This document discusses bio-inspired computing as a problem solving technique. It begins by defining bio-inspired algorithms as those inspired by natural systems like ant colonies, bee swarms, and bird flocks. These algorithms are bottom-up, decentralized, adaptive, reactive, and distributed. The document then provides an example of applying the biological phenomenon of haptotaxis, or cell migration, to develop a location search algorithm for peer-to-peer networks. This bio-inspired algorithm, called Hapto-search, guides the search towards nodes with key identifiers closer to the target based on Hamming distance. While this approach mimics how biological systems solve problems, it has some limitations like getting stuck in local minima that need
This paper describes a method to classify messages from online health forums about psoriasis into those describing treatments that worked and those that do not. The authors use natural language processing and a convolutional neural network model. They collected over 2000 posts from various forums discussing psoriasis treatments. The CNN model was trained on this labeled data and achieved an accuracy of 84% at classifying messages as describing a solution or not. The authors developed tools to automatically search forums, extract posts, and prepare the text for analysis using NLP techniques prior to classification with the CNN model.
IRJET- Factoid Question and Answering SystemIRJET Journal
This document describes a factoid question answering system that uses neural networks and the Tensorflow framework. The system takes in a text document and question as input. It then processes the input using techniques like gated recurrent units and support vector machines to classify the question. The system calculates attention between facts and the question, modifies its memory, and identifies the word closest to the answer to output as the response. Key aspects of the system include training a question answering engine with Tensorflow, storing and retrieving data, and generating the final answer.
This document summarizes a research paper that proposes using a genetic algorithm to efficiently cluster wireless sensor nodes. The genetic algorithm aims to minimize the total communication distance between sensors and the base station in order to prolong the network lifetime. Simulation results showed that the genetic algorithm can quickly find good clustering solutions that reduce energy consumption compared to previous clustering methods. The full paper provides details on wireless sensor networks, related clustering algorithms, genetic algorithms, and the proposed genetic algorithm-based clustering method.
This document provides an annual progress report for the National Resource for Network Biology (NRNB) for the period of May 1, 2011 to April 30, 2012. It summarizes the following:
1) Advances made in developing algorithms to identify network modules and use modules as biomarkers for disease. This includes methods to capture complex logical relationships within modules.
2) Progress on tools to enable new network analysis and visualization capabilities, including a new version of Cytoscape.
3) Growth of collaborations through the NRNB, which have nearly doubled over the past year to around 100 projects.
4) Continued development of the Cytoscape App Store to support the user and developer community.
Nature Inspired Reasoning Applied in Semantic Webguestecf0af
1) Neural networks are computational structures inspired by biological neural networks and have been successfully used to solve complex tasks like image recognition and natural language processing.
2) Neural networks consist of interconnected nodes that perform simple mathematical functions to produce outputs. The connections between nodes and their weights can be modified through training to solve problems.
3) Nature inspired algorithms like neural networks are well-suited for semantic web problems because they can process large amounts of information quickly to find good enough solutions.
A genetic algorithm approach for predicting ribonucleic acid sequencing data ...TELKOMNIKA JOURNAL
Malaria larvae accept explosive variable lifecycle as they spread across numerous mosquito vector stratosphere. Transcriptomes arise in thousands of diverse parasites. Ribonucleic acid sequencing (RNA-seq) is a prevalent gene expression that has led to enhanced understanding of genetic queries. RNA-seq tests transcript of gene expression, and provides methodological enhancements to machine learning procedures. Researchers have proposed several methods in evaluating and learning biological data. Genetic algorithm (GA) as a feature selection process is used in this study to fetch relevant information from the RNA-Seq Mosquito Anopheles gambiae malaria vector dataset, and evaluates the results using kth nearest neighbor (KNN) and decision tree classification algorithms. The experimental results obtained a classification accuracy of 88.3 and 98.3 percents respectively.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document provides an overview of a tutorial on machine learning and reasoning for drug discovery.
The tutorial covers several topics: molecular representation and property prediction, including fingerprints, string representations, graph representations, and self-supervised learning; protein representation and protein-drug binding; molecular optimization and generation; and knowledge graph reasoning and drug synthesis.
The introduction discusses the drug discovery pipeline and how machine learning can help with various tasks such as molecular property prediction, target identification, and reaction planning. Neural networks are well-suited for drug discovery due to their expressiveness, learnability, generalizability, and ability to handle large amounts of data.
The National Resource for Network Biology (NRNB) aims to advance network biology science through bioinformatic methods, software, infrastructure, collaboration, and training. In the past year, the NRNB made progress in its specific aims, including developing new network analysis methods, catalyzing changes in network representation, establishing software and databases, engaging in collaborations, and providing training opportunities. Going forward, the NRNB plans to further develop methods for differential and predictive network analysis, multi-scale network representation, and pathway analysis tools.
This document provides a summary of the 2013 annual progress report for the National Resource for Network Biology (NRNB). It describes the NRNB network in 2013, including personnel from various institutions collaborating on projects. It also summarizes the findings of the NRNB External Advisory Committee meeting in December 2012. The Committee found that the NRNB had made strong progress in developing new network analysis tools and demonstrating their value. They provided suggestions to optimize projects, measure success beyond citations, and prepare for renewal. Specific projects like TRD C on network-extracted ontologies were praised for progress. Cytoscape 3.0 development was also discussed.
An Extensive Review on Generative Adversarial Networks GAN’sijtsrd
This paper is to provide a high level understanding of Generative Adversarial Networks. This paper will be covering the working of GAN’s by explaining the background idea of the framework, types of GAN’s in the industry, it’s advantages and disadvantages, history of how GAN’s are developed and enhanced along the timeline and some applications where GAN’s outperforms themselves. Atharva Chitnavis | Yogeshchandra Puranik "An Extensive Review on Generative Adversarial Networks (GAN’s)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42357.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42357/an-extensive-review-on-generative-adversarial-networks-gan’s/atharva-chitnavis
The document summarizes the accomplishments of the National Resource for Network Biology (NRNB) over the past year, including:
- Over 100 publications citing NRNB funding and high usage of Cytoscape tools
- 18 supported tools, 93 collaborations, and training of over 100 users
- Progress on developing algorithms for differential network analysis, predictive networks, and multi-scale networks
- Launch of two new NRNB workgroups on single cell genomics and patient similarity networks
- 18 new collaboration projects in areas like cancer, neuroinflammation, and drug transporters
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...ijassn
The document describes a proposed approach for optimal clustering and routing in wireless sensor networks based on cuckoo search and multi-objective genetic algorithms. The cuckoo search algorithm is used to create clusters with sensor nodes within an egg laying radius of a trigger node, selected based on residual energy. Within each cluster, a multi-objective genetic algorithm with Pareto ranking is used to select an optimal node for data forwarding, aiming to maximize network lifetime and minimize transmission delay. The proposed approach combines cuckoo search for energy-efficient clustering with multi-objective optimization for optimal intra-cluster routing, seeking to prolong network lifetime, reduce packet loss, and improve throughput compared to existing techniques like LEACH.
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
This document presents a system for extracting named entities and their relationships from unstructured text data using n-gram features with hidden Markov models and conditional random fields. The system first extracts n-gram, part-of-speech, and lexicon features from documents, then trains a hidden Markov model to classify entities and a conditional random field with kernel approach to detect relationships between entities. Evaluation shows the proposed system achieves 98.03% accuracy, 88.80% precision, and 87.50% recall for entity detection, outperforming a support vector machine baseline. For relationship extraction, it achieves 87.46% accuracy, 84.46% precision, and 82.46% recall, again outperforming the SVM baseline.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
The document discusses an improved method for storing feature vectors to detect Android malware. It proposes using a compressed row storage format to efficiently store the statistical features that represent malware families. This involves storing only the non-zero elements of sparse feature matrices in three vectors, which reduces storage needs by 79% compared to conventional methods. This improved storage technique leads to reduced processing time for feature vector generation and malware detection overall. The proposed method aims to enhance Android malware analysis by making feature vector searches and classification faster.
Robust Feature Learning with Deep Neural Networks
http://snu-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?tabs=viewOnlineTab&doc=82SNU_INST21557911060002591
The National Resource for Network Biology aims to provide freely available, open-source software tools to enable researchers to assemble biological data into networks and pathways and use these networks to better understand biological systems and disease; it pursues this mission through technology research and development projects, driving biological projects, collaboration and service projects, training, and dissemination; key components include the Cytoscape software platform, supercomputing infrastructure, and partnerships with over 30 external research groups.
This document summarizes the accomplishments of the National Resource for Network Biology over a reporting period. It lists numerous quantitative metrics of success, including over 100 publications citing their grants, thousands of daily downloads and uses of their software tools, and training over 100 users. It also provides details on improvements and developments made to several of their modeling frameworks, algorithms, and software applications. Finally, it outlines the formation of a new working group on single-cell RNA-seq analysis and visualization, and improvements made to their computing infrastructure.
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintNam Le
This paper proposes using latent representation models, specifically autoencoders (AEs) and variational autoencoders (VAEs), to improve network anomaly detection. The models are trained on only normal data and introduce regularizers that compress normal data into a tight region around the origin in the latent space, while anomalies will have representations further away. This new latent feature space is then used as input to one-class classifiers to detect anomalies. The goal is for the models to perform well even with limited training data and be insensitive to hyperparameter settings, in order to address challenges of network anomaly detection like lack of labeled anomaly data and high dimensionality.
5.local community detection algorithm based on minimal clusterVenkat Projects
The document summarizes a thesis project on a local cluster-based community detection algorithm. It was submitted by Regalla Sairam Reddy to the University College of Engineering Kakinada in partial fulfillment of a Master of Computer Applications degree. The thesis was supervised by Dr. M.H.M Krishna Prasad and examines using a minimal cluster approach to detect local communities more effectively in complex networks compared to algorithms that start from a single initial node. The document includes declarations by the student and supervisor, as well as acknowledgments and outlines of the problem identification, methodology, technologies used, implementation, and conclusion.
This document provides an overview of recent advances in applying artificial intelligence and machine learning techniques to matters and materials. It discusses several key ideas and approaches, including:
- Using graph neural networks and message passing algorithms to model molecules as graphs and predict molecular properties.
- Generative models like variational autoencoders and generative adversarial networks to represent molecules in a continuous latent space and generate new molecular structures.
- Reinforcement learning approaches for predicting chemical reactions and planning chemical syntheses.
