-
Influence Maximization (IM) in Complex Networks with Limited Visibility Using Statistical Methods
Authors:
Saeid Ghafouri,
Seyed Hossein Khasteh,
Seyed Omid Azarkasb
Abstract:
A social network (SN) is a social structure consisting of a group representing the interaction between them. SNs have recently been widely used and, subsequently, have become suitable and popular platforms for product promotion and information diffusion. People in an SN directly influence each other's interests and behavior. One of the most important problems in SNs is to find people who can have…
▽ More
A social network (SN) is a social structure consisting of a group representing the interaction between them. SNs have recently been widely used and, subsequently, have become suitable and popular platforms for product promotion and information diffusion. People in an SN directly influence each other's interests and behavior. One of the most important problems in SNs is to find people who can have the maximum influence on other nodes in the network in a cascade manner if they are chosen as the seed nodes of a network diffusion scenario. Influential diffusers are people who, if they are chosen as the seed set in a publishing issue in the network, that network will have the most people who have learned about that diffused entity. This is a well-known problem in literature known as influence maximization (IM) problem. Although it has been proven that this is an NP-complete problem and does not have a solution in polynomial time, it has been argued that it has the properties of sub modular functions and, therefore, can be solved using a greedy algorithm. Most of the methods proposed to improve this complexity are based on the assumption that the entire graph is visible. However, this assumption does not hold for many real-world graphs. This study is conducted to extend current maximization methods with link prediction techniques to pseudo-visibility graphs. To this end, a graph generation method called the exponential random graph model (ERGM) is used for link prediction. The proposed method is tested using the data from the Snap dataset of Stanford University. According to the experimental tests, the proposed method is efficient on real-world graphs.
△ Less
Submitted 11 September, 2022; v1 submitted 28 August, 2022;
originally announced August 2022.
-
Opinion Leader Detection in Online Social Networks Based on Output and Input Links
Authors:
Zahra Ghorbani,
Seyed Hossein Khasteh,
Saeid Ghafouri
Abstract:
The understanding of how users in a network update their opinions based on their neighbours opinions has attracted a great deal of interest in the field of network science, and a growing body of literature recognises the significance of this issue. In this research paper, we propose a new dynamic model of opinion formation in directed networks. In this model, the opinion of each node is updated as…
▽ More
The understanding of how users in a network update their opinions based on their neighbours opinions has attracted a great deal of interest in the field of network science, and a growing body of literature recognises the significance of this issue. In this research paper, we propose a new dynamic model of opinion formation in directed networks. In this model, the opinion of each node is updated as the weighted average of its neighbours opinions, where the weights represent social influence. We define a new centrality measure as a social influence metric based on both influence and conformity. We measure this new approach using two opinion formation models: (i) the Degroot model and (ii) our own proposed model. Previously published research studies have not considered conformity, and have only considered the influence of the nodes when computing the social influence. In our definition, nodes with low in-degree and high out-degree that were connected to nodes with high out-degree and low in-degree had higher centrality. As the main contribution of this research, we propose an algorithm for finding a small subset of nodes in a social network that can have a significant impact on the opinions of other nodes. Experiments on real-world data demonstrate that the proposed algorithm significantly outperforms previously published state-of-the-art methods.
△ Less
Submitted 28 August, 2022;
originally announced August 2022.
-
Profitable Strategy Design by Using Deep Reinforcement Learning for Trades on Cryptocurrency Markets
Authors:
Mohsen Asgari,
Seyed Hossein Khasteh
Abstract:
Deep Reinforcement Learning solutions have been applied to different control problems with outperforming and promising results. In this research work we have applied Proximal Policy Optimization, Soft Actor-Critic and Generative Adversarial Imitation Learning to strategy design problem of three cryptocurrency markets. Our input data includes price data and technical indicators. We have implemented…
▽ More
Deep Reinforcement Learning solutions have been applied to different control problems with outperforming and promising results. In this research work we have applied Proximal Policy Optimization, Soft Actor-Critic and Generative Adversarial Imitation Learning to strategy design problem of three cryptocurrency markets. Our input data includes price data and technical indicators. We have implemented a Gym environment based on cryptocurrency markets to be used with the algorithms. Our test results on unseen data shows a great potential for this approach in helping investors with an expert system to exploit the market and gain profit. Our highest gain for an unseen 66 day span is 4850 US dollars per 10000 US dollars investment. We also discuss on how a specific hyperparameter in the environment design can be used to adjust risk in the generated strategies.
△ Less
Submitted 15 January, 2022;
originally announced January 2022.
