-
The complexity of convexity number and percolation time in the cycle convexity
Authors:
Carlos V. G. C. Lima,
Thiago Marcilon,
Pedro Paulo de Medeiros
Abstract:
The subject of graph convexity is well explored in the literature, the so-called interval convexities above all. In this work, we explore the cycle convexity, an interval convexity whose interval function is $I(S) = S \cup \{u \mid G[S \cup \{u\}]$ has a cycle containing $u\}$. In this convexity, we prove that determine whether the convexity number of a graph $G$ is at least $k$ is \NP-complete an…
▽ More
The subject of graph convexity is well explored in the literature, the so-called interval convexities above all. In this work, we explore the cycle convexity, an interval convexity whose interval function is $I(S) = S \cup \{u \mid G[S \cup \{u\}]$ has a cycle containing $u\}$. In this convexity, we prove that determine whether the convexity number of a graph $G$ is at least $k$ is \NP-complete and \W[1]-hard when parameterized by the size of the solution when $G$ is a thick spider, but polynomial when $G$ is an extended $P_4$-laden graph. We also prove that determining whether the percolation time of a graph is at least $k$ is \NP-complete even for fixed $k \geq 9$, but polynomial for cacti or for fixed $k\leq2$.
△ Less
Submitted 6 May, 2024; v1 submitted 14 April, 2024;
originally announced April 2024.
-
Identifying Risk Patterns in Brazilian Police Reports Preceding Femicides: A Long Short Term Memory (LSTM) Based Analysis
Authors:
Vinicius Lima,
Jaque Almeida de Oliveira
Abstract:
Femicide refers to the killing of a female victim, often perpetrated by an intimate partner or family member, and is also associated with gender-based violence. Studies have shown that there is a pattern of escalating violence leading up to these killings, highlighting the potential for prevention if the level of danger to the victim can be assessed. Machine learning offers a promising approach to…
▽ More
Femicide refers to the killing of a female victim, often perpetrated by an intimate partner or family member, and is also associated with gender-based violence. Studies have shown that there is a pattern of escalating violence leading up to these killings, highlighting the potential for prevention if the level of danger to the victim can be assessed. Machine learning offers a promising approach to address this challenge by predicting risk levels based on textual descriptions of the violence. In this study, we employed the Long Short Term Memory (LSTM) technique to identify patterns of behavior in Brazilian police reports preceding femicides. Our first objective was to classify the content of these reports as indicating either a lower or higher risk of the victim being murdered, achieving an accuracy of 66%. In the second approach, we developed a model to predict the next action a victim might experience within a sequence of patterned events. Both approaches contribute to the understanding and assessment of the risks associated with domestic violence, providing authorities with valuable insights to protect women and prevent situations from escalating.
△ Less
Submitted 4 January, 2024;
originally announced January 2024.
-
How do machines learn? Evaluating the AIcon2abs method
Authors:
Rubens Lacerda Queiroz,
Cabral Lima,
Fabio Ferrentini Sampaio,
Priscila Machado Vieira Lima
Abstract:
This paper evaluates AI from concrete to Abstract (AIcon2abs), a recently proposed method that enables awareness among the general public on machine learning. Such is possible due to the use of WiSARD, an easily understandable machine learning mechanism, thus requiring little effort and no technical background from the target users. WiSARD is adherent to digital computing; training consists of wri…
▽ More
This paper evaluates AI from concrete to Abstract (AIcon2abs), a recently proposed method that enables awareness among the general public on machine learning. Such is possible due to the use of WiSARD, an easily understandable machine learning mechanism, thus requiring little effort and no technical background from the target users. WiSARD is adherent to digital computing; training consists of writing to RAM-type memories, and classification consists of reading from these memories. The model enables easy visualization and understanding of training and classification tasks' internal realization through ludic activities. Furthermore, the WiSARD model does not require an Internet connection for training and classification, and it can learn from a few or one example. WiSARD can also create "mental images" of what it has learned so far, evidencing key features pertaining to a given class. The AIcon2abs method's effectiveness was assessed through the evaluation of a remote course with a workload of approximately 6 hours. It was completed by thirty-four Brazilian subjects: 5 children between 8 and 11 years old; 5 adolescents between 12 and 17 years old; and 24 adults between 21 and 72 years old. The collected data was analyzed from two perspectives: (i) from the perspective of a pre-experiment (of a mixed methods nature) and (ii) from a phenomenological perspective (of a qualitative nature). AIcon2abs was well-rated by almost 100% of the research subjects, and the data collected revealed quite satisfactory results concerning the intended outcomes. This research has been approved by the CEP/HUCFF/FM/UFRJ Human Research Ethics Committee.
△ Less
Submitted 24 July, 2024; v1 submitted 14 January, 2024;
originally announced January 2024.
