Yifan Guo is a PhD student at Case Western Reserve University studying machine learning and big data. He received his B.S. from Beijing University of Posts and Telecommunications and his Master's from Northwestern University. His research projects include developing an image recognition system for identifying pill types, building a movie recommendation system using matrix factorization, and designing an algorithm for a nonlinear integer programming transportation problem.
GTC 2021: Counterfactual Learning to Rank in E-commerceGrubhubTech
Many ecommerce companies have extensive logs of user behavior such as clicks and conversions. However, if supervised learning is naively applied, then systems can suffer from poor performance due to bias and feedback loops. Using techniques from counterfactual learning we can leverage log data in a principled manner in order to model user behaviour and build personalized recommender systems. At Grubhub, a user journey begins with recommendations and the vast majority of conversions are powered by recommendations. Our recommender policies can drive user behavior to increase orders and/or profit. Accordingly, the ability to rapidly iterate and experiment is very important. Because of our powerful GPU workflows, we can iterate 200% more rapidly than with counterpart CPU workflows. Developers iterate ideas with notebooks powered by GPUs. Hyperparameter spaces are explored up to 8x faster with multi-GPUs Ray clusters. Solutions are shipped from notebooks to production in half the time with nbdev. With our accelerated DS workflows and Deep Learning on GPUs, we were able to deliver a +12.6% conversion boost in just a few months. In this talk we hope to present modern techniques for industrial recommender systems powered by GPU workflows. First a small background on counterfactual learning techniques, then followed by practical information and data from our industrial application.
By Alex Egg, accepted to Nvidia GTC 2021 Conference
Amazon Product Review Sentiment Analysis with Machine Learningijtsrd
Users of Amazons online shopping service are allowed to leave feedback for the items they buy. Amazon makes no effort to monitor or limit the scope of these reviews. Although the amount of reviews for various items varies, the reviews provide easily accessible and abundant data for a variety of applications. This paper aims to apply and expand existing natural language processing and sentiment analysis research to data obtained from Amazon. The number of stars given to a product by a user is used as training data for supervised machine learning. Since more people are dependent on online products these days, the value of a review is increasing. Before making a purchase, a buyer must read thousands of reviews to fully comprehend a product. In this day and age of machine learning, however, sorting through thousands of comments and learning from them would be much easier if a model was used to polarize and learn from them. We used supervised learning to polarize a massive Amazon dataset and achieve satisfactory accuracy. Ravi Kumar Singh | Dr. Kamalraj Ramalingam "Amazon Product Review Sentiment Analysis with Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42372.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/42372/amazon-product-review-sentiment-analysis-with-machine-learning/ravi-kumar-singh
Anomaly Detection and Spark Implementation - Meetup Presentation.pptxImpetus Technologies
StreamAnalytix sponsored a meetup on “Anomaly Detection Techniques and Implementation using Apache Spark” which took place on Tuesday December 5, 2017 at Larkspur Landing Milpitas Hotel, Milpitas, CA. The meetup was led by Maxim Shkarayev, Lead Data Scientist, Impetus Technologies along with Punit Shah, Solution Architect, StreamAnalytix and Anand Venugopal, Product Head & AVP, StreamAnalytix, who introduced and summarized the vast field of Anomaly Detection and its applications in various industry problems. The speakers at the event also offered a structured approach to choose the right anomaly detection techniques based on specific use-cases and data characteristics which was followed by a demonstration of some real-world anomaly detection use-cases on Apache Spark based analytics platform.
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
10.sentiment analysis of customer product reviews using machine learning In this project author is detecting sentiments from amazon reviews by using various machine learning algorithms such as SVM, Decision Tree and Naïve Bayes. In all 3 algorithms SVM is giving better accuracy and to train this algorithms author has used AMAZON reviews dataset and this dataset is saved inside ‘Amazon_Reviews_dataset’ folder. Below screen shot show example reviews from dataset
Organizations are collecting massive amounts of data from disparate sources. However, they continuously face the challenge of identifying patterns, detecting anomalies, and projecting future trends based on large data sets. Machine learning for anomaly detection provides a promising alternative for the detection and classification of anomalies.
