23,801 research outputs found
The Research Space: using the career paths of scholars to predict the evolution of the research output of individuals, institutions, and nations
In recent years scholars have built maps of science by connecting the
academic fields that cite each other, are cited together, or that cite a
similar literature. But since scholars cannot always publish in the fields they
cite, or that cite them, these science maps are only rough proxies for the
potential of a scholar, organization, or country, to enter a new academic
field. Here we use a large dataset of scholarly publications disambiguated at
the individual level to create a map of science-or research space-where links
connect pairs of fields based on the probability that an individual has
published in both of them. We find that the research space is a significantly
more accurate predictor of the fields that individuals and organizations will
enter in the future than citation based science maps. At the country level,
however, the research space and citations based science maps are equally
accurate. These findings show that data on career trajectories-the set of
fields that individuals have previously published in-provide more accurate
predictors of future research output for more focalized units-such as
individuals or organizations-than citation based science maps
The Challenges in SDN/ML Based Network Security : A Survey
Machine Learning is gaining popularity in the network security domain as many
more network-enabled devices get connected, as malicious activities become
stealthier, and as new technologies like Software Defined Networking (SDN)
emerge. Sitting at the application layer and communicating with the control
layer, machine learning based SDN security models exercise a huge influence on
the routing/switching of the entire SDN. Compromising the models is
consequently a very desirable goal. Previous surveys have been done on either
adversarial machine learning or the general vulnerabilities of SDNs but not
both. Through examination of the latest ML-based SDN security applications and
a good look at ML/SDN specific vulnerabilities accompanied by common attack
methods on ML, this paper serves as a unique survey, making a case for more
secure development processes of ML-based SDN security applications.Comment: 8 pages. arXiv admin note: substantial text overlap with
arXiv:1705.0056
The Faculty Notebook, September 2015
The Faculty Notebook is published periodically by the Office of the Provost at Gettysburg College to bring to the attention of the campus community accomplishments and activities of academic interest. Faculty are encouraged to submit materials for consideration for publication to the Associate Provost for Faculty Development. Copies of this publication are available at the Office of the Provost
EVALUATION OF CURRICULUM 2013 IMPLEMENTATION IN ELEMENTARY SCHOOLS
This research aims to contribute several ideas towards the implementation of the 2013 curriculum for elementary school teachers in Palembang. This descriptive qualitative research used interviews and questionnaires as data collection techniques. The results of the 2013
Curriculum implementation evaluation research were
related to the constraints of teachers in implementing the 2013 curriculum. The benefits of this research are the data analyzed with arguments descriptively. The results of the study found obstacles and obstacles to the implementation of the 2013 curriculum for schools and teachers towards the mastery of science and technology, the creation of instructional media, evaluation of learning and the limitations of facilities and infrastructure so that the implementation of the 2013 curriculum could only be carried out in 2018/2019. Solutions are needed in the form of providing adequate training and workshops for teachers and education personnel. Provide the necessary facilities and infrastructure and develop technology-based assessment systems
- …