15,912 research outputs found
Advances on Concept Drift Detection in Regression Tasks using Social Networks Theory
Mining data streams is one of the main studies in machine learning area due
to its application in many knowledge areas. One of the major challenges on
mining data streams is concept drift, which requires the learner to discard the
current concept and adapt to a new one. Ensemble-based drift detection
algorithms have been used successfully to the classification task but usually
maintain a fixed size ensemble of learners running the risk of needlessly
spending processing time and memory. In this paper we present improvements to
the Scale-free Network Regressor (SFNR), a dynamic ensemble-based method for
regression that employs social networks theory. In order to detect concept
drifts SFNR uses the Adaptive Window (ADWIN) algorithm. Results show
improvements in accuracy, especially in concept drift situations and better
performance compared to other state-of-the-art algorithms in both real and
synthetic data
The Metaverse: Survey, Trends, Novel Pipeline Ecosystem & Future Directions
The Metaverse offers a second world beyond reality, where boundaries are
non-existent, and possibilities are endless through engagement and immersive
experiences using the virtual reality (VR) technology. Many disciplines can
benefit from the advancement of the Metaverse when accurately developed,
including the fields of technology, gaming, education, art, and culture.
Nevertheless, developing the Metaverse environment to its full potential is an
ambiguous task that needs proper guidance and directions. Existing surveys on
the Metaverse focus only on a specific aspect and discipline of the Metaverse
and lack a holistic view of the entire process. To this end, a more holistic,
multi-disciplinary, in-depth, and academic and industry-oriented review is
required to provide a thorough study of the Metaverse development pipeline. To
address these issues, we present in this survey a novel multi-layered pipeline
ecosystem composed of (1) the Metaverse computing, networking, communications
and hardware infrastructure, (2) environment digitization, and (3) user
interactions. For every layer, we discuss the components that detail the steps
of its development. Also, for each of these components, we examine the impact
of a set of enabling technologies and empowering domains (e.g., Artificial
Intelligence, Security & Privacy, Blockchain, Business, Ethics, and Social) on
its advancement. In addition, we explain the importance of these technologies
to support decentralization, interoperability, user experiences, interactions,
and monetization. Our presented study highlights the existing challenges for
each component, followed by research directions and potential solutions. To the
best of our knowledge, this survey is the most comprehensive and allows users,
scholars, and entrepreneurs to get an in-depth understanding of the Metaverse
ecosystem to find their opportunities and potentials for contribution
Database for validation of thermo-hydro-chemo-mechanical behaviour in bentonites
This paper presents a database of thermo-hydro-chemo-mechanical tests on bentonites, which has been named “Bento_DB4THCM”. After a comprehensive literature review, a set of experimental tests have been compiled. The experimental data are used to perform validation exercises for numerical codes to simulate the coupled thermo-hydro-mechanical and geochemical behaviour of bentonites. The database contains the information required for the simulation of each experimental test solving a boundary value problem. The validation exercises cover a wide range of clays, including the best-known bentonites (MX-80, FEBEX, GMZ) as well as others. The results collected in this database are from free swelling, swelling under load, swelling pressure and squeezing tests. The database is attached as Supplementary material.En este artículo se presenta una base de datos de ensayos termo-hidro-quimio-mecánicos sobre bentonitas, a la que se ha denominado “Bento_DB4THCM”. Después de una revisión exhaustiva de la literatura, se ha compilado un conjunto de pruebas experimentales. Los datos experimentales se utilizan para realizar ejercicios de validación de códigos numéricos para simular el comportamiento termohidromecánico y geoquímico acoplado de las bentonitas. La base de datos contiene la información requerida para la simulación de cada prueba experimental que resuelve un problema de valor límite. Los ejercicios de validación cubren una amplia gama de arcillas, incluidas las bentonitas más conocidas (MX-80, FEBEX, GMZ) entre otras. Los resultados recopilados en esta base de datos provienen de pruebas de hinchamiento libre, hinchamiento bajo carga, presión de hinchamiento y compresión. La base de datos se adjunta como material complementario