Find out how you can implement machine learning to increase speed and effectiveness in identifying and reporting anomalies.
In this webinar, we will discuss :
How machine learning can help in identifying anomalies
Steps to approach an anomaly detection problem
Various techniques available for anomaly detection
Best algorithms that fit in different situations
Implementing an anomaly detection use case on the StreamAnalytix platform
To view the webinar - https://bit.ly/2IV2ahC
GTC 2021: Counterfactual Learning to Rank in E-commerceGrubhubTech
Many ecommerce companies have extensive logs of user behavior such as clicks and conversions. However, if supervised learning is naively applied, then systems can suffer from poor performance due to bias and feedback loops. Using techniques from counterfactual learning we can leverage log data in a principled manner in order to model user behaviour and build personalized recommender systems. At Grubhub, a user journey begins with recommendations and the vast majority of conversions are powered by recommendations. Our recommender policies can drive user behavior to increase orders and/or profit. Accordingly, the ability to rapidly iterate and experiment is very important. Because of our powerful GPU workflows, we can iterate 200% more rapidly than with counterpart CPU workflows. Developers iterate ideas with notebooks powered by GPUs. Hyperparameter spaces are explored up to 8x faster with multi-GPUs Ray clusters. Solutions are shipped from notebooks to production in half the time with nbdev. With our accelerated DS workflows and Deep Learning on GPUs, we were able to deliver a +12.6% conversion boost in just a few months. In this talk we hope to present modern techniques for industrial recommender systems powered by GPU workflows. First a small background on counterfactual learning techniques, then followed by practical information and data from our industrial application.
By Alex Egg, accepted to Nvidia GTC 2021 Conference
Amazon Product Review Sentiment Analysis with Machine Learningijtsrd
Users of Amazons online shopping service are allowed to leave feedback for the items they buy. Amazon makes no effort to monitor or limit the scope of these reviews. Although the amount of reviews for various items varies, the reviews provide easily accessible and abundant data for a variety of applications. This paper aims to apply and expand existing natural language processing and sentiment analysis research to data obtained from Amazon. The number of stars given to a product by a user is used as training data for supervised machine learning. Since more people are dependent on online products these days, the value of a review is increasing. Before making a purchase, a buyer must read thousands of reviews to fully comprehend a product. In this day and age of machine learning, however, sorting through thousands of comments and learning from them would be much easier if a model was used to polarize and learn from them. We used supervised learning to polarize a massive Amazon dataset and achieve satisfactory accuracy. Ravi Kumar Singh | Dr. Kamalraj Ramalingam "Amazon Product Review Sentiment Analysis with Machine Learning" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42372.pdf Paper URL: https://www.ijtsrd.comcomputer-science/data-processing/42372/amazon-product-review-sentiment-analysis-with-machine-learning/ravi-kumar-singh
Anomaly Detection and Spark Implementation - Meetup Presentation.pptxImpetus Technologies
StreamAnalytix sponsored a meetup on “Anomaly Detection Techniques and Implementation using Apache Spark” which took place on Tuesday December 5, 2017 at Larkspur Landing Milpitas Hotel, Milpitas, CA. The meetup was led by Maxim Shkarayev, Lead Data Scientist, Impetus Technologies along with Punit Shah, Solution Architect, StreamAnalytix and Anand Venugopal, Product Head & AVP, StreamAnalytix, who introduced and summarized the vast field of Anomaly Detection and its applications in various industry problems. The speakers at the event also offered a structured approach to choose the right anomaly detection techniques based on specific use-cases and data characteristics which was followed by a demonstration of some real-world anomaly detection use-cases on Apache Spark based analytics platform.
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
10.sentiment analysis of customer product reviews using machine learning In this project author is detecting sentiments from amazon reviews by using various machine learning algorithms such as SVM, Decision Tree and Naïve Bayes. In all 3 algorithms SVM is giving better accuracy and to train this algorithms author has used AMAZON reviews dataset and this dataset is saved inside ‘Amazon_Reviews_dataset’ folder. Below screen shot show example reviews from dataset
Organizations are collecting massive amounts of data from disparate sources. However, they continuously face the challenge of identifying patterns, detecting anomalies, and projecting future trends based on large data sets. Machine learning for anomaly detection provides a promising alternative for the detection and classification of anomalies.
