11 research outputs found

    The Terror Network Industrial Complex: A Measurement and Analysis of Terrorist Networks and War Stocks

    Get PDF
    This paper presents a measurement study and analysis of the structure of multiple Islamic terrorist networks to determine if similar characteristics exist between those networks. We examine data gathered from four terrorist groups: Al-Qaeda, ISIS, Lashkar-e-Taiba (LeT) and Jemaah Islamiyah (JI) consisting of six terror networks. Our study contains 471 terrorists’ nodes and 2078 links. Each terror network is compared in terms efficiency, communication and composition of network metrics. The paper examines the effects these terrorist attacks had on US aerospace and defence stocks (herein War stocks). We found that the Islamic terror groups increase recruitment during the planned attacks, communication increases during and after the attacks between the subordinate terrorists and low density is a common feature of Islamic terrorist groups. The Al- Qaeda organisation structure was the most complex and superior in terms of secrecy, diameter, clustering, modularity and density. Jemaah Islamiyah followed a similar structure but not as superior. The ISIS and LeT organisational structures were more concerned with the efficiency of the operation rather than secrecy. We found that war stocks prices and the S+P 500 were lower the day after the attacks, however, the war stocks slightly outperformed the S+P 500 the day after the attacks. Further, we found that war stock prices were significantly lower one month after the terrorist attacks but the S+P 500 rebounded one month later

    Multi-view Latent Factor Models for Recommender Systems

    Get PDF

    Educational Technology and Education Conferences, January to June 2016

    Get PDF

    Educational Technology and Related Education Conferences for June to December 2015

    Get PDF
    The 33rd edition of the conference list covers selected events that primarily focus on the use of technology in educational settings and on teaching, learning, and educational administration. Only listings until December 2015 are complete as dates, locations, or Internet addresses (URLs) were not available for a number of events held from January 2016 onward. In order to protect the privacy of individuals, only URLs are used in the listing as this enables readers of the list to obtain event information without submitting their e-mail addresses to anyone. A significant challenge during the assembly of this list is incomplete or conflicting information on websites and the lack of a link between conference websites from one year to the next

    Políticas de Copyright de Publicações Científicas em Repositórios Institucionais: O Caso do INESC TEC

    Get PDF
    A progressiva transformação das práticas científicas, impulsionada pelo desenvolvimento das novas Tecnologias de Informação e Comunicação (TIC), têm possibilitado aumentar o acesso à informação, caminhando gradualmente para uma abertura do ciclo de pesquisa. Isto permitirá resolver a longo prazo uma adversidade que se tem colocado aos investigadores, que passa pela existência de barreiras que limitam as condições de acesso, sejam estas geográficas ou financeiras. Apesar da produção científica ser dominada, maioritariamente, por grandes editoras comerciais, estando sujeita às regras por estas impostas, o Movimento do Acesso Aberto cuja primeira declaração pública, a Declaração de Budapeste (BOAI), é de 2002, vem propor alterações significativas que beneficiam os autores e os leitores. Este Movimento vem a ganhar importância em Portugal desde 2003, com a constituição do primeiro repositório institucional a nível nacional. Os repositórios institucionais surgiram como uma ferramenta de divulgação da produção científica de uma instituição, com o intuito de permitir abrir aos resultados da investigação, quer antes da publicação e do próprio processo de arbitragem (preprint), quer depois (postprint), e, consequentemente, aumentar a visibilidade do trabalho desenvolvido por um investigador e a respetiva instituição. O estudo apresentado, que passou por uma análise das políticas de copyright das publicações científicas mais relevantes do INESC TEC, permitiu não só perceber que as editoras adotam cada vez mais políticas que possibilitam o auto-arquivo das publicações em repositórios institucionais, como também que existe todo um trabalho de sensibilização a percorrer, não só para os investigadores, como para a instituição e toda a sociedade. A produção de um conjunto de recomendações, que passam pela implementação de uma política institucional que incentive o auto-arquivo das publicações desenvolvidas no âmbito institucional no repositório, serve como mote para uma maior valorização da produção científica do INESC TEC.The progressive transformation of scientific practices, driven by the development of new Information and Communication Technologies (ICT), which made it possible to increase access to information, gradually moving towards an opening of the research cycle. This opening makes it possible to resolve, in the long term, the adversity that has been placed on researchers, which involves the existence of barriers that limit access conditions, whether geographical or financial. Although large commercial publishers predominantly dominate scientific production and subject it to the rules imposed by them, the Open Access movement whose first public declaration, the Budapest Declaration (BOAI), was in 2002, proposes significant changes that benefit the authors and the readers. This Movement has gained importance in Portugal since 2003, with the constitution of the first institutional repository at the national level. Institutional repositories have emerged as a tool for disseminating the scientific production of an institution to open the results of the research, both before publication and the preprint process and postprint, increase the visibility of work done by an investigator and his or her institution. The present study, which underwent an analysis of the copyright policies of INESC TEC most relevant scientific publications, allowed not only to realize that publishers are increasingly adopting policies that make it possible to self-archive publications in institutional repositories, all the work of raising awareness, not only for researchers but also for the institution and the whole society. The production of a set of recommendations, which go through the implementation of an institutional policy that encourages the self-archiving of the publications developed in the institutional scope in the repository, serves as a motto for a greater appreciation of the scientific production of INESC TEC