-
Emissions Reporting Maturity Model: supporting cities to leverage emissions-related processes through performance indicators and artificial intelligence
Authors:
Victor de A. Xavier,
Felipe M. G. França,
Priscila M. V. Lima
Abstract:
Climate change and global warming have been trending topics worldwide since the Eco-92 conference. However, little progress has been made in reducing greenhouse gases (GHGs). The problems and challenges related to emissions are complex and require a concerted and comprehensive effort to address them. Emissions reporting is a critical component of GHG reduction policy and is therefore the focus of…
▽ More
Climate change and global warming have been trending topics worldwide since the Eco-92 conference. However, little progress has been made in reducing greenhouse gases (GHGs). The problems and challenges related to emissions are complex and require a concerted and comprehensive effort to address them. Emissions reporting is a critical component of GHG reduction policy and is therefore the focus of this work. The main goal of this work is two-fold: (i) to propose an emission reporting evaluation model to leverage emissions reporting overall quality and (ii) to use artificial intelligence (AI) to support the initiatives that improve emissions reporting. Thus, this work presents an Emissions Reporting Maturity Model (ERMM) for examining, clustering, and analysing data from emissions reporting initiatives to help the cities to deal with climate change and global warming challenges. The Performance Indicator Development Process (PIDP) proposed in this work provides ways to leverage the quality of the available data necessary for the execution of the evaluations identified by the ERMM. Hence, the PIDP supports the preparation of the data from emissions-related databases, the classification of the data according to similarities highlighted by different clustering techniques, and the identification of performance indicator candidates, which are strengthened by a qualitative analysis of selected data samples. Thus, the main goal of ERRM is to evaluate and classify the cities regarding the emission reporting processes, pointing out the drawbacks and challenges faced by other cities from different contexts, and at the end to help them to leverage the underlying emissions-related processes and emissions mitigation initiatives.
△ Less
Submitted 8 December, 2023;
originally announced January 2024.
-
Hotspot Prediction of Severe Traffic Accidents in the Federal District of Brazil
Authors:
Vinicius Lima,
Vetria Byrd
Abstract:
Traffic accidents are one of the biggest challenges in a society where commuting is so important. What triggers an accident can be dependent on several subjective parameters and varies within each region, city, or country. In the same way, it is important to understand those parameters in order to provide a knowledge basis to support decisions regarding future cases prevention. The literature pres…
▽ More
Traffic accidents are one of the biggest challenges in a society where commuting is so important. What triggers an accident can be dependent on several subjective parameters and varies within each region, city, or country. In the same way, it is important to understand those parameters in order to provide a knowledge basis to support decisions regarding future cases prevention. The literature presents several works where machine learning algorithms are used for prediction of accidents or severity of accidents, in which city-level datasets were used as evaluation studies. This work attempts to add to the diversity of research, by focusing mainly on concentration of accidents and how machine learning can be used to predict hotspots. This approach demonstrated to be a useful technique for authorities to understand nuances of accident concentration behavior. For the first time, data from the Federal District of Brazil collected from forensic traffic accident analysts were used and combined with data from local weather conditions to predict hotspots of collisions. Out of the five algorithms we considered, two had good performance: Multi-layer Perceptron and Random Forest, with the latter being the best one at 98% accuracy. As a result, we identify that weather parameters are not as important as the accident location, demonstrating that local intervention is important to reduce the number of accidents.
△ Less
Submitted 28 December, 2023;
originally announced December 2023.
-
Health Disparities through Generative AI Models: A Comparison Study Using A Domain Specific large language model
Authors:
Yohn Jairo Parra Bautista,
Vinicious Lima,
Carlos Theran,
Richard Alo
Abstract:
Health disparities are differences in health outcomes and access to healthcare between different groups, including racial and ethnic minorities, low-income people, and rural residents. An artificial intelligence (AI) program called large language models (LLMs) can understand and generate human language, improving health communication and reducing health disparities. There are many challenges in us…
▽ More
Health disparities are differences in health outcomes and access to healthcare between different groups, including racial and ethnic minorities, low-income people, and rural residents. An artificial intelligence (AI) program called large language models (LLMs) can understand and generate human language, improving health communication and reducing health disparities. There are many challenges in using LLMs in human-doctor interaction, including the need for diverse and representative data, privacy concerns, and collaboration between healthcare providers and technology experts. We introduce the comparative investigation of domain-specific large language models such as SciBERT with a multi-purpose LLMs BERT. We used cosine similarity to analyze text queries about health disparities in exam rooms when factors such as race are used alone. Using text queries, SciBERT fails when it doesn't differentiate between queries text: "race" alone and "perpetuates health disparities." We believe clinicians can use generative AI to create a draft response when communicating asynchronously with patients. However, careful attention must be paid to ensure they are developed and implemented ethically and equitably.
△ Less
Submitted 23 October, 2023;
originally announced October 2023.
-
Algorithms for the Bin Packing Problem with Scenarios
Authors:
Yulle G. F. Borges,
Vinícius L. de Lima,
Flávio K. Miyazawa,
Lehilton L. C. Pedrosa,
Thiago A. de Queiroz,
Rafael C. S. Schouery
Abstract:
This paper presents theoretical and practical results for the bin packing problem with scenarios, a generalization of the classical bin packing problem which considers the presence of uncertain scenarios, of which only one is realized. For this problem, we propose an absolute approximation algorithm whose ratio is bounded by the square root of the number of scenarios times the approximation ratio…
▽ More
This paper presents theoretical and practical results for the bin packing problem with scenarios, a generalization of the classical bin packing problem which considers the presence of uncertain scenarios, of which only one is realized. For this problem, we propose an absolute approximation algorithm whose ratio is bounded by the square root of the number of scenarios times the approximation ratio for an algorithm for the vector bin packing problem. We also show how an asymptotic polynomial-time approximation scheme is derived when the number of scenarios is constant. As a practical study of the problem, we present a branch-and-price algorithm to solve an exponential model and a variable neighborhood search heuristic. To speed up the convergence of the exact algorithm, we also consider lower bounds based on dual feasible functions. Results of these algorithms show the competence of the branch-and-price in obtaining optimal solutions for about 59% of the instances considered, while the combined heuristic and branch-and-price optimally solved 62% of the instances considered.
△ Less
Submitted 24 May, 2023;
originally announced May 2023.
