A Unified Approach for Outliers and Influential Data Detection – The Value of Information in Retrospect

Stat ◽  
2021 ◽  
Author(s):  
Jacob Parsons ◽  
Le Bao
2001 ◽  
Vol 20 (2) ◽  
pp. 159-169 ◽  
Author(s):  
M. Ganesh Madhan ◽  
P. R. Vaya ◽  
N. Gunasekaran

Author(s):  
Pierre-Loïc Garoche

The verification of control system software is critical to a host of technologies and industries, from aeronautics and medical technology to the cars we drive. The failure of controller software can cost people their lives. This book provides control engineers and computer scientists with an introduction to the formal techniques for analyzing and verifying this important class of software. Too often, control engineers are unaware of the issues surrounding the verification of software, while computer scientists tend to be unfamiliar with the specificities of controller software. The book provides a unified approach that is geared to graduate students in both fields, covering formal verification methods as well as the design and verification of controllers. It presents a wealth of new verification techniques for performing exhaustive analysis of controller software. These include new means to compute nonlinear invariants, the use of convex optimization tools, and methods for dealing with numerical imprecisions such as floating point computations occurring in the analyzed software. As the autonomy of critical systems continues to increase—as evidenced by autonomous cars, drones, and satellites and landers—the numerical functions in these systems are growing ever more advanced. The techniques presented here are essential to support the formal analysis of the controller software being used in these new and emerging technologies.


Author(s):  
Sergey Valerevich Belov ◽  
Irina Mikhalovna Kosmacheva ◽  
Irina Vyacheslavovna Sibikina

To solve the problem of information security management the method was proposed that allows determining the degree of importance of confidential documents of the organization. The urgency of the proposed algorithm was substantiated taking into account the requirements of the legislation of the Russian Federation in the sphere of information security. The stages prior to the formation of the list of confidential documents of the organization were described. A review of the main documents of the legal and regulatory framework was carried out including documents relating to the state regulation of relations in the sphere of information security. The classes of protected information for the accessing categories were considered. The criteria changes of the value of information in the process of time were represented. The algorithm of formation of the list of confidential documents of the organization based on the properties of information was offered. The algorithm is based on an expert method of pair comparison of alternatives. The result of the use of this method is a number of confidential documents, ranked in descending order of importance. For each document the weighting factor of importance can be calculated. The verification stage of the degree of expert consistency was included in the methodology to eliminate the use of erroneous expert data. The application of the methodology is illustrated by a calculated example.


Author(s):  
Melissa M. Gustafson

Critical pedagogy originated in the social sciences during the mid-twentieth century with the foundational work of Paolo Friere. More recently in information science, James Elmborg and others have framed critical pedagogy through the lens of information literacy instruction. As a whole the philosophy is one which considers economic, political, and societal systems which influence the entire information life cycle from creation to consumption. Central to the adoption was the incorporation of learners as equals with valid and highly individualized experiences in academic discourse. Beyond information literacy instruction, critical pedagogy has the potential to also benefit and define the librarian's outreach and support role for the scholarly communications process. Scholarly communications encompasses both traditional academic publishing models (peer reviewed journals, conference presentations, etc.) and nontraditional channels (social media, open access, etc.) and is concerned with the information lifecycle as it relates to teaching research and scholarly work. In consideration of scholarly communications processes, issues of critical pedagogy including external market forces, privilege of information, systems of access, and consumption all play a defining role. A move to a more unified approach of critical pedagogy in libraries would highlight crucial issues of information literacy and scholarly communications while simultaneously augmenting the library's role across campus. The evolution of critical pedagogy in libraries is briefly discussed. Current scholarly communications practices in academic libraries as seen through the literature and by examining U.S. library websites is also reviewed. The author makes suggestions for meaningful inclusion of critical pedagogy in libraries through a unified approach to scholarly communications and information literacy programs.


Sign in / Sign up

Export Citation Format

Share Document