Find out how you can implement machine learning to increase speed and effectiveness in identifying and reporting anomalies.
In this webinar, we will discuss :
How machine learning can help in identifying anomalies
Steps to approach an anomaly detection problem
Various techniques available for anomaly detection
Best algorithms that fit in different situations
Implementing an anomaly detection use case on the StreamAnalytix platform
To view the webinar - https://bit.ly/2IV2ahC
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Predicting Current User Intent with Contextual Markov ModelsJulia Kiseleva
Abstract—In many web information systems like e-shops and information portals predictive modeling is used to understand user intentions based on their browsing behavior. User behavior is inherently sensitive to various contexts. Identifying such relevant contexts can help to improve the prediction performance. In this work, we propose a formal approach in which the context
discovery process is defined as an optimization problem. For simplicity we assume a concrete yet generic scenario in which context is considered to be a secondary label of an instance that is either known from the available contextual attribute (e.g. user location) or can be induced from the training data (e.g. novice vs. expert user). In an ideal case, the objective function of the optimization problem has an analytical form enabling us
to design a context discovery algorithm solving the optimization problem directly. An example with Markov models, a typical approach for modeling user browsing behavior, shows that the derived analytical form of the optimization problem provides us with useful mathematical insights of the problem. Experiments with a real-world use-case show that we can discover useful contexts allowing us to significantly improve the prediction of
user intentions with contextual Markov models.
Part of the ongoing effort with Skater for enabling better Model Interpretation for Deep Neural Network models presented at the AI Conference.
https://conferences.oreilly.com/artificial-intelligence/ai-ny/public/schedule/detail/65118
The talk at Twente University on 28 July 2014 Julia Kiseleva
Predictive Web Analytics is aimed at understanding behavioural patterns of users of various web-based applications: e-commerce, ubiquitous and mobile computing, and computational advertising. Within these applications business decisions often rely on two types of predictions: an overall or particular user segment demand predictions and individualised recommendations for visitors. Visitor behaviour is inherently sensitive to the context, which can be de ned as a collection of external factors. Context-awareness allows integrating external explanatory information into the learning process and adapting user behaviour accordingly. The importance of context-awareness has been recognised by researchers and practitioners in many disciplines, including recommendation systems, information retrieval, personalization, data mining, and marketing. We focus on studying ways of context discovery and its integration into predictive analytics.
Why is image analytics Important? What good can come of caption generation or image descriptions? And how does Data Science & Machine learning techniques work on Image Analytics and to what purpose? We see how it works for the retail industry and for the Healthcare industry. What more? Take a look...
International Journal of Engineering Research and Development (IJERD)IJERD Editor
call for paper 2012, hard copy of journal, research paper publishing, where to publish research paper,
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
Predicting Current User Intent with Contextual Markov ModelsJulia Kiseleva
Abstract—In many web information systems like e-shops and information portals predictive modeling is used to understand user intentions based on their browsing behavior. User behavior is inherently sensitive to various contexts. Identifying such relevant contexts can help to improve the prediction performance. In this work, we propose a formal approach in which the context
discovery process is defined as an optimization problem. For simplicity we assume a concrete yet generic scenario in which context is considered to be a secondary label of an instance that is either known from the available contextual attribute (e.g. user location) or can be induced from the training data (e.g. novice vs. expert user). In an ideal case, the objective function of the optimization problem has an analytical form enabling us
to design a context discovery algorithm solving the optimization problem directly. An example with Markov models, a typical approach for modeling user browsing behavior, shows that the derived analytical form of the optimization problem provides us with useful mathematical insights of the problem. Experiments with a real-world use-case show that we can discover useful contexts allowing us to significantly improve the prediction of
user intentions with contextual Markov models.