-
ULEEN: A Novel Architecture for Ultra Low-Energy Edge Neural Networks
Authors:
Zachary Susskind,
Aman Arora,
Igor D. S. Miranda,
Alan T. L. Bacellar,
Luis A. Q. Villon,
Rafael F. Katopodis,
Leandro S. de Araujo,
Diego L. C. Dutra,
Priscila M. V. Lima,
Felipe M. G. Franca,
Mauricio Breternitz Jr.,
Lizy K. John
Abstract:
The deployment of AI models on low-power, real-time edge devices requires accelerators for which energy, latency, and area are all first-order concerns. There are many approaches to enabling deep neural networks (DNNs) in this domain, including pruning, quantization, compression, and binary neural networks (BNNs), but with the emergence of the "extreme edge", there is now a demand for even more ef…
▽ More
The deployment of AI models on low-power, real-time edge devices requires accelerators for which energy, latency, and area are all first-order concerns. There are many approaches to enabling deep neural networks (DNNs) in this domain, including pruning, quantization, compression, and binary neural networks (BNNs), but with the emergence of the "extreme edge", there is now a demand for even more efficient models. In order to meet the constraints of ultra-low-energy devices, we propose ULEEN, a model architecture based on weightless neural networks. Weightless neural networks (WNNs) are a class of neural model which use table lookups, not arithmetic, to perform computation. The elimination of energy-intensive arithmetic operations makes WNNs theoretically well suited for edge inference; however, they have historically suffered from poor accuracy and excessive memory usage. ULEEN incorporates algorithmic improvements and a novel training strategy inspired by BNNs to make significant strides in improving accuracy and reducing model size. We compare FPGA and ASIC implementations of an inference accelerator for ULEEN against edge-optimized DNN and BNN devices. On a Xilinx Zynq Z-7045 FPGA, we demonstrate classification on the MNIST dataset at 14.3 million inferences per second (13 million inferences/Joule) with 0.21 $μ$s latency and 96.2% accuracy, while Xilinx FINN achieves 12.3 million inferences per second (1.69 million inferences/Joule) with 0.31 $μ$s latency and 95.83% accuracy. In a 45nm ASIC, we achieve 5.1 million inferences/Joule and 38.5 million inferences/second at 98.46% accuracy, while a quantized Bit Fusion model achieves 9230 inferences/Joule and 19,100 inferences/second at 99.35% accuracy. In our search for ever more efficient edge devices, ULEEN shows that WNNs are deserving of consideration.
△ Less
Submitted 20 April, 2023;
originally announced April 2023.
-
On the Linguistic and Computational Requirements for Creating Face-to-Face Multimodal Human-Machine Interaction
Authors:
João Ranhel,
Cacilda Vilela de Lima
Abstract:
In this study, conversations between humans and avatars are linguistically, organizationally, and structurally analyzed, focusing on what is necessary for creating face-to-face multimodal interfaces for machines. We videorecorded thirty-four human-avatar interactions, performed complete linguistic microanalysis on video excerpts, and marked all the occurrences of multimodal actions and events. Sta…
▽ More
In this study, conversations between humans and avatars are linguistically, organizationally, and structurally analyzed, focusing on what is necessary for creating face-to-face multimodal interfaces for machines. We videorecorded thirty-four human-avatar interactions, performed complete linguistic microanalysis on video excerpts, and marked all the occurrences of multimodal actions and events. Statistical inferences were applied to data, allowing us to comprehend not only how often multimodal actions occur but also how multimodal events are distributed between the speaker (emitter) and the listener (recipient). We also observed the distribution of multimodal occurrences for each modality. The data show evidence that double-loop feedback is established during a face-to-face conversation. This led us to propose that knowledge from Conversation Analysis (CA), cognitive science, and Theory of Mind (ToM), among others, should be incorporated into the ones used for describing human-machine multimodal interactions. Face-to-face interfaces require an additional control layer to the multimodal fusion layer. This layer has to organize the flow of conversation, integrate the social context into the interaction, as well as make plans concerning 'what' and 'how' to progress on the interaction. This higher level is best understood if we incorporate insights from CA and ToM into the interface system.
△ Less
Submitted 24 November, 2022;
originally announced November 2022.
-
On the Computational Complexity of the Strong Geodetic Recognition Problem
Authors:
Carlos V. G. C. Lima,
Vinicius F. dos Santos,
João H. G. Sousa,
Sebastián A. Urrutia
Abstract:
A strong geodetic set of a graph~$G=(V,E)$ is a vertex set~$S \subseteq V(G)$ in which it is possible to cover all the remaining vertices of~$V(G) \setminus S$ by assigning a unique shortest path between each vertex pair of~$S$. In the Strong Geodetic problem (SG) a graph~$G$ and a positive integer~$k$ are given as input and one has to decide whether~$G$ has a strong geodetic set of cardinality at…
▽ More
A strong geodetic set of a graph~$G=(V,E)$ is a vertex set~$S \subseteq V(G)$ in which it is possible to cover all the remaining vertices of~$V(G) \setminus S$ by assigning a unique shortest path between each vertex pair of~$S$. In the Strong Geodetic problem (SG) a graph~$G$ and a positive integer~$k$ are given as input and one has to decide whether~$G$ has a strong geodetic set of cardinality at most~$k$. This problem is known to be NP-hard for general graphs. In this work we introduce the Strong Geodetic Recognition problem (SGR), which consists in determining whether even a given vertex set~$S \subseteq V(G)$ is strong geodetic. We demonstrate that this version is NP-complete. We investigate and compare the computational complexity of both decision problems restricted to some graph classes, deriving polynomial-time algorithms, NP-completeness proofs, and initial parameterized complexity results, including an answer to an open question in the literature for the complexity of SG for chordal graphs.
△ Less
Submitted 2 August, 2022;
originally announced August 2022.
