HomeTechnologyArtificial IntelligenceBig Data Becomes more Understandable with these Tools.

    Big Data Becomes more Understandable with these Tools.

    Patterns and anomalies in big data can help businesses target likely customers, reveal fraud or even predict drug interactions. Unfortunately, these patterns are often not easily observable. To extract the needles of useful information out of haystacks of data, data scientists need increasingly powerful methods of machine learning.

    The contribution of this lab is to expand the universe of tools and techniques.

    Many machine learning and data mining algorithms use graphs, which are simply lists of connections between people, groups, or objects. Examples include “friend,” “like” or “follow” relationships in social networks, or the list of videos streamed or marked as favorites in a streaming subscription service.

    These mountains of data hide useful information whose extraction belongs to an area known as graph inference. Graph inference has many interesting and useful applications—for example, suggesting movies in a streaming service based on viewing history or purchasing suggestions in online shopping. It also can reveal patterns in the spread of epidemics, or provide insights into the folding of proteins, which is important in understanding how proteins function.

    This work for the first time proposes and analyzes techniques to improve graph inference by absorbing nongraph information, whose efficient blending with graph information was previously not well understood. Examples of non-graph information include a person’s age and residence ZIP code, which are individual attributes.

    In almost every practical application involving graphs, there exist nongraph data of great relevance. The kind of work these researchers are doing is further upstream, developing the mathematical models, theory, and techniques, but it has widespread applications.

    The second component of the research addresses data security. This work harnesses the natural variations of wireless channels to provide layers of security for data transmission. This area of work, known as physical layer security, aims to leverage the imperfections of the communication channel as a tool for security. Part of this research is aimed at developing techniques for making the presence of electronic communication undetectable to cybercriminals.

    “To give a simple example, a password works by leveraging the difference between what is known by a legitimate user versus cybercriminals who want to steal information. This work creates, amplifies, and analyzes statistical asymmetry of information against adversaries in ways that do not involve passwords or keys, and uses them for securing communications.

    ELE Times Research Desk
    ELE Times Research Deskhttps://www.eletimes.ai
    ELE Times provides extensive global coverage of Electronics, Technology and the Market. In addition to providing in-depth articles, ELE Times attracts the industry’s largest, qualified and highly engaged audiences, who appreciate our timely, relevant content and popular formats. ELE Times helps you build experience, drive traffic, communicate your contributions to the right audience, generate leads and market your products favourably.

    Related News

    Must Read

    20 Years of EEPROM: Why It Matters, Needed, and Its Future

    ST has been the leading manufacturer of EEPROM for the 20th...

    Modern Cars Will Contain 600 Million Lines of Code by 2027

    Courtesy: Synopsys The 1977 Oldsmobile Toronado was ahead of its...

    Advancement in waveguides to progress XR displays, not GPUs

    Across emerging technology domains, a familiar narrative keeps repeating...

    Powering AI: How Power Pulsation Buffers are transforming data center power architecture

    Courtesy: Infineon Technologies Microsoft, OpenAI, Google, Amazon, NVIDIA, etc. are...

    Can the SDV Revolution Happen Without SoC Standardization?

    Speaking at the Auto EV Tech Vision Summit 2025,...

    ElevateX 2026, Marking a New Chapter in Human Centric and Intelligent Automation

    Teradyne Robotics today hosted ElevateX 2026 in Bengaluru -...

    The Architecture of Edge Computing Hardware: Why Latency, Power and Data Movement Decide Everything

    Courtesy: Ambient Scientific Most explanations of edge computing hardware talk...