This document describes using a genetic algorithm to prioritize requirements. It begins with an outline and introduction to the problem of prioritizing software requirements. It then discusses related prioritization techniques from literature and how they have limitations like poor scalability. The document proposes using a genetic algorithm to prioritize requirements, leveraging domain knowledge graphs representing priority and dependencies. It describes representing potential solutions as individuals in a population, calculating fitness by counting disagreements with domain knowledge, and using genetic operators like crossover to evolve better solutions over generations. The goal is to find a prioritized requirements list that best satisfies constraints and delivers value to users.
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...Startup
New Genetic or Evolutionary Algorithm for multiobjective optimization, that attempts to find tradeoff solutions and scales easily with increase in parameter space as well as objective space. Does not use complex niche calculation that is used in existing multiobjective genetic algorithms.
Two Level Disambiguation Model for Query TranslationIJECEIAES
Selection of the most suitable translation among all translation candidates returned by bilingual dictionary has always been quiet challenging task for any cross language query translation. Researchers have frequently tried to use word co-occurrence statistics to determine the most probable translation for user query. Algorithms using such statistics have certain shortcomings, which are focused in this paper. We propose a novel method for ambiguity resolution, named „two level disambiguation model‟. At first level disambiguation, the model properly weighs the importance of translation alternatives of query terms obtained from the dictionary. The importance factor measures the probability of a translation candidate of being selected as the final translation of a query term. This removes the problem of taking binary decision for translation candidates. At second level disambiguation, the model targets the user query as a single concept and deduces the translation of all query terms simultaneously, taking into account the weights of translation alternatives also. This is contrary to previous researches which select translation for each word in source language query independently. The experimental result with English-Hindi cross language information retrieval shows that the proposed two level disambiguation model achieved 79.53% and 83.50% of monolingual translation and 21.11% and 17.36% improvement compared to greedy disambiguation strategies in terms of MAP for short and long queries respectively.
Toward a Natural Genetic / Evolutionary Algorithm for Multiobjective Optimiza...Startup
New Genetic or Evolutionary Algorithm for multiobjective optimization, that attempts to find tradeoff solutions and scales easily with increase in parameter space as well as objective space. Does not use complex niche calculation that is used in existing multiobjective genetic algorithms.
Two Level Disambiguation Model for Query TranslationIJECEIAES
Selection of the most suitable translation among all translation candidates returned by bilingual dictionary has always been quiet challenging task for any cross language query translation. Researchers have frequently tried to use word co-occurrence statistics to determine the most probable translation for user query. Algorithms using such statistics have certain shortcomings, which are focused in this paper. We propose a novel method for ambiguity resolution, named „two level disambiguation model‟. At first level disambiguation, the model properly weighs the importance of translation alternatives of query terms obtained from the dictionary. The importance factor measures the probability of a translation candidate of being selected as the final translation of a query term. This removes the problem of taking binary decision for translation candidates. At second level disambiguation, the model targets the user query as a single concept and deduces the translation of all query terms simultaneously, taking into account the weights of translation alternatives also. This is contrary to previous researches which select translation for each word in source language query independently. The experimental result with English-Hindi cross language information retrieval shows that the proposed two level disambiguation model achieved 79.53% and 83.50% of monolingual translation and 21.11% and 17.36% improvement compared to greedy disambiguation strategies in terms of MAP for short and long queries respectively.
Sentiment analysis using naive bayes classifier Dev Sahu
This ppt contains a small description of naive bayes classifier algorithm. It is a machine learning approach for detection of sentiment and text classification.
[WI 2014]Context Recommendation Using Multi-label ClassificationYONG ZHENG
Context-aware recommender systems (CARS) are extensions of traditional recommenders that also take into account contextual condition of a user to whom a recommendation is made. The recommendation problem is, however, still focused on recommending a set of items to a target user. In this paper, we consider the problem of recommending to a user the appropriate contexts in which an item should be selected. We believe that context recommenders can be used as another set of tools to assist users' decision making. We formulate the context recommendation problem and discuss the motivation behind and possible applications of the concept. We identify two general classes of algorithms to solve this problem: direct context prediction and indirect context recommendation. Furthermore, we present and evaluate several direct context prediction algorithms based on multi-label classification (MLC). Our experiments demonstrate that the proposed approaches outperform the baseline methods, and also that personalization is required to enhance the effectiveness of context recommenders.
For three decades, many mathematical programming methods have been developed to solve optimization problems. However, until now, there has not been a single totally efficient and robust method to coverall optimization problems that arise in the different engineering fields.Most engineering application design problems involve the choice of design variable values that better describe the behaviour of a system.At the same time, those results should cover the requirements and specifications imposed by the norms for that system. This last condition leads to predicting what the entrance parameter values should be whose design results comply with the norms and also present good performance, which describes the inverse problem.Generally, in design problems the variables are discreet from the mathematical point of view. However, most mathematical optimization applications are focused and developed for continuous variables. Presently, there are many research articles about optimization methods; the typical ones are based on calculus,numerical methods, and random methods.