-
Weightless Neural Networks for Efficient Edge Inference
Authors:
Zachary Susskind,
Aman Arora,
Igor Dantas Dos Santos Miranda,
Luis Armando Quintanilla Villon,
Rafael Fontella Katopodis,
Leandro Santiago de Araujo,
Diego Leonel Cadette Dutra,
Priscila Machado Vieira Lima,
Felipe Maia Galvao Franca,
Mauricio Breternitz Jr.,
Lizy K. John
Abstract:
Weightless Neural Networks (WNNs) are a class of machine learning model which use table lookups to perform inference. This is in contrast with Deep Neural Networks (DNNs), which use multiply-accumulate operations. State-of-the-art WNN architectures have a fraction of the implementation cost of DNNs, but still lag behind them on accuracy for common image recognition tasks. Additionally, many existi…
▽ More
Weightless Neural Networks (WNNs) are a class of machine learning model which use table lookups to perform inference. This is in contrast with Deep Neural Networks (DNNs), which use multiply-accumulate operations. State-of-the-art WNN architectures have a fraction of the implementation cost of DNNs, but still lag behind them on accuracy for common image recognition tasks. Additionally, many existing WNN architectures suffer from high memory requirements. In this paper, we propose a novel WNN architecture, BTHOWeN, with key algorithmic and architectural improvements over prior work, namely counting Bloom filters, hardware-friendly hashing, and Gaussian-based nonlinear thermometer encodings to improve model accuracy and reduce area and energy consumption. BTHOWeN targets the large and growing edge computing sector by providing superior latency and energy efficiency to comparable quantized DNNs. Compared to state-of-the-art WNNs across nine classification datasets, BTHOWeN on average reduces error by more than than 40% and model size by more than 50%. We then demonstrate the viability of the BTHOWeN architecture by presenting an FPGA-based accelerator, and compare its latency and resource usage against similarly accurate quantized DNN accelerators, including Multi-Layer Perceptron (MLP) and convolutional models. The proposed BTHOWeN models consume almost 80% less energy than the MLP models, with nearly 85% reduction in latency. In our quest for efficient ML on the edge, WNNs are clearly deserving of additional attention.
△ Less
Submitted 2 March, 2022;
originally announced March 2022.
-
Do Proportionate Algorithms Exploit Sparsity?
Authors:
Markus V. S. Lima,
Gabriel S. Chaves,
Tadeu N. Ferreira,
Paulo S. R. Diniz
Abstract:
Adaptive filters exploiting sparsity have been a very active research field, among which the algorithms that follow the "proportional-update principle", the so-called proportionate-type algorithms, are very popular. Indeed, there are hundreds of works on proportionate-type algorithms and, therefore, their advantages are widely known. This paper addresses the unexplored drawbacks and limitations of…
▽ More
Adaptive filters exploiting sparsity have been a very active research field, among which the algorithms that follow the "proportional-update principle", the so-called proportionate-type algorithms, are very popular. Indeed, there are hundreds of works on proportionate-type algorithms and, therefore, their advantages are widely known. This paper addresses the unexplored drawbacks and limitations of using proportional updates and their practical impacts. Our findings include the theoretical justification for the poor performance of these algorithms in several sparse scenarios, and also when dealing with non-stationary and compressible systems. Simulation results corroborating the theory are presented.
△ Less
Submitted 15 August, 2021;
originally announced August 2021.
-
Exact solution of network flow models with strong relaxations
Authors:
Vinícius L. de Lima,
Manuel Iori,
Flávio K. Miyazawa
Abstract:
We address the solution of Mixed Integer Linear Programming (MILP) models with strong relaxations that are derived from Dantzig-Wolfe decompositions and allow a pseudo-polynomial pricing algorithm. We exploit their network-flow characterization and provide a framework based on column generation, reduced-cost variable-fixing, and a highly asymmetric branching scheme that allows us to take advantage…
▽ More
We address the solution of Mixed Integer Linear Programming (MILP) models with strong relaxations that are derived from Dantzig-Wolfe decompositions and allow a pseudo-polynomial pricing algorithm. We exploit their network-flow characterization and provide a framework based on column generation, reduced-cost variable-fixing, and a highly asymmetric branching scheme that allows us to take advantage of the potential of the current MILP solvers. We apply our framework to a variety of cutting and packing problems from the literature. The efficiency of the framework is proved by extensive computational experiments, in which a significant number of open instances could be solved to proven optimality for the first time.
△ Less
Submitted 31 May, 2021;
originally announced May 2021.
-
On the proper orientation number of chordal graphs
Authors:
Julio Araujo,
Alexandre Cezar,
Carlos V. G. C. Lima,
Vinicius F. dos Santos,
Ana Silva
Abstract:
An orientation $D$ of a graph $G=(V,E)$ is a digraph obtained from $G$ by replacing each edge by exactly one of the two possible arcs with the same end vertices. For each $v \in V(G)$, the indegree of $v$ in $D$, denoted by $d^-_D(v)$, is the number of arcs with head $v$ in $D$. An orientation $D$ of $G$ is proper if $d^-_D(u)\neq d^-_D(v)$, for all $uv\in E(G)$. An orientation with maximum indegr…
▽ More
An orientation $D$ of a graph $G=(V,E)$ is a digraph obtained from $G$ by replacing each edge by exactly one of the two possible arcs with the same end vertices. For each $v \in V(G)$, the indegree of $v$ in $D$, denoted by $d^-_D(v)$, is the number of arcs with head $v$ in $D$. An orientation $D$ of $G$ is proper if $d^-_D(u)\neq d^-_D(v)$, for all $uv\in E(G)$. An orientation with maximum indegree at most $k$ is called a $k$-orientation. The proper orientation number of $G$, denoted by $\overrightarrowχ(G)$, is the minimum integer $k$ such that $G$ admits a proper $k$-orientation. We prove that determining whether $\overrightarrowχ(G) \leq k$ is NP-complete for chordal graphs of bounded diameter, but can be solved in linear-time in the subclass of quasi-threshold graphs. When parameterizing by $k$, we argue that this problem is FPT for chordal graphs and argue that no polynomial kernel exists, unless $NP\subseteq coNP/\ poly$. We present a better kernel to the subclass of split graphs and a linear kernel to the class of cobipartite graphs.
