9,007 research outputs found

    Can we detect contract cheating using existing assessment data? Applying crime prevention theory to an academic integrity issue

    Get PDF
    Objectives Building on what is known about the non-random nature of crime problems and the explanatory capacity of opportunity theories of crime, this study explores the utility of using existing university administrative data to detect unusual patterns of performance consistent with a student having engaged in contract cheating (paying a third-party to produce unsupervised work on their behalf). Methods Results from an Australian university were analysed (N = 3798 results, N = 1459 students). Performances on unsupervised and supervised assessment items were converted to percentages and percentage point differences analysed at the academic discipline-, unit-, and student-level, looking for non-random patterns of unusually large differences. Results Non-random, unusual patterns, consistent with contract cheating, were found at the academic discipline-, unit-, and student-level, with approximately 2.1% of students producing multiple unusual patterns. Conclusions These findings suggest it may be possible to use existing administrative data to identify assessment items that provide suitable opportunities for contract cheating. This approach could be used in conjunction with targeted problem-prevention strategies (based on situational crime prevention) to reduce the vulnerability of academic assessment items to contract cheating. This approach is worthy of additional research as it has the potential to help academic institutions around the world manage contract cheating; a problem that currently threatens the validity and integrity of tertiary qualifications

    Probing dark energy with steerable wavelets through correlation of WMAP and NVSS local morphological measures

    Get PDF
    Using local morphological measures on the sphere defined through a steerable wavelet analysis, we examine the three-year WMAP and the NVSS data for correlation induced by the integrated Sachs-Wolfe (ISW) effect. The steerable wavelet constructed from the second derivative of a Gaussian allows one to define three local morphological measures, namely the signed-intensity, orientation and elongation of local features. Detections of correlation between the WMAP and NVSS data are made with each of these morphological measures. The most significant detection is obtained in the correlation of the signed-intensity of local features at a significance of 99.9%. By inspecting signed-intensity sky maps, it is possible for the first time to see the correlation between the WMAP and NVSS data by eye. Foreground contamination and instrumental systematics in the WMAP data are ruled out as the source of all significant detections of correlation. Our results provide new insight on the ISW effect by probing the morphological nature of the correlation induced between the cosmic microwave background and large scale structure of the Universe. Given the current constraints on the flatness of the Universe, our detection of the ISW effect again provides direct and independent evidence for dark energy. Moreover, this new morphological analysis may be used in future to help us to better understand the nature of dark energy.Comment: 12 pages, 10 figures, replaced to match version accepted by MNRA

    Trust and Risk Relationship Analysis on a Workflow Basis: A Use Case

    Get PDF
    Trust and risk are often seen in proportion to each other; as such, high trust may induce low risk and vice versa. However, recent research argues that trust and risk relationship is implicit rather than proportional. Considering that trust and risk are implicit, this paper proposes for the first time a novel approach to view trust and risk on a basis of a W3C PROV provenance data model applied in a healthcare domain. We argue that high trust in healthcare domain can be placed in data despite of its high risk, and low trust data can have low risk depending on data quality attributes and its provenance. This is demonstrated by our trust and risk models applied to the BII case study data. The proposed theoretical approach first calculates risk values at each workflow step considering PROV concepts and second, aggregates the final risk score for the whole provenance chain. Different from risk model, trust of a workflow is derived by applying DS/AHP method. The results prove our assumption that trust and risk relationship is implicit

    Bayes-X: a Bayesian inference tool for the analysis of X-ray observations of galaxy clusters

    Full text link
    We present the first public release of our Bayesian inference tool, Bayes-X, for the analysis of X-ray observations of galaxy clusters. We illustrate the use of Bayes-X by analysing a set of four simulated clusters at z=0.2-0.9 as they would be observed by a Chandra-like X-ray observatory. In both the simulations and the analysis pipeline we assume that the dark matter density follows a spherically-symmetric Navarro, Frenk and White (NFW) profile and that the gas pressure is described by a generalised NFW (GNFW) profile. We then perform four sets of analyses. By numerically exploring the joint probability distribution of the cluster parameters given simulated Chandra-like data, we show that the model and analysis technique can robustly return the simulated cluster input quantities, constrain the cluster physical parameters and reveal the degeneracies among the model parameters and cluster physical parameters. We then analyse Chandra data on the nearby cluster, A262, and derive the cluster physical profiles. To illustrate the performance of the Bayesian model selection, we also carried out analyses assuming an Einasto profile for the matter density and calculated the Bayes factor. The results of the model selection analyses for the simulated data favour the NFW model as expected. However, we find that the Einasto profile is preferred in the analysis of A262. The Bayes-X software, which is implemented in Fortran 90, is available at http://www.mrao.cam.ac.uk/facilities/software/bayesx/.Comment: 22 pages, 11 figure

    Classifying LISA gravitational wave burst signals using Bayesian evidence

    Full text link
    We consider the problem of characterisation of burst sources detected with the Laser Interferometer Space Antenna (LISA) using the multi-modal nested sampling algorithm, MultiNest. We use MultiNest as a tool to search for modelled bursts from cosmic string cusps, and compute the Bayesian evidence associated with the cosmic string model. As an alternative burst model, we consider sine-Gaussian burst signals, and show how the evidence ratio can be used to choose between these two alternatives. We present results from an application of MultiNest to the last round of the Mock LISA Data Challenge, in which we were able to successfully detect and characterise all three of the cosmic string burst sources present in the release data set. We also present results of independent trials and show that MultiNest can detect cosmic string signals with signal-to-noise ratio (SNR) as low as ~7 and sine-Gaussian signals with SNR as low as ~8. In both cases, we show that the threshold at which the sources become detectable coincides with the SNR at which the evidence ratio begins to favour the correct model over the alternative.Comment: 21 pages, 11 figures, accepted by CQG; v2 has minor changes for consistency with accepted versio

    Computational science and re-discovery: open-source implementations of ellipsoidal harmonics for problems in potential theory

    Full text link
    We present two open-source (BSD) implementations of ellipsoidal harmonic expansions for solving problems of potential theory using separation of variables. Ellipsoidal harmonics are used surprisingly infrequently, considering their substantial value for problems ranging in scale from molecules to the entire solar system. In this article, we suggest two possible reasons for the paucity relative to spherical harmonics. The first is essentially historical---ellipsoidal harmonics developed during the late 19th century and early 20th, when it was found that only the lowest-order harmonics are expressible in closed form. Each higher-order term requires the solution of an eigenvalue problem, and tedious manual computation seems to have discouraged applications and theoretical studies. The second explanation is practical: even with modern computers and accurate eigenvalue algorithms, expansions in ellipsoidal harmonics are significantly more challenging to compute than those in Cartesian or spherical coordinates. The present implementations reduce the "barrier to entry" by providing an easy and free way for the community to begin using ellipsoidal harmonics in actual research. We demonstrate our implementation using the specific and physiologically crucial problem of how charged proteins interact with their environment, and ask: what other analytical tools await re-discovery in an era of inexpensive computation?Comment: 25 pages, 3 figure
    • 

    corecore