- Directed generation of molecular graphs using graph variational autoencoders to overcome limitations of string-based representations.
The document outlines many promising directions for using deep learning to tackle important problems in chemistry, materials science
Pattern Recognition using Artificial Neural NetworkEditor IJCATR
An artificial neural network (ANN) usually called neural network. It can be considered as a resemblance to a paradigm
which is inspired by biological nervous system. In network the signals are transmitted by the means of connections links. The links
possess an associated way which is multiplied along with the incoming signal. The output signal is obtained by applying activation to
the net input NN are one of the most exciting and challenging research areas. As ANN mature into commercial systems, they are likely
to be implemented in hardware. Their fault tolerance and reliability are therefore vital to the functioning of the system in which they
are embedded. The pattern recognition system is implemented with Back propagation network and Hopfield network to remove the
distortion from the input. The Hopfield network has high fault tolerance which supports this system to get the accurate output.
Survey of Various Approaches of Emotion Detection Via Multimodal ApproachIRJET Journal
This document summarizes various approaches for multimodal emotion detection using features extracted from text, audio, and video data. It discusses how combining multiple modalities can provide more comprehensive insight into a user's emotions compared to a single modality. The document reviews related literature on audio-video, text-video, and multimodal emotion classification systems. It also describes approaches for feature extraction from text, such as identifying semantic words and concepts, and from video, including face detection and facial feature extraction. The proposed system aims to predict emotions by combining features from Twitter text and real-time video captured while a user completes a depression questionnaire.
IRJET- Deep Neural Network based Mechanism to Compute Depression in Socia...IRJET Journal
The document describes a proposed system to analyze social media posts using deep neural networks to detect signs of depression. It involves collecting social media posts from users over a period of 90 days. A 3-layer deep neural network would analyze the posts to identify emotions and habits. Regression analysis of the neural network outputs over time would determine a "depression quotient" score for each user, indicating their risk of depression. The system aims to provide automated advice and prognosis to help depressed users.
Neural Networks for Pattern RecognitionVipra Singh
- Neural networks are computing systems inspired by biological neural networks in the brain that can be used for pattern recognition. An artificial neuron receives multiple inputs and produces a single output. Neural networks are trained to recognize complex patterns and identify categories.
- An important application of neural networks is pattern recognition, where a network is trained to associate input patterns with output categories. Recent advances include using neural networks for tasks like predicting student performance, medical diagnosis, and analyzing customer interactions. Neural networks are also being used increasingly in business for applications like predictive analytics and artificial intelligence.
This document is a Bangladeshi passport belonging to Sultana Naima born in January 1977 in Comilla, Bangladesh. The passport lists her personal identification number as 2691649118666. It was issued on December 20, 2011 by the Department of Immigration and Passports in Dhaka, Bangladesh and expires on December 19, 2016.
The document discusses the glutamate hypothesis of schizophrenia and glutamate-linked treatments. It proposes that hypofunction of the NMDA glutamate receptor contributes to the symptoms of schizophrenia. Specifically:
1. Antipsychotic drugs and conditions that block NMDA receptors can induce schizophrenia-like symptoms, supporting NMDA hypofunction.
2. Glutamate-linked drugs may improve both positive and negative symptoms by targeting NMDA receptors in the prefrontal cortex, hippocampus, and other brain regions.
3. NMDA hypofunction during neurodevelopment or through excitotoxicity could underlie schizophrenia by disrupting processes like neural migration, pruning, and plasticity.
Glutamate-linked treatments may
The National Resource for Network Biology (NRNB) aims to advance network biology science through bioinformatic methods, software, infrastructure, collaboration, and training. In the past year, the NRNB made progress in its specific aims, including developing new network analysis methods, catalyzing changes in network representation, establishing software and databases, engaging in collaborations, and providing training opportunities. Going forward, the NRNB plans to further develop methods for differential and predictive network analysis, multi-scale network representation, and pathway analysis tools.
This document provides a summary of the 2013 annual progress report for the National Resource for Network Biology (NRNB). It describes the NRNB network in 2013, including personnel from various institutions collaborating on projects. It also summarizes the findings of the NRNB External Advisory Committee meeting in December 2012. The Committee found that the NRNB had made strong progress in developing new network analysis tools and demonstrating their value. They provided suggestions to optimize projects, measure success beyond citations, and prepare for renewal. Specific projects like TRD C on network-extracted ontologies were praised for progress. Cytoscape 3.0 development was also discussed.
An Extensive Review on Generative Adversarial Networks GAN’sijtsrd
This paper is to provide a high level understanding of Generative Adversarial Networks. This paper will be covering the working of GAN’s by explaining the background idea of the framework, types of GAN’s in the industry, it’s advantages and disadvantages, history of how GAN’s are developed and enhanced along the timeline and some applications where GAN’s outperforms themselves. Atharva Chitnavis | Yogeshchandra Puranik "An Extensive Review on Generative Adversarial Networks (GAN’s)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, URL: https://www.ijtsrd.compapers/ijtsrd42357.pdf Paper URL: https://www.ijtsrd.comcomputer-science/artificial-intelligence/42357/an-extensive-review-on-generative-adversarial-networks-gan’s/atharva-chitnavis
The document summarizes the accomplishments of the National Resource for Network Biology (NRNB) over the past year, including:
- Over 100 publications citing NRNB funding and high usage of Cytoscape tools
- 18 supported tools, 93 collaborations, and training of over 100 users
- Progress on developing algorithms for differential network analysis, predictive networks, and multi-scale networks
- Launch of two new NRNB workgroups on single cell genomics and patient similarity networks
- 18 new collaboration projects in areas like cancer, neuroinflammation, and drug transporters
OPTIMAL CLUSTERING AND ROUTING FOR WIRELESS SENSOR NETWORK BASED ON CUCKOO SE...ijassn
The document describes a proposed approach for optimal clustering and routing in wireless sensor networks based on cuckoo search and multi-objective genetic algorithms. The cuckoo search algorithm is used to create clusters with sensor nodes within an egg laying radius of a trigger node, selected based on residual energy. Within each cluster, a multi-objective genetic algorithm with Pareto ranking is used to select an optimal node for data forwarding, aiming to maximize network lifetime and minimize transmission delay. The proposed approach combines cuckoo search for energy-efficient clustering with multi-objective optimization for optimal intra-cluster routing, seeking to prolong network lifetime, reduce packet loss, and improve throughput compared to existing techniques like LEACH.
With the surge in modern research focus towards Pervasive Computing, lot of techniques and challenges
needs to be addressed so as to effectively create smart spaces and achieve miniaturization. In the process of
scaling down to compact devices, the real things to ponder upon are the Information Retrieval challenges.
In this work, we discuss the aspects of multimedia which makes information access challenging. An
Example Pattern Recognition scenario is presented and the mathematical techniques that can be used to
model uncertainty are also presented for developing a system that can sense, compute and communicate in
a way that can make human life easy with smart objects assisting from around his surroundings.
On Using Network Science in Mining Developers Collaboration in Software Engin...IJDKP
Background: Network science is the set of mathematical frameworks, models, and measures that are used to understand a complex system modeled as a network composed of nodes and edges. The nodes of a network represent entities and the edges represent relationships between these entities. Network science has been used in many research works for mining human interaction during different phases of software engineering (SE). Objective: The goal of this study is to identify, review, and analyze the published research works that used network analysis as a tool for understanding the human collaboration on different levels of software development. This study and its findings are expected to be of benefit for software engineering practitioners and researchers who are mining software repositories using tools from network science field. Method: We conducted a systematic literature review, in which we analyzed a number of selected papers from different digital libraries based on inclusion and exclusion criteria. Results: We identified 35 primary studies (PSs) from four digital libraries, then we extracted data from each PS according to a predefined data extraction sheet. The results of our data analysis showed that not all of the constructed networks used in the PSs were valid as the edges of these networks did not reflect a real relationship between the entities of the network. Additionally, the used measures in the PSs were in many cases not suitable for the used networks. Also, the reported analysis results by the PSs were not, in most cases, validated using any statistical model. Finally, many of the PSs did not provide lessons or guidelines for software practitioners that can improve the software engineering practices. Conclusion: Although employing network analysis in mining developers’ collaboration showed some satisfactory results in some of the PSs, the application of network analysis needs to be conducted more carefully. That is said, the constructed network should be representative and meaningful, the used measure needs to be suitable for the context, and the validation of the results should be considered. More and above, we state some research gaps, in which network science can be applied, with some pointers to recent advances that can be used to mine collaboration networks.
This document presents a system for extracting named entities and their relationships from unstructured text data using n-gram features with hidden Markov models and conditional random fields. The system first extracts n-gram, part-of-speech, and lexicon features from documents, then trains a hidden Markov model to classify entities and a conditional random field with kernel approach to detect relationships between entities. Evaluation shows the proposed system achieves 98.03% accuracy, 88.80% precision, and 87.50% recall for entity detection, outperforming a support vector machine baseline. For relationship extraction, it achieves 87.46% accuracy, 84.46% precision, and 82.46% recall, again outperforming the SVM baseline.
Multi-objective NSGA-II based community detection using dynamical evolution s...IJECEIAES
Community detection is becoming a highly demanded topic in social networking-based applications. It involves finding the maximum intraconnected and minimum inter-connected sub-graphs in given social networks. Many approaches have been developed for community’s detection and less of them have focused on the dynamical aspect of the social network. The decision of the community has to consider the pattern of changes in the social network and to be smooth enough. This is to enable smooth operation for other community detection dependent application. Unlike dynamical community detection Algorithms, this article presents a non-dominated aware searching Algorithm designated as non-dominated sorting based community detection with dynamical awareness (NDS-CD-DA). The Algorithm uses a non-dominated sorting genetic algorithm NSGA-II with two objectives: modularity and normalized mutual information (NMI). Experimental results on synthetic networks and real-world social network datasets have been compared with classical genetic with a single objective and has been shown to provide superiority in terms of the domination as well as the convergence. NDS-CD-DA has accomplished a domination percentage of 100% over dynamic evolutionary community searching DECS for almost all iterations.
The document discusses an improved method for storing feature vectors to detect Android malware. It proposes using a compressed row storage format to efficiently store the statistical features that represent malware families. This involves storing only the non-zero elements of sparse feature matrices in three vectors, which reduces storage needs by 79% compared to conventional methods. This improved storage technique leads to reduced processing time for feature vector generation and malware detection overall. The proposed method aims to enhance Android malware analysis by making feature vector searches and classification faster.