Concerning bounds, we prove tight upper bounds for subclasses of block graphs. We also present new families of trees having proper orientation number at most 2 and at most 3. Actually, we prove a general bound stating that any graph $G$ having no adjacent vertices of degree at least $c+1$ have proper orientation number at most $c$. This implies new classes of (outer)planar graphs with bounded proper orientation number. We also prove that maximal outerplanar graphs $G$ whose weak-dual is a path satisfy $\overrightarrowχ(G)\leq 13$. Finally, we present simple bounds to the classes of chordal claw-free graphs and cographs.
△ Less
Submitted 30 November, 2020;
originally announced November 2020.
-
Arc Flow Formulations Based on Dynamic Programming: Theoretical Foundations and Applications
Authors:
Vinícius L. de Lima,
Cláudio Alves,
François Clautiaux,
Manuel Iori,
José M. Valério de Carvalho
Abstract:
Network flow formulations are among the most successful tools to solve optimization problems. Such formulations correspond to determining an optimal flow in a network. One particular class of network flow formulations is the arc flow, where variables represent flows on individual arcs of the network. For $\mathcal{NP}$-hard problems, polynomial-sized arc flow models typically provide weak linear r…
▽ More
Network flow formulations are among the most successful tools to solve optimization problems. Such formulations correspond to determining an optimal flow in a network. One particular class of network flow formulations is the arc flow, where variables represent flows on individual arcs of the network. For $\mathcal{NP}$-hard problems, polynomial-sized arc flow models typically provide weak linear relaxations and may have too much symmetry to be efficient in practice. Instead, arc flow models with a pseudo-polynomial size usually provide strong relaxations and are efficient in practice. The interest in pseudo-polynomial arc flow formulations has grown considerably in the last twenty years, in which they have been used to solve many open instances of hard problems. A remarkable advantage of pseudo-polynomial arc flow models is the possibility to solve practical-sized instances directly by a Mixed Integer Linear Programming solver, avoiding the implementation of complex methods based on column generation.
In this survey, we present theoretical foundations of pseudo-polynomial arc flow formulations, by showing a relation between their network and Dynamic Programming (DP). This relation allows a better understanding of the strength of these formulations, through a link with models obtained by Dantzig-Wolfe decomposition. The relation with DP also allows a new perspective to relate state-space relaxation methods for DP with arc flow models. We also present a dual point of view to contrast the linear relaxation of arc flow models with that of models based on paths and cycles. To conclude, we review the main solution methods and applications of arc flow models based on DP in several domains such as cutting, packing, scheduling, and routing.
△ Less
Submitted 15 April, 2021; v1 submitted 1 October, 2020;
originally announced October 2020.
-
Target set selection with maximum activation time
Authors:
Lucas Keiler,
Carlos Vinicius G. C. Lima,
Ana Karolinna Maia,
Rudini Sampaio,
Ignasi Sau
Abstract:
A target set selection model is a graph $G$ with a threshold function $τ:V\to \mathbb{N}$ upper-bounded by the vertex degree. For a given model, a set $S_0\subseteq V(G)$ is a target set if $V(G)$ can be partitioned into non-empty subsets $S_0,S_1,\dotsc,S_t$ such that, for $i \in \{1, \ldots, t\}$, $S_i$ contains exactly every vertex $v$ having at least $τ(v)$ neighbors in…
▽ More
A target set selection model is a graph $G$ with a threshold function $τ:V\to \mathbb{N}$ upper-bounded by the vertex degree. For a given model, a set $S_0\subseteq V(G)$ is a target set if $V(G)$ can be partitioned into non-empty subsets $S_0,S_1,\dotsc,S_t$ such that, for $i \in \{1, \ldots, t\}$, $S_i$ contains exactly every vertex $v$ having at least $τ(v)$ neighbors in $S_0\cup\dots\cup S_{i-1}$. We say that $t$ is the activation time $t_τ(S_0)$ of the target set $S_0$. The problem of, given such a model, finding a target set of minimum size has been extensively studied in the literature. In this article, we investigate its variant, which we call TSS-time, in which the goal is to find a target set $S_0$ that maximizes $t_τ(S_0)$. That is, given a graph $G$, a threshold function $τ$ in $G$, and an integer $k$, the objective of the TSS-time problem is to decide whether $G$ contains a target set $S_0$ such that $t_τ(S_0)\geq k$. Let $τ^* = \max_{v \in V(G)} τ(v)$. Our main result is the following dichotomy about the complexity of TSS-time when $G$ belongs to a minor-closed graph class ${\cal C}$: if ${\cal C}$ has bounded local treewidth, the problem is FPT parameterized by $k$ and $τ^{\star}$; otherwise, it is NP-complete even for fixed $k=4$ and $τ^{\star}=2$. We also prove that, with $τ^*=2$, the problem is NP-hard in bipartite graphs for fixed $k=5$, and from previous results we observe that TSS-time is NP-hard in planar graphs and W[1]-hard parameterized by treewidth. Finally, we present a linear-time algorithm to find a target set $S_0$ in a given tree maximizing $t_τ(S_0)$.
