5,357 research outputs found
The Mixed Methods Appraisal Tool (MMAT) version 2018 for information professionals and researchers
INTRODUCTION: Appraising the quality of studies included in systematic reviews combining qualitative and quantitative evidence is challenging. To address this challenge, a critical appraisal tool was developed: the Mixed Methods Appraisal Tool (MMAT). The aim of this paper is to present the enhancements made to the MMAT. DEVELOPMENT: The MMAT was initially developed in 2006 based on a literature review on systematic reviews combining qualitative and quantitative evidence. It was subject to pilot and interrater reliability testing. A revised version of the MMAT was developed in 2018 based on the results from usefulness testing, a literature review on critical appraisal tools and a modified e-Delphi study with methodological experts to identify core criteria. TOOL DESCRIPTION: The MMAT assesses the quality of qualitative, quantitative, and mixed methods studies. It focuses on methodological criteria and includes five core quality criteria for each of the following five categories of study designs: (a) qualitative, (b) randomized controlled, (c) nonrandomized, (d) quantitative descriptive, and (e) mixed methods. CONCLUSION: The MMAT is a unique tool that can be used to appraise the quality of different study designs. Also, by limiting to core criteria, the MMAT can provide a more efficient appraisal
On the exponential convergence of the Kaczmarz algorithm
The Kaczmarz algorithm (KA) is a popular method for solving a system of
linear equations. In this note we derive a new exponential convergence result
for the KA. The key allowing us to establish the new result is to rewrite the
KA in such a way that its solution path can be interpreted as the output from a
particular dynamical system. The asymptotic stability results of the
corresponding dynamical system can then be leveraged to prove exponential
convergence of the KA. The new bound is also compared to existing bounds
Cyber Threat Intelligence : Challenges and Opportunities
The ever increasing number of cyber attacks requires the cyber security and
forensic specialists to detect, analyze and defend against the cyber threats in
almost realtime. In practice, timely dealing with such a large number of
attacks is not possible without deeply perusing the attack features and taking
corresponding intelligent defensive actions, this in essence defines cyber
threat intelligence notion. However, such an intelligence would not be possible
without the aid of artificial intelligence, machine learning and advanced data
mining techniques to collect, analyse, and interpret cyber attack evidences. In
this introductory chapter we first discuss the notion of cyber threat
intelligence and its main challenges and opportunities, and then briefly
introduce the chapters of the book which either address the identified
challenges or present opportunistic solutions to provide threat intelligence.Comment: 5 Page
NIPS - Not Even Wrong? A Systematic Review of Empirically Complete Demonstrations of Algorithmic Effectiveness in the Machine Learning and Artificial Intelligence Literature
Objective: To determine the completeness of argumentative steps necessary to
conclude effectiveness of an algorithm in a sample of current ML/AI supervised
learning literature.
Data Sources: Papers published in the Neural Information Processing Systems
(NeurIPS, n\'ee NIPS) journal where the official record showed a 2017 year of
publication.
Eligibility Criteria: Studies reporting a (semi-)supervised model, or
pre-processing fused with (semi-)supervised models for tabular data.
Study Appraisal: Three reviewers applied the assessment criteria to determine
argumentative completeness. The criteria were split into three groups,
including: experiments (e.g real and/or synthetic data), baselines (e.g
uninformed and/or state-of-art) and quantitative comparison (e.g. performance
quantifiers with confidence intervals and formal comparison of the algorithm
against baselines).
Results: Of the 121 eligible manuscripts (from the sample of 679 abstracts),
99\% used real-world data and 29\% used synthetic data. 91\% of manuscripts did
not report an uninformed baseline and 55\% reported a state-of-art baseline.
32\% reported confidence intervals for performance but none provided references
or exposition for how these were calculated. 3\% reported formal comparisons.
Limitations: The use of one journal as the primary information source may not
be representative of all ML/AI literature. However, the NeurIPS conference is
recognised to be amongst the top tier concerning ML/AI studies, so it is
reasonable to consider its corpus to be representative of high-quality
research.
Conclusion: Using the 2017 sample of the NeurIPS supervised learning corpus
as an indicator for the quality and trustworthiness of current ML/AI research,
it appears that complete argumentative chains in demonstrations of algorithmic
effectiveness are rare
Resilient Distributed Optimization Algorithms for Resource Allocation
Distributed algorithms provide flexibility over centralized algorithms for
resource allocation problems, e.g., cyber-physical systems. However, the
distributed nature of these algorithms often makes the systems susceptible to
man-in-the-middle attacks, especially when messages are transmitted between
price-taking agents and a central coordinator. We propose a resilient strategy
for distributed algorithms under the framework of primal-dual distributed
optimization. We formulate a robust optimization model that accounts for
Byzantine attacks on the communication channels between agents and coordinator.
We propose a resilient primal-dual algorithm using state-of-the-art robust
statistics methods. The proposed algorithm is shown to converge to a
neighborhood of the robust optimization model, where the neighborhood's radius
is proportional to the fraction of attacked channels.Comment: 15 pages, 1 figure, accepted to CDC 201
Non-stationary quantum walks on the cycle
We consider quantum walks on the cycle in the non-stationary case where the
`coin' operation is allowed to change at each time step. We characterize, in
algebraic terms, the set of possible state transfers and prove that, as opposed
to the stationary case, it is possible to asymnptotically reach a uniform
distribution among the nodes of the associated graph.Comment: Revised version with minor change
- …