Organizational Resilience between Competing Networks of Infomediaries A Case Study in Civil Society Resilience in Hong Kong

This study explores how non-governmental organizations (NGOs) in Hong Kongcan be considered as ‘infomediaries’ in their use of information and communication technologies . It posits that NGOs are uniquely capable of developing ICTs grounded in local legal, psychological, and cultural contextsto improve MDW community resilience .…

The Multiverse Logical Modularity for Proof Assistants

Proof assistants play a dual role as programming languages and logical systems . We propose the multiverse, ageneral type-theoretic approach to endow proof assistants with logical modularity . The multiverse consists of multiple universe hierarchies that describe the reasoning principles and effects available to define a term at a given type .…

Understanding the Basis of Graph Convolutional Neural Networks via an Intuitive Matched Filtering Approach

Graph Convolutional Neural Networks (GCNN) are becoming a preferred model for data processing on irregular domains . Their analysis and principles of operation are rarely examined due to the black box nature of NNs . We show that their convolution layerseffectively perform matched filtering of input data with the chosen patterns(features) This allows us to provide a unifying account of GCNNs through amatched filter perspective .…

Visualizing Uncertainty in Probabilistic Graphs with Network Hypothetical Outcome Plots NetHOPs

Network Hypothetical Outcome Plots is a visualization technique that animates a sequence of networkrealizations sampled from a network distribution defined by probabilisticedges . NetHOPs employ an aggregation and anchoring algorithm used in dynamicand longitudinal graph drawing to parameterize layout stability for uncertaintyestimation .…

Exploring Biases and Prejudice of Facial Synthesis via Semantic Latent Space

Deep learning (DL) models are widely used to provide a more convenient andsmarter life . However, biased algorithms will negatively influence us . Varying the proportions of male and female faces in the training data can have a substantial effect on behavior on test data .…

EEG based Classification of Drivers Attention using Convolutional Neural Network

Accurate detection of a drivers attention state can help develop assistivetechnologies that respond to unexpected hazards in real time . This study compares the performance of several attention classifiers trained on participants brain activity . Participants performed adriving task in an immersive simulator where the car randomly deviated from the lane .…

ZS SLR Zero Shot Sign Language Recognition from RGB D Videos

Sign Language Recognition (SLR) is a challenging research area in computervision . To tackle the annotation bottleneck in SLR, we formulate a two-stream model . We use two vision Transformer models, for humandetection and visual features representation . We configure a transformerencoder-decoder architecture, as a fast and accurate human detection model, toovercome the challenges of the current human detection models.…

On the Queue Number of Partial Orders

Heath and Pemmaraju conjectured that every poset ofwidth $w$ has queue-number at most $w$. Alam et al. constructed posets of width $w+1 with queue-numbers$w-+$. Our contribution is a construction of posets with width$W$with$Omega(w^2) This asymptotically matches the known upper bound .…

Learning Sparse Analytic Filters for Piano Transcription

filterbank learning has become an increasingly popular strategy for various audio-related machine learning tasks . We build upon a standard pianotranscription model, modifying only the feature extraction stage . The filterbank module is designed such that its complex filters are unconstrained1D convolutional kernels with long receptive fields .…

Appropriation coloniality and digital technologies Observations from within an African place

This paper provides an assessment of experiences and understanding of digitaltechnologies from within an African place . It provides philosophicalreflections upon the introduction and existence – appropriation – of digital technologies . Digital technologies are inherently linked to a colonialising power and, in general, unaligned with local, African ways of knowing .…

The Ethical Implications of Digital Contact Tracing for LGBTQIA Communities

The onset of COVID-19 has led to the introduction of far-reaching digitalinterventions in the interest of public health . Digital contact tracing has been proposed as a viable means of targeted control in countriesacross the globe, including on the African continent .…

A Simplicial Model for KB4_n Epistemic Logic with Agents that May Die

The standard semantics of multi-agent epistemic logic $S5$ is based on Kripkemodels whose accessibility relations are reflexive, symmetric and transitive . This one dimensional structure contains implicit higher-dimensional information beyond pairwise interactions, that has been formalized as pure simplicialmodels . Here we extend the theory toencompass all simplicial models – including those that are not pure .…

Geometric Amortization of Enumeration Algorithms

In this paper, we introduce the technique of geometric amortization forenumeration algorithms . This technique can be used to make the delay of enumeration algorithms more regular without much overhead on the space it uses . We show that, using geometricamortization, such an algorithm can be transformed into an algorithm with delay$O(p\log K)$ and $O(s\logK)$ space .…

Medical Graphs in Patient Information Systems in Primary Care

Graphs are very effective tools in visualizing information and are used in many fields including the medical field . In most developing countries primarycare, graphs are used to monitor child growth . These measures are therefore often displayed using line graphs, basing it on three indicators (stunting,underweight and wasting) based on the WHO 2006 Child Growth Standard .…

