2,411 research outputs found

    Perception, Prestige and PageRank

    Get PDF
    Academic esteem is difficult to quantify in objective terms. Network theory offers the opportunity to use a mathematical formalism to model both the esteem associated with an academic and the relationships between academic colleagues. Early attempts using this line of reasoning have focused on intellectual genealogy as constituted by supervisor student networks. The process of examination is critical in many areas of study but has not played a part in existing models. A network theoretical "social" model is proposed as a tool to explore and understand the dynamics of esteem in the academic hierarchy. It is observed that such a model naturally gives rise to the idea that the esteem associated with a node in the graph (the esteem of an individual academic) can be viewed as a dynamic quantity that evolves with time based on both local and non-local changes in the properties in the network. The toy model studied here includes both supervisor-student and examiner-student relationships. This gives an insight into some of the key features of academic genealogies and naturally leads to a proposed model for "esteem propagation" on academic networks. This propagation is not solely directed forward in time (from teacher to progeny) but sometimes also flows in the other direction. As collaborators do well, this reflects well on those with whom they choose to collaborate and those that taught them. Furthermore, esteem as a quantity continues to be dynamic even after the end of a relationship or career. In other words, esteem can be thought of as flowing both forward and backward in time.Comment: 40 page

    Mining complex trees for hidden fruit : a graph–based computational solution to detect latent criminal networks : a thesis presented in partial fulfilment of the requirements for the degree of Doctor of Philosophy in Information Technology at Massey University, Albany, New Zealand.

    Get PDF
    The detection of crime is a complex and difficult endeavour. Public and private organisations – focusing on law enforcement, intelligence, and compliance – commonly apply the rational isolated actor approach premised on observability and materiality. This is manifested largely as conducting entity-level risk management sourcing ‘leads’ from reactive covert human intelligence sources and/or proactive sources by applying simple rules-based models. Focusing on discrete observable and material actors simply ignores that criminal activity exists within a complex system deriving its fundamental structural fabric from the complex interactions between actors - with those most unobservable likely to be both criminally proficient and influential. The graph-based computational solution developed to detect latent criminal networks is a response to the inadequacy of the rational isolated actor approach that ignores the connectedness and complexity of criminality. The core computational solution, written in the R language, consists of novel entity resolution, link discovery, and knowledge discovery technology. Entity resolution enables the fusion of multiple datasets with high accuracy (mean F-measure of 0.986 versus competitors 0.872), generating a graph-based expressive view of the problem. Link discovery is comprised of link prediction and link inference, enabling the high-performance detection (accuracy of ~0.8 versus relevant published models ~0.45) of unobserved relationships such as identity fraud. Knowledge discovery uses the fused graph generated and applies the “GraphExtract” algorithm to create a set of subgraphs representing latent functional criminal groups, and a mesoscopic graph representing how this set of criminal groups are interconnected. Latent knowledge is generated from a range of metrics including the “Super-broker” metric and attitude prediction. The computational solution has been evaluated on a range of datasets that mimic an applied setting, demonstrating a scalable (tested on ~18 million node graphs) and performant (~33 hours runtime on a non-distributed platform) solution that successfully detects relevant latent functional criminal groups in around 90% of cases sampled and enables the contextual understanding of the broader criminal system through the mesoscopic graph and associated metadata. The augmented data assets generated provide a multi-perspective systems view of criminal activity that enable advanced informed decision making across the microscopic mesoscopic macroscopic spectrum

    Are social inequalities being transmitted through higher education?:A propensity-score matching analysis of private versus public university graduates using machine learning models

    Get PDF
    This study investigates differences in employment outcomes of students graduating from private versus public universities in Spain, and the resulting impact on employment outcomes. The methodology involves propensity score matching, utilising novel machine learning approaches. Machine learning algorithms can be used to calculate propensity scores and can potentially have advantages compared to conventional methods. Contrary to previous research carried out in Spain, this analysis found a wage premium for those pupils who attended a private university in the short and medium term, although these differences were relatively small. The discussion outlines the implications for intergenerational inequality, policy development, and future research that utilises machine learning algorithms
    • 

    corecore