△ Less
Submitted 10 July, 2020;
originally announced July 2020.
-
AI from concrete to abstract: demystifying artificial intelligence to the general public
Authors:
Rubens Lacerda Queiroz,
Fábio Ferrentini Sampaio,
Cabral Lima,
Priscila Machado Vieira Lima
Abstract:
Artificial Intelligence (AI) has been adopted in a wide range of domains. This shows the imperative need to develop means to endow common people with a minimum understanding of what AI means. Combining visual programming and WiSARD weightless artificial neural networks, this article presents a new methodology, AI from concrete to abstract (AIcon2abs), to enable general people (including children)…
▽ More
Artificial Intelligence (AI) has been adopted in a wide range of domains. This shows the imperative need to develop means to endow common people with a minimum understanding of what AI means. Combining visual programming and WiSARD weightless artificial neural networks, this article presents a new methodology, AI from concrete to abstract (AIcon2abs), to enable general people (including children) to achieve this goal. The main strategy adopted by is to promote a demystification of artificial intelligence via practical activities related to the development of learning machines, as well as through the observation of their learning process. Thus, it is possible to provide subjects with skills that contributes to making them insightful actors in debates and decisions involving the adoption of artificial intelligence mechanisms. Currently, existing approaches to the teaching of basic AI concepts through programming treat machine intelligence as an external element/module. After being trained, that external module is coupled to the main application being developed by the learners. In the methodology herein presented, both training and classification tasks are blocks that compose the main program, just as the other programming constructs. As a beneficial side effect of AIcon2abs, the difference between a program capable of learning from data and a conventional computer program becomes more evident. In addition, the simplicity of the WiSARD weightless artificial neural network model enables easy visualization and understanding of training and classification tasks internal realization.
△ Less
Submitted 12 June, 2022; v1 submitted 6 June, 2020;
originally announced June 2020.
-
wisardpkg -- A library for WiSARD-based models
Authors:
Aluizio S. Lima Filho,
Gabriel P. Guarisa,
Leopoldo A. D. Lusquino Filho,
Luiz F. R. Oliveira,
Felipe M. G. Franca,
Priscila M. V. Lima
Abstract:
In order to facilitate the production of codes using WiSARD-based models, LabZero developed an ML library C++/Python called wisardpkg. This library is an MIT-licensed open-source package hosted on GitHub under the license.
In order to facilitate the production of codes using WiSARD-based models, LabZero developed an ML library C++/Python called wisardpkg. This library is an MIT-licensed open-source package hosted on GitHub under the license.
△ Less
Submitted 2 May, 2020;
originally announced May 2020.
-
Intersection graph of maximal stars
Authors:
Guilherme C. M. Gomes,
Marina Groshaus,
Carlos V. G. C. Lima,
Vinicius F. dos Santos
Abstract:
A biclique of a graph $G$ is an induced complete bipartite subgraph of $G$ such that neither part is empty. A star is a biclique of $G$ such that one part has exactly one vertex. The star graph of $G$ is the intersection graph of the maximal stars of $G$. A graph $H$ is star-critical if its star graph is different from the star graph of any of its proper induced subgraphs. We begin by presenting a…
▽ More
A biclique of a graph $G$ is an induced complete bipartite subgraph of $G$ such that neither part is empty. A star is a biclique of $G$ such that one part has exactly one vertex. The star graph of $G$ is the intersection graph of the maximal stars of $G$. A graph $H$ is star-critical if its star graph is different from the star graph of any of its proper induced subgraphs. We begin by presenting a bound on the size of star-critical pre-images by a quadratic function on the number of vertices of the star graph, then proceed to describe a Krausz-type characterization for this graph class; we combine these results to show membership of the recognition problem in \textsf{NP}. We also present some properties of star graphs. In particular, we show that they are biconnected, that every edge belongs to at least one triangle, characterize the structures the pre-image must have in order to generate degree two vertices, and bound the diameter of the star graph with respect to the diameter of its pre-image. Finally, we prove a monotonicity theorem, which we apply to list every star graph on at most eight vertices.
△ Less
Submitted 24 November, 2019;
originally announced November 2019.
-
Parameterized Complexity of Equitable Coloring
Authors:
Guilherme de C. M. Gomes,
Carlos V. G. C. Lima,
Vinícius F. dos Santos
Abstract:
A graph on $n$ vertices is equitably $k$-colorable if it is $k$-colorable and every color is used either $\left\lfloor n/k \right\rfloor$ or $\left\lceil n/k \right\rceil$ times.
Such a problem appears to be considerably harder than vertex coloring, being $\mathsf{NP\text{-}Complete}$ even for cographs and interval graphs.
In this work, we prove that it is $\mathsf{W[1]\text{-}Hard}$ for block…
▽ More
A graph on $n$ vertices is equitably $k$-colorable if it is $k$-colorable and every color is used either $\left\lfloor n/k \right\rfloor$ or $\left\lceil n/k \right\rceil$ times.
Such a problem appears to be considerably harder than vertex coloring, being $\mathsf{NP\text{-}Complete}$ even for cographs and interval graphs.
In this work, we prove that it is $\mathsf{W[1]\text{-}Hard}$ for block graphs and for disjoint union of split graphs when parameterized by the number of colors; and $\mathsf{W[1]\text{-}Hard}$ for $K_{1,4}$-free interval graphs when parameterized by treewidth, number of colors and maximum degree, generalizing a result by Fellows et al. (2014) through a much simpler reduction.
Using a previous result due to Dominique de Werra (1985), we establish a dichotomy for the complexity of equitable coloring of chordal graphs based on the size of the largest induced star.