On Specialization of a Program Model of Naive Pattern Matching in Strings Extended Abstract

We have proved that for any pattern p the tail recursive program model ofnaive pattern matching may be automatically specialized w.r.t. the pattern p to a specialized version of the so-called KMP-algorithm, using the Higman-Kruskalrelation that controls the unfolding/folding . Given an input string, theresponding residual program finds the first occurrence of p in the string in linear time on the string length .…

The Shut the f k up Phenomenon Characterizing Incivility in Open Source Code Review Discussions

Code review is an important quality assurance activity for softwaredevelopment . Code review discussions among developers and maintainers can be heated and sometimes involve personal attacks and disrespectfulcomments . Frustration, name calling, and impatience are the most frequent features in uncivil emails .…

Analysis of Chronic Pain Experiences Based on Online Reports the RRCP Dataset

Chronic pain is recognized as a major health problem, with impacts at theeconomic, social, and individual levels . Verbal communication is key to convey relevant information to health professionals . We present the RedditReports of Chronic Pain (RRCP) dataset . We identify the main concerns emergent of eachpathology, as represented by a subset of documents explicitly related to it .…

Network control by a constrained external agent as a continuous optimization problem

Social science studies dealing with control in networks typically resort toheuristics or describing the static control distribution . Optimal policies require interventions that optimize control over a socioeconomicnetwork subject to real-world constraints . We integrate optimisation tools from deep-learning with network science into a framework that is able to optimizes interventions in real-life networks .…

Algorithms for reachability problems on stochastic Markov reward models

The stochastic Markov reward model (sMRM) extends the Markov chain with rewards as random variables . The model recently beingintroduced, does not have much in the way of techniques and algorithms for analysis . The purpose of this study is to derive such algorithms that are both scalable and accurate .…

Gender Data 4 Girls A Postcolonial Feminist Participatory Study in Bangladesh

Postcolonial feminist theory has long provided a critical lens throughwhich to analyse international development projects that target women in themajority world . This paper presents the findings from a participatory action research project with young women involved in a gender data for development project inBangladesh .…

The complexity of high dimensional cuts

Cut problems form one of the most fundamental classes of problems in algorithm theory . For general complexes, we show that THS is W[1] hard with respect to the solution size $k$. We also define a problem called Boundary Nontrivialization (BNT) We provide randomized (approximation) FPT algorithms for the globalvariants of THS and BNT .…

Earth Observation and the New African Rural Datascapes Defining an Agenda for Critical Research

Earth Observation data could transform the use and governance of African rural landscapes, with major implications for the wellbeing of people living in those landscapes . But there is still relatively little critical scholarship questioning how EO data are accessed, presented,disseminated and used in different socio-political contexts .…

Artificial Intelligence in the Global South AI4D Potential and Risks

Artificial intelligence is becoming more widely available in all parts of the world . This paper examines the key issues and questions arising in the emergingsub-field of AI for global development (AI4D) We propose that although there are many risks associated with the use of AI, the potential benefits are enough to warrant detailed research and investigation of the most appropriate and effective ways to design, develop, implement, and use such technologies in the Global South .…

Pulse Width Modulation Neuron Implemented by Single Positive Feedback Device

Positive-feedback (PF) device and its operation scheme to implement pulsewidth modulation (PWM) function was proposed and demonstrated . By adjusting the amount of the charge stored in the n- floating body (Qn), the potential of the floating body linearly changes with time .…

Heterogeneous Graph Attention Networks for Learning Diverse Communication

Multi-agent teaming achieves better performance when there is communication among participating agents allowing them to coordinate their actions formaximizing shared utility . We propose a Multi-Agent Heterogeneous Actor-Critic(MAHAC) learning paradigm to obtain collaborative per-class policies and effective communication protocols for composite robot teams .…

A Systematic Approach to Cleaning Routine Health Surveillance Datasets An Illustration Using National Vector Borne Disease Control Programme Data of Punjab India

Advances in ICT4D and data science facilitate systematic, reproducible, andscalable data cleaning for strengthening routine health information systems . Alogic model for data cleaning was used and it included an algorithm forscreening, diagnosis, and editing datasets in a rule-based, interactive, andsemi-automated manner .…

The Moderating Effect of Gender on Adopting Digital Government Innovations in Ethiopia

Digital government innovation is being recognised as a solution to many problems faced by governments in providing services to their citizens . It is especially important for low-income countries where there are resource constraints . Research was aimed at exploring the moderating effect of gender on the adoption of a digital government innovation in Ethiopia based on the UTAUT model (n=270) and using structural equation modeling (SEM) The results reveal that gender only moderates the relationship between facilitatingconditions and usage behavior of government employees to adopt the digitalgovernment innovation which is inconsistent with other findings .…

The complexity of high dimensional cuts

Cut problems form one of the most fundamental classes of problems in algorithm theory . For general complexes, we show that THS is W[1] hard with respect to the solution size $k$. We also define a problem called Boundary Nontrivialization (BNT) We provide randomized (approximation) FPT algorithms for the globalvariants of THS and BNT .…