-
Text as Environment: A Deep Reinforcement Learning Text Readability Assessment Model
Authors:
Hamid Mohammadi,
Seyed Hossein Khasteh,
Tahereh Firoozi,
Taha Samavati
Abstract:
Evaluating the readability of a text can significantly facilitate the precise expression of information in written form. The formulation of text readability assessment involves the identification of meaningful properties of the text regardless of its length. Sophisticated features and models are used to evaluate the comprehensibility of texts accurately. Despite this, the problem of assessing text…
▽ More
Evaluating the readability of a text can significantly facilitate the precise expression of information in written form. The formulation of text readability assessment involves the identification of meaningful properties of the text regardless of its length. Sophisticated features and models are used to evaluate the comprehensibility of texts accurately. Despite this, the problem of assessing texts' readability efficiently remains relatively untouched. The efficiency of state-of-the-art text readability assessment models can be further improved using deep reinforcement learning models. Using a hard attention-based active inference technique, the proposed approach makes efficient use of input text and computational resources. Through the use of semi-supervised signals, the reinforcement learning model uses the minimum amount of text in order to determine text's readability. A comparison of the model on Weebit and Cambridge Exams with state-of-the-art models, such as the BERT text readability model, shows that it is capable of achieving state-of-the-art accuracy with a significantly smaller amount of input text than other models.
△ Less
Submitted 23 October, 2023; v1 submitted 12 December, 2019;
originally announced December 2019.
-
Low-power and Reliable Solid-state Drive with Inverted Limited Weight Coding
Authors:
Armin Ahmadzadeh,
Omid Hajihassani,
Pooria Taheri,
Seyed Hossein Khasteh
Abstract:
In this work, we propose a novel coding scheme which based on the characteristics of NAND flash cells, generates codewords that reduce the energy consumption and improve the reliability of solid-state drives. This novel coding scheme, namely Inverted Limited Weight Coding (ILWC), favors a greater number of '1's appearing in its generated codewords at the cost of added information redundancy, as a…
▽ More
In this work, we propose a novel coding scheme which based on the characteristics of NAND flash cells, generates codewords that reduce the energy consumption and improve the reliability of solid-state drives. This novel coding scheme, namely Inverted Limited Weight Coding (ILWC), favors a greater number of '1's appearing in its generated codewords at the cost of added information redundancy, as a form of flag bits. This increase in the number of bits valued as logical '1', in the generated codewords, will increase the number of cells that have lower threshold voltages. Through cells with lower threshold voltages, ILWC fruitfully reduces the SSD's program operation energy consumption. Moreover, it increases the SSD's data retention rate and reliability by decreasing the threshold voltage of the cells. The evaluation of our proposed coding method on three different SSDs, indicates more than 20% reduction in the SSD's program operation energy consumption. In addition, ILWC improves the cells' data retention rate by decreasing their intrinsic electric field by more than 18%. Moreover, the SSD's cell-to-cell coupling noise is diminished with the help of 35% reduction in the worst-case threshold voltage shift in a cell's adjacent cells. All this leads to 5.3% reduction in the MLC's cell error rate. In addition, ILWC achieves 37.5% improvement in the performance of the SSD program operation.
△ Less
Submitted 4 July, 2019;
originally announced July 2019.
-
A Machine Learning Approach to Persian Text Readability Assessment Using a Crowdsourced Dataset
Authors:
Hamid Mohammadi,
Seyed Hossein Khasteh
Abstract:
An automated approach to text readability assessment is essential to a language and can be a powerful tool for improving the understandability of texts written and published in that language. However, the Persian language, which is spoken by over 110 million speakers, lacks such a system. Unlike other languages such as English, French, and Chinese, very limited research studies have been carried o…
▽ More
An automated approach to text readability assessment is essential to a language and can be a powerful tool for improving the understandability of texts written and published in that language. However, the Persian language, which is spoken by over 110 million speakers, lacks such a system. Unlike other languages such as English, French, and Chinese, very limited research studies have been carried out to build an accurate and reliable text readability assessment system for the Persian language. In the present research, the first Persian dataset for text readability assessment was gathered and the first model for Persian text readability assessment using machine learning was introduced. The experiments showed that this model was accurate and could assess the readability of Persian texts with a high degree of confidence. The results of this study can be used in a number of applications such as medical and educational text readability evaluation and have the potential to be the cornerstone of future studies in Persian text readability assessment.
△ Less
Submitted 21 April, 2020; v1 submitted 7 October, 2018;
originally announced October 2018.
