eISSN:
 2577-8838

All Issues

Volume 1, 2018

Mathematical Foundations of Computing

May 2018 , Volume 1 , Issue 2

Select all articles

Export/Reference:

Web services recommendation leveraging semantic similarity computing
Boran Hu, Zehui Cheng and Zhangbing Zhou
2018, 1(2): 101-119 doi: 10.3934/mfc.2018006 +[Abstract](417) +[HTML](216) +[PDF](577.4KB)
Abstract:

With the popularity of Web services adopted for supporting domain applications, recommending and composing appropriate services with respect to user requirements is a challenge. This paper proposes a dynamic programming and variable length genetic algorithm for the recommendation and composition of Web services. Generally, starting and ending services are determined leveraging the constructed service network model. Based on which, services are selected and composed, such that these services should be more appropriate on satisfying users' requirements. Experimental evaluation result shows that our technique is effective and can improve the accuracy of service recommendation.

A survey on security and privacy issues of blockchain technology
Archana Prashanth Joshi, Meng Han and Yan Wang
2018, 1(2): 121-147 doi: 10.3934/mfc.2018007 +[Abstract](2434) +[HTML](1200) +[PDF](3282.55KB)
Abstract:

Blockchain is gaining traction and can be termed as one of the furthermost prevalent topics nowadays. Although critics question about its scalability, security, and sustainability, it has already transformed many individuals' lifestyle in some areas due to its inordinate influence on industries and businesses. Granting that the features of blockchain technology guarantee more reliable and expedient services, it is important to consider the security and privacy issues and challenges behind the innovative technology. The spectrum of blockchain applications range from financial, healthcare, automobile, risk management, Internet of things (IoT) to public and social services. Several studies focus on utilizing the blockchain data structure in various applications. However, a comprehensive survey on technical and applications perspective has not yet been accomplished. In this paper, we try to conduct a comprehensive survey on the blockchain technology by discussing its structure to different consensus algorithms as well as the challenges and opportunities from the prospective of security and privacy of data in blockchains. Furthermore, we delve into future trends the blockchain technology can adapt in the years to come.

Index Terms- Blockchains, Future Trends of Blockchains, Security, Privacy

How convolutional neural networks see the world --- A survey of convolutional neural network visualization methods
Zhuwei Qin, Fuxun Yu, Chenchen Liu and Xiang Chen
2018, 1(2): 149-180 doi: 10.3934/mfc.2018008 +[Abstract](836) +[HTML](814) +[PDF](5025.25KB)
Abstract:

Nowadays, the Convolutional Neural Networks (CNNs) have achieved impressive performance on many computer vision related tasks, such as object detection, image recognition, image retrieval, etc. These achievements benefit from the CNNs' outstanding capability to learn the input features with deep layers of neuron structures and iterative training process. However, these learned features are hard to identify and interpret from a human vision perspective, causing a lack of understanding of the CNNs' internal working mechanism. To improve the CNN interpretability, the CNN visualization is well utilized as a qualitative analysis method, which translates the internal features into visually perceptible patterns. And many CNN visualization works have been proposed in the literature to interpret the CNN in perspectives of network structure, operation, and semantic concept.

In this paper, we expect to provide a comprehensive survey of several representative CNN visualization methods, including Activation Maximization, Network Inversion, Deconvolutional Neural Networks (DeconvNet), and Network Dissection based visualization. These methods are presented in terms of motivations, algorithms, and experiment results. Based on these visualization methods, we also discuss their practical applications to demonstrate the significance of the CNN interpretability in areas of network design, optimization, security enhancement, etc.

Hybrid binary dragonfly enhanced particle swarm optimization algorithm for solving feature selection problems
Mohamed A. Tawhid and Kevin B. Dsouza
2018, 1(2): 181-200 doi: 10.3934/mfc.2018009 +[Abstract](430) +[HTML](251) +[PDF](609.18KB)
Abstract:

In this paper, we present a new hybrid binary version of dragonfly and enhanced particle swarm optimization algorithm in order to solve feature selection problems. The proposed algorithm is called Hybrid Binary Dragonfly Enhanced Particle Swarm Optimization Algorithm(HBDESPO). In the proposed HBDESPO algorithm, we combine the dragonfly algorithm with its ability to encourage diverse solutions with its formation of static swarms and the enhanced version of the particle swarm optimization exploiting the data with its ability to converge to the best global solution in the search space. In order to investigate the general performance of the proposed HBDESPO algorithm, the proposed algorithm is compared with the original optimizers and other optimizers that have been used for feature selection in the past. Further, we use a set of assessment indicators to evaluate and compare the different optimizers over 20 standard data sets obtained from the UCI repository. Results prove the ability of the proposed HBDESPO algorithm to search the feature space for optimal feature combinations.

Editors

Referees

Librarians

Email Alert

[Back to Top]