The calculus-based methods have been intensely studied and are subdivided in two main classes: 1) the direct search methods find a local maximum moving a function over the relative local gradient directions and 2) the indirect methods usually find the local ends solving a set of non-linear equations, resultant of equating the gradient from the object function to zero, i.e., by means of multidimensional generalization of the notion of the function’s extreme points from elementary calculus given smooth function without restrictions to find a possible maximum which is to be restricted to those points whose slope is zero in all directions. The real world has many discontinuities and noisy spaces, which is why it is not surprising that the methods depending upon the restrictive requirements of continuity and existence of a derivative, are unsuitable for all, but a very limited problem domain. A number of schemes have been applied in many forms and sizes. The idea is quite direct inside a finite search space or a discrete infinite search space, where the algorithms can locate the object function values in each space point one at a time. The simplicity of this kind of algorithm is very attractive when the numbers of possibilities are very small. Nevertheless, these outlines are often inefficient, since they do not complete the requirements of robustness in big or highly-dimensional spaces, making it quite a hard task to find the optimal values. Given the shortcomings of the calculus-based techniques and the numerical ones the random methods have increased their popularity.
Evaluation of subjective answers using glsa enhanced with contextual synonymyijnlc
Evaluation of subjective answers submitted in an exam is an essential but one of the most resource consuming educational activity. This paper details experiments conducted under our project to build a software that evaluates the subjective answers of informative nature in a given knowledge domain. The paper first summarizes the techniques such as Generalized Latent Semantic Analysis (GLSA) and Cosine Similarity that provide basis for the proposed model. The further sections point out the areas of improvement in the previous work and describe our approach towards the solutions of the same. We then discuss the implementation details of the project followed by the findings that show the improvements achieved. Our approach focuses on comprehending the various forms of expressing same entity and thereby capturing the subjectivity of text into objective parameters. The model is tested by evaluating answers submitted by 61 students of Third Year B. Tech. CSE class of Walchand College of Engineering Sangli in a test on Database Engineering.
Differential Evolution (DE) is a renowned optimization stratagem that can easily solve nonlinear and comprehensive problems. DE is a well known and uncomplicated population based probabilistic approach for comprehensive optimization. It has apparently outperformed a number of Evolutionary Algorithms and further search heuristics in the vein of Particle Swarm Optimization at what time of testing over both yardstick and actual world problems. Nevertheless, DE, like other probabilistic optimization algorithms, from time to time exhibits precipitate convergence and stagnates at suboptimal position. In order to stay away from stagnation behavior while maintaining an excellent convergence speed, an innovative search strategy is introduced, named memetic search in DE. In the planned strategy, positions update equation customized as per a memetic search stratagem. In this strategy a better solution participates more times in the position modernize procedure. The position update equation is inspired from the memetic search in artificial bee colony algorithm. The proposed strategy is named as Memetic Search in Differential Evolution (MSDE). To prove efficiency and efficacy of MSDE, it is tested over 8 benchmark optimization problems and three real world optimization problems. A comparative analysis has also been carried out among proposed MSDE and original DE. Results show that the anticipated algorithm go one better than the basic DE and its recent deviations in a good number of the experiments.
Peter Muschick MSc thesis
Universitat Pollitecnica de Catalunya, 2020
Sign language recognition and translation has been an active research field in the recent years with most approaches using deep neural networks to extract information from sign language data. This work investigates the mostly disregarded approach of using human keypoint estimation from image and video data with OpenPose in combination with transformer network architecture. Firstly, it was shown that it is possible to recognize individual signs (4.5% word error rate (WER)). Continuous sign language recognition though was more error prone (77.3% WER) and sign language translation was not possible using the proposed methods, which might be due to low accuracy scores of human keypoint estimation by OpenPose and accompanying loss of information or insufficient capacities of the used transformer model. Results may improve with the use of datasets containing higher repetition rates of individual signs or focusing more precisely on keypoint extraction of hands.
CUHK intern PPT. Machine Translation Evaluation: Methods and Tools Lifeng (Aaron) Han
Abstract of Aaron Han’s Presentation
The main topic of this presentation will be the “evaluation of machine translation”. With the rapid development of machine translation (MT), the MT evaluation becomes more and more important to tell whether they make some progresses. The traditional human judgments are very time-consuming and expensive. On the other hand, there are some weaknesses in the existing automatic MT evaluation metrics:
– perform well in certain language pairs but weak on others, which we call the language-bias problem;
– consider no linguistic information (leading the metrics result in low correlation with human judgments) or too many linguistic features (difficult in replicability), which we call the extremism problem;
– design incomprehensive factors (e.g. precision only).
To address the existing problems, he has developed several automatic evaluation metrics:
– Design tunable parameters to address the language-bias problem;
– Use concise linguistic features for the linguistic extremism problem;
– Design augmented factors.
