Education in Pure Mathematics, double minor in Economics and English Lit. Certified in Statistics by Society of Actuaries' Test 1. Strong knowledge of SAS, SQL, and Excel. Use forecasting and research experience to aid in data analysis. Currently work as a Senior Risk Analyst for First Data's Telecheck division, reducing check fraud.
7 differences betwwen shopping and buyingSumit Sharma
Buying is when a person goes to market with the intention of spending money, whether he has a specific item in mind or not. Shopping doesn't cost any money. Shopping is a part of the decision making process for us. ... One may be shopping while buying
Education in Pure Mathematics, double minor in Economics and English Lit. Certified in Statistics by Society of Actuaries' Test 1. Strong knowledge of SAS, SQL, and Excel. Use forecasting and research experience to aid in data analysis. Currently work as a Senior Risk Analyst for First Data's Telecheck division, reducing check fraud.
7 differences betwwen shopping and buyingSumit Sharma
Buying is when a person goes to market with the intention of spending money, whether he has a specific item in mind or not. Shopping doesn't cost any money. Shopping is a part of the decision making process for us. ... One may be shopping while buying
Today’s market evolution and high volatility of business requirements put an increasing emphasis on the
ability for systems to accommodate the changes required by new organizational needs while maintaining
security objectives satisfiability. This is all the more true in case of collaboration and interoperability
between different organizations and thus between their information systems. Ontology mapping has been
used for interoperability and several mapping systems have evolved to support the same. Usual solutions
do not take care of security. That is almost all systems do a mapping of ontologies which are unsecured.
We have developed a system for mapping secured ontologies using graph similarity concept.
Co-word analyses study the co-occurrence of pairs of items (for example, keywords) that are representative in a document, to identify relations between the ideas presented in the
texts.
Keyphrase Extraction using Neighborhood KnowledgeIJMTST Journal
This paper focus on keyphrase extraction for news articles because news article is one of the popular document genres on the web and most news articles have no author-assigned keyphrases. Existing methods for single document keyphrase extraction usually make use of only the information contained in the specified document. This paper proposes to use a small number of nearest neighbor documents to provide more knowledge to improve single document keyphrase extraction. Experimental results demonstrate the good effectiveness and robustness of our proposed approach. According to experiments conducted on several documents and keyphrases we consider top 10 keyphrases are most suitable keyphrases.
Measuring academic influence: Not all citations are equalAndre Vellino
The importance of a research article is routinely measured by counting how many times it has been cited. However, treating all citations with equal weight ignores the wide variety of functions that citations perform. The research described in this presentation – work that was performed with Xiaodan Zhu, Peter Turney (National Research Council Canada) and Daniel Lemire (TELUQ, Université du Québec à Montréal) – aims to automatically identify the subset of references in a bibliography that have a central academic influence on the citing paper. To achieve this we examined the effectiveness of a variety of features in the citing paper that might plausibly predict the academic influence of a citation. We asked a group of authors to identify the key references in their own work and created a dataset in which citations were labeled according to their academic influence. Using automatic feature selection with supervised machine learning, we developed a model for predicting academic influence that achieves good performance on this dataset using only four features. The performance of these features inspired us to design an influence-primed h-index (the hip-index). According to our experiments, the hip-index is a better indicator of researcher performance than the conventional h-index.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
International Journal of Engineering Research and Development is an international premier peer reviewed open access engineering and technology journal promoting the discovery, innovation, advancement and dissemination of basic and transitional knowledge in engineering, technology and related disciplines.
Gv index scientific contribution rating index that takes into account the gro...IJDKP
There are a wide variety of scientific contribution rating indices including the impact factor and h-index.
These are used for quantitative analyses on research papers published in the past, and therefore unable to
incorporate in the assessment the growth, or deterioration, of the research area: whether the research area
of a particular paper is in decline or conversely in a growing trend. Other hand, the use of the conventional
rating indices may result in higher rates for papers that are hardly referenced nowadays in other papers
although frequently cited in the past. This study proposes a new type of scientific contribution ranking
index, "Growing Degree of Research Area and Variance Values Index (GV-Index)". The GV-Index is
computed by a principal component analysis based on an estimated value obtained by PageRank
Algorithm, which takes into account the growing degree of the research area and its variance. We also
propose visualization system of a scientist’s network using the GV-Index.