Part of the ongoing effort with Skater for enabling better Model Interpretation for Deep Neural Network models presented at the AI Conference.
https://conferences.oreilly.com/artificial-intelligence/ai-ny/public/schedule/detail/65118
The talk at Twente University on 28 July 2014 Julia Kiseleva
Predictive Web Analytics is aimed at understanding behavioural patterns of users of various web-based applications: e-commerce, ubiquitous and mobile computing, and computational advertising. Within these applications business decisions often rely on two types of predictions: an overall or particular user segment demand predictions and individualised recommendations for visitors. Visitor behaviour is inherently sensitive to the context, which can be de ned as a collection of external factors. Context-awareness allows integrating external explanatory information into the learning process and adapting user behaviour accordingly. The importance of context-awareness has been recognised by researchers and practitioners in many disciplines, including recommendation systems, information retrieval, personalization, data mining, and marketing. We focus on studying ways of context discovery and its integration into predictive analytics.
Why is image analytics Important? What good can come of caption generation or image descriptions? And how does Data Science & Machine learning techniques work on Image Analytics and to what purpose? We see how it works for the retail industry and for the Healthcare industry. What more? Take a look...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Editor IJAIEM
Dr.G.Anandharaj1, Dr.P.Srimanchari2
1Associate Professor and Head, Department of Computer Science
Adhiparasakthi College of Arts and Science (Autonomous), Kalavai, Vellore (Dt) -632506
2 Assistant Professor and Head, Department of Computer Applications
Erode Arts and Science College (Autonomous), Erode (Dt) - 638001
ABSTRACT
In unpredictable increase in mobile apps, more and more threats migrate from outmoded PC client to mobile device. Compared
with traditional windows Intel alliance in PC, Android alliance dominates in Mobile Internet, the apps replace the PC client
software as the foremost target of hateful usage. In this paper, to improve the confidence status of recent mobile apps, we
propose a methodology to estimate mobile apps based on cloud computing platform and data mining. Compared with
traditional method, such as permission pattern based method, combines the dynamic and static analysis methods to
comprehensively evaluate an Android applications The Internet of Things (IoT) indicates a worldwide network of
interconnected items uniquely addressable, via standard communication protocols. Accordingly, preparing us for the
forthcoming invasion of things, a tool called data fusion can be used to manipulate and manage such data in order to improve
progression efficiency and provide advanced intelligence. In this paper, we propose an efficient multidimensional fusion
algorithm for IoT data based on partitioning. Finally, the attribute reduction and rule extraction methods are used to obtain the
synthesis results. By means of proving a few theorems and simulation, the correctness and effectiveness of this algorithm is
illustrated. This paper introduces and investigates large iterative multitier ensemble (LIME) classifiers specifically tailored for
big data. These classifiers are very hefty, but are quite easy to generate and use. They can be so large that it makes sense to use
them only for big data. Our experiments compare LIME classifiers with various vile classifiers and standard ordinary ensemble
Meta classifiers. The results obtained demonstrate that LIME classifiers can significantly increase the accuracy of
classifications. LIME classifiers made better than the base classifiers and standard ensemble Meta classifiers.
Keywords: LIME classifiers, ensemble Meta classifiers, Internet of Things, Big data
Review on Algorithmic and Non Algorithmic Software Cost Estimation Techniquesijtsrd
Effective software cost estimation is the most challenging and important activities in software development. Developers want a simple and accurate method of efforts estimation. Estimation of the cost before starting of work is a prediction and prediction always not accurate. Software effort estimation is a very critical task in the software engineering and to control quality and efficiency a suitable estimation technique is crucial. This paper gives a review of various available software effort estimation methods, mainly focus on the algorithmic model and non algorithmic model. These existing methods for software cost estimation are illustrated and their aspect will be discussed. No single technique is best for all situations, and thus a careful comparison of the results of several approaches is most likely to produce realistic estimation. This paper provides a detailed overview of existing software cost estimation models and techniques. This paper presents the strength and weakness of various cost estimation methods. This paper focuses on some of the relevant reasons that cause inaccurate estimation. Pa Pa Win | War War Myint | Hlaing Phyu Phyu Mon | Seint Wint Thu "Review on Algorithmic and Non-Algorithmic Software Cost Estimation Techniques" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd26511.pdfPaper URL: https://www.ijtsrd.com/engineering/-/26511/review-on-algorithmic-and-non-algorithmic-software-cost-estimation-techniques/pa-pa-win
Methods for Sentiment Analysis: A Literature Studyvivatechijri
Sentiment analysis is a trending topic, as everyone has an opinion on everything. The systematic
study of these opinions can lead to information which can prove to be valuable for many companies and
industries in future. A huge number of users are online, and they share their opinions and comments regularly,
this information can be mined and used efficiently. Various companies can review their own product using
sentiment analysis and make the necessary changes in future. The data is huge and thus it requires efficient
processing to collect this data and analyze it to produce required result.