    Exploiting general-purpose background knowledge for automated schema matching

    Full text link
    The schema matching task is an integral part of the data integration process. It is usually the first step in integrating data. Schema matching is typically very complex and time-consuming. It is, therefore, to the largest part, carried out by humans. One reason for the low amount of automation is the fact that schemas are often defined with deep background knowledge that is not itself present within the schemas. Overcoming the problem of missing background knowledge is a core challenge in automating the data integration process. In this dissertation, the task of matching semantic models, so-called ontologies, with the help of external background knowledge is investigated in-depth in Part I. Throughout this thesis, the focus lies on large, general-purpose resources since domain-specific resources are rarely available for most domains. Besides new knowledge resources, this thesis also explores new strategies to exploit such resources. A technical base for the development and comparison of matching systems is presented in Part II. The framework introduced here allows for simple and modularized matcher development (with background knowledge sources) and for extensive evaluations of matching systems. One of the largest structured sources for general-purpose background knowledge are knowledge graphs which have grown significantly in size in recent years. However, exploiting such graphs is not trivial. In Part III, knowledge graph em- beddings are explored, analyzed, and compared. Multiple improvements to existing approaches are presented. In Part IV, numerous concrete matching systems which exploit general-purpose background knowledge are presented. Furthermore, exploitation strategies and resources are analyzed and compared. This dissertation closes with a perspective on real-world applications

    Hard Multi-Tenancy Kubernetes approaches in a local 5G deployment: Testing and evaluation of the available solutions

    Get PDF
    With its capabilities, the fifth mobile network generation (5G) provides new opportunities and applications, which were not possible to exploit previously. In addition to novel technologies, also infrastructure management has been influenced by 5G. Micro-Operator business model was identified by University of Oulu and Nokia Oulu in 2017. They observed that TelCo stakeholders actors are no longer based only on a small group of Mobile Network Operators, but new actors are becoming relevant. Specifically, Micro-Operators are involved in the deployment of scalable services within local 5G deployments. In most cases, micro-operators deploy their containerized application by exploiting Kubernetes Orchestrator capabilities. At the same time, they share a pool of resources, which usually are provided by the infrastructure owner. Since current standards require strict data privacy and security mechanisms, hard multi-tenancy should be enforced in the design phase. Many solutions are available within the Kubernetes environment. Thus, it would be interesting to analyse how each approach affects network performance, which are very critical metrics in 5G requirements. In the context of this thesis, test and evaluation strategy consisted of deploying a set of applications with every identified hard multi-tenancy approach. The choice of the applications was based on the 5G application classes: extreme multi broadband, massive scale communication, ultra-reliable low latency communication. Once the deployment configurations were defined, data of specific critical application network performance metrics was collected for each of the approaches. By looking at the retrieved data, it is possible to observe that network performance is mainly affected by the application protocol and the corresponding transport protocol. Nevertheless, it is not possible to perform design choices only by looking at network performance. In conclusion, further investigation on other design characteristics may be require
    corecore