The experiments on ACL-WMT corpora show the proposed metrics yield higher correlation with human judgments. The proposed metrics have been published on international top conferences, e.g. COLING and MT SUMMIT. Actually speaking, the evaluation works are very related to the similarity measuring. So these works can be further developed into other literature, such as information retrieval, question and answering, searching, etc.
A brief introduction about some of his other researches will also be mentioned, such as Chinese named entity recognition, word segmentation, and multilingual treebanks, which have been published on Springer LNCS and LNAI series. Precious suggestions and comments are much appreciated. The opportunities of further corporation will be more exciting.
Genetic Algorithm (GA) is a search-based optimization technique based on the principles of Genetics and Natural Selection. It is frequently used to find optimal or near-optimal solutions to difficult problems which otherwise would take a lifetime to solve. It is frequently used to solve optimization problems, in research, and in machine learning.
Contents of the presentation:
• GA – Introduction
• GA – Fundamentals
• GA – Genotype Representation
• GA – Population
• GA – Fitness Function
• GA – Parent Selection
• GA – Crossover
• GA – Mutation
• Research Paper
A constraint is defined as a logical relation among several unknown quantities or variables, each taking a value in a given
domain. Constraint Programming (CP) is an emergent field in operations research. Constraint programming is based on feasibility
which means finding a feasible solution rather than optimization which means finding an optimal solution and focuses on the
constraints and variables domain rather than the objective functions. While defining a set of constraints, this may seem a simple way to
model a real-world problem but finding a good model that works well with a chosen solver is not that easy. A model could be very
hard to solve if it is poorly chosen
An Open Source GIS System for Earthquake Early Warning and Post-Event Emergen...Maurizio Pollino
Authors: M. Pollino, G. Fattoruso, A. B. Della Rocca, L. La Porta, S. Lo Curzio, A. Arolchi, V. James and C. Pascale (2011).
Presented at "Computational Science and Its Applications - ICCSA 2011 International Conference", Santander, Spain, June 20-23, 2011.
The recent advances in geo-informatics have been opening new opportunities in earthquake early warning and emergency management issues. In the last years, the geo-scientific community has recognized the added value of a geo-analytic approach in complex decision making processes for critical situations due to disastrous natural events such as earthquakes. In fact, recently, GIS-based solutions are investigated in several research projects such as SIT_MEW Project, aimed at the development of volcanic and seismic early warning systems (EWSs). In this project context, an innovative open source GIS system has been investigated and developed as integrated component of the seismic EWS. Its architecture consists in a geospatial database system, a local GIS application for analyzing and modelling the seismic event and its impacts and supporting post-event emergency management, a WEB-GIS module for sharing the geo-information among the public and private stakeholders and emergency managers involved in disaster impact assessment and response management.
Sentiment analysis using naive bayes classifier Dev Sahu
This ppt contains a small description of naive bayes classifier algorithm. It is a machine learning approach for detection of sentiment and text classification.
[WI 2014]Context Recommendation Using Multi-label ClassificationYONG ZHENG
Context-aware recommender systems (CARS) are extensions of traditional recommenders that also take into account contextual condition of a user to whom a recommendation is made. The recommendation problem is, however, still focused on recommending a set of items to a target user. In this paper, we consider the problem of recommending to a user the appropriate contexts in which an item should be selected. We believe that context recommenders can be used as another set of tools to assist users' decision making. We formulate the context recommendation problem and discuss the motivation behind and possible applications of the concept. We identify two general classes of algorithms to solve this problem: direct context prediction and indirect context recommendation. Furthermore, we present and evaluate several direct context prediction algorithms based on multi-label classification (MLC). Our experiments demonstrate that the proposed approaches outperform the baseline methods, and also that personalization is required to enhance the effectiveness of context recommenders.
For three decades, many mathematical programming methods have been developed to solve optimization problems. However, until now, there has not been a single totally efficient and robust method to coverall optimization problems that arise in the different engineering fields.Most engineering application design problems involve the choice of design variable values that better describe the behaviour of a system.At the same time, those results should cover the requirements and specifications imposed by the norms for that system. This last condition leads to predicting what the entrance parameter values should be whose design results comply with the norms and also present good performance, which describes the inverse problem.Generally, in design problems the variables are discreet from the mathematical point of view. However, most mathematical optimization applications are focused and developed for continuous variables. Presently, there are many research articles about optimization methods; the typical ones are based on calculus,numerical methods, and random methods.
The calculus-based methods have been intensely studied and are subdivided in two main classes: 1) the direct search methods find a local maximum moving a function over the relative local gradient directions and 2) the indirect methods usually find the local ends solving a set of non-linear equations, resultant of equating the gradient from the object function to zero, i.e., by means of multidimensional generalization of the notion of the function’s extreme points from elementary calculus given smooth function without restrictions to find a possible maximum which is to be restricted to those points whose slope is zero in all directions. The real world has many discontinuities and noisy spaces, which is why it is not surprising that the methods depending upon the restrictive requirements of continuity and existence of a derivative, are unsuitable for all, but a very limited problem domain. A number of schemes have been applied in many forms and sizes. The idea is quite direct inside a finite search space or a discrete infinite search space, where the algorithms can locate the object function values in each space point one at a time. The simplicity of this kind of algorithm is very attractive when the numbers of possibilities are very small. Nevertheless, these outlines are often inefficient, since they do not complete the requirements of robustness in big or highly-dimensional spaces, making it quite a hard task to find the optimal values. Given the shortcomings of the calculus-based techniques and the numerical ones the random methods have increased their popularity.