Robust Feature Learning with Deep Neural Networks
http://snu-primo.hosted.exlibrisgroup.com/primo_library/libweb/action/display.do?tabs=viewOnlineTab&doc=82SNU_INST21557911060002591
The National Resource for Network Biology aims to provide freely available, open-source software tools to enable researchers to assemble biological data into networks and pathways and use these networks to better understand biological systems and disease; it pursues this mission through technology research and development projects, driving biological projects, collaboration and service projects, training, and dissemination; key components include the Cytoscape software platform, supercomputing infrastructure, and partnerships with over 30 external research groups.
This document summarizes the accomplishments of the National Resource for Network Biology over a reporting period. It lists numerous quantitative metrics of success, including over 100 publications citing their grants, thousands of daily downloads and uses of their software tools, and training over 100 users. It also provides details on improvements and developments made to several of their modeling frameworks, algorithms, and software applications. Finally, it outlines the formation of a new working group on single-cell RNA-seq analysis and visualization, and improvements made to their computing infrastructure.
Cao nicolau-mc dermott-learning-neural-cybernetics-2018-preprintNam Le
This paper proposes using latent representation models, specifically autoencoders (AEs) and variational autoencoders (VAEs), to improve network anomaly detection. The models are trained on only normal data and introduce regularizers that compress normal data into a tight region around the origin in the latent space, while anomalies will have representations further away. This new latent feature space is then used as input to one-class classifiers to detect anomalies. The goal is for the models to perform well even with limited training data and be insensitive to hyperparameter settings, in order to address challenges of network anomaly detection like lack of labeled anomaly data and high dimensionality.
5.local community detection algorithm based on minimal clusterVenkat Projects
The document summarizes a thesis project on a local cluster-based community detection algorithm. It was submitted by Regalla Sairam Reddy to the University College of Engineering Kakinada in partial fulfillment of a Master of Computer Applications degree. The thesis was supervised by Dr. M.H.M Krishna Prasad and examines using a minimal cluster approach to detect local communities more effectively in complex networks compared to algorithms that start from a single initial node. The document includes declarations by the student and supervisor, as well as acknowledgments and outlines of the problem identification, methodology, technologies used, implementation, and conclusion.
This document provides an overview of recent advances in applying artificial intelligence and machine learning techniques to matters and materials. It discusses several key ideas and approaches, including:
- Using graph neural networks and message passing algorithms to model molecules as graphs and predict molecular properties.
- Generative models like variational autoencoders and generative adversarial networks to represent molecules in a continuous latent space and generate new molecular structures.
- Reinforcement learning approaches for predicting chemical reactions and planning chemical syntheses.
- Directed generation of molecular graphs using graph variational autoencoders to overcome limitations of string-based representations.
The document outlines many promising directions for using deep learning to tackle important problems in chemistry, materials science
Pattern Recognition using Artificial Neural NetworkEditor IJCATR
An artificial neural network (ANN) usually called neural network. It can be considered as a resemblance to a paradigm
which is inspired by biological nervous system. In network the signals are transmitted by the means of connections links. The links
possess an associated way which is multiplied along with the incoming signal. The output signal is obtained by applying activation to
the net input NN are one of the most exciting and challenging research areas. As ANN mature into commercial systems, they are likely
to be implemented in hardware. Their fault tolerance and reliability are therefore vital to the functioning of the system in which they
are embedded. The pattern recognition system is implemented with Back propagation network and Hopfield network to remove the
distortion from the input. The Hopfield network has high fault tolerance which supports this system to get the accurate output.
Survey of Various Approaches of Emotion Detection Via Multimodal ApproachIRJET Journal
This document summarizes various approaches for multimodal emotion detection using features extracted from text, audio, and video data. It discusses how combining multiple modalities can provide more comprehensive insight into a user's emotions compared to a single modality. The document reviews related literature on audio-video, text-video, and multimodal emotion classification systems. It also describes approaches for feature extraction from text, such as identifying semantic words and concepts, and from video, including face detection and facial feature extraction. The proposed system aims to predict emotions by combining features from Twitter text and real-time video captured while a user completes a depression questionnaire.
IRJET- Deep Neural Network based Mechanism to Compute Depression in Socia...IRJET Journal
The document describes a proposed system to analyze social media posts using deep neural networks to detect signs of depression. It involves collecting social media posts from users over a period of 90 days. A 3-layer deep neural network would analyze the posts to identify emotions and habits. Regression analysis of the neural network outputs over time would determine a "depression quotient" score for each user, indicating their risk of depression. The system aims to provide automated advice and prognosis to help depressed users.
Neural Networks for Pattern RecognitionVipra Singh
- Neural networks are computing systems inspired by biological neural networks in the brain that can be used for pattern recognition. An artificial neuron receives multiple inputs and produces a single output. Neural networks are trained to recognize complex patterns and identify categories.
- An important application of neural networks is pattern recognition, where a network is trained to associate input patterns with output categories. Recent advances include using neural networks for tasks like predicting student performance, medical diagnosis, and analyzing customer interactions. Neural networks are also being used increasingly in business for applications like predictive analytics and artificial intelligence.
This document is a Bangladeshi passport belonging to Sultana Naima born in January 1977 in Comilla, Bangladesh. The passport lists her personal identification number as 2691649118666. It was issued on December 20, 2011 by the Department of Immigration and Passports in Dhaka, Bangladesh and expires on December 19, 2016.
The document discusses the glutamate hypothesis of schizophrenia and glutamate-linked treatments. It proposes that hypofunction of the NMDA glutamate receptor contributes to the symptoms of schizophrenia. Specifically:
1. Antipsychotic drugs and conditions that block NMDA receptors can induce schizophrenia-like symptoms, supporting NMDA hypofunction.
2. Glutamate-linked drugs may improve both positive and negative symptoms by targeting NMDA receptors in the prefrontal cortex, hippocampus, and other brain regions.
3. NMDA hypofunction during neurodevelopment or through excitotoxicity could underlie schizophrenia by disrupting processes like neural migration, pruning, and plasticity.
Glutamate-linked treatments may
Venezuela is a country in South America with a population of over 28 million people. Its economy relies heavily on oil and gas exports. The average monthly cost of living includes 19% spent on rent, 35% on food from markets, and 13% eating at restaurants. [/SUMMARY]
Glutamate production and regulation of ionotropic glutamate receptors.pptx+ f...dariush Gholami
Dr. Dariush Ghulami presented on glutamate production and ionotropic glutamate receptors. Some key points:
- Glutamate is the main excitatory neurotransmitter in the central nervous system, acting on ionotropic glutamate receptors.
- It is commercially produced primarily through fermentation and used in food/feed additives and pharmaceuticals.
- Ionotropic glutamate receptors are ligand-gated ion channels that include NMDA, AMPA, and kainate receptors. The NMDA receptor requires binding of glutamate and glycine and is permeable to calcium.
- NMDA receptor activation plays a role in long-term potentiation involved in learning and memory
Challenges and Opportunities for Food Manufacturers: Market Trends and Future...Euromonitor International
Euromonitor International’s data reveals that the global packaged food industry will grow 2.4 percent to reach US$2.9 trillion in 2019. In this presentation, Euromonitor’s analysts Dimitrios Dimakakos, Lianne van den Bos and Lauren Bandy highlight the market trends and future prospects in packaged food and nutrition and identify the challenges and opportunities for Food Manufacturers globally and in Europe.
A trends of salmonella and antibiotic resistanceAlexander Decker
This document provides a review of trends in Salmonella and antibiotic resistance. It begins with an introduction to Salmonella as a facultative anaerobe that causes nontyphoidal salmonellosis. The emergence of antimicrobial-resistant Salmonella is then discussed. The document proceeds to cover the historical perspective and classification of Salmonella, definitions of antimicrobials and antibiotic resistance, and mechanisms of antibiotic resistance in Salmonella including modification or destruction of antimicrobial agents, efflux pumps, modification of antibiotic targets, and decreased membrane permeability. Specific resistance mechanisms are discussed for several classes of antimicrobials.
A unique common fixed point theorems in generalized dAlexander Decker
This document presents definitions and properties related to generalized D*-metric spaces and establishes some common fixed point theorems for contractive type mappings in these spaces. It begins by introducing D*-metric spaces and generalized D*-metric spaces, defines concepts like convergence and Cauchy sequences. It presents lemmas showing the uniqueness of limits in these spaces and the equivalence of different definitions of convergence. The goal of the paper is then stated as obtaining a unique common fixed point theorem for generalized D*-metric spaces.
A universal model for managing the marketing executives in nigerian banksAlexander Decker
This document discusses a study that aimed to synthesize motivation theories into a universal model for managing marketing executives in Nigerian banks. The study was guided by Maslow and McGregor's theories. A sample of 303 marketing executives was used. The results showed that managers will be most effective at motivating marketing executives if they consider individual needs and create challenging but attainable goals. The emerged model suggests managers should provide job satisfaction by tailoring assignments to abilities and monitoring performance with feedback. This addresses confusion faced by Nigerian bank managers in determining effective motivation strategies.
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
This document presents a framework for evaluating the usability of B2C e-commerce websites. It involves user testing methods like usability testing and interviews to identify usability problems in areas like navigation, design, purchasing processes, and customer service. The framework specifies goals for the evaluation, determines which website aspects to evaluate, and identifies target users. It then describes collecting data through user testing and analyzing the results to identify usability problems and suggest improvements.
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
Women with polycystic ovary syndrome (PCOS) have elevated levels of hormones like luteinizing hormone and testosterone, as well as higher levels of insulin and insulin resistance compared to healthy women. They also have increased levels of inflammatory markers like C-reactive protein, interleukin-6, and leptin. This study found these abnormalities in the hormones and inflammatory cytokines of women with PCOS ages 23-40, indicating that hormone imbalances associated with insulin resistance and elevated inflammatory markers may worsen infertility in women with PCOS.
11.Bio Inspired Approach as a Problem Solving Technique.pdfKaren Benoit
This document discusses bio-inspired computing as a problem solving technique. It begins by defining bio-inspired computing as computing methods inspired by natural biological systems. An example is then provided of applying the biological phenomenon of haptotaxis, or cell migration, to develop an algorithm for location search in peer-to-peer networks. The document outlines the merits of bio-inspired approaches, such as flexibility and adaptability, as well as some potential drawbacks, such as low performance. It concludes by comparing bio-inspired algorithms to conventional algorithms and discussing how bio-inspired approaches are well-suited for emerging computing environments.