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSgerogepatton
Document similarity is an important part of Natural Language Processing and is most commonly used for
plagiarism-detection and text summarization. Thus, finding the overall most effective document similarity
algorithm could have a major positive impact on the field of Natural Language Processing. This report sets
out to examine the numerous document similarity algorithms, and determine which ones are the most
useful. It addresses the most effective document similarity algorithm by categorizing them into 3 types of
document similarity algorithms: statistical algorithms, neural networks, and corpus/knowledge-based
algorithms. The most effective algorithms in each category are also compared in our work using a series of
benchmark datasets and evaluations that test every possible area that each algorithm could be used in.
A COMPARISON OF DOCUMENT SIMILARITY ALGORITHMSgerogepatton
Document similarity is an important part of Natural Language Processing and is most commonly used for
plagiarism-detection and text summarization. Thus, finding the overall most effective document similarity
algorithm could have a major positive impact on the field of Natural Language Processing. This report sets
out to examine the numerous document similarity algorithms, and determine which ones are the most
useful. It addresses the most effective document similarity algorithm by categorizing them into 3 types of
document similarity algorithms: statistical algorithms, neural networks, and corpus/knowledge-based
algorithms. The most effective algorithms in each category are also compared in our work using a series of
benchmark datasets and evaluations that test every possible area that each algorithm could be used in.
21 minutes agoTami Frazier RE Discussion - Week 3COLLAPSE.docxvickeryr87
21 minutes ago
Tami Frazier
RE: Discussion - Week 3
COLLAPSE
Top of Form
NURS 6052 – Essentials of Evidence-Based Practice
Week 3 Initial Discussion Post
The Role of Theoretical Frameworks in Research
Research is a process of evaluating a concept or theory concerning a specific subject. Analysis of a theory includes examining the behaviors and characteristics of people and how they interact with biological, interpersonal, and environmental factors (Polit & Beck, 2017). Every theory attempts to explain phenomena and how they are related to a specific purpose. Valid research uses a theory or model as the building blocks. Nursing theory relies on models to define what nursing is and the processes involved in providing care (Polit & Beck, 2017). In this post, I will examine a research example that has adopted different theories and models to design, implement, and evaluate health promotion efforts (Joseph, Daniel, Thind, Benitez, & Pekmezi, 2016).
Research Review
Finding research related to nursing theories and models was an easy task. Many fundamental nursing policies and procedures are founded on either a theory or a model. For this paper review, I chose the transtheoretical model which states that “transition from one stage of change to the next are affected by processes of change” (Polit & Beck, 2017, p. 124). The research paper was focused on reviewing numerous theories used to assess long-term maintenance of physical activity, weight loss, and smoking cessation (Joseph et al., 2016). Within this research, the authors referenced five prominent behavioral theories which are self-determination theory, the theory of planned behavior, social cognitive theory, transtheoretical model, and the social ecological model (Joseph et al., 2016). The paper excluded studies that referenced cognitive behavioral therapy used for intervention. PubMed and PsycINFO were used with relevant search terms and Boolean operators. Each article was then reviewed by three different reviewers.
Transtheoretical Model
In this article, the transtheoretical model (TTM) was used to define and recognize behavioral change through natural processes. The total number of participants was 20,645 with over 65% of participants being female with a mean age of 49.9 years (Joseph et al., 2016). TTM is a combination of behavior change theories and psychotherapy (Joseph et al., 2016). TTM presumes people move through the five stages of behavioral change which are precontemplation, contemplation, preparation, action, and maintenance in a cyclical manner instead of a linear route (Joseph et al., 2016). Often participants in the study found themselves making progress with physical activity, weight loss, and smoking cessation only to regress creating a cycle of one step ahead and two steps back(Joseph et al., 2016). Relapse is a common occurrence with TTM for new patients and long-term patients. Maintaining the stage of change can be challenging due to intrinsic and extrinsic.
Entity Resolution is a problem that occurs in many information integration processes and applications. The primary goal of entity resolution is to resolve data references to the corresponding same real world entity. The ambiguity in references comes in various net- works such as social network, biological network, citation graphs and many others. Ambiguity in references not only leads to data redundancy but also inaccuracies in knowledge representation, extraction and query processing. Entity resolution is the solution to this problem. There have been many approaches such as pair-wise similarity over attributes of references, a parallel approach for morphing the graph data on to cluster of nodes (P-Swoosh) [2] and relational clustering that makes use of relational information in addition to the attribute similarity. In this article, we make use of relational culstering to resolve author name ambiguities in a subset of a real-world dataset: US patent network consisting of more than 650,000 author references.