Evaluation of subjective answers using glsa enhanced with contextual synonymyijnlc
Evaluation of subjective answers submitted in an exam is an essential but one of the most resource consuming educational activity. This paper details experiments conducted under our project to build a software that evaluates the subjective answers of informative nature in a given knowledge domain. The paper first summarizes the techniques such as Generalized Latent Semantic Analysis (GLSA) and Cosine Similarity that provide basis for the proposed model. The further sections point out the areas of improvement in the previous work and describe our approach towards the solutions of the same. We then discuss the implementation details of the project followed by the findings that show the improvements achieved. Our approach focuses on comprehending the various forms of expressing same entity and thereby capturing the subjectivity of text into objective parameters. The model is tested by evaluating answers submitted by 61 students of Third Year B. Tech. CSE class of Walchand College of Engineering Sangli in a test on Database Engineering.
Differential Evolution (DE) is a renowned optimization stratagem that can easily solve nonlinear and comprehensive problems. DE is a well known and uncomplicated population based probabilistic approach for comprehensive optimization. It has apparently outperformed a number of Evolutionary Algorithms and further search heuristics in the vein of Particle Swarm Optimization at what time of testing over both yardstick and actual world problems. Nevertheless, DE, like other probabilistic optimization algorithms, from time to time exhibits precipitate convergence and stagnates at suboptimal position. In order to stay away from stagnation behavior while maintaining an excellent convergence speed, an innovative search strategy is introduced, named memetic search in DE. In the planned strategy, positions update equation customized as per a memetic search stratagem. In this strategy a better solution participates more times in the position modernize procedure. The position update equation is inspired from the memetic search in artificial bee colony algorithm. The proposed strategy is named as Memetic Search in Differential Evolution (MSDE). To prove efficiency and efficacy of MSDE, it is tested over 8 benchmark optimization problems and three real world optimization problems. A comparative analysis has also been carried out among proposed MSDE and original DE. Results show that the anticipated algorithm go one better than the basic DE and its recent deviations in a good number of the experiments.
Peter Muschick MSc thesis
Universitat Pollitecnica de Catalunya, 2020
Sign language recognition and translation has been an active research field in the recent years with most approaches using deep neural networks to extract information from sign language data. This work investigates the mostly disregarded approach of using human keypoint estimation from image and video data with OpenPose in combination with transformer network architecture. Firstly, it was shown that it is possible to recognize individual signs (4.5% word error rate (WER)). Continuous sign language recognition though was more error prone (77.3% WER) and sign language translation was not possible using the proposed methods, which might be due to low accuracy scores of human keypoint estimation by OpenPose and accompanying loss of information or insufficient capacities of the used transformer model. Results may improve with the use of datasets containing higher repetition rates of individual signs or focusing more precisely on keypoint extraction of hands.
CUHK intern PPT. Machine Translation Evaluation: Methods and Tools Lifeng (Aaron) Han
Abstract of Aaron Han’s Presentation
The main topic of this presentation will be the “evaluation of machine translation”. With the rapid development of machine translation (MT), the MT evaluation becomes more and more important to tell whether they make some progresses. The traditional human judgments are very time-consuming and expensive. On the other hand, there are some weaknesses in the existing automatic MT evaluation metrics:
– perform well in certain language pairs but weak on others, which we call the language-bias problem;
– consider no linguistic information (leading the metrics result in low correlation with human judgments) or too many linguistic features (difficult in replicability), which we call the extremism problem;
– design incomprehensive factors (e.g. precision only).
To address the existing problems, he has developed several automatic evaluation metrics:
– Design tunable parameters to address the language-bias problem;
– Use concise linguistic features for the linguistic extremism problem;
– Design augmented factors.
The experiments on ACL-WMT corpora show the proposed metrics yield higher correlation with human judgments. The proposed metrics have been published on international top conferences, e.g. COLING and MT SUMMIT. Actually speaking, the evaluation works are very related to the similarity measuring. So these works can be further developed into other literature, such as information retrieval, question and answering, searching, etc.
A brief introduction about some of his other researches will also be mentioned, such as Chinese named entity recognition, word segmentation, and multilingual treebanks, which have been published on Springer LNCS and LNAI series. Precious suggestions and comments are much appreciated. The opportunities of further corporation will be more exciting.
Genetic Algorithm (GA) is a search-based optimization technique based on the principles of Genetics and Natural Selection. It is frequently used to find optimal or near-optimal solutions to difficult problems which otherwise would take a lifetime to solve. It is frequently used to solve optimization problems, in research, and in machine learning.