SCALABLE LOCAL COMMUNITY DETECTION WITH MAPREDUCE FOR LARGE NETWORKSIJDKP
This document summarizes a research paper that proposes a MapReduce algorithm called 3MA for scalable local community detection in large networks. 3MA parallelizes an existing iterative expansion algorithm that uses the M metric to evaluate communities. It distributes the computation of node degrees and community M measures across multiple systems. Experimental results showed 3MA can detect communities in networks with millions of nodes faster than sequential algorithms.
Scalable Local Community Detection with Mapreduce for Large NetworksIJDKP
Community detection from complex information networks draws much attention from both academia and
industry since it has many real-world applications. However, scalability of community detection algorithms
over very large networks has been a major challenge. Real-world graph structures are often complicated
accompanied with extremely large sizes. In this paper, we propose a MapReduce version called 3MA that
parallelizes a local community identification method which uses the $M$ metric. Then we adopt an
iterative expansion approach to find all the communities in the graph. Empirical results show that for large
networks in the order of millions of nodes, the parallel version of the algorithm outperforms the traditional
sequential approach to detect communities using the M-measure. The result shows that for local community
detection, when the data is too big for the original M metric-based sequential iterative expension approach
to handle, our MapReduce version 3MA can finish in a reasonable time.
Comparative Analysis of Computational Intelligence Paradigms in WSN: Reviewiosrjce
Computational Intelligence is the study of the design of intelligent agents. An agent is something that
react according to an environment—it does something. Agents includes worms, dogs, thermostats, airplanes,
humans, and society. The purpose of computational intelligence is to understand the principles that make
intelligent behavior possible, in real or artificial systems. Techniques of Computational Intelligence are
designed to model the aspects of biological intelligence. These paradigms include that exhibit an ability to
learn or adapt to new situations,to generalize, abstract, learn and associate. This paper gives review of
comparison between computational intelligence paradigms in Wireless Sensor Network and Finally,a short
conclusion is provided.
This document provides a review of computational intelligence paradigms in wireless sensor networks. It begins with an introduction to computational intelligence and its characteristics such as adaptation, high computational speed, versatility, robustness, self-organization, and self-learning. Various applications of computational intelligence are discussed including autonomous delivery robots, diagnostic assistants, and infobots. Key computational intelligence paradigms like artificial neural networks, genetic algorithms, fuzzy logic, swarm intelligence, and artificial immune systems are described and compared. The document concludes with a table comparing the state variables and number of search points used in different computational intelligence algorithms.
Study on security and quality of service implementations in p2 p overlay netw...eSAT Publishing House
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology
This document discusses how natural computation techniques can be applied to web usage mining. It begins by introducing web usage mining and its importance. It then provides an overview of various natural computation approaches, including artificial neural networks, evolutionary algorithms, swarm intelligence, artificial immune systems, bacterial foraging, DNA computation, and hybrid approaches. The document explains how each of these natural computation techniques can inspire computational methods for analyzing web usage data.
An Improved Leader Election Algorithm for Distributed Systemsijngnjournal
This document summarizes an article from the International Journal of Next-Generation Networks that proposes an improved leader election algorithm for distributed systems. The algorithm modifies the existing ring election algorithm to minimize the number of messages exchanged during leader election. Simulation results showed that the proposed algorithm reduces message complexity compared to the original ring algorithm. The document provides background on leader election algorithms and discusses related work that has aimed to improve leader election in distributed systems through approaches like failure detectors and modifying the bully algorithm.
TOWARD ORGANIC COMPUTING APPROACH FOR CYBERNETIC RESPONSIVE ENVIRONMENTijasa
The developpment of the Internet of Things (IoT) concept revives Responsive Environments (RE) technologies. Nowadays, the idea of a permanent connection between physical and digital world is technologically possible. The capillar Internet relates to the Internet extension into daily appliances such as they become actors of Internet like any hu-man. The parallel development of Machine-to-Machine
communications and Arti cial Intelligence (AI) technics start a new area of cybernetic. This paper presents an approach for Cybernetic Organism (Cyborg) for RE based on Organic Computing (OC). In such approach, each appli-ance is a part of an autonomic system in order to control a physical environment.The underlying idea is that such systems must have self-x properties in order to adapt their behavior to
external disturbances with a high-degree of autonomy.
A comprehensive review of the firefly algorithmsXin-She Yang
This document provides a comprehensive review of firefly algorithms. It begins with background on swarm intelligence and how firefly algorithms were inspired by the flashing lights of fireflies. It then describes the basic structure of firefly algorithms, including initializing a population of fireflies, evaluating their fitness, sorting by fitness, selecting the best solution, and moving fireflies toward more attractive solutions over generations. The document reviews applications of firefly algorithms in areas like continuous, combinatorial, and multi-objective optimization as well as engineering problems. It concludes by discussing exploration vs exploitation in firefly algorithms and directions for further development.
Bat-Cluster: A Bat Algorithm-based Automated Graph Clustering Approach IJECEIAES
The document presents a new approach called Bat-Cluster (BC) for automated graph clustering. BC combines the Fast Fourier Domain Positioning (FFDP) algorithm and the Bat Algorithm. FFDP positions graph nodes, then Bat Algorithm optimizes clustering by finding configurations that minimize the Davies-Bouldin Index. BC is tested on four benchmark graphs and outperforms Particle Swarm Optimization, Ant Colony Optimization, and Differential Evolution in providing higher clustering precision.
This document discusses optimizing clustering in ad-hoc networks using genetic algorithms. It introduces genetic algorithms and describes how they can be applied to solve optimization problems. It then discusses weighted clustering algorithms for ad-hoc networks, focusing on selecting optimal cluster heads. The key factors that influence cluster head selection are described, including degree difference, battery power, mobility, and distance between nodes. Finally, an optimization approach is proposed that uses genetic algorithms to search for the best nodes to act as cluster heads. A genetic algorithm representation and fitness function are defined to evaluate potential cluster head solutions. The goal is to minimize the number of cluster heads needed based on these weighted factors.
Novel Methodology of Data Management in Ad Hoc Network Formulated using Nanos...Drjabez
In Ad hoc Network of Nanosensors for Wastage detection, clustering assist in nodal communication and in organization of the data fetched by the nanosensors in the network. The attempt of traditional cluster formation techniques degraded the formation of cluster in a precise manner. The data from the nanosensors which act as the nodes of the network have to be distinctively added into the clusters. The dynamic path selection cluster would achieve this distinct addition by dynamically creating a path to the data as an initial process and then redirecting the data to their appropriate cluster based to the readied scheme.
Survey on evolutionary computation tech techniques and its application in dif...ijitjournal
In computer science, 'evolutionary computation' is an algorithmic tool based on evolution. It implements
random variation, reproduction and selection by altering and moving data within a computer. It helps in
building, applying and studying algorithms based on the Darwinian principles of natural selection. In this
paper, studies about different evolutionary computation techniques used in some applications specifically
image processing, cloud computing and grid computing is carried out briefly. This work is an effort to help
researchers from different fields to have knowledge on the techniques of evolutionary computation
applicable in the above mentioned areas.
A Binary Bat Inspired Algorithm for the Classification of Breast Cancer Data ijscai
This document summarizes a research paper that proposes using a binary bat algorithm to classify breast cancer data. The researchers developed a hybrid model combining a binary bat algorithm and feedforward neural network. The binary bat algorithm was used to generate a activation function for training the neural network and minimize error. Testing of the model on three breast cancer datasets produced an accuracy of 92.61% for training data and 89.95% for testing data, showing potential for classifying breast cancer as malignant or benign.
Integrated approach for domain dimensional information retrieval system by us...Alexander Decker
This document summarizes a research paper about developing an integrated information retrieval system using neural networks and domain dimensions. The system is intended to allow more precise searching within specific domains by utilizing each domain's own terminology and organizing information along dimensions. Neural networks are discussed as a technique for personalizing search results. Domain dimensions extract specialized vocabulary and semantic relationships within a domain to index documents and help users build targeted queries.
New Similarity Index for Finding Followers in Leaders Based Community DetectionIRJET Journal
This document presents a new similarity index method for improving the accuracy of leader-based community detection in large networks. Leader-based community detection identifies influential leader nodes and assigns other nodes as followers based on their similarity to the leaders. The existing method's accuracy decreases as the network size increases. The proposed method modifies the similarity calculation to increase accuracy for networks with more than 2000 nodes. It was tested on synthetic networks generated by the LFR benchmark model and evaluated using normalized mutual information and adjusted rand index, showing accuracy remains high even for large networks.
The document discusses the future of informatics as a fundamental science. It outlines how informatics studies information and information processing in natural systems, making it a new science with its own methods beyond traditional sciences. The University of Edinburgh helped establish the foundations and ethos that allowed informatics to mature as a discipline. Informatics has proven useful to other scientists and society by addressing problems that require an informatics approach due to their large scale. Momentum now comes from the critical mass and size the field has achieved in addressing issues only solvable through informatics.
The document provides an overview of expert systems and applications of artificial intelligence (AI). It discusses how expert systems use knowledge and reasoning to solve complex problems, and how AI is being applied in fields like science, engineering, business, and medicine. The document also explores several current uses of AI technologies, including using AI to design power system stabilizers, for network intrusion protection, improving medical care, medical image classification, and accounting/games.
A transformational generative approach towards understanding al-istifhamAlexander Decker
This document discusses a transformational-generative approach to understanding Al-Istifham, which refers to interrogative sentences in Arabic. It begins with an introduction to the origin and development of Arabic grammar. The paper then explains the theoretical framework of transformational-generative grammar that is used. Basic linguistic concepts and terms related to Arabic grammar are defined. The document analyzes how interrogative sentences in Arabic can be derived and transformed via tools from transformational-generative grammar, categorizing Al-Istifham into linguistic and literary questions.
A time series analysis of the determinants of savings in namibiaAlexander Decker
This document summarizes a study on the determinants of savings in Namibia from 1991 to 2012. It reviews previous literature on savings determinants in developing countries. The study uses time series analysis including unit root tests, cointegration, and error correction models to analyze the relationship between savings and variables like income, inflation, population growth, deposit rates, and financial deepening in Namibia. The results found inflation and income have a positive impact on savings, while population growth negatively impacts savings. Deposit rates and financial deepening were found to have no significant impact. The study reinforces previous work and emphasizes the importance of improving income levels to achieve higher savings rates in Namibia.