Atypical developmental trajectories of white matter microstructure in prenatal alcohol exposure: Preliminary evidence from neurite orientation dispersion and density imaging
IntroductionFetal alcohol spectrum disorder (FASD), a life-long condition resulting from prenatal alcohol exposure (PAE), is associated with structural brain anomalies and neurobehavioral differences. Evidence from longitudinal neuroimaging suggest trajectories of white matter microstructure maturation are atypical in PAE. We aimed to further characterize longitudinal trajectories of developmental white matter microstructure change in children and adolescents with PAE compared to typically-developing Controls using diffusion-weighted Neurite Orientation Dispersion and Density Imaging (NODDI).Materials and methodsParticipants: Youth with PAE (n = 34) and typically-developing Controls (n = 31) ages 8–17 years at enrollment. Participants underwent formal evaluation of growth and facial dysmorphology. Participants also completed two study visits (17 months apart on average), both of which involved cognitive testing and an MRI scan (data collected on a Siemens Prisma 3 T scanner). Age-related changes in the orientation dispersion index (ODI) and the neurite density index (NDI) were examined across five corpus callosum (CC) regions defined by tractography.ResultsWhile linear trajectories suggested similar overall microstructural integrity in PAE and Controls, analyses of symmetrized percent change (SPC) indicated group differences in the timing and magnitude of age-related increases in ODI (indexing the bending and fanning of axons) in the central region of the CC, with PAE participants demonstrating atypically steep increases in dispersion with age compared to Controls. Participants with PAE also demonstrated greater increases in ODI in the mid posterior CC (trend-level group difference). In addition, SPC in ODI and NDI was differentially correlated with executive function performance for PAE participants and Controls, suggesting an atypical relationship between white matter microstructure maturation and cognitive function in PAE.DiscussionPreliminary findings suggest subtle atypicality in the timing and magnitude of age-related white matter microstructure maturation in PAE compared to typically-developing Controls. These findings add to the existing literature on neurodevelopmental trajectories in PAE and suggest that advanced biophysical diffusion modeling (NODDI) may be sensitive to biologically-meaningful microstructural changes in the CC that are disrupted by PAE. Findings of atypical brain maturation-behavior relationships in PAE highlight the need for further study. Further longitudinal research aimed at characterizing white matter neurodevelopmental trajectories in PAE will be important
Grand challenges in entomology: Priorities for action in the coming decades
Entomology is key to understanding terrestrial and freshwater ecosystems at a time of unprecedented anthropogenic environmental change and offers substantial untapped potential to benefit humanity in a variety of ways, from improving agricultural practices to managing vector-borne diseases and inspiring technological advances. We identified high priority challenges for entomology using an inclusive, open, and democratic four-stage prioritisation approach, conducted among the membership and affiliates (hereafter ‘members’) of the UK-based Royal Entomological Society (RES). A list of 710 challenges was gathered from 189 RES members. Thematic analysis was used to group suggestions, followed by an online vote to determine initial priorities, which were subsequently ranked during an online workshop involving 37 participants. The outcome was a set of 61 priority challenges within four groupings of related themes: (i) ‘Fundamental Research’ (themes: Taxonomy, ‘Blue Skies’ [defined as research ideas without immediate practical application], Methods and Techniques); (ii) ‘Anthropogenic Impacts and Conservation’ (themes: Anthropogenic Impacts, Conservation Options); (iii) ‘Uses, Ecosystem Services and Disservices’ (themes: Ecosystem Benefits, Technology and Resources [use of insects as a resource, or as inspiration], Pests); (iv) ‘Collaboration, Engagement and Training’ (themes: Knowledge Access, Training and Collaboration, Societal Engagement). Priority challenges encompass research questions, funding objectives, new technologies, and priorities for outreach and engagement. Examples include training taxonomists, establishing a global network of insect monitoring sites, understanding the extent of insect declines, exploring roles of cultivated insects in food supply chains, and connecting professional with amateur entomologists. Responses to different challenges could be led by amateur and professional entomologists, at all career stages. Overall, the challenges provide a diverse array of options to inspire and initiate entomological activities and reveal the potential of entomology to contribute to addressing global challenges related to human health and well-being, and environmental change
