon.html
1
2. •Natural Computing
–An Overview
–The Grand Challenges in Natural Computing Research
•Case Studies
–Social Media Mining
–Mining Association Rules for Recommender Systems
•Discussion
2
Summary
3. Natural Computing
An Overview*
3
* de Castro, L. N. (2007), “Fundamentals of Natural Computing: An Overview”, Physics of Life Reviews, 4(1), pp. 1-36.
4. •1940s: Study of automatic computing;
•1950s: Study of information processing;
•1960s: Study of phenomena surrounding computers;
•1970s: Study of what can be automated;
•1980s: Study of computation;
•2000s: Study of information processes, both natural and artificial.
4
Computing: Yesterday, Today and Tomorrow*
* Denning, P. (2008), “Computing Field: Structure”, In B. Wah (Ed.), Wiley Encyclopedia of Computer Science and Engineering, Wiley Interscience.
5. 5
From the early days of computer science, by the 1940s, researchers have been interested in tracing parallels and designing computational models and abstractions of natural phenomena.
6. The GCs aim at defining research questions that tend to be important in the long term, identifying and characterizing potential grand research problems. These may allow the formulation of projects capable of producing major scientific advancements, with practical applications for society and technology. Emphasis is in advancing science, a vision beyond specific projects, a clear and objective success evaluation and a great ambition.
6
The Grand Challenges (GCs)
7. Theoretical Works
Empirical Works
Natural Computing
Mathematical Models
Bioinspiration
Computational Synthesis of Natural Phenomena
Computing with Natural Materials
Natural Computing: The Old View
8. Natural Computing: The New Perspective
Natural Computing
Computer Modeling of Nature
Nature- Inspired Computing
Computer Synthesis of Natural Phenomena
Computing with New Materials
Natural computing is a science concerned with the investigation and design of information processing in natural and computational systems.
9. Natural Computing
The Grand Challenges*
9
* de Castro, L. N.; Xavier, R. S.; Pasti, R.; Maia, R. D.; Szabo, A.; Ferrari, D. G. (2012), "The Grand Challenges in Natural Computing Research: The Quest for a New Science", Int. J. Nat. Comp. Res., 2(4), p. 16.
11. 11
Natural Computing
Biology
Physics
Chemistry
Computer Science
GC 1: How to transpose Natural Computing into a transdisciplinary context?
12. 12
“Computer science differs from physics in that it is not actually a science. It does not study natural objects. Neither is it mathematics. It’s like engineering – about getting to do something, rather than dealing with abstractions”.*
“Biology is today an information science”**
* Feynman, R. P. (1996), “The Feynman Lectures on Computation”, In A. J. G. Hey and R. W. Allen (Ed.), (Reading, MA: Addison-Wesley).
** Denning, P. J., (2001) (Ed.), The Invisible Future: The Seamless Integration of Technology in Everyday Life, McGraw- Hill.
13. 13
GC 2: What is the Natural Computing role in this Informational Natural Sciences Era?
Overcoming this challenge will bring two important benefits to Computing and Nature:
• A Rethinking (and probably Redesign) of Computing
• A New Form of Interacting With and Using Nature
14. 14
Natural systems are open systems that communicate with the environment presenting a complex and emergent behavior. Complex biological systems must be modeled as self-referential, self- organizing, and auto-generative systems whose computational behavior goes far beyond the TM/VN paradigm. The system restructures itself in a hardware-software non-dissociable interaction: the hardware defines the software, and the software defines the hardware.
15. 15
Are there standards to design (engineer) natural computing systems?*
GC 3: To what degree defining standards for the engineering of Natural Computing systems is a limiting factor for the creative development of the field?
* Brueckner, S. A.; Serugendo, G. D. M.; Karageorgos, A.; Nagpal, R., (2005), Engineering Self-Organizing Systems, Lecture Notes in Artificial Intelligence, 3464, Springer.
* de Castro, L. N. (2001), Immune Engineering: Development and Application of Computational Tools Inspired by Artificial Immune Systems, Ph. D. Thesis presented at the Computer and Electrical Engineering School, Unicamp, Brazil.
* Fernandez-Marquez, J. L.; Serugendo, G. D. M.; Montagna, S.; Viroli M.; Arcos J. L (2012), “Description and Composition of Bio-Inspired Design Patterns: A Complete Overview”, Natural Computing, Online, DOI 10.1007/s11047-012-9324-y.
* Nagpal, R.; Mamei, M. (2004), “Engineering Amorphous Computing Systems”, Multiagent Systems, Artificial Societies, and Simulated Organizations, 11, Part V, pp. 303-320.
18. 18
110 billion minutes spent in social networks
13 years = 50 million people
9 months = 100 million users
250 million tweets/day
(Nielsen, 2011)
(Alé, 2012)
(Alé, 2012)
(Datasift, 2012)
Data and Social Media
19. 19
Qualitative analysis of tweets.
Methodology based on text mining, natural language processing and ontologies for Sentiment Analysis (SA).
Word Sense Disambiguation (WSD).
Research Focus
Social Media Analysis Tool
Text Mining; NLP; Web Semantics
Context
Twitter
20. 20
Social media and Microblog.
Messages (tweets) with up to 140 characters.
Stimulates simultaneous activities.
Informal, allows the creation of new terms, slangs, mix of languages, ironies.
Twitter Features
21. 21
Text Mining
Semi- or unstructured data
Data Mining
Structured Data
Unstructured Data Analysis
• Tokens
•Stopwords removal
• Stemming
• Representation
• Term (feature) selection
• Association
• Classification
• Clustering
• APIs
• Crawlers
•Confusion Matrix
• Accuracy
• Precision
• Recall
• F-measure
22. 22
Text Analysis
t1
t2
tc
d1
w11
w12
...
w1c
d2
w21
w22
...
w2c
...