A therapy for physical and mental fitness of school childrenAlexander Decker
This document summarizes a study on the importance of exercise in maintaining physical and mental fitness for school children. It discusses how physical and mental fitness are developed through participation in regular physical exercises and cannot be achieved solely through classroom learning. The document outlines different types and components of fitness and argues that developing fitness should be a key objective of education systems. It recommends that schools ensure pupils engage in graded physical activities and exercises to support their overall development.
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
This document summarizes a study examining efficiency in managing marketing executives in Nigerian banks. The study was examined through the lenses of Kaizen theory (continuous improvement) and efficiency theory. A survey of 303 marketing executives from Nigerian banks found that management plays a key role in identifying and implementing efficiency improvements. The document recommends adopting a "3H grand strategy" to improve the heads, hearts, and hands of management and marketing executives by enhancing their knowledge, attitudes, and tools.
This document discusses evaluating the link budget for effective 900MHz GSM communication. It describes the basic parameters needed for a high-level link budget calculation, including transmitter power, antenna gains, path loss, and propagation models. Common propagation models for 900MHz that are described include Okumura model for urban areas and Hata model for urban, suburban, and open areas. Rain attenuation is also incorporated using the updated ITU model to improve communication during rainfall.
A synthetic review of contraceptive supplies in punjabAlexander Decker
This document discusses contraceptive use in Punjab, Pakistan. It begins by providing background on the benefits of family planning and contraceptive use for maternal and child health. It then analyzes contraceptive commodity data from Punjab, finding that use is still low despite efforts to improve access. The document concludes by emphasizing the need for strategies to bridge gaps and meet the unmet need for effective and affordable contraceptive methods and supplies in Punjab in order to improve health outcomes.
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
1) The document discusses synthesizing Taylor's scientific management approach and Fayol's process management approach to identify an effective way to manage marketing executives in Nigerian banks.
2) It reviews Taylor's emphasis on efficiency and breaking tasks into small parts, and Fayol's focus on developing general management principles.
3) The study administered a survey to 303 marketing executives in Nigerian banks to test if combining elements of Taylor and Fayol's approaches would help manage their performance through clear roles, accountability, and motivation. Statistical analysis supported combining the two approaches.
A survey paper on sequence pattern mining with incrementalAlexander Decker
This document summarizes four algorithms for sequential pattern mining: GSP, ISM, FreeSpan, and PrefixSpan. GSP is an Apriori-based algorithm that incorporates time constraints. ISM extends SPADE to incrementally update patterns after database changes. FreeSpan uses frequent items to recursively project databases and grow subsequences. PrefixSpan also uses projection but claims to not require candidate generation. It recursively projects databases based on short prefix patterns. The document concludes by stating the goal was to find an efficient scheme for extracting sequential patterns from transactional datasets.
A survey on live virtual machine migrations and its techniquesAlexander Decker
This document summarizes several techniques for live virtual machine migration in cloud computing. It discusses works that have proposed affinity-aware migration models to improve resource utilization, energy efficient migration approaches using storage migration and live VM migration, and a dynamic consolidation technique using migration control to avoid unnecessary migrations. The document also summarizes works that have designed methods to minimize migration downtime and network traffic, proposed a resource reservation framework for efficient migration of multiple VMs, and addressed real-time issues in live migration. Finally, it provides a table summarizing the techniques, tools used, and potential future work or gaps identified for each discussed work.
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
This document discusses data mining of big data using Hadoop and MongoDB. It provides an overview of Hadoop and MongoDB and their uses in big data analysis. Specifically, it proposes using Hadoop for distributed processing and MongoDB for data storage and input. The document reviews several related works that discuss big data analysis using these tools, as well as their capabilities for scalable data storage and mining. It aims to improve computational time and fault tolerance for big data analysis by mining data stored in Hadoop using MongoDB and MapReduce.
1. The document discusses several challenges for integrating media with cloud computing including media content convergence, scalability and expandability, finding appropriate applications, and reliability.
2. Media content convergence challenges include dealing with the heterogeneity of media types, services, networks, devices, and quality of service requirements as well as integrating technologies used by media providers and consumers.
3. Scalability and expandability challenges involve adapting to the increasing volume of media content and being able to support new media formats and outlets over time.
This document surveys trust architectures that leverage provenance in wireless sensor networks. It begins with background on provenance, which refers to the documented history or derivation of data. Provenance can be used to assess trust by providing metadata about how data was processed. The document then discusses challenges for using provenance to establish trust in wireless sensor networks, which have constraints on energy and computation. Finally, it provides background on trust, which is the subjective probability that a node will behave dependably. Trust architectures need to be lightweight to account for the constraints of wireless sensor networks.
This document discusses private equity investments in Kenya. It provides background on private equity and discusses trends in various regions. The objectives of the study discussed are to establish the extent of private equity adoption in Kenya, identify common forms of private equity utilized, and determine typical exit strategies. Private equity can involve venture capital, leveraged buyouts, or mezzanine financing. Exits allow recycling of capital into new opportunities. The document provides context on private equity globally and in developing markets like Africa to frame the goals of the study.
This document discusses a study that analyzes the financial health of the Indian logistics industry from 2005-2012 using Altman's Z-score model. The study finds that the average Z-score for selected logistics firms was in the healthy to very healthy range during the study period. The average Z-score increased from 2006 to 2010 when the Indian economy was hit by the global recession, indicating the overall performance of the Indian logistics industry was good. The document reviews previous literature on measuring financial performance and distress using ratios and Z-scores, and outlines the objectives and methodology used in the current study.
A study to evaluate the attitude of faculty members of public universities of...Alexander Decker
This study evaluated faculty members' attitudes toward shared governance in public universities in Pakistan. It used a questionnaire to assess attitudes on 4 indicators of shared governance: the role of the dean, role of faculty, role of the board, and role of joint decision-making. The study analyzed responses from 90 faculty across various universities. Statistical analysis found significant differences in perceptions of shared governance based on faculty rank and gender. Faculty rank influenced perceptions of the dean's role and role of joint decision-making. Gender influenced overall perceptions of shared governance. The results indicate a need to improve shared governance practices in Pakistani universities.
A study to assess the knowledge regarding prevention of pneumonia among middl...Alexander Decker
1) The study assessed knowledge of pneumonia prevention among 60 middle-aged adults in rural Moodbidri, India. Most subjects (55%) had poor knowledge and 41.67% had average knowledge. The mean knowledge score was 40.66%.
2) Knowledge was lowest in areas of diagnosis, prevention and management (35.61%) and highest in introduction to pneumonia (45.42%).
3) There was a significant association between knowledge and gender but not other demographic factors like age, education level or occupation. The study concluded knowledge of prevention was low and health education is needed.
A study regarding analyzing recessionary impact on fundamental determinants o...Alexander Decker
This document analyzes the impact of fundamental factors on stock prices in India during normal and recessionary periods. It finds that during normal periods from 2000-2007, earnings per share had a positive and significant impact on stock prices, while coverage ratio had a negative impact. During the recession from 2007-2009, price-earnings ratio positively and significantly impacted stock prices, while growth had a negative effect. Overall, the study aims to compare the influence of fundamental factors like book value, dividends, earnings, etc. on stock prices during different economic conditions in India.
A study on would be urban-migrants’ needs and necessities in rural bangladesh...Alexander Decker
This document summarizes a study on the needs and necessities of potential rural migrants in Bangladesh and how providing certain facilities could encourage them to remain in rural areas. The study involved surveys of 350 local and non-local people across 7 upazilas to understand their satisfaction with existing services and priority of needs. The findings revealed variations in requirements between local and non-local respondents. Based on the analysis, the study recommends certain priority facilities, such as employment opportunities and community services, that should be provided in rural areas to improve quality of life and reduce migration to cities. Limitations include the small sample size not representing all of Bangladesh and difficulties collecting full information from all respondents.
A study on the evaluation of scientific creativity among scienceAlexander Decker
This study evaluated scientific creativity among 31 science teacher candidates in Turkey. The candidates were asked open-ended questions about scientific creativity and how they would advance science. Their responses showed adequate fluency and scientific knowledge, but low flexibility and originality. When asked to self-evaluate, most said their scientific creativity was partially adequate. The study aims to help improve the development of scientific creativity among future teachers.
A study on the antioxidant defense system in breast cancer patients.Alexander Decker
This document discusses a study on the antioxidant defense system in breast cancer patients. The study measured levels of reduced glutathione (GSH), superoxide dismutase (SOD) activity, total antioxidant potential (AOP), malondialdehyde (MDA), and nitrate in 40 breast cancer patients and 20 healthy controls. The results found increased MDA, SOD, and nitrite levels and decreased GSH and AOP levels in breast cancer patients compared to controls, indicating higher oxidative stress in patients from increased free radicals and lower antioxidant defenses.
Adtran’s SDG 9000 Series brings high-performance, cloud-managed Wi-Fi 7 to homes, businesses and public spaces. Built on a unified SmartOS platform, the portfolio includes outdoor access points, ceiling-mount APs and a 10G PoE router. Intellifi and Mosaic One simplify deployment, deliver AI-driven insights and unlock powerful new revenue streams for service providers.
SAP Sapphire 2025 ERP1612 Enhancing User Experience with SAP Fiori and AIPeter Spielvogel
Explore how AI in SAP Fiori apps enhances productivity and collaboration. Learn best practices for SAPUI5, Fiori elements, and tools to build enterprise-grade apps efficiently. Discover practical tips to deploy apps quickly, leveraging AI, and bring your questions for a deep dive into innovative solutions.
European Accessibility Act & Integrated Accessibility TestingJulia Undeutsch
Emma Dawson will guide you through two important topics in this session.
Firstly, she will prepare you for the European Accessibility Act (EAA), which comes into effect on 28 June 2025, and show you how development teams can prepare for it.
In the second part of the webinar, Emma Dawson will explore with you various integrated testing methods and tools that will help you improve accessibility during the development cycle, such as Linters, Storybook, Playwright, just to name a few.
