2,634 research outputs found

    Record Duplication Detection in Database: A Review

    Get PDF
    The recognition of similar entities in databases has gained substantial attention in many application areas. Despite several techniques proposed to recognize and locate duplication of database records, there is a dearth of studies available which rate the effectiveness of the diverse techniques used for duplicate record detection. Calculating time complexity of the proposed methods reveals their performance rating. The time complexity calculation showed that the efficiency of these methods improved when blocking and windowing is applied. Some domain-specific methods train systems to optimize results and improve efficiency and scalability, but they are prone to errors. Most of the existing methods fail to either discuss, or lack thoroughness in consideration of scalability. The process of sorting and searching form an essential part of duplication detection, but they are time-consuming. Therefore this paper proposes the possibility of eliminating the sorting process by utilization of tree structure to improve the record duplication detection. This has added benefits of reducing time required, and offers a probable increase in scalability. For database system, scalability is an inherent feature for any proposed solution, due to the fact that the data size is huge. Improving the efficiency in identifying duplicate records in databases is an essential step for data cleaning and data integration methods. This paper reveals that the current proposed methods lack in providing solutions that are scalable, high accurate, and reduce the processing time during detecting duplication of records in database. The ability to provide solutions to this problem will improve the quality of data that are used for decision making process

    Impact Factor: outdated artefact or stepping-stone to journal certification?

    Full text link
    A review of Garfield's journal impact factor and its specific implementation as the Thomson Reuters Impact Factor reveals several weaknesses in this commonly-used indicator of journal standing. Key limitations include the mismatch between citing and cited documents, the deceptive display of three decimals that belies the real precision, and the absence of confidence intervals. These are minor issues that are easily amended and should be corrected, but more substantive improvements are needed. There are indications that the scientific community seeks and needs better certification of journal procedures to improve the quality of published science. Comprehensive certification of editorial and review procedures could help ensure adequate procedures to detect duplicate and fraudulent submissions.Comment: 25 pages, 12 figures, 6 table

    Recognition of Characters from Streaming Videos

    Get PDF
    Non

    Citation Databases for Legal Scholarship

    Get PDF
    Traditional citation sources, such as Web of Science, index limited numbers of law journals. Consequently, although not designed for generating scholarship citation metrics, many law scholarship citation studies use law-specific databases like Westlaw or LexisNexis to gather citations. This article compares citation metrics derived from Web of Science and Westlaw to metrics derived from Google Scholar and HeinOnline’s citation tools. The study finds that HeinOnline and Westlaw generate higher metrics than Web of Science, and Google Scholar generates higher metrics than both. However, metrics from all four sources are highly correlated, so rankings generated from any may be very similar

    Temporal tracking of mineralization and transcriptional developments of shell formation during the early life history of pearl oyster Pinctada maxima

    Get PDF
    Molluscan larval ontogeny is a highly conserved process comprising three principal developmental stages. A characteristic unique to each of these stages is shell design, termed prodissoconch I, prodissoconch II and dissoconch. These shells vary in morphology, mineralogy and microstructure. The discrete temporal transitions in shell biomineralization between these larval stages are utilized in this study to investigate transcriptional involvement in several distinct biomineralization events. Scanning electron microscopy and X-ray diffraction analysis of P. maxima larvae and juveniles collected throughout post-embryonic ontogenesis, document the mineralogy and microstructure of each shelled stage as well as establishing a timeline for transitions in biomineralization. P. maxima larval samples most representative of these biomineralization distinctions and transitions were analyzed for differential gene expression on the microarray platform PmaxArray 1.0. A number of transcripts are reported as differentially expressed in correlation to the mineralization events of P. maxima larval ontogeny. Some of those isolated are known shell matrix genes while others are novel; these are discussed in relation to potential shell formation roles. This interdisciplinary investigation has linked the shell developments of P. maxima larval ontogeny with corresponding gene expression profiles, furthering the elucidation of shell biomineralization

    Total or near-total thyroidectomy versus subtotal thyroidectomy for multinodular non-toxic goitre in adults