Contents of the presentation:
• GA – Introduction
• GA – Fundamentals
• GA – Genotype Representation
• GA – Population
• GA – Fitness Function
• GA – Parent Selection
• GA – Crossover
• GA – Mutation
• Research Paper
A constraint is defined as a logical relation among several unknown quantities or variables, each taking a value in a given
domain. Constraint Programming (CP) is an emergent field in operations research. Constraint programming is based on feasibility
which means finding a feasible solution rather than optimization which means finding an optimal solution and focuses on the
constraints and variables domain rather than the objective functions. While defining a set of constraints, this may seem a simple way to
model a real-world problem but finding a good model that works well with a chosen solver is not that easy. A model could be very
hard to solve if it is poorly chosen
An Open Source GIS System for Earthquake Early Warning and Post-Event Emergen...Maurizio Pollino
Authors: M. Pollino, G. Fattoruso, A. B. Della Rocca, L. La Porta, S. Lo Curzio, A. Arolchi, V. James and C. Pascale (2011).
Presented at "Computational Science and Its Applications - ICCSA 2011 International Conference", Santander, Spain, June 20-23, 2011.
The recent advances in geo-informatics have been opening new opportunities in earthquake early warning and emergency management issues. In the last years, the geo-scientific community has recognized the added value of a geo-analytic approach in complex decision making processes for critical situations due to disastrous natural events such as earthquakes. In fact, recently, GIS-based solutions are investigated in several research projects such as SIT_MEW Project, aimed at the development of volcanic and seismic early warning systems (EWSs). In this project context, an innovative open source GIS system has been investigated and developed as integrated component of the seismic EWS. Its architecture consists in a geospatial database system, a local GIS application for analyzing and modelling the seismic event and its impacts and supporting post-event emergency management, a WEB-GIS module for sharing the geo-information among the public and private stakeholders and emergency managers involved in disaster impact assessment and response management.
A Multiobjective Evolutionary Algorithm for Infrastructure Location in Vehicu...Jamal Toutouh, PhD
Presentation of our research study "A Multiobjective Evolutionary Algorithm for Infrastructure Location in Vehicular Networks" performed at 7th European Symposium on Computational Intelligence and Mathematics
See the paper --> http://dx.doi.org/10.13140/RG.2.1.1965.0006
This is the poster presented at GECCO 08. It presents IGAP, a peer to peer interactive genetic algorithm, where case injection allows individuals to share ideas across multiple individual evolutionary sessions.
Vehicle Tracking System (VTS) enables realtime monitoring and controlling of vehicles using easy software interface.
VTS uses GPS/GLONASS and GSM based services along many software components to make this work.
This is presentation is intended for middle school students. It provides a short introduction to GIS and how to use GIS in the real-world.
ArcGIS Explorer is the software used to demonstrate concepts.
45 minutes + 15 minutes demo
Download ArcGIS Explorer here...
http://www.esri.com/software/arcgis/explorer/
Performance analysis of machine learning approaches in software complexity pr...Sayed Mohsin Reza
This video contains the presentation at TCCE 2020 by Sayed Mohsin Reza on his paper titled "Performance Analysis of Machine Learning Approaches in Software Complexity Prediction"
Keywords: Software Complexity, Software Quality, Machine Learning, Software Design, Software Reliability, etc
Authors :
1. Sayed Mohsin Reza, Ph.D. Student, University of Texas
2. Mahfujur Rahman, Lecturer, Daffodil International University
3. Hasnat Parvez, Student, Jahangirnagar University
4. Omar Badreddin, Professor, University of Texas
5. Shamim Al Mamun, Professor, Jahangirnagar University
Abstract: Software design is one of the core concepts in software engineering. This covers insights and intuitions of software evolution, reliability, and maintainability. Effective software design facilitates software reliability and better quality management during development which reduces software development cost. Therefore, it is required to detect and maintain these issues earlier. Class complexity is one of the ways of detecting software quality. The objective of this paper is to predict class complexity from source code metrics using Machine Learning (ML) approaches and compare the performance of the approaches. In order to do that, we collect ten popular and quality maintained open source repositories and extract 18 source code metrics that relate to complexity for class-level analysis. First, we apply statistical correlation to find out the source code metrics that impact most on class complexity. Second, we apply five alternative ML techniques to build complexity predictors and compare the performances. The results report that the following source code metrics: Depth Inheritance Tree (DIT), Response For Class (RFC), Weighted Method Count (WMC), Lines of Code (LOC), and Coupling Between Objects (CBO) have the most impact on class complexity. Also, we evaluate the performance of the techniques and results show that Random Forest (RF) significantly improves accuracy without providing additional false negative or false positive that work as false alarms in complexity prediction.