-
A Fast Text Similarity Measure for Large Document Collections using Multi-reference Cosine and Genetic Algorithm
Authors:
Hamid Mohammadi,
Seyed Hossein Khasteh
Abstract:
One of the important factors that make a search engine fast and accurate is a concise and duplicate free index. In order to remove duplicate and near-duplicate documents from the index, a search engine needs a swift and reliable duplicate and near-duplicate text document detection system. Traditional approaches to this problem, such as brute force comparisons or simple hash-based algorithms are no…
▽ More
One of the important factors that make a search engine fast and accurate is a concise and duplicate free index. In order to remove duplicate and near-duplicate documents from the index, a search engine needs a swift and reliable duplicate and near-duplicate text document detection system. Traditional approaches to this problem, such as brute force comparisons or simple hash-based algorithms are not suitable as they are not scalable and are not capable of detecting near-duplicate documents effectively. In this paper, a new signature-based approach to text similarity detection is introduced which is fast, scalable, reliable and needs less storage space. The proposed method is examined on popular text document data-sets such as CiteseerX, Enron, Gold Set of Near-duplicate News Articles and etc. The results are promising and comparable with the best cutting-edge algorithms, considering the accuracy and performance. The proposed method is based on the idea of using reference texts to generate signatures for text documents. The novelty of this paper is the use of genetic algorithms to generate better reference texts.
△ Less
Submitted 24 September, 2019; v1 submitted 7 October, 2018;
originally announced October 2018.
-
Extended Active Learning Method
Authors:
Ali Akbar Kiaei,
Saeed Bagheri Shouraki,
Seyed Hossein Khasteh,
Mahmoud Khademi,
Alireza Ghatreh Samani
Abstract:
Active Learning Method (ALM) is a soft computing method which is used for modeling and control, based on fuzzy logic. Although ALM has shown that it acts well in dynamic environments, its operators cannot support it very well in complex situations due to losing data. Thus ALM can find better membership functions if more appropriate operators be chosen for it. This paper substituted two new operato…
▽ More
Active Learning Method (ALM) is a soft computing method which is used for modeling and control, based on fuzzy logic. Although ALM has shown that it acts well in dynamic environments, its operators cannot support it very well in complex situations due to losing data. Thus ALM can find better membership functions if more appropriate operators be chosen for it. This paper substituted two new operators instead of ALM original ones; which consequently renewed finding membership functions in a way superior to conventional ALM. This new method is called Extended Active Learning Method (EALM).
△ Less
Submitted 17 January, 2011; v1 submitted 10 November, 2010;
originally announced November 2010.
-
A New Sufficient Condition for 1-Coverage to Imply Connectivity
Authors:
Seyed Hossein Khasteh,
Saeid Bagheri Shouraki,
Ali Akbar Kiaei
Abstract:
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes while the remaining nodes stay active to provide continuous service. For the sensor network to operate successfully the active nodes must maintain both sensing coverage and network connectivity, It proved before if the communication range of nodes is at least twice the sensi…
▽ More
An effective approach for energy conservation in wireless sensor networks is scheduling sleep intervals for extraneous nodes while the remaining nodes stay active to provide continuous service. For the sensor network to operate successfully the active nodes must maintain both sensing coverage and network connectivity, It proved before if the communication range of nodes is at least twice the sensing range, complete coverage of a convex area implies connectivity among the working set of nodes. In this paper we consider a rectangular region A = a *b, such that R a R b s s £, £, where s R is the sensing range of nodes. and put a constraint on minimum allowed distance between nodes(s). according to this constraint we present a new lower bound for communication range relative to sensing range of sensors(s 2 + 3 *R) that complete coverage of considered area implies connectivity among the working set of nodes; also we present a new distribution method, that satisfy our constraint.
△ Less
Submitted 7 November, 2010;
originally announced November 2010.
-
New S-norm and T-norm Operators for Active Learning Method
Authors:
Ali Akbar Kiaei,
Saeed Bagheri Shouraki,
Seyed Hossein Khasteh,
Mahmoud Khademi,
Ali Reza Ghatreh Samani
Abstract:
Active Learning Method (ALM) is a soft computing method used for modeling and control based on fuzzy logic. All operators defined for fuzzy sets must serve as either fuzzy S-norm or fuzzy T-norm. Despite being a powerful modeling method, ALM does not possess operators which serve as S-norms and T-norms which deprive it of a profound analytical expression/form. This paper introduces two new operato…
▽ More
Active Learning Method (ALM) is a soft computing method used for modeling and control based on fuzzy logic. All operators defined for fuzzy sets must serve as either fuzzy S-norm or fuzzy T-norm. Despite being a powerful modeling method, ALM does not possess operators which serve as S-norms and T-norms which deprive it of a profound analytical expression/form. This paper introduces two new operators based on morphology which satisfy the following conditions: First, they serve as fuzzy S-norm and T-norm. Second, they satisfy Demorgans law, so they complement each other perfectly. These operators are investigated via three viewpoints: Mathematics, Geometry and fuzzy logic.
△ Less
Submitted 6 February, 2011; v1 submitted 21 October, 2010;
originally announced October 2010.