Fast MATLAB evaluation of nonlinear energies using FEM in 2D and 3D nodal elements

Nonlinear energy functionals appearing in the calculus of variations can be bediscretized by the finite element (FE) method and formulated as a sum of energy contributions from local elements . We describe a vectorized implementation using the simplest P1 elements in which all energy contributions are evaluated all at once without the loop over triangular or tetrahedral elements .…

On Quantifying Literals in Boolean Logic and Its Applications to Explainable AI

Quantified Boolean logic results from adding operators to Boolean logic forexistentially and universally quantifying variables . This extends the reach ofBoolean logic by enabling a variety of applications that have been explored over the decades . The existential quantification of literals (variable states) and its applications have also been studied in the literature .…

Artificial Intelligence Ethics An Inclusive Global Discourse

The rapid advancement of artificial intelligence (AI) brings with it the potential to address many of the challenges outlined in the Sustainable Development Goals (SDGs) However, there are many questions about how such advanced technologies should be managed and governed .…

Primal and Dual Combinatorial Dimensions

We give tight bounds on relation between the primal and dual of variouscombinatorial dimensions . These dimensional notions play animportant role in the area of learning theory . In particular, we give an appropriate generalization to multi-valued function classes of awell-known bound due to Assouad (1983), that relates the primal .…

No DBA No regret Multi armed bandits for index tuning of analytical and HTAP workloads with provable guarantees

Automating physical database design has remained a long-term interest indatabase research due to substantial performance gains afforded by optimisedstructures . We propose a self-driving approach to online index selection that eschews the DBA and query optimiser, and instead learns the benefits of viable structuresthrough strategic exploration and direct performance observation .…

Readiness of the South African Agricultural Sector to Implement IoT

The Internetof Things (IoT) has been suggested as a potential tool for farmers to overcomethe impact of climate change on food security . There is evidence that the use of technology in agriculture has the potential to improve food production and foodsustainability .…

Cross Lingual Training with Dense Retrieval for Document Retrieval

Dense retrieval has shown great success in passage ranking in English . However, its effectiveness in document retrieval for non-English languages remains unexplored due to the limitation in training resources . In this work,we explore different transfer techniques for document ranking from Englishannotations to multiple languages .…

On Specialization of a Program Model of Naive Pattern Matching in Strings Extended Abstract

We have proved that for any pattern p the tail recursive program model ofnaive pattern matching may be automatically specialized w.r.t. the pattern p to a specialized version of the so-called KMP-algorithm, using the Higman-Kruskalrelation that controls the unfolding/folding . Given an input string, theresponding residual program finds the first occurrence of p in the string in linear time on the string length .…

Gender based occupational segregation a bit string approach

Gender-based occupational segregation has been suggested as one of the most important determinants of the still existing gender wage gap . Despite somesigns of a decreasing trend, there is evidence that occupational genderedsegregation is persistent . Using an agent-based model we provide aframework that introduces discriminatory behavior based on labour market theories of discrimination .…

A Simplicial Model for KB4_n Epistemic Logic with Agents that May Die

The standard semantics of multi-agent epistemic logic $S5$ is based on Kripkemodels whose accessibility relations are reflexive, symmetric and transitive . This one dimensional structure contains implicit higher-dimensional information beyond pairwise interactions, that has been formalized as pure simplicialmodels . Here we extend the theory toencompass all simplicial models – including those that are not pure .…

Custom Tailored Clone Detection for IEC 61131 3 Programming Languages

Automated production systems (aPS) are highly customized systems that consistof hardware and software . A common practice during the development of such systems is reusing implementation artifacts by copying, pasting, and then modifying code . This approach is referred to as code cloning .…

ICLR 2021 Challenge for Computational Geometry Topology Design and Results

This paper presents the computational challenge on differential geometry and topology that happened within the ICLR 2021 workshop “Geometric and TopologicalRepresentation Learning” The challengeattracted 16 teams in its two month duration . This paper describes the design of the challenge and summarizes its main findings .…

On universal covers for carpenter s rule folding

We present improved universal covers for carpenter’s rule folding in theplane .…

On universal covers for carpenter s rule folding

We present improved universal covers for carpenter’s rule folding in theplane .…

ICLR 2021 Challenge for Computational Geometry Topology Design and Results

This paper presents the computational challenge on differential geometry and topology that happened within the ICLR 2021 workshop “Geometric and TopologicalRepresentation Learning” The challengeattracted 16 teams in its two month duration . This paper describes the design of the challenge and summarizes its main findings .…

On a Tverberg graph

For a graph whose vertices are closed, consider the closed (open) balls with diameters induced by its edges . The graphis called a (an open) Tverberg graph) if these closed balls intersect . For any finite set of points in the plane, there exists a Hamiltonian cycle that is a Tverberberg graph .…