Focus: European Accessibility Act, Integrated Testing tools and methods (e.g. Linters, Storybook, Playwright)
Target audience: Everyone, Developers, Testers
Introducing the OSA 3200 SP and OSA 3250 ePRCAdtran
Adtran's latest Oscilloquartz solutions make optical pumping cesium timing more accessible than ever. Discover how the new OSA 3200 SP and OSA 3250 ePRC deliver superior stability, simplified deployment and lower total cost of ownership. Built on a shared platform and engineered for scalable, future-ready networks, these models are ideal for telecom, defense, metrology and more.
Adtran’s new Ensemble Cloudlet vRouter solution gives service providers a smarter way to replace aging edge routers. With virtual routing, cloud-hosted management and optional design services, the platform makes it easy to deliver high-performance Layer 3 services at lower cost. Discover how this turnkey, subscription-based solution accelerates deployment, supports hosted VNFs and helps boost enterprise ARPU.
Master tester AI toolbox - Kari Kakkonen at Testaus ja AI 2025 ProfessioKari Kakkonen
My slides at Professio Testaus ja AI 2025 seminar in Espoo, Finland.
Deck in English, even though I talked in Finnish this time, in addition to chairing the event.
I discuss the different motivations for testing to use AI tools to help in testing, and give several examples in each categories, some open source, some commercial.
cloudgenesis cloud workshop , gdg on campus mitasiyaldhande02
Step into the future of cloud computing with CloudGenesis, a power-packed workshop curated by GDG on Campus MITA, designed to equip students and aspiring cloud professionals with hands-on experience in Google Cloud Platform (GCP), Microsoft Azure, and Azure Al services.
This workshop offers a rare opportunity to explore real-world multi-cloud strategies, dive deep into cloud deployment practices, and harness the potential of Al-powered cloud solutions. Through guided labs and live demonstrations, participants will gain valuable exposure to both platforms- enabling them to think beyond silos and embrace a cross-cloud approach to
development and innovation.
Multistream in SIP and NoSIP @ OpenSIPS Summit 2025Lorenzo Miniero
Slides for my "Multistream support in the Janus SIP and NoSIP plugins" presentation at the OpenSIPS Summit 2025 event.
They describe my efforts refactoring the Janus SIP and NoSIP plugins to allow for the gatewaying of an arbitrary number of audio/video streams per call (thus breaking the current 1-audio/1-video limitation), plus some additional considerations on what this could mean when dealing with application protocols negotiated via SIP as well.
With Claude 4, Anthropic redefines AI capabilities, effectively unleashing a ...SOFTTECHHUB
With the introduction of Claude Opus 4 and Sonnet 4, Anthropic's newest generation of AI models is not just an incremental step but a pivotal moment, fundamentally reshaping what's possible in software development, complex problem-solving, and intelligent business automation.
Fully Open-Source Private Clouds: Freedom, Security, and ControlShapeBlue
In this presentation, Swen Brüseke introduced proIO's strategy for 100% open-source driven private clouds. proIO leverage the proven technologies of CloudStack and LINBIT, complemented by professional maintenance contracts, to provide you with a secure, flexible, and high-performance IT infrastructure. He highlighted the advantages of private clouds compared to public cloud offerings and explain why CloudStack is in many cases a superior solution to Proxmox.
--
The CloudStack European User Group 2025 took place on May 8th in Vienna, Austria. The event once again brought together open-source cloud professionals, contributors, developers, and users for a day of deep technical insights, knowledge sharing, and community connection.
Supercharge Your AI Development with Local LLMsFrancesco Corti
In today's AI development landscape, developers face significant challenges when building applications that leverage powerful large language models (LLMs) through SaaS platforms like ChatGPT, Gemini, and others. While these services offer impressive capabilities, they come with substantial costs that can quickly escalate especially during the development lifecycle. Additionally, the inherent latency of web-based APIs creates frustrating bottlenecks during the critical testing and iteration phases of development, slowing down innovation and frustrating developers.
This talk will introduce the transformative approach of integrating local LLMs directly into their development environments. By bringing these models closer to where the code lives, developers can dramatically accelerate development lifecycles while maintaining complete control over model selection and configuration. This methodology effectively reduces costs to zero by eliminating dependency on pay-per-use SaaS services, while opening new possibilities for comprehensive integration testing, rapid prototyping, and specialized use cases.
Measuring Microsoft 365 Copilot and Gen AI SuccessNikki Chapple
Session | Measuring Microsoft 365 Copilot and Gen AI Success with Viva Insights and Purview
Presenter | Nikki Chapple 2 x MVP and Principal Cloud Architect at CloudWay
Event | European Collaboration Conference 2025
Format | In person Germany
Date | 28 May 2025
📊 Measuring Copilot and Gen AI Success with Viva Insights and Purview
Presented by Nikki Chapple – Microsoft 365 MVP & Principal Cloud Architect, CloudWay
How do you measure the success—and manage the risks—of Microsoft 365 Copilot and Generative AI (Gen AI)? In this ECS 2025 session, Microsoft MVP and Principal Cloud Architect Nikki Chapple explores how to go beyond basic usage metrics to gain full-spectrum visibility into AI adoption, business impact, user sentiment, and data security.
🎯 Key Topics Covered:
Microsoft 365 Copilot usage and adoption metrics
Viva Insights Copilot Analytics and Dashboard
Microsoft Purview Data Security Posture Management (DSPM) for AI
Measuring AI readiness, impact, and sentiment
Identifying and mitigating risks from third-party Gen AI tools
Shadow IT, oversharing, and compliance risks
Microsoft 365 Admin Center reports and Copilot Readiness
Power BI-based Copilot Business Impact Report (Preview)
📊 Why AI Measurement Matters: Without meaningful measurement, organizations risk operating in the dark—unable to prove ROI, identify friction points, or detect compliance violations. Nikki presents a unified framework combining quantitative metrics, qualitative insights, and risk monitoring to help organizations:
Prove ROI on AI investments
Drive responsible adoption
Protect sensitive data
Ensure compliance and governance
🔍 Tools and Reports Highlighted:
Microsoft 365 Admin Center: Copilot Overview, Usage, Readiness, Agents, Chat, and Adoption Score
Viva Insights Copilot Dashboard: Readiness, Adoption, Impact, Sentiment
Copilot Business Impact Report: Power BI integration for business outcome mapping
Microsoft Purview DSPM for AI: Discover and govern Copilot and third-party Gen AI usage
🔐 Security and Compliance Insights: Learn how to detect unsanctioned Gen AI tools like ChatGPT, Gemini, and Claude, track oversharing, and apply eDLP and Insider Risk Management (IRM) policies. Understand how to use Microsoft Purview—even without E5 Compliance—to monitor Copilot usage and protect sensitive data.
📈 Who Should Watch: This session is ideal for IT leaders, security professionals, compliance officers, and Microsoft 365 admins looking to:
Maximize the value of Microsoft Copilot
Build a secure, measurable AI strategy
Align AI usage with business goals and compliance requirements
🔗 Read the blog https://nikkichapple.com/measuring-copilot-gen-ai/
Droidal: AI Agents Revolutionizing HealthcareDroidal LLC
Droidal’s AI Agents are transforming healthcare by bringing intelligence, speed, and efficiency to key areas such as Revenue Cycle Management (RCM), clinical operations, and patient engagement. Built specifically for the needs of U.S. hospitals and clinics, Droidal's solutions are designed to improve outcomes and reduce administrative burden.
Through simple visuals and clear examples, the presentation explains how AI Agents can support medical coding, streamline claims processing, manage denials, ensure compliance, and enhance communication between providers and patients. By integrating seamlessly with existing systems, these agents act as digital coworkers that deliver faster reimbursements, reduce errors, and enable teams to focus more on patient care.
Droidal's AI technology is more than just automation — it's a shift toward intelligent healthcare operations that are scalable, secure, and cost-effective. The presentation also offers insights into future developments in AI-driven healthcare, including how continuous learning and agent autonomy will redefine daily workflows.
Whether you're a healthcare administrator, a tech leader, or a provider looking for smarter solutions, this presentation offers a compelling overview of how Droidal’s AI Agents can help your organization achieve operational excellence and better patient outcomes.
A free demo trial is available for those interested in experiencing Droidal’s AI Agents firsthand. Our team will walk you through a live demo tailored to your specific workflows, helping you understand the immediate value and long-term impact of adopting AI in your healthcare environment.
To request a free trial or learn more:
https://droidal.com/
Talk: On an adventure into the depths of Maven - Kaya WeersKaya Weers
11.bio inspired approach as a problem solving technique
1. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Bio Inspired Approach as a Problem Solving Technique
Harini Chakravarthy * Pomil Bachan Proch Roshini Rajan K. Chandrasekharan
Department of Computer Science and Engineering, National Institute of Technology Karnataka,
Surathkal, Mangalore, Karnataka 575025, India
* E-mail of the corresponding author: [email protected]
Abstract
This paper describes the “biologically inspired methodology” as a computing and problem solving
technique. Bio-inspired methods have recently gained importance in computing due to the need for flexible,
adaptable ways of solving engineering problems. Bio-inspired algorithms are based on the structure and
functioning of complex natural systems and tend to solve problems in an adaptable and distributed fashion.
An example of a bio-inspired approach to solving the problem of location search has been taken up and
discussed in this paper. The bio-inspired methodology has several merits and demerits, which are also
discussed in the paper.
Keywords: Bio-inspired approach, Merits and Demerits, Haptotaxis, Competitive and Cooperative
Interactions
1. Introduction
Computers have grown from rudimentary calculation machines to sophisticated complex machines that can
perform detailed and precise computations and store huge amounts of data. However, the capacity of
computers is still limited by the physical limits imposed by the raw material used to make computers.
(Nancy Forbes 2000)
Several computation techniques have been introduced to enhance computation beyond the physical limits
of computers to solve complex problems. One such approach is biologically inspired computing, also
known as Bio-Inspired approach.
Despite the numerous advances in computing technologies, we continue to be humbled by the way nature
operates. The variety, sophistication of nature has always amazed the human kind. A problem solving
methodology derived from the structure, behaviour and operation of a natural system is called a Bio-
Inspired approach. Several systems such as the ant-colony system, bee foraging, bird flocking etc. have
been used as the basis for developing models and algorithms to solve various issues such as peer-to-peer
network communication and optimal resource allocation. Bio-inspired algorithms have gained importance
in the field of computing for their remarkably flexible and adaptable nature.
