Search results for " data mining."

showing 10 items of 30 documents

Unlock ways to share data on peer review

2020

Peer review is the defining feature of scholarly communication. In a 2018 survey of more than 11, 000 researchers, 98% said that they considered peer review important or extremely important for ensuring the quality and integrity of scholarly communication.

0303 health sciencesMultidisciplinarybusiness.industry05 social sciencesdata miningPublic relations050905 science studiesResearch managementBibliometrics ; Scientometrics ; Research Integrity03 medical and health sciencesWork (electrical)Publishingpeer review data miningpeer reviewSociology0509 other social sciencesbusiness030304 developmental biology
researchProduct

Analysing the presence of school-shooting related communities at social media sites

2010

Surprisingly cruel mass murders and attacks have been witnessed in the educational institutions of the Western world since the 1970s. These are often referred to as 'school shootings'. There have been over 300 known incidents around the world and the number is growing. Social network sites (SNSs) have enabled the perpetrators to express their views and intentions. Our result is that since about 2005, all major school shooters have had a presence in SNS and some have left traces that would have made possible to evaluate their intentions to carry out a rampage. A further hypothesis is that future school shooters will behave in a similar manner and would thus be traceable in the digital sphere…

GeographySocial media miningSocial networkbusiness.industryOntologyWestern worldSocial mediaCriminologyMultimedia data miningRelation (history of concept)businessSocial psychologyInternational Journal of Multimedia Intelligence and Security
researchProduct

Reverse-safe data structures for text indexing

2021

We introduce the notion of reverse-safe data structures. These are data structures that prevent the reconstruction of the data they encode (i.e., they cannot be easily reversed). A data structure D is called z-reverse-safe when there exist at least z datasets with the same set of answers as the ones stored by D. The main challenge is to ensure that D stores as many answers to useful queries as possible, is constructed efficiently, and has size close to the size of the original dataset it encodes. Given a text of length n and an integer z, we propose an algorithm which constructs a z-reverse-safe data structure that has size O(n) and answers pattern matching queries of length at most d optim…

050101 languages & linguisticsComputer sciencedata structure02 engineering and technologyprivacySet (abstract data type)combinatoric0202 electrical engineering electronic engineering information engineering0501 psychology and cognitive sciencesPattern matchingSettore ING-INF/05 - Sistemi Di Elaborazione Delle InformazionialgorithmSettore INF/01 - Informatica05 social sciencesSearch engine indexingINF/01 - INFORMATICAdata miningData structureMatrix multiplicationcombinatoricsExponent020201 artificial intelligence & image processingdata structure; algorithm; combinatorics; de Bruijn graph; data mining; privacyAlgorithmAdversary modelde Bruijn graphInteger (computer science)
researchProduct

The Urban Landscape and the Real Estate Market. Structures and Fragments of the Axiological Tessitura in a Wide Urban Area of Palermo

2016

The proposed study deals with the urban landscape of Palermo and its possible representation from the perspective of the real estate market analysis. Real estate is one of the most significant types of capital asset and the wide range of its possible utilizations makes complex the interpretation of the market phenomena. The multi-layered reality of such a large city (represented through the sample of 500 properties) needs to be articulated into a significant set of sub-markets in order to outline the complexity and to map the distribution of homogeneous groups of properties within the whole city area. The comparison between quality and price within each cluster allows us to elicit the degre…

Cluster analysisUrban landscape Real estate market Data mining Cluster analysis Urban regenerationUrban regenerationSettore ICAR/22 - EstimoUrban landscapeData miningReal estate market
researchProduct

Contribution of virtual reality to functional rehabilitation

2010

Virtual reality has grown immensely. Practical applications for the use of this technology encompass many fields in both engineering science and human science. In the field of medicine, one of the newest fields to benefit from the advances in VR technology, virtual reality has become a major new therapeutic tool not only in medicine and surgery but also for the treatment of psychological disorders and rehabilitation for impaired person. Our research presented in this thesis aims at developing utilities to aid in functional rehabilitation using virtual reality technology. The main research question of our work concerns the effect of virtual metaphors in learning and training human gestures f…

Time-series data mining.Evaluation d'utilisabilité de l'environnement[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processing[INFO.INFO-TS] Computer Science [cs]/Signal and Image Processing[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingRééducation motriceVirtual realityHuman motion evaluationRéalité virtuelleEvaluation de mouvement[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingMotor rehabilitationFouille de données chronologiqueEvaluate the usability of virtual environment[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Fragments of peer review: A quantitative analysis of the literature (1969-2015)

2018

This paper examines research on peer review between 1969 and 2015 by looking at records indexed from the Scopus database. Although it is often argued that peer review has been poorly investigated, we found that the number of publications in this field doubled from 2005. A half of this work was indexed as research articles, a third as editorial notes and literature reviews and the rest were book chapters or letters. We identified the most prolific and influential scholars, the most cited publications and the most important journals in the field. Co-authorship network analysis showed that research on peer review is fragmented, with the largest group of co-authors including only 2.1% of the wh…