In this paper, we will discuss the various methods used for sentiment analysis. It also covers various techniques
used for sentiment analysis such as lexicon based approach, SVM [10], Convolution neural network,
morphological sentence pattern model [1] and IML algorithm. This paper shows studies on various data sets
such as Twitter API, Weibo, movie review, IMDb, Chinese micro-blog database [9] and more. The paper shows
various accuracy results obtained by all the systems.
Similar to Report of Previous Project by Yifan Guo (20)
Methods for Sentiment Analysis: A Literature Study
Report of Previous Project by Yifan Guo
1. YifanGuo
PhD Student at Case Western Reserve University
yxg383@case.edu
Summary
I received the B.S. Degree in Information and Computing Sciences from Beijing University
of Posts and Telecommunications on June 2013, and Master’s Degree in Computer
Science from Northwestern University on February 2016. My potential research is
expected on related topics in Machine Learning and Big Data.
Research Projects
Smart Pill Box January 2015-December2015
Supervisor: Prof. Seda Ogrenci-Memik, Department of EECS, Northwestern University
Research Field: Machine Learning and Image Processing
Brief Description: The medication-related problem often occurs for the aged when wrong medicine is
being taken due to an increase in the number of tablet type being circulated throughout our society. In order
to overcome this obstacle, this project has developed an automated image-based content recognition
system based on the Bag of Features Model with feature vector of SURF descriptor and color feature
histogram. This system could not successfully make identification on pill’s type, but also effectively
recognize on wrong medicine mixed into the bottle and send notification to users timely. In the experiment,
840 pill images from eight categories and 8 distinct pill images for testing (without used in training) have
been used to verify our system. The result has shown a perfect performance with overall accuracy of 100
percent on recognition on single type of pill when applying multi-class classifier SVM using SURF, Hue,
and Saturation Feature. And the robustness to recognition on unknown type of pills is also verified. When
dealing with mixed type of pill, the system could successfully separate it from the single type of pills and
interact with user on the information of mixed pills. In future, the system would make contributions on the
design of a vision based Smart Cap design for a pill box at Northwestern University.
My Responsibility:
“Intelligently” recognized pill images via bag of features model, and successfully applied appropriate
features combination and multiclass machine learning method on recognition;
Conducted presentations during the research group’s weekly meeting to report on new potential method
and the experiment results from different methods and corresponding parameter setting;
2. Implemented the entire code via Open CV in Python environment with packages in Scikit-Learn.
Movie Box March 2015-June2015
Supervisor: Prof. Doug Downey, Department of EECS, Northwestern University
Research Field: Machine Learning (Recommendation System)
Brief Description: The Recommender Systems have become extremely common in recent years, and
are applied in a variety of applications, especially on movies, music, news, books, to predict the preference
that user would give to an item. Our task is to recommend favorite movies to users and compute the
accuracy of our prediction based on the processed data that originated from Amazon movie websites. The
main method in our recommend system is based on Matrix Factorization Model with method of Singular
Value Decomposition. The processed dataset consists of 200, 000 ratings from 500 users on more than
9,000 movies. After applying data into our models, we will generate the predicted score for the unscored
movies. Then we choose RMSE (Root Mean Square Error) to evaluate the system and compare the
performance of different via with 10-fold cross validation. Our goal is to make RMSE under 0.9. Finally, we
use the model with best performance to output the recommendations, which achieves RMSE at 0.89 under
10-fold cross validation.
