scholarly journals Spatial Statistical Models: An Overview under the Bayesian Approach

Axioms ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 307
Author(s):  
Francisco Louzada ◽  
Diego Carvalho do Nascimento ◽  
Osafu Augustine Egbon

Spatial documentation is exponentially increasing given the availability of Big Data in the Internet of Things, enabled by device miniaturization and data storage capacity. Bayesian spatial statistics is a useful statistical tool to determine the dependence structure and hidden patterns in space through prior knowledge and data likelihood. However, this class of modeling is not yet well explored when compared to adopting classification and regression in machine-learning models, in which the assumption of the spatiotemporal independence of the data is often made, that is an inexistent or very weak dependence. Thus, this systematic review aims to address the main models presented in the literature over the past 20 years, identifying the gaps and research opportunities. Elements such as random fields, spatial domains, prior specification, the covariance function, and numerical approximations are discussed. This work explores the two subclasses of spatial smoothing: global and local.

2018 ◽  
Vol 6 (3) ◽  
pp. 359-363
Author(s):  
A. Saxena ◽  
◽  
S. Sharma ◽  
S. Dangi ◽  
A. Sharma ◽  
...  

2021 ◽  
Vol 155 ◽  
pp. 107174 ◽  
Author(s):  
Jianxin Wang ◽  
Ming K. Lim ◽  
Chao Wang ◽  
Ming-Lang Tseng

2008 ◽  
Vol 15 (1) ◽  
pp. 56-69 ◽  
Author(s):  
Kristian Kristiansen

When I agreed to present the article as a vehicle for discussion at a session at the EAA's annual meeting in Zadar, Croatia, I decided to approach the question of a European archaeology from what I considered to be the three organizing pillars of archaeological practice: heritage, theory and publications. Heritage is the dominant organizational/legislative framework for archaeological practice, and it is where most of the money is spent. Theory, on the other hand, organizes most of our interpretations of the past, while publications are still the most common way of presenting the results of both heritage work (mostly excavations) and interpretations of that work. In this way I hoped to have encircled the dominant parameters for a diagnosis of the archaeological landscapes in Europe. I assumed that there might be some correlation between the three, and that such observed common trends within two or more variables would strengthen the argument, to paraphrase processual jargon.


2021 ◽  
Vol 37 (3) ◽  
pp. 585-617
Author(s):  
Teresa Bono ◽  
Karen Croxson ◽  
Adam Giles

Abstract The use of machine learning as an input into decision-making is on the rise, owing to its ability to uncover hidden patterns in large data and improve prediction accuracy. Questions have been raised, however, about the potential distributional impacts of these technologies, with one concern being that they may perpetuate or even amplify human biases from the past. Exploiting detailed credit file data for 800,000 UK borrowers, we simulate a switch from a traditional (logit) credit scoring model to ensemble machine-learning methods. We confirm that machine-learning models are more accurate overall. We also find that they do as well as the simpler traditional model on relevant fairness criteria, where these criteria pertain to overall accuracy and error rates for population subgroups defined along protected or sensitive lines (gender, race, health status, and deprivation). We do observe some differences in the way credit-scoring models perform for different subgroups, but these manifest under a traditional modelling approach and switching to machine learning neither exacerbates nor eliminates these issues. The paper discusses some of the mechanical and data factors that may contribute to statistical fairness issues in the context of credit scoring.


2015 ◽  
Vol 11 (6) ◽  
pp. 28 ◽  
Author(s):  
Ken Cai ◽  
Fenglian Tie ◽  
Haoran Huang ◽  
Hanhui Lin ◽  
Huazhou Chen

By analyzing the current situation of experimental platforms which is based on the Internet of Things (IOT) and the cultivation of talents, we established the talents' cultivating orientation and experiment platform for innovation. In accordance with the requirements of a students' practical and creative ability curriculum, the method of modularization was adopted to design this platform. With this, the platform can basically satisfy the needs of the varying teaching experiments, which can increase opportunities for the students on their comprehensive application. The platform was widely used in experimental and practice teaching in the past three years, such as synthetic experiment, graduate programs, and practice project in Zhongkai University of Agriculture and Engineering, Guilin University of Technology etc. Result shows that the innovation experimental platform has broad application prospects, and effectiveness to meet the requirements of students' in-depth learning and research of IOT technologies. Meanwhile, the platform expanded the students' basic understanding of IOT and improved their innovation.