0301 basic medicineScience and Technology WorkforceResearch Quality Assessmentlcsh:MedicineCareers in ResearchPeer review co-authorship collaboration communityCitation analysisCentralityData MiningSociologylcsh:ScienceMultidisciplinary05 social sciencesScientometricsco-authorshipResearch AssessmentKnowledge sharingProfessionsCitation AnalysiscommunityNetwork AnalysisResearch ArticleComputer and Information SciencesScience PolicyAbstracting and IndexingPeer ReviewAbstracting and Indexing as Topic ; Animals ; Data Mining ; Databases Bibliographic ; History 20th Century ; History 21st Century ; Humans ; Peer ReviewScopusLibrary science050905 science studiesResearch and Analysis MethodsHistory 21st Century03 medical and health sciencesAnimalsHumansScientific Publishinglcsh:RScientometricsHistory 20th CenturyDatabases Bibliographiccollaboration030104 developmental biologyQuantitative analysis (finance)People and PlacesScientistslcsh:QPopulation Groupings0509 other social sciencesScientific publishingCentrality
researchProduct

Speeding up the Consensus Clustering methodology for microarray data analysis

2010

Abstract Background The inference of the number of clusters in a dataset, a fundamental problem in Statistics, Data Analysis and Classification, is usually addressed via internal validation measures. The stated problem is quite difficult, in particular for microarrays, since the inferred prediction must be sensible enough to capture the inherent biological structure in a dataset, e.g., functionally related genes. Despite the rich literature present in that area, the identification of an internal validation measure that is both fast and precise has proved to be elusive. In order to partially fill this gap, we propose a speed-up of Consensus (Consensus Clustering), a methodology whose purpose…

Settore INF/01 - Informaticalcsh:QH426-470Computer scienceResearchApplied MathematicsStability (learning theory)InferenceApproximation algorithmcomputer.software_genreNon-negative matrix factorizationIdentification (information)lcsh:GeneticsComputingMethodologies_PATTERNRECOGNITIONComputational Theory and Mathematicslcsh:Biology (General)Structural BiologyConsensus clusteringBenchmark (computing)Data mininginternal validation measures data mining microarray data NMFCluster analysiscomputerMolecular Biologylcsh:QH301-705.5Algorithms for Molecular Biology
researchProduct

Rings for Privacy: an Architecture for Large Scale Privacy-Preserving Data Mining

2021

This article proposes a new architecture for privacy-preserving data mining based on Multi Party Computation (MPC) and secure sums. While traditional MPC approaches rely on a small number of aggregation peers replacing a centralized trusted entity, the current study puts forth a distributed solution that involves all data sources in the aggregation process, with the help of a single server for storing intermediate results. A large-scale scenario is examined and the possibility that data become inaccessible during the aggregation process is considered, a possibility that traditional schemes often neglect. Here, it is explicitly examined, as it might be provoked by intermittent network connec…

020203 distributed computingInformation privacyDistributed databasesDistributed databaseSettore ING-INF/03 - TelecomunicazioniComputer scienceReliability (computer networking)Secure Multi-Party Computation02 engineering and technologycomputer.software_genreSecret sharingData Mining; Data privacy; Distributed databases; Peer-to-peer computing; Secret sharing; Secure Multi-Party ComputationComputational Theory and MathematicsHardware and ArchitectureServerSignal Processing0202 electrical engineering electronic engineering information engineeringSecure multi-party computationData MiningData miningPeer-to-peer computingC-means data mining Privacy secret sharing secure multi-party computationSecret sharingcomputerData privacy
researchProduct

Visual Data Mining With Self-organizing Maps for “Self-monitoring” Data Analysis

2016

Data collected in psychological studies are mainly characterized by containing a large number of variables (multidimensional data sets). Analyzing multidimensional data can be a difficult task, especially if only classical approaches are used (hypothesis tests, analyses of variance, linear models, etc.). Regarding multidimensional models, visual techniques play an important role because they can show the relationships among variables in a data set. Parallel coordinates and Chernoff faces are good examples of this. This article presents self-organizing maps (SOM), a multivariate visual data mining technique used to provide global visualizations of all the data. This technique is presented as…

Self-organizing mapSociology and Political ScienceComputer scienceself-organizing mapscomputer.software_genreTask (project management)tutorial03 medical and health sciences0302 clinical medicinevisual data mining030212 general & internal medicinePersonalitat sociopatològicaArtificial neural networkCognitive restructuringMultidimensional dataData sciencePsicologiaSelf-monitoringEarly adolescentsdata scienceData miningartificial neural networkscomputer030217 neurology & neurosurgerySocial Sciences (miscellaneous)Sociological Methods & Research
researchProduct

Tracing Potential School Shooters in the Digital Sphere

2010

There are over 300 known school shooting cases in the world and over ten known cases where the perpetrator(s) have been prohibited to perform the attack at the last moment or earlier. Interesting from our point of view is that in many cases the perpetrators have expressed their views in social media or on their web page well in advance, and often also left suicide messages in blogs and other forums before their attack, along the planned date and place. This has become more common towards the end of this decennium. In some cases this has made it possible to prevent the attack. In this paper we will look at the possibilities to find commonalities of the perpetrators, beyond the fact that they…

World Wide WebSocial networkPoint (typography)business.industryComputer scienceOrder (business)Internet privacyWeb pageSocial mediaTracingMultimedia data miningbusiness
researchProduct