Defining the generative probabilistic topic model for text summarization that aims at extracting a small subset of sentences from the corpus with respect to some given query.
An Enhanced Suffix Tree Approach to Measure Semantic Similarity between Multi...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Interpreting the Semantics of Anomalies Based on Mutual Information in Link M...ijdms
This paper aims to show how mutual information can help provide a semantic interpretation of anomalies in data, characterize the anomalies, and how mutual information can help measure the information that object item X shares with another object item Y. Whilst most link mining approaches focus on predicting link type, link based object classification or object identification, this research focused on using link mining to detect anomalies and discovering links/objects among anomalies. This paper attempts to demonstrate the contribution of mutual information to interpret anomalies using a case study.
Seeds Affinity Propagation Based on Text ClusteringIJRES Journal
The objective is to find among all partitions of the data set, best publishing according to some quality measure. Affinity propagation is a low error, high speed, flexible, and remarkably simple clustering algorithm that may be used in forming teams of participants for business simulations and experiential exercises, and in organizing participant’s preferences for the parameters of simulations. This paper proposes an efficient Affinity Propagation algorithm that guarantees the same clustering result as the original algorithm after convergence. The heart of our approach is (1) to prune unnecessary message exchanges in the iterations and (2) to compute the convergence values of pruned messages after the iterations to determine clusters.
Similar to Open Data in Science. Corey Chivers (20)
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Open Data in Science. Corey Chivers
1. Future Avenues for Open Data
Corey Chivers
PhD Candidate, McGill University
Data Hacker
@cjbayesian
bayesianbiologist.com
2. Open Data in Science
● Science is supposed to be a bastion of
openess (data and otherwise).
● Publication incentives get in the way of this.
● However, the future looks bright!
3.
4. Full text journal articles
● Study scientific products (articles) as data.
● Insights beyond the metadata
● ~200,000 p-values reported in ~30,000
ecology journal articles.
... To quantify the technical level of any theory presented in the articles, we
counted equations, inequalities, and other mathematical expressions (hereafter
referred to simply as “equations”) in the main text and any printed appendixes. We
divided this count by the number of pages to give a measure of equation density,
which ranged from 0 to 7.29 equations per page (mean ± SEM: 0.43 ± 0.04) and was
uncorrelated with the length of the article (r647 = 0.056, P = 0.151). To assess
impact, we obtained citation data for these articles from the Science Citation Index
Expanded on the Thomson Reuters Web of Science in May 2011, excluding any
selfcitations (i.e., citing papers for which one or more of the author surnames
matched one or more of the author surnames for the cited paper). The number of
citations varied widely, ranging from 0 to 374 with a mean ± SEM of 44.80 ± 1.98
citations (excluding self-citations). Controlling for a significant positive effect
of paper length (Table 1, All citations), the use of equations has a striking
influence on this measure of impact. Equation density negatively affects citation
rates, leading on average to 22% fewer citations for each additional equation per
page (Table 1, All citations). We might expect this effect to be driven largely by a
reduction in nontheoretical citations. To investigate this hypothesis, we searched
for the term “model*” (excluding some common empirical uses such as “experimental
model*”) in the title or abstract of the citing articles and used the presence of
this term as a proxy for whether the citing paper was a theoretical one. This search
identified 6,229 (22.2%) of the 28,068 citing articles as “theoretical.” We validated
our proxy by examining a randomly selected subset of 200 citing articles, which
showed that 84.5% were correctly classified as theoretical or nontheoretical. As
expected, the negative effect of equation density is strongest for nontheoretical
papers, which provide 27% fewer citations for each additional equation per page
(Table 1, Nontheoretical citations). Articles less than 10 pages long with up to 0.5
equations per page are just as well ...
5. ● R is an open source data analysis
& statistics language.
● Powerful plotting and statistics built in.
● Huge community of developers and
statisticians providing customized packages to
do just about every data
crunching/analysis/ML task under the sun.
6. Community Meetups
● Getting data hackers together
● Bridging academia and the Real World
● Sharing tools and data
● Collaborating together to bring the awesome