Test case prioritization (TCP) is aimed at finding an ideal ordering for executing the available test cases to reveal faults earlier. To solve this problem greedy algorithms and meta-heuristics have been widely investigated, but in most cases there is no statistically significant difference between them in terms of effectiveness. The fitness function used to guide meta-heuristics condenses the cumulative coverage scores achieved by a test case ordering using the Area Under Curve (AUC) metric. In this paper we notice that the AUC metric represents a simplified version of the hypervolume metric used in many objective optimization and we propose HGA, a Hypervolume-based Genetic Algorithm, to solve the TCP problem when using multiple test criteria. The results shows that HGA is more cost-effective than the additional greedy algorithm on large systems and on average requires 36% of the execution time required by the additional greedy algorithm.
Template-based information access, in which templates are constructed for keywords, is a recent development of linked data information retrieval. However, most such approaches suffer from ineffective template management. Because linked data has a structured data representation, we assume the data’s inside statistics can effectively influence template management. In this work, we use this influence for template
creation, template ranking, and scaling. Our proposal can effectively be used for automatic linked data information retrieval and can be incorporated with other techniques such as ontology inclusion and sophisticated matching to further improve performance.
Feature Selection for Document RankingAndrea Gigli
Feature selection for Machine Learning applied to Document Ranking (aka L2R, LtR, LETOR). Contains empirical results on Yahoo! and Bing public available Web Search Engine data.
By popular demand, here is a case study of my first Kaggle competition from about a year ago. Hope you find it useful. Thank you again to my fantastic team.
Dear Sir/Ma’am
I am interested to work as a data specialist in your organization. I believe my experience, skills and work attitude will aid your organization in a great way. Please accept my enclosed resume with this letter.
I worked at Accenture for the last four years. My key responsibilities here were to collect, analyse, store and create data. I made sure that these data were accurate and not damaged. As far as my educational background is concerned, I have a bachelor's degree in EXTC. I am excellent at solving problems and have great analytical skills. I am capable of working well with network administration and can explain the technical problems.
I would appreciate if we could meet up for an interview wherein we can discuss more on this. I can be contacted at +919493377607 or you can email me at imtiaz.khan.sw39@gmail.com
Thank You.
Yours sincerely,
Imtiaz Khan
The field of machine programming — the automation of the development of software — is making notable research advances. This is, in part, due to the emergence of a wide range of novel techniques in machine learning. In today’s technological landscape, software is integrated into almost everything we do, but maintaining software is a time-consuming and error-prone process. When fully realized, machine programming will enable everyone to express their creativity and develop their own software without writing a single line of code. Intel realizes the pioneering promise of machine programming, which is why it created the Machine Programming Research (MPR) team in Intel Labs. The MPR team’s goal is to create a society where everyone can create software, but machines will handle the “programming” part.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
3. Problem Description
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
Problem: [Prioritization of Requirements] To find the best ordering of
requirements in each successive release to ensure quality & value of
the delivered system, trade-off constraints & end-user satisfaction. 3
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
Do Trade-off between user needs & real constraints
Now, highest quality &
best valued system!
4. Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
4
1. Acquisition and coding of set of Requirements and Domain Knowledge
2. Apply A Prioritization Technique
3. Output of the ranking
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
Problem Description (cont)
Find it!Why Ordered List? Order of implementation satisfy the
developers’ constraints & delivers maximum value to the user.
5. Domain Knowledge: Prio & Dep
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
5
Domain knowledge includes two precedence graphs
• Prio
• Dep
How to build them?
Prio: For 1st release, initial priorities
Dep: For 1st release, dependencies
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
Prio
Dep
6. Classification: State-of-the-Art approaches
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
6
Prioritization Approaches Classification
using user knowledge either performing pair-wise
comparison or not
using domain knowledge
using both
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
User Knowledge refers to the awareness of the requirements attributes
and the overall system functionalities to be developed
7. State-of-the-Art approaches (cont)
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
7
Pairwise Comparison based approaches
Analytic Hierarchy Process (AHP): involves comparing all unique pairs of
requirements to determine which of the two is of higher priority, and to
what extent
Bubble Sort: compares two requirements & swap them if they are in the
wrong order
Cost-Value Approach: each individual requirement is determined on
(i) the value to the users
(ii) the cost of implementing the requirements.
It uses the AHP technique
Case Based Ranking (CBRank): exploits a machine learning algorithm to
guide the elicitation of user preferences during the prioritization process
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
8. State-of-the-Art approaches (cont)
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
8
Non-Pairwise comparison based approaches
Numerical Assignment: grouping requirements into different priority groups
MoScoW: groups all requirements into four priority groups MUST have, SHOULD have,
COULD have, and WON’T have.
Simple Ranking: requirements are simply ranked from integer 1 to N
Binary Search Tree: each node represents a requirement, requirements placed in the
left subtree of a node are of lower priority and those placed in the right subtree of a
node are of higher priority than the node priority.
