A Method to Review Expert Recommendation Using Topic Relevance and Expert Relationship

2018 ◽  
Vol 27 (01) ◽  
pp. 1741004 ◽  
Author(s):  
Shengxiang Gao ◽  
Zhengtao Yu ◽  
Linbin Shi ◽  
Xin Yan ◽  
Haixia Song

In the process of recommending review experts to projects, in order to effectively make use of the relevance among topics and the relationship among experts, a new method is proposed for review expert recommendation using topic relevance and expert relationship. In this method, firstly, the relevance among topics and the relationships among experts are used to respectively construct the Markov network of topics and the Markov network of experts. Next, the maximum topic clique is extracted from the topic Markov network and the maximum expert clique is extracted from the expert Markov network; then, with the information of the two maximum cliques, the relevance between experts and projects is calculated. After that, according to the descending order of the relevant degree, the candidates are ranked. Finally, the experts, who are the top N to projects, are recommended. The experiments on five domain datasets are made and the results show that the proposed method can improve the effect of review expert recommendation, and the F-value increases by an average of 5% than without considering the relevance among topics and the relationship among experts.

1957 ◽  
Vol 24 (3_Suppl) ◽  
pp. S207
Author(s):  
A. Klopper

Abstract The changes in view on the significance and amount of urinary pregnanediol in the menstrual cycle are reviewed; in particular the effects of the discovery that the adrenals in both sexes normally contribute to the urinary pregnanediol. Pregnanediol excretion during the menstrual cycle was studied by means of a new method of assay (Klopper et al., 1955) and the results applied to present day concepts of the growth and duration of the corpus luteum. The relationship between pregnanediol excretion and ovulation or the onset of menstrual bleeding was studied. A new view is put forward on the influence of age and parity on the production of progesterone by the corpus luteum.


2018 ◽  
Vol 2 (2) ◽  
pp. 70-82 ◽  
Author(s):  
Binglu Wang ◽  
Yi Bu ◽  
Win-bin Huang

AbstractIn the field of scientometrics, the principal purpose for author co-citation analysis (ACA) is to map knowledge domains by quantifying the relationship between co-cited author pairs. However, traditional ACA has been criticized since its input is insufficiently informative by simply counting authors’ co-citation frequencies. To address this issue, this paper introduces a new method that reconstructs the raw co-citation matrices by regarding document unit counts and keywords of references, named as Document- and Keyword-Based Author Co-Citation Analysis (DKACA). Based on the traditional ACA, DKACA counted co-citation pairs by document units instead of authors from the global network perspective. Moreover, by incorporating the information of keywords from cited papers, DKACA captured their semantic similarity between co-cited papers. In the method validation part, we implemented network visualization and MDS measurement to evaluate the effectiveness of DKACA. Results suggest that the proposed DKACA method not only reveals more insights that are previously unknown but also improves the performance and accuracy of knowledge domain mapping, representing a new basis for further studies.


Atmosphere ◽  
2021 ◽  
Vol 12 (4) ◽  
pp. 414
Author(s):  
Long Zhang ◽  
Bert Van Schaeybroeck ◽  
Steven Caluwaerts ◽  
Piet Termonia ◽  
Nico Van de Weghe

El Niño influences the global climate through teleconnections that are not constant in space and time. In order to study and visualize the spatiotemporal patterns of the El Niño teleconnections, a new method inspired by the concept of attribute trajectories is proposed. The coordinates of the trajectories are the normalized anomalies of the relevant meteorological variables in El Niño. The data structures called flocks are extracted from the trajectories to indicate the regions that are subject to the same type of El Niño teleconnection for a certain period. It is then shown how these structures can be used to get a detailed, spatiotemporal picture of the dynamics of the El Niño teleconnections. The comparison between the flocks of the same temporal scale reveals the general dynamics of the teleconnection, while the analysis among the flocks of different temporal scales indicates the relationship between the coverage and their duration. As an illustration of this method, the spatiotemporal patterns of the anomalous temperature increase caused by El Niño are presented and discussed at the monthly and seasonal scales. This study demonstrates the capability of the proposed method in analyzing and visualizing the spatiotemporal patterns of the teleconnections.