    Get PDF
    Background Total thyroidectomy (TT) and subtotal thyroidectomy (ST) are worldwide treatment options for multinodular non-toxic goitre in adults. Near TT, defined as a postoperative thyroid remnant less than 1 mL, is supposed to be a similarly effective but safer option than TT. ST has been shown to be marginally safer than TT, but it may leave an undetected thyroid cancer in place. Objectives The objective was to assess the effects of total or near-total thyroidectomy compared to subtotal thyroidectomy for multinodular non-toxic goitre. Search methods We searched the Cochrane Library, MEDLINE, PubMed, EMBASE, as well as the ICTRP Search Portal and ClinicalTrials.gov. The date of the last search was 18 June 2015 for all databases. No language restrictions were applied. Selection criteria Two review authors independently scanned the abstract, title or both sections of every record retrieved to identify randomised controlled trials (RCTs) on thyroidectomy for multinodular non-toxic goitre for further assessment. Data collection and analysis Two review authors independently extracted data, assessed studies for risk of bias and evaluated overall study quality utilising the GRADE instrument. We calculated the odds ratio (OR) and corresponding 95% confidence interval (CI) for dichotomous outcomes. A random-effects model was used for pooling data. Main results We examined 1430 records, scrutinized 14 full-text publications and included four RCTs. Altogether 1305 participants entered the four trials, 543 participants were randomised to TT and 762 participants to ST. A total of 98% and 97% of participants finished the trials in the TT and ST groups, respectively. Two trials had a duration of follow-up between 12 and 39 months and two trials a follow-up of 5 and 10 years, respectively. Risk of bias across studies was mainly unknown for selection, performance and detection bias. Attrition bias was generally low and reporting bias high for some outcomes. In the short-term postoperative period no deaths were reported for both TT and ST groups. However, longer-term data on all-cause mortality were not reported (1284 participants; 4 trials; moderate quality evidence). Goiter recurrence was lower in the TT group compared to ST. Goiters recurred in 0.2% (1/425) of the TT group compared to 8.4% (53/632) of the ST group (OR 0.05 (95% CI 0.01 to 0.21); P < 0.0001; 1057 participants; 3 trials; moderate quality evidence). Re-intervention due to goitre recurrence was lower in the TT group compared to ST. Re-intervention was necessary in 0.5% (1/191) of TT patients compared to 0.8% (3/379)of ST patients (OR 0.66 (95% CI 0.07 to 6.38); P = 0.72; 570 participants; 1 trial; low quality evidence). The incidence of permanent recurrent laryngeal nerve palsy was lower for ST compared with TT. Permanent recurrent laryngeal nerve palsy occurred in 0.8% (6/741) of ST patients compared to 0.7% (4/543) of TT patients (OR 1.28, (95% CI 0.38 to 4.36); P = 0.69; 1275 participants; 4 trials; low quality evidence). The incidence of permanent hypoparathyroidism was lower for ST compared with TT. Permanent hypoparathyroidism occurred in 0.1% (1/741) of ST patients compared to 0.6% (3/543) of TT patients (OR 3.09 (95% CI 0.45 to 21.36); P = 0.25; 1275 participants: 4 trials; low quality evidence). The incidence of thyroid cancer was lower for ST compared with TT. Thyroid cancer occurred in 6.1% (41/669) of ST patients compared to 7.3% (34/465)of TT patients (OR 1.32 (95% CI 0.81 to 2.15); P = 0.27; 1134 participants; 3 trials; low quality evidence). No data on health-related quality of life or socioeconomic effects were reported in the included studies. Authors' conclusions The body of evidence on TT compared with ST is limited. Goiter recurrence is reduced following TT. The effects on other key outcomes such as re-interventions due to goitre recurrence, adverse events and thyroid cancer incidence are uncertain. New long-term RCTs with additional data such as surgeons level of experience, treatment volume of surgical centres and details on techniques used are needed

    Image and Video Forensics

    Get PDF
    Nowadays, images and videos have become the main modalities of information being exchanged in everyday life, and their pervasiveness has led the image forensics community to question their reliability, integrity, confidentiality, and security. Multimedia contents are generated in many different ways through the use of consumer electronics and high-quality digital imaging devices, such as smartphones, digital cameras, tablets, and wearable and IoT devices. The ever-increasing convenience of image acquisition has facilitated instant distribution and sharing of digital images on digital social platforms, determining a great amount of exchange data. Moreover, the pervasiveness of powerful image editing tools has allowed the manipulation of digital images for malicious or criminal ends, up to the creation of synthesized images and videos with the use of deep learning techniques. In response to these threats, the multimedia forensics community has produced major research efforts regarding the identification of the source and the detection of manipulation. In all cases (e.g., forensic investigations, fake news debunking, information warfare, and cyberattacks) where images and videos serve as critical evidence, forensic technologies that help to determine the origin, authenticity, and integrity of multimedia content can become essential tools. This book aims to collect a diverse and complementary set of articles that demonstrate new developments and applications in image and video forensics to tackle new and serious challenges to ensure media authenticity
    corecore