Finally, we show that \textsc{equitable coloring} is $\mathsf{FPT}$ when parameterized by the treewidth of the complement graph.
△ Less
Submitted 14 May, 2019; v1 submitted 30 October, 2018;
originally announced October 2018.
-
Dual parameterization of Weighted Coloring
Authors:
Júlio Araújo,
Victor A. Campos,
Carlos Vinícius G. C. Lima,
Vinícius Fernandes dos Santos,
Ignasi Sau,
Ana Silva
Abstract:
Given a graph $G$, a proper $k$-coloring of $G$ is a partition $c = (S_i)_{i\in [1,k]}$ of $V(G)$ into $k$ stable sets $S_1,\ldots, S_{k}$. Given a weight function $w: V(G) \to \mathbb{R}^+$, the weight of a color $S_i$ is defined as $w(i) = \max_{v \in S_i} w(v)$ and the weight of a coloring $c$ as $w(c) = \sum_{i=1}^{k}w(i)$. Guan and Zhu [Inf. Process. Lett., 1997] defined the weighted chromati…
▽ More
Given a graph $G$, a proper $k$-coloring of $G$ is a partition $c = (S_i)_{i\in [1,k]}$ of $V(G)$ into $k$ stable sets $S_1,\ldots, S_{k}$. Given a weight function $w: V(G) \to \mathbb{R}^+$, the weight of a color $S_i$ is defined as $w(i) = \max_{v \in S_i} w(v)$ and the weight of a coloring $c$ as $w(c) = \sum_{i=1}^{k}w(i)$. Guan and Zhu [Inf. Process. Lett., 1997] defined the weighted chromatic number of a pair $(G,w)$, denoted by $σ(G,w)$, as the minimum weight of a proper coloring of $G$. The problem of determining $σ(G,w)$ has received considerable attention during the last years, and has been proved to be notoriously hard: for instance, it is NP-hard on split graphs, unsolvable on $n$-vertex trees in time $n^{o(\log n)}$ unless the ETH fails, and W[1]-hard on forests parameterized by the size of a largest tree. In this article we provide some positive results for the problem, by considering its so-called dual parameterization: given a vertex-weighted graph $(G,w)$ and an integer $k$, the question is whether $σ(G,w) \leq \sum_{v \in V(G)} w(v) - k$. We prove that this problem is FPT by providing an algorithm running in time $9^k \cdot n^{O(1)}$, and it is easy to see that no algorithm in time $2^{o(k)} \cdot n^{O(1)}$ exists under the ETH. On the other hand, we present a kernel with at most $(2^{k-1}+1) (k-1)$ vertices, and we rule out the existence of polynomial kernels unless ${\sf NP} \subseteq {\sf coNP} / {\sf poly}$, even on split graphs with only two different weights. Finally, we identify some classes of graphs on which the problem admits a polynomial kernel, in particular interval graphs and subclasses of split graphs, and in the latter case we present lower bounds on the degrees of the polynomials.
△ Less
Submitted 17 May, 2018;
originally announced May 2018.
-
Neural-Symbolic Learning and Reasoning: A Survey and Interpretation
Authors:
Tarek R. Besold,
Artur d'Avila Garcez,
Sebastian Bader,
Howard Bowman,
Pedro Domingos,
Pascal Hitzler,
Kai-Uwe Kuehnberger,
Luis C. Lamb,
Daniel Lowd,
Priscila Machado Vieira Lima,
Leo de Penning,
Gadi Pinkas,
Hoifung Poon,
Gerson Zaverucha
Abstract:
The study and understanding of human behaviour is relevant to computer science, artificial intelligence, neural computation, cognitive science, philosophy, psychology, and several other areas. Presupposing cognition as basis of behaviour, among the most prominent tools in the modelling of behaviour are computational-logic systems, connectionist models of cognition, and models of uncertainty. Recen…
▽ More
The study and understanding of human behaviour is relevant to computer science, artificial intelligence, neural computation, cognitive science, philosophy, psychology, and several other areas. Presupposing cognition as basis of behaviour, among the most prominent tools in the modelling of behaviour are computational-logic systems, connectionist models of cognition, and models of uncertainty. Recent studies in cognitive science, artificial intelligence, and psychology have produced a number of cognitive models of reasoning, learning, and language that are underpinned by computation. In addition, efforts in computer science research have led to the development of cognitive computational systems integrating machine learning and automated reasoning. Such systems have shown promise in a range of applications, including computational biology, fault diagnosis, training and assessment in simulators, and software verification. This joint survey reviews the personal ideas and views of several researchers on neural-symbolic learning and reasoning. The article is organised in three parts: Firstly, we frame the scope and goals of neural-symbolic computation and have a look at the theoretical foundations. We then proceed to describe the realisations of neural-symbolic computation, systems, and applications. Finally we present the challenges facing the area and avenues for further research.
△ Less
Submitted 10 November, 2017;
originally announced November 2017.
