Purpose:In recent decades,with the availability of large-scale scientific corpus datasets,difference-in-difference(DID)is increasingly used in the science of science and bibliometrics *** method outputs the unbiased e...
详细信息
Purpose:In recent decades,with the availability of large-scale scientific corpus datasets,difference-in-difference(DID)is increasingly used in the science of science and bibliometrics *** method outputs the unbiased estimation on condition that several hypotheses hold,especially the common trend *** this paper,we gave a systematic demonstration of DID in the science of science,and the potential ways to improve the accuracy of DID ***/methodology/approach:At first,we reviewed the statistical assumptions,the model specification,and the application procedures of DID ***,to improve the necessary assumptions before conducting DID regression and the accuracy of estimation,we introduced some matching techniques serving as the pre-selecting step for DID design by matching control individuals who are equivalent to those treated ones on observational variables before the ***,we performed a case study to estimate the effects of prizewinning on the scientific performance of Nobel laureates,by comparing the yearly citation impact after the prizewinning year between Nobel laureates and their prizewinning-work ***:We introduced the procedures to conduct a DID estimation and demonstrated the effectiveness to use matching method to improve the *** a case study,we found that there are no significant increases in citations for Nobel laureates compared to their prizewinning *** limitations:This study ignored the rigorous mathematical deduction parts of DID,while focused on the practical *** implications:This work gives experimental practice and potential guidelines to use DID method in science of science and bibliometrics ***/value:This study gains insights into the usage of econometric tools in science of science.
Contemporary research, particularly when addressing the most significant transdisciplinary research challenges, cannot effectively be done without a range of skills relating to data management, data analysis, and cybe...
Contemporary research, particularly when addressing the most significant transdisciplinary research challenges, cannot effectively be done without a range of skills relating to data management, data analysis, and cyberinfrastructure (CI). These data and CI skills are common to all disciplines that conduct data-centric research. Research datascience acts as a vital component of the scientific process. In a grassroots attempt to address this gap, the COdata-RDA Schools of Research datascience (SoRDS) was founded in 2016 to provide instruction on foundational datascience and open research concepts to early career researchers in low and middle-income countries. This partnership between international collaborators has since 2016 provided this training to over 1000 early career researchers in 24 events in 10 countries worldwide. The most recent event was held at Georgia Institute of Technology and focused on health equity and included researchers from minority-serving institutions in the southeast United States. This paper covers the background of the SoRDS project along with organization and curriculum details. It also covers the transition of the events from a non-domain-centric curriculum to spotlighting biological and social health equity data and what we learned to make future health-related events more engaging and valuable to the attendees. It also looks toward future events that will serve international students studying health informatics and other data-centric disciplines.
Purpose-With the development of intelligent technology,deep learning has made significant progress and has been widely used in various *** learning is data-driven,and its training process requires a large amount of da...
详细信息
Purpose-With the development of intelligent technology,deep learning has made significant progress and has been widely used in various *** learning is data-driven,and its training process requires a large amount of data to improve model ***,labeled data is expensive and not readily ***/methodology/approach-To address the above problem,researchers have integrated semisupervised and deep learning,using a limited number of labeled data and many unlabeled data to train *** this paper,Generative Adversarial Networks(GANs)are analyzed as an entry ***,we discuss the current research on GANs in image super-resolution applications,including supervised,unsupervised,and semi-supervised learning ***,based on semi-supervised learning,different optimization methods are introduced as an example of image ***,experimental comparisons and analyses of existing semi-supervised optimization methods based on GANs will be ***-Following the analysis of the selected studies,we summarize the problems that existed during the research process and propose future research ***/value-This paper reviews and analyzes research on generative adversarial networks for image super-resolution and classification from various learning *** comparative analysis of experimental results on current semi-supervised GAN optimizations is performed to provide a reference for further research.
With the rapid development of artificial intelligence in recent years,applying various learning techniques to solve mixed-integer linear programming(MILP)problems has emerged as a burgeoning research *** from construc...
详细信息
With the rapid development of artificial intelligence in recent years,applying various learning techniques to solve mixed-integer linear programming(MILP)problems has emerged as a burgeoning research *** from constructing end-to-end models directly,integrating learning approaches with some modules in the traditional methods for solving MILPs is also a promising *** cutting plane method is one of the fundamental algorithms used in modern MILP solvers,and the selection of appropriate cuts from the candidate cuts subset is crucial for enhancing *** to the reliance on expert knowledge and problem-specific heuristics,classical cut selection methods are not always transferable and often limit the scalability and generalizability of the cutting plane *** provide a more efficient and generalizable strategy,we propose a reinforcement learning(RL)framework to enhance cut selection in the solving process of ***,we design feature vectors to incorporate the inherent properties of MILP and computational information from the solver and represent MILP instances as bipartite ***,we choose the weighted metrics to approximate the proximity of feasible solutions to the convex hull and utilize the learning method to determine the weights assigned to each ***,a graph convolutional neural network is adopted with a self-attention mechanism to predict the value of weighting ***,we transform the cut selection process into a Markov decision process and utilize RL method to train the *** experiments are conducted based on a leading open-source MILP solver *** on both general and specific datasets validate the effectiveness and efficiency of our proposed approach.