During the last few years of his life Prof. Simon Newcomb was keenly interested in the problem of periodicities, and devised a new method for their investigation. This method is explained, and to some extent applied, in a paper entitled "A Search for Fluctuations in the Sun's Thermal Radiation through their Influence on Terrestrial Temperature." The importance of the question justifies a critical examination of the relationship of the older methods to that of Newcomb, and though I do not agree with his contention that his process gives us more than can be obtained from Fourier's analysis, it has the advantage of great simplicity in its numerical work, and should prove useful in a certain, though I am afraid, very limited field. Let f ( t ) represent a function of a variable which we may take to be the time, and let the average value of the function be zero. Newcomb examines the sum of the series f ( t 1 ) f ( t 1 + τ) + f ( t 2 ) f ( t 2 + τ) + f ( t 3 ) f ( t 3 + τ) + ..., where t 1 , t 2 , etc., are definite values of the variable which are taken to lie at equal distances from each other. If the function be periodic so as to repeat itself after an interval τ, the products are all squares and each term is positive. If, on the other hand, the periodic time be 2τ, each product will be negative and the sum itself therefore negative. It is easy to see that if τ be varied continuously the sum of the series passes through maxima and minima, and the maxima will indicated the periodic time, or any of its multiples.


1992 ◽  
Vol 263 (2) ◽  
pp. E400-E415 ◽  
Author(s):  
A. Mari

A simple tracer-based method for calculating the rate of appearance of endogenous substances in the non-steady state, free from the inconsistencies of Steele's equation, is still lacking. This paper presents a method based on a two-compartment model by which the rate of appearance can be calculated with only a modest increase in complexity over Steele's approach. An equation is developed where the rate of appearance is expressed as a sum of three terms: a steady-state term, a term for the first compartment, and a term for the second compartment. The formula employs three parameters and makes the relationship between rate of appearance and specific activity changes explicit. An equation is also provided for estimating the error of the method in each individual run. The algorithm can be implemented with a spreadsheet on a personal computer. Simulated and experimental data obtained by the hyperinsulinemic euglycemic glucose clamp technique were used as a test. The accuracy with which the time course of glucose production could be reconstructed was clearly better than that using Steele's equation. Marked negative values for endogenous glucose output were calculated with Steele's equation but not with the new method. The characteristics of generality, simplicity, and accuracy and the availability of an error estimate make this new method suitable for routine application to non-steady-state tracer analysis.


Author(s):  
Алексей Леонидович Сердечный ◽  
Павел Сергеевич Краюшкин ◽  
Михаил Андреевич Тарелкин ◽  
Юрий Константинович Язов

Статья посвящена моделированию компьютерных атак на распределённые корпоративные компьютерные системы, на примере действий группировки Advanced Persistent Threat 29 (APT29). В статье предлагается подход моделирования способов, реализуемых указанной группировкой, а также мер защиты от них. Подход основан на использовании аппарата сетей Петри, а также сведений о технических приёмах, предоставляемых в рамках проекта MITRE ATT&CK. Разработанные модели учитывают связи по условиям и последствиям действий, совершаемых группировкой APT29 в ходе атак на распределённые корпоративные системы. Также в статье продемонстрирована возможность наращивания модели за счёт включения в неё моделей мер защиты от рассмотренных способов реализации компьютерных атак. Предлагаемые модели могут быть дополнены за счёт моделирования новых способов реализации компьютерных атак, используемых другими кибергруппировками. Кроме того, модели могут быть расширены до моделей сети Петри-Маркова путём реализации частным методик расчёта вероятностно-временных характеристик для фрагментов предлагаемых моделей. The article is devoted to modeling computer attacks on distributed corporate computer systems, using the example of the actions of the Advanced Persistent Threat 29 (APT29) group. The article proposes an approach to modeling the methods implemented by this grouping, as well as measures to protect against them. The approach is based on Petri nets and information about the techniques (MITRE ATT&CK project). The developed models take into account the relationship between the conditions and consequences of actions committed by the APT29 group during attacks on distributed enterprise systems. The article also demonstrates the possibility of increasing the model by including models of protection measures against the considered methods of implementing computer attacks. The proposed models can be supplemented by modeling new ways of implementing computer attacks used by other cyber groups. In addition, the models can be extended to Petri-Markov network models by implementing special methods for calculating probabilistic-time characteristics for fragments of the proposed models.