My Responsibility:
Tested major methods in Recommendation System (e.g., Matrix Factorization Model with method of
singular value decomposition, User-based recommendation, and Item-based recommendation) and
determined the effectives on recommendation by comparing its Root Mean Squared Error;
Implemented part of Java code of process including data parsing and collection, machine learning and
evaluation; wrote report on recommending favorite movies to users and computed the accuracy of our
prediction based on the processed data that originated from Amazon movie websites
Specific Transportation Problem September 2014-December 2014
Supervisor: Prof. Wenbao Ai, Member of Operations Research Society of China (ORSC) & Society
for Industry and Applied Mathematics (SIAM)
Research Field: Algorithm Design and Integer Optimization
Brief Description: As a core issue of combinatorial optimization theory, integer programming plays an
important role on task scheduling, network design, network routing and other important applications.
Although integer programming just turns real variables of linear programming to integer variables and linear
programming is polynomial-time solvable, integer programming is a typical NP-hard problem. Consider a
class of special transportation problems with stochastic loss, since such a problem is a nonlinear
integer programming problem, completely different from the classical transportation problem, there is no
ready-made algorithm available, which needs author to design a novel algorithm. By analyzing defects of
3. some preliminary designed algorithms, we develop the algorithm based on minimizing critical factor of
actual demands. Experimental results show that the algorithm successfully overcomes "pseudo-non-
feasible" situation under the plays of the preliminary designed algorithms.
My Responsibility:
Analyzed and designed the symbol system and established the mathematical model; discussed related
algorithms and accomplished the corresponding implementation and verification with MATLAB;
Completed the design of the algorithm for non-linear integer programming and wrote program
independently.
Trust Management Model of Virtual Community in P2P Network
May 2011-June 2012
Supervisor: Prof.YucuiGuo, School ofScience, Beijing University ofPosts & Telecommunications
(BUPT)
Research Field: Information Security
Brief Description: The existed trust management models in Peer-to-Peer (P2P) network mainly have two
problems. For one thing, the different influences on value of trust between short-term trading and long-term
trading are usually ignored. For another, the lack of the specific risk analysis on trading resources exists.
Consequently, focusing on the quality of different nodes and its opposite risk value, this project introduced
the concept of risk factor with setting up its value and proposed a trust management model based on
evaluation of value-at-risk with changing time. From the simulation results, a higher efficiency on
resisting malicious actions in P2P network is achieved, and it has confirmed to select better traders
effectively with a deeply quantitative analysis of trade resources through the model.
My Responsibility:
Facilitated weekly discussion on the breakthrough and innovation of the research topic; modeled and
designed algorithms; analyzed the time complexity of the algorithms; explored the feasible algorithm;
conducted quantitative study of trust management of virtual community in P2P network;
Accomplished the simulation by using MATLAB/Simulink; collected relevant paper and academic journals,
assisted other team members; wrote the paper;
Internship
Intern of Data Annotation at Samsung Advanced Institute of Technology in Beijing
July 2012-January 2013
4. My Responsibility: Served as the leader of intern group, assigned tasks and collected daily record of work;
studied the Human Body Recognition Project; collected and arranged the required image data; completed
the image annotation for subsequent debugging; responsible for programming according to the
requirements
Publication
Yifan Guo, Teng Li, Yucui Guo, Trust Management Model based on Value-at-risk Evaluation with
ChangingTimeinP2P Network, Journal of Computer Applications (ISSN: 1001-9081. CN: 51-1307),
Sep. 2012.
Proficiencies
Proficientin Python,Java, MATLAB, MySQL;
Familiar with C Language, C++, HTML, CSS, JavaScript, MATHEMATICA, R; knowledgeable in PHP,
SAS;
Experienced in fieldof machine learning, data mining, image processing, webdesign, and database
management