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(...
详细信息
Face anti-spoofing aims at detecting whether the input is a real photo of a user(living)or a fake(spoofing)*** new types of attacks keep emerging,the detection of unknown attacks,known as Zero-Shot Face Anti-Spoofing(ZSFA),has become increasingly important in both academia and *** ZSFA methods mainly focus on extracting discriminative features between spoofing and living ***,the nature of the spoofing faces is to trick anti-spoofing systems by mimicking the livings,therefore the deceptive features between the known attacks and the livings,which have been ignored by existing ZSFA methods,are essential to comprehensively represent the ***,existing ZSFA models are incapable of learning the complete representations of living faces and thus fall short of effectively detecting newly emerged *** tackle this problem,we propose an innovative method that effectively captures both the deceptive and discriminative features distinguishing between genuine and spoofing *** method consists of two main components:a two-against-all training strategy and a semantic *** two-against-all training strategy is employed to separate deceptive and discriminative *** address the subsequent invalidation issue of categorical functions and the dominance disequilibrium issue among different dimensions of features after importing deceptive features,we introduce a modified semantic *** autoencoder is designed to map all extracted features to a semantic space,thereby achieving a balance in the dominance of each feature *** combine our method with the feature extraction model ResNet50,and experimental results show that the trained ResNet50 model simultaneously achieves a feasible detection of unknown attacks and comparably accurate detection of known *** results confirm the superiority and effectiveness of our proposed method in identifying the living with the interference of both known
The non-parametric regression method becomes an alternative that prioritizes flexibility. Therefore, it is possible to obtain a regression curve model when its shape is not yet known. Multivariate adaptive regression ...
详细信息
As smart contracts,represented by Solidity,become deeply integrated into the manufacturing industry,blockchain-based Digital Twins(DT)has gained momentum in recent *** of the blockchain infrastructures in widespread u...
详细信息
As smart contracts,represented by Solidity,become deeply integrated into the manufacturing industry,blockchain-based Digital Twins(DT)has gained momentum in recent *** of the blockchain infrastructures in widespread use today are based on the Proof-of-Work(PoW)mechanism,and the process of creating blocks is known as“mining”.Mining becomes increasingly difficult as the blockchain grows in size and the number of on-chain business systems *** lower the threshold of participation in the mining process,“mining pools”have been *** can cooperate and share the mining rewards according to the hashrate they contributed to the *** is the most widely used communication protocol between miners and mining *** security is essential for the *** this paper,we propose two novel Man-In-The-Middle(MITM)attack schemes against Stratum,which allow attackers to steal miners'hashrate to any mining pool using hijacked TCP *** with existing attacks,our work is more secretive,more suitable for the real-world environment,and more *** Proof-of-Concept(PoC)shows that our schemes work perfectly on most mining softwares and ***,we present a lightweight AI-driven approach based on protocol-level feature analysis to detect Stratum MITM for blockchain-based *** detection model consists of three layers:feature extraction layer,vectorization layer,and detection *** prove that our detection approach can effectively detect Stratum MITM traffic with 98%*** work alerts the communities and provides possible mitigation against these more hidden and profitable attack schemes.
A Riemannian gradient descent algorithm and a truncated variant are presented to solve systems of phaseless equations|Ax|^(2)=*** algorithms are developed by exploiting the inherent low rank structure of the problem b...
详细信息
A Riemannian gradient descent algorithm and a truncated variant are presented to solve systems of phaseless equations|Ax|^(2)=*** algorithms are developed by exploiting the inherent low rank structure of the problem based on the embedded manifold of rank-1 positive semidefinite *** recovery guarantee has been established for the truncated variant,showing that the algorithm is able to achieve successful recovery when the number of equations is proportional to the number of *** key ingredients in the analysis are the restricted well conditioned property and the restricted weak correlation property of the associated truncated linear *** evaluations show that our algorithms are competitive with other state-of-the-art first order nonconvex approaches with provable guarantees.
Background: Quality indicators (QI) are a common method to ensure quality in healthcare. This paper is based on the so-called QI-KA project, which defined cross-sector QI for the Austrian healthcare system. However, t...
详细信息
Three new Gentzen-style sequent calculi GS41, GS42, and GS43 for normal modal logic S4 are introduced. These calculi are obtained from a Gentzen-style sequent calculus GMA4 for a modal extension MA4 of Avron’s self-e...
详细信息
暂无评论