Author(s):  
Joseba Agirreazkuenaga

In order to establish and consolidate the themes and ways of writing history, historians must be attentive to the global and local public agenda. Empowered lives - Resilient nations is a program for human development promoted by the UN. As long as there are local powers and local communities it will be necessary to carry out biographical-local research, analyzing these powers and communities in the past and present, establishing resilience patterns. We transform the historical research of the local past into global history. The personal and the political cannot be dissociated because “The personal is political and the political is personal”. Even eating is a political practice in today’s globalized world.


2021 ◽  
Vol 3 (1) ◽  
Author(s):  
Dylan Rafferty ◽  
Kevin Curran

Cyber security breaches are on the rise globally. Due to the introduction of legislation like the EU’s General Data Protection Regulation (GDPR), companies are now subject to further financial penalties if they fail to meet requirements in protecting user information.  In 2018, 75% of CEOs and board members considered cyber security and technology acquisitions among their top priorities, and blockchain based solutions were among the most considered options. Blockchain is a decentralised structure that offers multiple security benefits over traditional, centralised network architectures. These two approaches are compared in this chapter in areas such as data storage, the Internet of Things (IoT) and Domain Name System (DNS) in order to determine blockchain’s potential in the future of cyber security.


Author(s):  
Hala A. Naman ◽  
Naseer Ali Hussien ◽  
Mohand Lokman Al-dabag ◽  
Haider Th.Salim Alrikabi

<p class="0abstract">One of the unexpected intelligence tactics known in World War II was to conceal the data in images that were reduced to the size of a point that was used in every text and transported in front of the enemy's eyes. In the new age, and after the expansion of Internet science and the use of the Internet worldwide, we will establish a security feature of the IOT service that will work more reliably and more effectively to deal with the Internet of Things and ensure the work of the services that the customer interacts with. A secret-key stenographic scheme that embeds four gray-scale secret size (128*128) pixel images into a size (512*512) pixel cover image in this work. Wavelet transform is the method used in this project to analyze the cover into its frequency components. In this work, combinations of steganography and cryptography were made to increase the level of safety and make the device more difficult for attackers to beat. The resulting stego-image that will be transmitted did not raise any suspicion by both objective and subjective evaluation, so the primary objective of Steganography is achieved. The proposed system was designed by using (MATLAB R2018b) and running on a Pentium-4 computer. The Internet of Things works with the encryption system for data in a synchronized manner with the technological development, and in order to maintain the stability of any Internet of things service, whether it is information signal services, visual or audio data, a remote control system, or data storage in the Internet cloud, we must focus on data preservation from internet pirates and internet system hackers. The picture Figure<strong> </strong>4 below shows the method of encryption and dealing with the Internet of things system..</p>


2021 ◽  
Vol 27 (4) ◽  
pp. 188-194
Author(s):  
D. V. Malakhovetsky ◽  
◽  
A. I. Razumowsky ◽  

Parsing character arrays by recursive scoping and structuring using the example of VRML data. The article presents a new method for structuring, segmentation and algorithmic design of the parser of character arrays using the example of VRML data. The key feature of the method is the ability to form a hierarchically complex object by means of recursive data structuring, which makes it possible to cover in aggregate the entire contents of the object, including its arbitrary nesting of child objects. This leads to high controllability of the development of the parsing algorithm, allowing you to focus each time on a specific piece of data, while not losing sight of the entire aggregate connectivity of information. The results obtained can easily be used in plans for creating convenient data storage structures related to information security, solving the problem of containing the amount of data in files, managing big data in heterogeneous systems, and processing hierarchical data in the Internet of Things. Keywords: data analysis method, parsing, structuring, se


Sign in / Sign up

Export Citation Format

Share Document