23,801 research outputs found

    The Research Space: using the career paths of scholars to predict the evolution of the research output of individuals, institutions, and nations

    Full text link
    In recent years scholars have built maps of science by connecting the academic fields that cite each other, are cited together, or that cite a similar literature. But since scholars cannot always publish in the fields they cite, or that cite them, these science maps are only rough proxies for the potential of a scholar, organization, or country, to enter a new academic field. Here we use a large dataset of scholarly publications disambiguated at the individual level to create a map of science-or research space-where links connect pairs of fields based on the probability that an individual has published in both of them. We find that the research space is a significantly more accurate predictor of the fields that individuals and organizations will enter in the future than citation based science maps. At the country level, however, the research space and citations based science maps are equally accurate. These findings show that data on career trajectories-the set of fields that individuals have previously published in-provide more accurate predictors of future research output for more focalized units-such as individuals or organizations-than citation based science maps

    The Challenges in SDN/ML Based Network Security : A Survey

    Full text link
    Machine Learning is gaining popularity in the network security domain as many more network-enabled devices get connected, as malicious activities become stealthier, and as new technologies like Software Defined Networking (SDN) emerge. Sitting at the application layer and communicating with the control layer, machine learning based SDN security models exercise a huge influence on the routing/switching of the entire SDN. Compromising the models is consequently a very desirable goal. Previous surveys have been done on either adversarial machine learning or the general vulnerabilities of SDNs but not both. Through examination of the latest ML-based SDN security applications and a good look at ML/SDN specific vulnerabilities accompanied by common attack methods on ML, this paper serves as a unique survey, making a case for more secure development processes of ML-based SDN security applications.Comment: 8 pages. arXiv admin note: substantial text overlap with arXiv:1705.0056

    The Faculty Notebook, September 2015

    Full text link
    The Faculty Notebook is published periodically by the Office of the Provost at Gettysburg College to bring to the attention of the campus community accomplishments and activities of academic interest. Faculty are encouraged to submit materials for consideration for publication to the Associate Provost for Faculty Development. Copies of this publication are available at the Office of the Provost

    EVALUATION OF CURRICULUM 2013 IMPLEMENTATION IN ELEMENTARY SCHOOLS

    Get PDF
    This research aims to contribute several ideas towards the implementation of the 2013 curriculum for elementary school teachers in Palembang. This descriptive qualitative research used interviews and questionnaires as data collection techniques. The results of the 2013 Curriculum implementation evaluation research were related to the constraints of teachers in implementing the 2013 curriculum. The benefits of this research are the data analyzed with arguments descriptively. The results of the study found obstacles and obstacles to the implementation of the 2013 curriculum for schools and teachers towards the mastery of science and technology, the creation of instructional media, evaluation of learning and the limitations of facilities and infrastructure so that the implementation of the 2013 curriculum could only be carried out in 2018/2019. Solutions are needed in the form of providing adequate training and workshops for teachers and education personnel. Provide the necessary facilities and infrastructure and develop technology-based assessment systems
    corecore