Advancing Model Pruning via Bi-level Optimization
The deployment constraints in practical applications necessitate the pruning
of large-scale deep learning models, i.e., promoting their weight sparsity. As
illustrated by the Lottery Ticket Hypothesis (LTH), pruning also has the
potential of improving their generalization ability. At the core of LTH,
iterative magnitude pruning (IMP) is the predominant pruning method to
successfully find 'winning tickets'. Yet, the computation cost of IMP grows
prohibitively as the targeted pruning ratio increases. To reduce the
computation overhead, various efficient 'one-shot' pruning methods have been
developed, but these schemes are usually unable to find winning tickets as good
as IMP. This raises the question of how to close the gap between pruning
accuracy and pruning efficiency? To tackle it, we pursue the algorithmic
advancement of model pruning. Specifically, we formulate the pruning problem
from a fresh and novel viewpoint, bi-level optimization (BLO). We show that the
BLO interpretation provides a technically-grounded optimization base for an
efficient implementation of the pruning-retraining learning paradigm used in
IMP. We also show that the proposed bi-level optimization-oriented pruning
method (termed BiP) is a special class of BLO problems with a bi-linear problem
structure. By leveraging such bi-linearity, we theoretically show that BiP can
be solved as easily as first-order optimization, thus inheriting the
computation efficiency. Through extensive experiments on both structured and
unstructured pruning with 5 model architectures and 4 data sets, we demonstrate
that BiP can find better winning tickets than IMP in most cases, and is
computationally as efficient as the one-shot pruning schemes, demonstrating 2-7
times speedup over IMP for the same level of model accuracy and sparsity.Comment: Thirty-sixth Conference on Neural Information Processing Systems
(NeurIPS 2022
Perceptions of surveillance: exploring feelings held by Black community leaders in Boston toward camera enforcement of roadway infractions
Roadway camera enforcement programs have been found to effectively reduce vehicle travel speeds, as well as decrease the number and severity of collisions. Despite a wealth of evaluative research confirming this enforcement approach's aptitude at promoting safer roadway behavior, fewer than 50 % of US states currently host camera-based programs. Public opposition is frequently cited as the cause for the slow proliferation of this enforcement strategy. However, with public demand for police reform having an increasing presence on the national political stage, how might feelings toward camera technology currently stand among groups most marginalized by existing enforcement systems, and how might those feelings vary by type of enforcement application? Through a series of focus groups, this work centers Black voices on matters of surveillance and roadway enforcement by discussing sentiment toward camera programs with Black community leaders. This discussion is contextually situated in Boston, Massachusetts, where legislation that would allow for camera enforcement of roadway infractions is actively being deliberated in the State Senate. Findings culminate in a list of right-sizing and procedural recommendations for policy makers hoping to gain support for camera enforcement, improve roadway safety, and advance racial equity in our systems of policing and governance
Corporate Social Responsibility: the institutionalization of ESG
Understanding the impact of Corporate Social Responsibility (CSR) on firm performance as it relates to industries reliant on technological innovation is a complex and perpetually evolving challenge. To thoroughly investigate this topic, this dissertation will adopt an economics-based structure to address three primary hypotheses. This structure allows for each hypothesis to essentially be a standalone empirical paper, unified by an overall analysis of the nature of impact that ESG has on firm performance. The first hypothesis explores the evolution of CSR to the modern quantified iteration of ESG has led to the institutionalization and standardization of the CSR concept. The second hypothesis fills gaps in existing literature testing the