-
On the Computational Complexity of the Bipartizing Matching Problem
Authors:
Carlos V. G. C. Lima,
Dieter Rautenbach,
Uéverton S. Souza,
Jayme L. Szwarcfiter
Abstract:
We study the problem of determining whether a given graph~$G=(V,E)$ admits a matching~$M$ whose removal destroys all odd cycles of~$G$ (or equivalently whether~$G-M$ is bipartite). This problem is equivalent to determine whether~$G$ admits a~$(2,1)$-coloring, which is a~$2$-coloring of~$V(G)$ such that each color class induces a graph of maximum degree at most~$1$. We determine a dichotomy related…
▽ More
We study the problem of determining whether a given graph~$G=(V,E)$ admits a matching~$M$ whose removal destroys all odd cycles of~$G$ (or equivalently whether~$G-M$ is bipartite). This problem is equivalent to determine whether~$G$ admits a~$(2,1)$-coloring, which is a~$2$-coloring of~$V(G)$ such that each color class induces a graph of maximum degree at most~$1$. We determine a dichotomy related to the~{\sf NP}-completeness of this problem, where we show that it is~{\sf NP}-complete even for $3$-colorable planar graphs of maximum degree~$4$, while it is known that the problem can be solved in polynomial time for graphs of maximum degree at most~$3$. In addition we present polynomial-time algorithms for some graph classes, including graphs in which every odd cycle is a triangle, graphs of small dominating sets, and~$P_5$-free graphs. Additionally, we show that the problem is fixed parameter tractable when parameterized by the clique-width, which implies polynomial-time solution for many interesting graph classes, such as distance-hereditary, outerplanar, and chordal graphs. Finally, an~$O\left(2^{O\left(vc(G)\right)} \cdot n\right)$-time algorithm and a kernel of at most~$2\cdot nd(G)$ vertices are presented, where~$vc(G)$ and~$nd(G)$ are the vertex cover number and the neighborhood diversity of~$G$, respectively.
△ Less
Submitted 10 June, 2019; v1 submitted 20 October, 2017;
originally announced October 2017.
-
Efficient Steered-Response Power Methods for Sound Source Localization Using Microphone Arrays
Authors:
Markus V. S. Lima,
Wallace A. Martins,
Leonardo O. Nunes,
Luiz W. P. Biscainho,
Tadeu N. Ferreira,
Maurício V. M. Costa,
Bowon Lee
Abstract:
This paper proposes an efficient method based on the steered-response power (SRP) technique for sound source localization using microphone arrays: the volumetric SRP (V-SRP). As compared to the SRP, by deploying a sparser volumetric grid, the V-SRP achieves a significant reduction of the computational complexity without sacrificing the accuracy of the location estimates. By appending a fine search…
▽ More
This paper proposes an efficient method based on the steered-response power (SRP) technique for sound source localization using microphone arrays: the volumetric SRP (V-SRP). As compared to the SRP, by deploying a sparser volumetric grid, the V-SRP achieves a significant reduction of the computational complexity without sacrificing the accuracy of the location estimates. By appending a fine search step to the V-SRP, its refined version (RV-SRP) improves on the compromise between complexity and accuracy. Experiments conducted in both simulated- and real-data scenarios demonstrate the benefits of the proposed approaches. Specifically, the RV-SRP is shown to outperform the SRP in accuracy at a computational cost of about ten times lower.
△ Less
Submitted 15 February, 2015; v1 submitted 9 July, 2014;
originally announced July 2014.
-
Scheduling data flow program in xkaapi: A new affinity based Algorithm for Heterogeneous Architectures
Authors:
Raphaël Bleuse,
Thierry Gautier,
João V. F. Lima,
Grégory Mounié,
Denis Trystram
Abstract:
Efficient implementations of parallel applications on heterogeneous hybrid architectures require a careful balance between computations and communications with accelerator devices. Even if most of the communication time can be overlapped by computations, it is essential to reduce the total volume of communicated data. The literature therefore abounds with ad-hoc methods to reach that balance, but…
▽ More
Efficient implementations of parallel applications on heterogeneous hybrid architectures require a careful balance between computations and communications with accelerator devices. Even if most of the communication time can be overlapped by computations, it is essential to reduce the total volume of communicated data. The literature therefore abounds with ad-hoc methods to reach that balance, but that are architecture and application dependent. We propose here a generic mechanism to automatically optimize the scheduling between CPUs and GPUs, and compare two strategies within this mechanism: the classical Heterogeneous Earliest Finish Time (HEFT) algorithm and our new, parametrized, Distributed Affinity Dual Approximation algorithm (DADA), which consists in grouping the tasks by affinity before running a fast dual approximation. We ran experiments on a heterogeneous parallel machine with six CPU cores and eight NVIDIA Fermi GPUs. Three standard dense linear algebra kernels from the PLASMA library have been ported on top of the Xkaapi runtime. We report their performances. It results that HEFT and DADA perform well for various experimental conditions, but that DADA performs better for larger systems and number of GPUs, and, in most cases, generates much lower data transfers than HEFT to achieve the same performance.
△ Less
Submitted 25 April, 2014; v1 submitted 26 February, 2014;
originally announced February 2014.
-
Statistics for Ranking Program Committees and Editorial Boards
Authors:
Roberto da Silva,
Jose Palazzo de Oliveira,
Jose Valdeni de Lima,
Viviane Moreira
Abstract:
Ranking groups of researchers is important in several contexts and can serve many purposes such as the fair distribution of grants based on the scientist's publication output, concession of research projects, classification of journal editorial boards and many other applications in a social context. In this paper, we propose a method for measuring the performance of groups of researchers. The pr…
▽ More
Ranking groups of researchers is important in several contexts and can serve many purposes such as the fair distribution of grants based on the scientist's publication output, concession of research projects, classification of journal editorial boards and many other applications in a social context. In this paper, we propose a method for measuring the performance of groups of researchers. The proposed method is called alpha-index and it is based on two parameters: (i) the homogeneity of the h-indexes of the researchers in the group; and (ii) the h-group, which is an extension of the h-index for groups. Our method integrates the concepts of homogeneity and absolute value of the h-index into a single measure which is appropriate for the evaluation of groups. We report on experiments that assess computer science conferences based on the h-indexes of their program committee members. Our results are similar to a manual classification scheme adopted by a research agency.
△ Less
Submitted 4 February, 2010;
originally announced February 2010.