2. What is Bio-Inspired Computing?
Computing has evolved to help us solve problems with increasing ease. Several complicated problems can
be solved using engineering approaches. However classical approaches to solve such problems lack in
flexibility and require rigorous mathematical analysis. In direct contrast to these approaches are new
methodologies inspired by the natural world that provide simple solutions to complex problems that would
be hard by traditional computing approaches.
Biologically inspired algorithms or bio-inspired algorithms are a class of algorithms that imitate specific
phenomena from nature. Bio-inspired algorithms are usually bottom-up, decentralized approaches (Ding
2009) that specify a simple set of conditions and rules and attempt to solve a complex problem by
iteratively applying these rules. Such algorithms tend to be adaptive, reactive and distributed. (Rocha 2011)
2.1 Importance of Bio-inspired Approach
14
2. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
The study of biological organisms has recently gained importance in computing. Biological organisms deal
with environmental demands using ingenious solutions that differ greatly from engineering solutions that
are traditionally used to solve similar problems. Such biological solutions are commonplace and easily
available to study.
Inspiration has been drawn from biology since the time of early computing. The first digital computer by
von Newmann was based on the human brain. (Nancy Forbes 2004) However the use of algorithms directly
mimicking the behaviour of natural organisms is a recent development and these algorithms are proven to
be significantly more robust and adaptive than traditional algorithms while not compromising much on
performance.
Bio-inspired algorithms imitate a biological system in terms of their component behaviour. Biological
systems heavily depend on individual components of the system. Thus the first step in building a bio-
inspired algorithm is to build individual simplistic components that imitate the behaviour of their biological
counterparts. These components then try to reach the overall goal that is defined for them. The components
can then be tailored to meet specific problem requirements such as performance or adaptability.
3. An Example
There have been several papers in this area targeting specific real world problems. Researchers have
tailored generic bio-inspired approaches such as genetic engineering and ant-colony optimisation to
specialized computing problems such as developing self-organizing systems and dynamic resource
allocation. One such application is the use of the Haptotaxis phenomenon to perform a location search in an
unstructured p2p network. (Kulkarni, Ganguly, Canright & Deutsch 2006)
3.1 Introduction to Haptotaxis
Tissue development, inflammation, tumour metastasis and wound healing in the body takes place by a
phenomenon called Haptotaxis. Cell migration to a wounded area or to an inflamed area in the body must
maintain a defined direction and speed. This is achieved by cell adhesion proteins that are present in the cell
walls. Adhesion ligands are present in the extra-cellular matrix (ECM). The ECM is a layer that surrounds
cells in a tissue. The ECM creates a gradient of cell adhesion causing the cells to move towards higher
adhesion between ECM ligands and cell receptors. The magnitude of adhesion affects the speed of cell
movement while the gradient of adhesion affects direction of cell movement. The Haptotaxis phenomenon
is an example of making cells move closer to the destination. This concept can easily be applied to any
guided search problem where at any given point of time, the entity should be directed closer to the
destination.
3.2 Application
The paper “A new bio-inspired location search algorithm for peer to peer network based Internet
telephony” (Brownlee 2005) describes a method of applying the concept of Haptotaxis to the general
problem of guided search and specifically to p2p internet telephony systems such as Skype. This technique
is called the Hapto-search algorithm.
The authors assume a key based network, where the aim of the system is to retrieve location information of
other nodes in the system. Each node is assigned a key, which it distributes to a fixed number of nodes in
the network. We say that a node A knows the location information of a node B if it knows the key of B.
Thus, if a node A wants to find the location information of a node B, it tries to reach a node C which has a
key of node B. Once it finds node C, it extracts B’s location information from it.
Figure 1 depicts an instance of the use of the Hapto-search algorithm in a key based network. Assume that a
node X distributes its key to nodes C and D. A node G tries to find location information of node X. It first
searches the keys it contains to determine if it itself contains the location information of the node X If node
G does not contain the key of node it searches its neighbours to find the neighbour that is closest to the
destination. To do this, it goes through the keys that each of its neighbours contains. If any of its neighbours
contain the key of the destination node, the location information is downloaded from that node. Otherwise,
the Hamming distance between each of the keys they contain and the destination is calculated to find the
neighbour with the least distance from the destination. The closest neighbour becomes the current node.
15
3. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
This process is repeated until one of the nodes C, D or X is found. The location is downloaded from the
node thus found.
3.2.1 Structure of the network
Every node distributes its key to a fixed number of nodes in the network. Thus every node in the network
contains keys from other nodes in the network. For any node to get the location information of a node, it is
enough if they traverse to any of the nodes that the node has distributed its key to.
3.2.2 The concept of Closeness
The Hamming distance between keys is used as a measure of closeness of one key to the other. A node A is
said to be closer to the destination than a node B if A has a key closer to the destination than B in terms of
Hamming Distance. If a node does not have the required key, it routes the query to a neighbour that is the
closest to the destination.
3.3 Problems with the algorithm
A major problem with the algorithm is when a local minimum is reached. This means the current node is
the closest to the destination than any of its neighbours. This problem arises because of the way the
algorithm is designed rather than a problem with the biological method used to model the situation. The
problem however is overcome by recognizing minima when they occur and continuing the solution using
the neighbour farthest from the destination as the current node. A minimum can be recognized easily when
all neighbours of the current node have been evaluated to have a higher Hamming Distance than the current
node.
4. Bio-Inspired Approach as a Problem Solving Technique
As described in section 2, bio-inspired algorithms depend heavily on component behaviour. They take a
bottom-up decentralized approach to solving any problem. They are called computationally intelligent with
respect to the field of artificial intelligence. This is because the system is not told how to achieve an overall
goal. Instead, through iterative individual component behaviour, the system produces an emergent, overall
behaviour. This emergent behaviour is then utilized for solving the problem.
Bio-inspired techniques have three common concepts to achieve the bottom-up emergent behaviour.
(Brownlee 2005)
a) Emergent Effects: Desirable characteristics emerge from exposing the bio-inspired computational
system to a particular problem. This phenomenon is due to individual component interaction and
are easily observed and identified in systems. There are usually complex relationships among
individual behavioural patterns that cause emergent effects.
b) Local Interactions: Local interactions are required for components to pass local information,
synchronization etc. These interactions are simplistic and are easy to describe and implement.
c) Intermediate Dynamics: The activities of a system that describe how and why discrete units and
local rules result in the desired emergent behaviours. These dynamics are complex and difficult to
model or describe. Although these concepts are very hard to model exactly for engineering
applications, each of these concepts can be optimized or modified to suit specific engineering
problems. (Abbott 2005)
4.1 Component design
Components in biological phenomena can typically be classified into cooperative or competitive,
depending on whether the components share information to reach the component-level goal or whether
each component works competitively to reach the component-level goal. (Smistad 2010)
Consider, for example, Particle Swarm Optimizations (PSO). At the beginning of the algorithm, we
randomize the location of individual members and the direction in which each member moves. Each
member of the swarm then does a local study (environment variables such as location, velocity and distance
from the original base camp). Usually in such algorithms, the individual aims to spread its information to
its neighbours. This ensures that each member gets a relative idea about its neighbours and has sufficient
16
4. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
information about where its individual performance stands relative to the group. This information helps the
individual make decisions such as whether to keep moving in the same direction or not and whether to slow
down or speed up. These environment variables are periodically checked by each component throughout
the lifetime of the program.
If we compare this search technique to evolutionary algorithms we see that both are parallel search
techniques. But, while evolutionary algorithms have competitive interactions, PSO has cooperative
interactions among its individual components.
To illustrate competitive interactions, we take the example of Bird Flocking Algorithms. This category of
algorithms are inspired by birds and fish that move together so that no individual in the flock can be singled
out and eaten by predators. It is to be noted that as in particle swarm optimizations where the organism’s
tendency is to move towards achieving a common goal of the entire group. This may not apply in case of
Bird Flocking Algorithms because here each individual’s aim is to survive. This may come at the cost of
life of the other members. In some cases, the individual is presented with a choice to leave the group during
its migration if it senses that the group of which it is currently a part of is more susceptible to danger that
some other group.
Craig Reynolds (1986) studied these algorithms in detail and was the first one to simulate the Flocking
Behaviour on a computer. He suggested flocking behaviour is controlled by three simple rules:
a) Separation - avoid crowding neighbours (short range repulsion)
b) Alignment - steer towards average heading of neighbours
c) Cohesion - steer towards average position of neighbours (long range attraction)
The phenomena of cooperation and competition are driving forces for several complex biological systems
in nature.
5. Merits and Demerits of Bio-inspired Approach
5.1 Merits
As we have discussed, bio-inspired algorithms present several merits because such a system is designed to
be flexible, completely distributed and efficient. Bio-inspired systems can grow, organize, and improve
themselves with little direction from humans. These systems consist of several, usually quite simple,
individual components. The components usually follow some simple behaviour according to the local
information they have or can perceive. This enables artificially intelligent systems that use these
components and dynamics to do parallel processing. Each of the components can often operate separately.
A few other merits are presented in Table 1, comparing them to the methods adopted by conventional
algorithms using the following criteria.
a) Flexibility
b) Performance
c) Scalability
d) Flexibility in decision making
e) Improvement Scope and innovation
5.2 Demerits
Although Bio-inspired approaches to problem solving seems almost ideal because of properties such as
self-optimization, flexibility and simple set of ground rules, it has a few demerits.
1. Component Design: A major drawback in case of Bio-inspired algorithms is the conflict on
whether to compromise on competitive interactions or cooperative interactions.
2. Lack of data: Biological systems are extremely hard to study, and the lack of data on a system may
affect the design of the algorithm derived from the corresponding biological system. For example,
not many measurements have been made for bird flocking, even with high speed cameras to film
17
5. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
flocks. The rules listed above have been found true for small groups but for large flocks the
validity of the above rules remains questionable, especially the rule regarding cohesion in large
flocks.
3. Lack of complete adaptability: Bio-inspired algorithms cannot be completely adapted to real world
systems because of conflicts in scalability or performance issues. For example, in the Bird-
flocking algorithm, achieving component safety from being singled out will require that we work
out the path of each individual in an explicit manner. This is alright when the algorithm is small
scale (similar to a flock of 15-20 birds). However, if we are dealing with a large number of
components, this explicit programming will take a huge amount of time.