$100 Method: each stakeholder is asked to assume having $100 to distribute over the
requirements in a ratio scale
Combining Techniques based approaches
Planning Game: combination of two prioritization techniques i.e. Numerical Assignment
& Simple Ranking
Domain Knowledge based approaches
Priority Groups: dividing requirements into separate groups. then groups are ranked by
using AHP
Genetic Algorithm: optimization is an application of GA & used in the problem of
requirements prioritization too; uses domain knowledge
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
9. State-of-the-Art approaches (cont)
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
9
Summary
Approach Cons
AHP Scalability
Bubble Sort Scalability, time
CBRank unable to accept constraints i.e. Dep
Cost-Value Approach Time consuming
BST Sensitivity; a single error may build wrong tree
GA Can’t resolve contradictory;
$100 Method Longer; less confidence, biased
MoScoW Ambiguous final ordering
Simple Ranking unable handling complex scenarios
Scalability is a very common problem of all the approaches!
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
11. Genetic Algorithm Pseudo Code
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
11
The Canonical GA (a simple pseudo code is presented here):
1. choose initial population
2. evaluate each individual’s fitness
REPEAT:
3. select best-ranking individuals to reproduce
4. apply crossover operator
5. apply mutation operator
6. evaluate each individual’s fitness
until terminating condition (e.g. until at least one individual
has the desired fitness or enough generations have passed)
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
12. What is Population & Individuals?
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
12
Indv. ID Individual Disagree
Pr1 < R1, R3, R2, R4, R5, R6, R7, R8, R9 >
Pr2 < R2, R3, R4, R1, R5, R8, R6, R7, R9 >
Pr3 < R5, R2, R1, R3, R7, R8, R6, R9, R4 >
Pr4 < R4, R5, R6, R3, R2, R1, R8, R9, R7 >
Pr5 < R7, R8, R6, R5, R2, R3, R4, R9, R1 >
Pr6 < R5, R6, R7, R8, R9, R1, R2, R3, R4 >
Pr7 < R9, R8, R7, R6, R5, R4, R3, R2, R1 >
Pr8 < R8, R9, R6, R7, R4, R5, R2, R3, R1 >
Pr9 < R1, R3, R5, R7, R9, R2, R4, R6, R8 >
Pr10 < R1, R4, R2, R3, R5, R6, R9, R8, R7 >
R1 R3 R2 R4 R5 R6 R7 R8 R9
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
Population!
A set of
solution
candidates
Pr1
An individual, also a solution candidate
A requirement as a gene
17. Disagreement Calculation (cont)
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
17
Indv. ID Individuals Disagree
Pr1 < R1, R3, R2, R4, R5, R6, R7, R8, R9 > 8
Pr2 < R2, R3, R4, R1, R5, R8, R6, R7, R9 > 8
Pr3 < R5, R2, R1, R3, R7, R8, R6, R9, R4 > 16
Pr4 < R4, R5, R6, R3, R2, R1, R8, R9, R7 > 15
Pr5 < R7, R8, R6, R5, R2, R3, R4, R9, R1 > 23
Pr6 < R5, R6, R7, R8, R9, R1, R2, R3, R4 > 29
Pr7 < R9, R8, R7, R6, R5, R4, R3, R2, R1 > 30
Pr8 < R8, R9, R6, R7, R4, R5, R2, R3, R1 > 29
Pr9 < R1, R3, R5, R7, R9, R2, R4, R6, R8 > 17
Pr10 < R1, R4, R2, R3, R5, R6, R9, R8, R7 > 13
Total Conflicts =
{(R5, R8), Prio
(R6, R7),
(R6, R8),
(R7, R8),
(R1, R3), Dep
(R1, R7),
(R1, R2),
(R5, R8)}
… and so on …
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
dis(pr1, pr2) {(r,s) pr1* |(r,s) pr2*}
Disagreement: Between a pair of ordering i.e. Pr1
and Prio, disagreement is the count of pairs that are inverted in
two orderings. Lower disagreement defines higher fitness.
Formally define:
18. GA Crossover Operator
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
18
We used cut-head/fill-in-tail and cut-tail/fill-in-head…
R2 R3
Positions 5-6 as cut points
to cut-head/fill-in-tail
R6
Pr2
Pr3
Pr2’
R4 R1 R5 R8 R6 R7 R9
R5 R8 R1 R3 R7 R2 R9 R4 R6
R7 R8 R9R2 R3 R4 R1 R5
- variation allows searching out different available niches, find better
fitness values and subsequently better solutions
- never produce chromosomes containing duplicate genes.
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
19. GA Mutation Operator
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
19
Mutation is basically a swap operator, we used
requirement-pair-swap
R2 R3
Pr2
R4 R1 R5 R8 R6 R7 R9
Pr2’
R2 R3 R6 R1 R5 R8 R4 R7 R9
- mutation causes movement in the search space
- may produce a stronger chromosome.
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
20. GA Selection Operator
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
20
We used the Tournament Selection for our approach
- allows the selection pressure to be easily adjusted
- faster than other selection operators i.e. Roulette Wheel Selection
- better convergence
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
21. Our IGA Approach
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
21
1. Acquisition and coding of set of Requirements and Domain Knowledge
2. Apply Interactive Genetic Algorithm (exploiting User Knowledge)
3. Output of the ranking (the most promising individual)
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
23. Our Approach: User Feedback
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
23
Why ties appear in population?