relationship between firm performance and ESG by finding that the relationship is significantly positive in long-term, strategic metrics (ROA and ROIC) and that there is no correlation in short-term metrics (ROE and ROS). Finally, the third hypothesis states that if a firm has a long-term strategic ESG plan, as proxied by the publication of CSR reports, then it is more resilience to damage from controversies. This is supported by the finding that pro-ESG firms consistently fared better than their counterparts in both financial and ESG performance, even in the event of a controversy. However, firms with consistent reporting are also held to a higher standard than their nonreporting peers, suggesting a higher risk and higher reward dynamic. These findings support the theory of good management, in that long-term strategic planning is both immediately economically beneficial and serves as a means of risk management and social impact mitigation. Overall, this contributes to the literature by fillings gaps in the nature of impact that ESG has on firm performance, particularly from a management perspective
Countermeasures for the majority attack in blockchain distributed systems
La tecnología Blockchain es considerada como uno de los paradigmas informáticos más importantes posterior al Internet; en función a sus características únicas que la hacen ideal para registrar, verificar y administrar información de diferentes transacciones. A pesar de esto, Blockchain se enfrenta a diferentes problemas de seguridad, siendo el ataque del 51% o ataque mayoritario uno de los más importantes. Este consiste en que uno o más mineros tomen el control de al menos el 51% del Hash extraído o del cómputo en una red; de modo que un minero puede manipular y modificar arbitrariamente la información registrada en esta tecnología. Este trabajo se enfocó en diseñar e implementar estrategias de detección y mitigación de ataques mayoritarios (51% de ataque) en un sistema distribuido Blockchain, a partir de la caracterización del comportamiento de los mineros. Para lograr esto, se analizó y evaluó el Hash Rate / Share de los mineros de Bitcoin y Crypto Ethereum, seguido del diseño e implementación de un protocolo de consenso para controlar el poder de cómputo de los mineros. Posteriormente, se realizó la exploración y evaluación de modelos de Machine Learning para detectar software malicioso de tipo Cryptojacking.DoctoradoDoctor en Ingeniería de Sistemas y Computació
The Artist as Surveillant: The Use of Surveillance Technology in Contemporary Art
Artists have long been called observers, voyeurs, and watchers, and with a particular interest in human behavior and society, they frequently use unknowing passersby as their subjects for works. Curators and scholars explored how artists put citizens under surveillance with photography and videography, which dates back to the early 1900s, years before governments deployed surveillance systems. Since the 1980s, artists have explicitly explored surveillance technology and theory to alert viewers to the rise of surveillance. Today, this genre is called artveillance, a term coined by Andrea Mubi Brighenti in 2010 to categorize art that explicitly deals with surveillance. This genre developed parallel to the rise of mass surveillance which created the current-day surveillance state. Since artveillance dominates the contemporary art scene, I was interested in the history of surveillance technology and themes in art. Although that history is brief, there is a wealth of artworks and studies on the topic. This thesis explores artists who use surveillance technology, specifically close-circuit video, in their practice and how this work has changed over time compared to the rise of government surveillance systems. To properly examine the artwork, each artwork’s technological history and broader cultural context is considered, with careful attention to the artists’ intentions. The thesis starts in the 1970s with Bruce Nauman and Peter Campus’s closed-circuit video installations. The artists did not aim to create a surveillance area but wanted to explore the viewer’s identity with their moving image. In Chapter 2, Julia Scher and Lynn Hershman Leeson’s work from the 1980s and early 1990s is discussed. Created when state surveillance was on the rise, the artists’ work used surveillance technology to critique the systems. The third chapter explores surveillance in a post-9/11 state through Jill Magid and Laura Poitras’s work. The artists exploited and exposed government systems to show how the public’s privacy is invaded. Finally, the paper concludes with an investigation into the public’s relationship with video surveillance, which resembles an apathetic acceptance
- …