...
...
...
...
dN
wN1
wN2
...
wNc
Vector Space Model
23. 23
Objeto
Entrar
Trancar
Porta
Molho
Guardar
Abrir
Pessoa
Presidente
Ditador
Hugo
Venezuela
Pessoa
SBT
Madruga
Kiko
Chiquinha
Bruxa do 71
TV
Girafales
Chaves
In Portuguese
24. 24
Sentiment Analysis:
Text classification based on the author’s opinion.
Word Sense Disambiguation:
Polysemic word: different meanings in different contexts.
Word Sense Disambiguation: appropriate meaning to a text with polysemic words.
WSD: words are classified according with a predefined set of meanings.
Research Focus
25. 25
Predicted Class
Correct Class
Positive Negative
Positive TP FN
Negative FP TN
TP FN
TP
P
TP
TPR
FP TN
FP
N
FP
FPR
TP FP TN FN
TP TN
ACC
FP TP
TP
Pr
FN TP
TP
Re
ered
levant ered
ecision
Recov
Re Recov
Pr
levant
levant ered
call
Re
Re Recov
Re
Interest Measures
26. 26
Context-Based Word Sense Disambiguation (CBWSD):
Polysemic words: e.g. Chaves, Estrelas, Na Brasa, Agora é tarde.
Context (semantic graph): OntoGeneral; OntoSpecific.
Classification based on the semantic graph.
Sentiment analysis based on Emoticons, Ontologies and Natural Computing:
Need to train the classifier.
Emoticon: graphic representation of a facial expression.
Example: :) :( :| :D
Ontology: concepts and their relations within a domain.
Case Study: Social TV
27. 27
Materials and Methods: CBWDS
Tweets about “Agora é tarde”:
Total: 6030 tweets
Period: 6-7 July 2012 (24 hours).
Generation of the Semantic Graph.
Case Study: Social TV
28. •INCLUDE NEW RESULTS
28
Partial Results
Without the Neutral Class
Predicted Class
Measure
Result
Measure
Positive
Negative
Positivo
Negativo
ACC
0.9580
Precision
0.9558
0.0544
Correct Class
Positive
2877
0
TPR
1
Recall
1
0.5521
Negative
133
164
FPR
0.4478
F-measure
0.9774
0.0991
Total: 142766 ms - Per tweet: 36 ms
Neutral as Positive
Predicted Class
Measure
Result
Measure
Positive
Negative
Positive
Negative
ACC
0.9689
Precision
0.9741
0.0318
Correct Class
Positive
5015
33
TPR
0.9934
Recall
0.9934
0.5521
Negative
133
164
FPR
0.4478
F-measure
0.9837
0.0602
Total: 118310 ms - Per tweet: 30 ms
30. •Discovery of association relations between items (attributes) in transactional databases.
30
Association Rules
Milk Bread Cereals Butter Milk Biscuit Cereals Chocolate Bread Coffee Eggs Sugar Bread Coffee Yogurt Sweetener
31. •Given a set of transactions, where each transaction is a set of items, na association rule is a rule X Y in which X and Y are itemsets.
•Concepts:
–Coverage or support: number of transactions for which the prediction rule is correct.
–Accuracy or confidence: number of objects that the rule predicts correctly, proportionally to the instances to which it applies.
support(A B) = P(A B) = (Freq. of A and B) / (Total of T).
confidence(A B) = P(B|A) = (Freq. of A and B) / (Freq. of A).
31
Association Rules
32. The problem of mining association rules corresponds to finding all the rules that satisfy a minimal support and confidence.
32
33. 33
Evolutionary Design of ARs
•Approaches:
–Pittsburgh: each individual represents the whole set of rules.
–Michigan: each individual represents a single rule, and the whole population composes the set of rules.
•Encoding scheme:
A
B
C
D
E
F
G
H
11
00
01
10
00
11
10
00
00: antecedent
11: consequent
01 ou 10: not part of the rule
34. •Comprehensibility:
•Interestingness:
•Operators:
–Binary encoding allos the use of standard operators, such as single-point mutation and crossover.
34
Interest Measures and Operators
C1(R) = log(1 + |C|)/log(1 + |A C|).
I(R) = (|A C|/|A|) * (|A C|/|C|) * (1(|A C|/|D|)).
C2(R) = log(1 + |C|) + log(1 + |A C|).
35. 35
Algorithms Evaluated
procedure [P] = eGA(pc,pm,pe,D) initialize P f := evaluate(P,D); P := select(P,f,pe); while not_stopping_criterion do, P := reproduce(P,f,pc); P := variate(P,pm); f := evaluate(P,D); P := select(P,f,pe); t := t+1; end while end procedure
procedure [P] = CLONALG1-2(D,max_it,n1,n2) initialize P t := 1; while t >= max_it do, f := evaluate(P); P1 := select(P,n1,f)**; C := clone(P1,f); C := mutate(C,f); f1 := evaluate(C1); P1 := select(C1,n1,f1); P := replace(P,n2); t ← t + 1; end while end procedure Evolutionary
Immune
39. •Focus on:
–Designing novel nature-inspired algorithms.
–Synthesizing natural phenomena.
–Using natural materials for computing.
•Real-world applications are unquestionable, but the field seems to be stuck on the same types of algorithms.
•Researchers are taking efforts to look at and formalize information processing in natural and computational systems.*
39
The Past and Present
* Zenil, H. (2012) (Ed.), A Computable Universe: Understanding Computation & Exploring Nature as Computation, World Scientific.
40. •Grand Challenges for the field:
–Transforming Natural Computing into a Transdisciplinary Discipline.
–Unveiling and Harnessing Information Processing in Natural Systems.
–Engineering Natural Computing Systems.
40
And the Future?