(i) Contradictory information
w.r.t. initial constraints
(ii) Nothing is expressed
explicitly in initial constraints
(iii) Common Domain
Knowledge but different
positions in the individuals
Simple example:
Why (R7, R8)?
Case I: Contradictory w.r.t. Prio & Dep..
Why (R2, R3)?
Case III: Common knowledge but different positions
TIE PAIRS
Pr1, Pr2 (R1, R3), (R2, R3), (R6, R8), (R7, R8) Prio
Dep
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
24. Our Approach: User Feedback
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
24
TIE PAIRS
Pr1, Pr2 (R1, R3), (R2, R3), (R6, R8), (R7, R8)
Eli
User Preference Graph eliOrd
Experience
&
knowledge
‘<‘ or ‘>’
So, user knowledge is playing important role…
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
25. Our Approach: New Round with New Constraints
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
25
The new evolved population after using GA operators
on population:
Crossover
Mutation
Selection
is compared against the new set of constraints graphs
Eli
DepPrio
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
27. The Case Study
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
27
Prioritize requirements for a real software system, as part of the
project ACube (Ambient Aware Assistance)
designing a highly technological monitoring environment to be
deployed in nursing homes to support medical and assistance staff
After user requirements analysis phase,
60 user requirements and 49 technical requirements
Four macro-scenarios have been identified.
ID Macro-Scenario # of requirements
FALL Monitoring falls 26
ESC Monitoring escapes 23
MON Monitoring dangerous behavior 21
ALL The three scenarios 49
*ACube is a social welfare project coordinated by Fondazione Bruno Kessler (FBK) and
funded by Autonomous Province of Trento under Bando Grandi Progetti, 2006.
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
28. Gold Standard (GS)
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
28
For each of the four macro-scenarios, we obtained the
Gold Standard (GS) prioritization from the Software Architect
of the ACube project
The GS prioritization is the ordering given by the software
architect to the requirements when planning their
implementation during the ACube project.
Why Gold Standard?
To measure disagreements with respect to GS.
To evaluate our approach in terms of disagreement
against other non-interactive approaches using the same
GS.
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
30. R Q 1
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
30
RQ1 (Convergence) Can we observe convergence with respect to the
finally elicited fitness function?
- Convergence is not obvious immediately, as Eli Graph is evolving at early stages.
- Although the full fitness function is known only at end of elicitation process.
The best individual in each population converges toward a low value of the
final fitness function.Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
YES!
31. R Q 2
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
31
RQ2 (Role of interaction) Does IGA produce improved
prioritizations compared to non-interactive requirement ordering?
IGA outperforms substantially GA (and RAND), especially when a
higher number of pairwise comparisons can be carried out
YES!
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
32. R Q 3
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
32
RQ3 (Role of initial precedence constraints) How does initial
availability of precedence constraints affect the performance of IGA?
- Different type of Domain Knowledge affects IGA significantly
- The improvement of IGA over GA is even higher when limited ranking
information is available
Improves!
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
33. R Q 4
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
33
RQ4 (Robustness) Is IGA robust with respect to errors committed by
the user during the elicitation of pairwise comparisons?
IGA can tolerate user errors up to 20%.
YES!Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
34. General Discussion
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
34
Cost/benefit trade off offered by IGA as compared to
AHP is extremely interesting
With an elicitation effort reduced to 10% of the one
required by AHP, IGA produces an apprx. ordering which has
a quite low disagreement from the requirement positions in
the GS.
User Errors tolerance offered by IGA as compared to
AHP is highly reasonable
With an elicitation of very significant amount of less pairs
than AHP (i.e. pairwise comparisons), it is reasonable even if
IGA accepts up to 20% user error, while using AHP even 10%
user error can result a total bad ordering.
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
35. Conclusions & Future Works
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
35
We proposed an Interactive Genetic Algorithm to collect
pairwise information useful to prioritize the requirements for a
software system.
We also verified the robustness of the algorithm with respect
to increasing user feedback errors.
We evaluated the approach in a real project (ACube).
In summary, we contributed A NOVEL APPROACH to prioritize
requirements & tested its effectiveness empirically.
What’s Next?
Algorithm:
- refining the algorithm
- improving GA operators
Experiment
- off-line: comparisons with other approaches
- on-line: controlled experiments with real object (i.e. human)
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions
36. Paper Publication
Using
Interactive
Genetic
Algorithm for
Requirements
Prioritization
36
A paper was published from this work and was presented at SSBSE
2010:
Paolo Tonella1, Angelo Susi1, and Francis Palma2, "Using
Interactive GA for Requirements Prioritization" in 2nd
International Symposium on Search Based Software Engineering
2010. 1Fondazione Bruno Kessler, Software Engineering Research
Unit; 2Department of Inf. Eng. and Computer Science, University of
Trento.
Outline
Problem
Related Works
Genetic Algo
Our Approach
Case Study
Results
Discussions
Conclusions