4. Low performance: Bio-inspired algorithms typically have low performance. This is because
biological methods aim to behave well in a wide variety of situations as against aiming to reach
the goal quickly. (Neumann & Witt 2010) However, we are free to improve on performance by
compromising on the adaptability or flexibility of the algorithm if we know parameters about the
environment that the algorithm will be working in.
A few other demerits are presented in Table 2, comparing them to the methods adopted by conventional
algorithms using the following criteria.
a) Initial thrust/Starting condition for the algorithm
b) Overhead involved
c) Checking of the environment variables
6. Comparison of Bio-Inspired Algorithms with Conventional Algorithms
Bio-inspired approach certainly differs from the conventional techniques. Biological techniques usually are
results of efforts of generations for their struggle to survive harsh conditions. Bio-inspired algorithms are
built on simple rules and the assumption that the organism stick to those rules. Also an important
characteristic of Bio-inspired approach is the continuous checking of an individual’s own performance, as
compared to the group. Table 3 compares conventional algorithms to Bio-Inspired algorithms with respect
to four criteria
a) Intelligence
b) Testing and Verifiability
c) Improvement
d) Adaptability to practical situations (Kulkarni, Ganguly, Canright & Deutsch 2006)
It is these very properties that are coming to the fore in emerging computer environments such as
autonomic computing, pervasive computing, peer-to-peer systems, grid computing and the semantic web.
These environments demand systems that are robust to failures, adaptable to changing requirements and
deployment scenarios, composed of relatively simple components for ease of development and
maintenance and are preferably decentralized and parallel.
7. Conclusion and Future Work
Bio-inspired approach is an emerging field in problem solving techniques. Bio-inspired algorithms have the
unique feature of being highly decentralized, bottom-up, adaptable and flexible, thus providing elegant
solutions to engineering problems that are constrained by rigid limitations that traditional approaches pose.
These algorithms are being progressively used and adapted to various real life situations and problems.
In this paper, we have explored the Bio-Inspired approach and analysed its importance by way of an
illustration. Bio-Inspired Algorithms can be used as a problem solving technique using the concepts of
Emergent effects, Local Interactions and Intermediate Dynamics. The merits and demerits of using such an
approach in real life problems are also shown. This paper addresses the difference between conventional
approaches to problem solving and Bio-Inspired approaches.
18
6. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Bio-Inspired approach to problem solving has immense potential for research especially in the field of
Secure routing in Mobile Ad Hoc Networks. The specific challenges of secure routing in MANETs can be
handled by using Bio-Inspired Algorithms. As future work, we intend to explore the possibility and
feasibility of using an immune system inspired Bio-Inspired approach for secure routing in MANETs.
References
Abbott, R. (2005), “Challenges for Bio-inspired Computing”, The Proceedings of The BioGEC workshop,
GECCO, New York: ACM, pp. 12-22
Bongard, J. (2009), “Biologically Inspired Computing”, IEEE Computer 42(4), pp. 95-98 [online at
http://www.cs.uvm.edu/ jbongard/papers/2009 IEEEComp Bongard.pdf [accessed 11 Sep 2011]
Brownlee, J. (2005), “On Biologically Inspired Computation a.k.a. The Field”, Technical Report 5-02,
Swinburne University of Technology
Cohoon, J. & Evans, D. (2003), “Biologically-Inspired Computing”, http://www.cs.virginia.edu/evans/bio/
[accessed: 11 Sep 2011]
Craig Reynolds (1986), “Boids”, http://www.red3d.com/cwr/boids/ [accessed 11 Sep 2011]
Ding, J (2009), Advances in Network Management, Taylor & Francis, p. 164
Forbes, N. (2000), “Biologically Inspired Computing”, Computing in Science and Engineering 2(6), pp. 83-
87
Forbes, N. (2004), Imitation of Life: How Biology Is Inspiring Computing, Cambridge, Massachusetts: The
MIT Press
Kulkarni, S., Ganguly, N., Canright, G. & Deutsch, A. (2006), “A new bio-inspired location search
algorithm for peer to peer network based Internet telephony”, Proceedings of the 1st international
conference on Bio-inspired models of network information and computing systems, New York: ACM,
Article 33.
Neumann, F. & Witt, C. (2010), Bio inspired Computation in Combinatorial Optimization Algorithms and
Their Computational Complexity, (Natural Computing Series) Springer [online at
http://bioinspiredcomputation.com/self-archived-bookNeumannWitt.pdf]
Ridge, E., Kudenko, D., Kazakov, D., Curry, E. (2005), “Moving Nature-Inspired Algorithms to Parallel,
Asynchronous and Decentralised Environments”, In Czap, H., Unland, R., Branki, C., Tianfield, H. (eds),
Proceeding of the 2005 conference on Self Organization and Autonomic Informatics, IOS Press, pp. 35-49.
Rocha, L. (2011) “I485/H485/I585: Biologically Inspired Computing”,
http://informatics.indiana.edu/rocha/i-bic/. August 31, 2011 [accessed 11 Sep 2011]
Smistad, E. (2010) “Competitive and cooperative interactions in biological inspired AI”,
http://www.thebigblob.com/competitive-and-cooperative-interactions-in-biological-inspired-ai [accessed 11
Sep 2011]
Wikipedia (2011), “Bio-inspired Computing”, http://en.wikipedia.org/wiki/Bio-inspired computing.
[accessed: 11 Sep 2011]
Notes
Note 1. The basic requirement of all bio inspired algorithms is that they always need some kind of initial
thrust or some kind of competition or some condition from which something has to be gained. If there is
nothing to be gained or there is no competition then these types of algorithms should not be preferred.
Note 2. Movement of every member (node) is not simply randomized but is guided by some specific set of
rules which are programmed into the system.
19
7. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Table 1. Merits of Bio-Inspired algorithms compared to conventional algorithms
Criteria Bio-inspired Algorithms Conventional Algorithms
Flexibility Strength through flexibility, or Start with a fixed size or
strength in numbers population in mind and hence are
not very flexible
Performance Work well even when the task is Reach a saturation limit in their
poorly defined performance
Scalability Scalability is not really a Scalable, but only to a certain
challenge degree
Flexibility in decision making Tend to find the alternate best Depends on programmer’s
available solution understanding of the program
Improvement Scope and Largely unexplored field Conventional algorithms are
innovation optimized and developed almost
to their limits
Table 1. Challenges while dealing with Bio-Inspired algorithms
Criteria Bio-inspired Algorithms Conventional Algorithms
Initial thrust/Starting condition for Require some kind of initial No other initial thrust required for
the algorithm thrust the program to run than its
specified input
Overhead involved Overhead involved in assigning a Overhead involved is
fitness value comparatively less
Checking of the environment They form feedback mechanisms. Do not require any environment
variables Thus they need to continuously variables other than specified
check environment variables. input and result.
Table 2. Comparison of Bio-Inspired Algorithms to Conventional Algorithms
Criteria Bio-inspired Algorithms Conventional Algorithms
Intelligence They are built on simple rules. Strictly top down approach.
They take a bottom-up approach.
Testing and Verifiability Improvements have to be tested on Any modifications to the
generations success rate of the algorithm can be tested and
organisms has to be compared with results can be verified almost
the previously existing success immediately
rates
Improvement Improving of the Bio-inspired Can be improved whenever the
algorithms is not that easy because programmer finds a better
verifiability approach to problem
Adaptability to practical situations Cannot be applied to practical Built keeping the practical
(Brownlee 2005) problems directly, but have to be situations and the end result in
customized to the problem mind
20
8. Network and Complex Systems www.iiste.org
ISSN 2224-610X (Paper) ISSN 2225-0603 (Online)
Vol 2, No.2, 2012
Figure 1. Sketch of a sample location information search.
21
9. International Journals Call for Paper
The IISTE, a U.S. publisher, is currently hosting the academic journals listed below. The peer review process of the following journals
usually takes LESS THAN 14 business days and IISTE usually publishes a qualified article within 30 days. Authors should
send their full paper to the following email address. More information can be found in the IISTE website : www.iiste.org
Business, Economics, Finance and Management PAPER SUBMISSION EMAIL
European Journal of Business and Management [email protected]
Research Journal of Finance and Accounting [email protected]
Journal of Economics and Sustainable Development [email protected]
Information and Knowledge Management [email protected]
Developing Country Studies [email protected]
Industrial Engineering Letters [email protected]
Physical Sciences, Mathematics and Chemistry PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research [email protected]
Chemistry and Materials Research [email protected]
Mathematical Theory and Modeling [email protected]
Advances in Physics Theories and Applications [email protected]
Chemical and Process Engineering Research [email protected]
Engineering, Technology and Systems PAPER SUBMISSION EMAIL
Computer Engineering and Intelligent Systems [email protected]
Innovative Systems Design and Engineering [email protected]
Journal of Energy Technologies and Policy [email protected]
Information and Knowledge Management [email protected]
Control Theory and Informatics [email protected]
Journal of Information Engineering and Applications [email protected]
Industrial Engineering Letters [email protected]
Network and Complex Systems [email protected]
Environment, Civil, Materials Sciences PAPER SUBMISSION EMAIL
Journal of Environment and Earth Science [email protected]
Civil and Environmental Research [email protected]
Journal of Natural Sciences Research [email protected]
Civil and Environmental Research [email protected]
Life Science, Food and Medical Sciences PAPER SUBMISSION EMAIL
Journal of Natural Sciences Research [email protected]
Journal of Biology, Agriculture and Healthcare [email protected]
Food Science and Quality Management [email protected]
Chemistry and Materials Research [email protected]
Education, and other Social Sciences PAPER SUBMISSION EMAIL
Journal of Education and Practice [email protected]
Journal of Law, Policy and Globalization [email protected] Global knowledge sharing:
New Media and Mass Communication [email protected] EBSCO, Index Copernicus, Ulrich's
Journal of Energy Technologies and Policy [email protected] Periodicals Directory, JournalTOCS, PKP
Historical Research Letter [email protected] Open Archives Harvester, Bielefeld
Academic Search Engine, Elektronische
Public Policy and Administration Research [email protected] Zeitschriftenbibliothek EZB, Open J-Gate,
International Affairs and Global Strategy [email protected] OCLC WorldCat, Universe Digtial Library ,
Research on Humanities and Social Sciences [email protected] NewJour, Google Scholar.
Developing Country Studies [email protected] IISTE is member of CrossRef. All journals
Arts and Design Studies [email protected] have high IC Impact Factor Values (ICV).