Search
Author
- Osman, Ahmed I. (5)
- Daqing, Ma (3)
- Jorgensen, Ed (3)
- Li, Yan (3)
- next >
Subject
- kinh tế (26)
- Economics (12)
- programming (10)
- XRD (10)
- next >
Date issued
- 2020 - 2025 (2128)
- 2010 - 2019 (129)
- 2000 - 2009 (9)
- 1999 - 1999 (1)
Has File(s)
Search Results
With the remarkable increase in the number of scientific entities such as publications, researchers, and scientific topics, and the associated information overload in science, academic recommender systems have become increasingly important for millions of researchers and science enthusiasts. However, it is often overlooked that these systems are subject to various biases. In this article, we first break down the biases of academic recommender systems and characterize them according to their impact and prevalence. In doing so, we distinguish between biases originally caused by humans and biases induced by the recommender system. Second, we provide an overview of methods that have been used to mitigate these biases in the scholarly domain. Based on this, third, we present a framework ... |
This paper presents the first attribute-based signature (ABS) scheme supporting signing policies representable by Turing machines (TM), based on well-studied computational assumptions. Our work supports arbitrary TMs as signing policies in the sense that the TMs can accept signing attribute strings of unbounded polynomial length and there is no limit on their running time, description size, or space complexity. Moreover, we are able to achieve input-specific running time for the signing algorithm. All other known expressive ABS schemes could at most support signing policies realizable by either arbitrary polynomial-size circuits or TMs having a pre-determined upper bound on the running time. |
In this study, we present an objective, replicable methodology to identify trendy journals in any consolidated discipline. Trendy journals are those most read by authors who are currently publishing within the scope of the discipline. Trendy journal lists differ from consolidated lists of top core journals; the latter are very stable over time, mainly reflecting reputational factors, whereas the former reveal current influences not yet captured by studies based on bibliometric indicators or expert surveys. We apply our methodology to identify trendy journals among 167 titles indexed in the Web of Science category of the Information Science & Library Science (LIS) research area. |
This work proposes and compare two different approaches for real-time human action recognition (HAR) from raw depth video sequences. Both proposals are based on the convolutional long short-term memory unit, namely ConvLSTM, with differences in the architecture and the long-term learning. The former uses a video-length adaptive input data generator (stateless) whereas the latter explores the stateful ability of general recurrent neural networks but is applied in the particular case of HAR. This stateful property allows the model to accumulate discriminative patterns from previous frames without compromising computer memory. Furthermore, since the proposal uses only depth information, HAR is carried out preserving the privacy of people in the scene, since their identities can not be ... |
The method of the learning of vague languages which represent distorted/ambiguous patterns is proposed in the paper. The goal of the method is to infer the quasi-context-sensitive string grammar which is used in our model as the generator of patterns. The method is an important component of the multi-derivational model of the parsing of vague languages used for syntactic pattern recognition. |
Let R be a finite commutative ring. The set F(R) of polynomial functions on R is a finite commutative ring with pointwise operations. Its group of units F(R)× is just the set of all unit-valued polynomial functions. We investigate polynomial permutations on R[x]/(x2)=R[α], the ring of dual numbers over R, and show that the group PR(R[α])
, consisting of those polynomial permutations of R[α] represented by polynomials in R[x], is embedded in a semidirect product of F(R)× by the group P(R) of polynomial permutations on R. In particular, when R=Fq
, we prove that PFq(Fq[α])≅P(Fq)⋉θF(Fq)×. Furthermore, we count unit-valued polynomial functions on the ring of integers modulo pn and obtain canonical representations for these functions. |
Some of the most critical competencies students need to acquire to become control engineers require performing practices under actual industrial conditions. This means that they must not only master the theoretical aspects of the discipline but also acquire skills and attitudes to face unpredictable real-world situations. Software tools such as Matlab/Simulink are widely used to train the design and validation of controllers, but they fail to provide real industrial contexts. Nowadays, there are 3D simulation tools that support recreating industrial environments to a remarkable extent, making them very attractive for university courses. Nevertheless, their application in engineering courses is scarce yet. This paper presents a methodological framework for seizing into competency-bas... |
A single network model can’t extract more complex and rich effective features. Meanwhile, the network structure is usually huge, and there are many parameters and consume more space resources, etc. Therefore, the combination of multiple network models to extract complementary features has attracted extensive attention. In order to solve the problems existing in the prior art that the network model can’t extract high spatial depth features, redundant network structure parameters, and weak generalization ability, this paper adopts two models of Xception module and inverted residual structure to build the neural network. Based on this, a face expression recognition method based on improved depthwise separable convolutional network is proposed in the paper. Firstly, Gaussian filtering i... |
Despite improvement in gender inequality in Australian science, the problem has not been fully addressed yet. To better understand the nature of gender inequality in Australian science, all gendered Australian first authored articles published between 2010 and 2020 and indexed in the Dimensions database were analysed. Field of Research (FoR) was used as the subject classification of articles and Field Citation Ratio (FCR) was used for citation comparison. Overall, the ratio of female to male first authored articles increased over the years, and this was true for all FoRs except for information and computing sciences. The ratio of single-authored articles by females was also improved over the study period. Females appeared to have a citation advantage, using Field Citation Ratio, ove... |
The success of blockchain technology in cryptocurrencies reveals its potential in the data management field. Recently, there is a trend in the database community to integrate blockchains and traditional databases to obtain security, efficiency, and privacy from the two distinctive but related systems. In this survey, we discuss the use of blockchain technology in the data management field and focus on the fusion system of blockchains and databases. We first classify existing blockchain-related data management technologies by their locations on the blockchain-database spectrum. |