Author(s):  
Lokesh Nandanwar ◽  
Palaiahnakote Shivakumara ◽  
Umapada Pal ◽  
Tong Lu ◽  
Daniel Lopresti ◽  
...  

As more and more office documents are captured, stored, and shared in digital format, and as image editing software are becoming increasingly more powerful, there is a growing concern about document authenticity. To prevent illicit activities, this paper presents a new method for detecting altered text in document images. The proposed method explores the relationship between positive and negative coefficients of DCT to extract the effect of distortions caused by tampering by fusing reconstructed images of respective positive and negative coefficients, which results in Positive-Negative DCT coefficients Fusion (PNDF). To take advantage of spatial information, we propose to fuse R, G, and B color channels of input images, which results in RGBF (RGB Fusion). Next, the same fusion operation is used for fusing PNDF and RGBF, which results in a fused image for the original input one. We compute a histogram to extract features from the fused image, which results in a feature vector. The feature vector is then fed to a deep neural network for classifying altered text images. The proposed method is tested on our own dataset and the standard datasets from the ICPR 2018 Fraud Contest, Altered Handwriting (AH), and faked IMEI number images. The results show that the proposed method is effective and the proposed method outperforms the existing methods irrespective of image type.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Rui Dan ◽  
Zhen Shi

PurposeObjective appraisal of pressure comfort is the key point of optimal designing of clothing. The purpose of this paper is to study a new method to provide pressure comfort for the waist of elastic pantyhose through the relationship between pressure and displacement using the finite element method (FEM).Design/methodology/approachThis paper presented a simulation model of the waist cross section consisting of three parts, namely skin, soft tissue and lumbar vertebrae, respectively, according to CT scan. The finite element the model of waist cross-section was established using Mimics software. The pressure–displacement quadratic equation can be obtained using ANSYS software and fitting curves. Meanwhile, we divide the waist cross-section into 12 equal regions according to angle, and then the area shrinkage mass of the waist cross-section can be calculated, respectively.FindingsIn this research work, we got the displacement distribution trend of elastic pantyhose at the waist cross section according to the area shrinkage mass of 12 regions, and this displacement could be used as an objective evaluation index for pressure comfort. All these solutions supply a theoretical reference for optimal design of the women's elastic pantyhose.Originality/valueThe paper analyzed the relationship between pressure and displacement for the waist of elastic pantyhose using FEM, and then got the displacement distribution trend of elastic pantyhose at the waist cross section according to the area shrinkage mass of different regions. It can supply a new method to appraise pressure comfort.


2013 ◽  
Vol 321-324 ◽  
pp. 757-761 ◽  
Author(s):  
Chen Liang Song ◽  
Zhen Liu ◽  
Bin Long ◽  
Cheng Lin Yang

According to the real-time prediction for performance degradation trend, the commonly used method is just based on field data. But this methods prediction result will not be so much ideal when the fitting of degradation trend of field data is not good. To solve the problem, the paper introduces a new method which is not only based on field method but also based on reliability experimental data coming from the history experiment. We use the relationship between the field data and reliability experimental data to get the result of the two kinds of data respectively and then get the weights according to the two prediction results. Finally, the final real-time prediction result for performance degradation tendency can obtain by allocating the weights to the two prediction results.


Sign in / Sign up

Export Citation Format

Share Document