Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hie...Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.展开更多
To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violation...To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.展开更多
The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to...The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.展开更多
Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research ...Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.展开更多
A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early u...A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.展开更多
Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising to...Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.展开更多
Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this res...Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.展开更多
文摘Clustering a social network is a process of grouping social actors into clusters where intra-cluster similarities among actors are higher than inter-cluster similarities. Clustering approaches, i.e. , k-medoids or hierarchical, use the distance function to measure the dissimilarities among actors. These distance functions need to fulfill various properties, including the triangle inequality (TI). However, in some cases, the triangle inequality might be violated, impacting the quality of the resulting clusters. With experiments, this paper explains how TI violates while performing traditional clustering techniques: k-medoids, hierarchical, DENGRAPH, and spectral clustering on social networks and how the violation of TI affects the quality of the resulting clusters.
文摘To understand any statistical tool requires not only an understanding of the relevant computational procedures but also an awareness of the assumptions upon which the procedures are based, and the effects of violations of these assumptions. In our earlier articles (Laverty, Miket, & Kelly [1]) and (Laverty & Kelly, [2] [3]) we used Microsoft Excel to simulate both a Hidden Markov model and heteroskedastic models showing different realizations of these models and the performance of the techniques for identifying the underlying hidden states using simulated data. The advantage of using Excel is that the simulations are regenerated when the spreadsheet is recalculated allowing the user to observe the performance of the statistical technique under different realizations of the data. In this article we will show how to use Excel to generate data from a one-way ANOVA (Analysis of Variance) model and how the statistical methods behave both when the fundamental assumptions of the model hold and when these assumptions are violated. The purpose of this article is to provide tools for individuals to gain an intuitive understanding of these violations using this readily available program.
文摘The cloud service level agreement(SLA)manage the relationship between service providers and consumers in cloud computing.SLA is an integral and critical part of modern era IT vendors and communication contracts.Due to low cost and flexibility more and more consumers delegate their tasks to cloud providers,the SLA emerges as a key aspect between the consumers and providers.Continuous monitoring of Quality of Service(QoS)attributes is required to implement SLAs because of the complex nature of cloud communication.Many other factors,such as user reliability,satisfaction,and penalty on violations are also taken into account.Currently,there is no such policy of cloud SLA monitoring to minimize SLA violations.In this work,we have proposed a cloud SLA monitoring policy by dividing a monitoring session into two parts,for critical and non-critical parameters.The critical and non-critical parameters will be decided on the interest of the consumer during SLA negotiation.This will help to shape a new comprehensive SLA based Proactive Resource Allocation Approach(RPAA)which will monitor SLA at runtime,analyze the SLA parameters and try to find the possibility of SLA violations.We also have implemented an adaptive system for allocating cloud IT resources based on SLA violations and detection.We have defined two main components of SLA-PRAA i.e.,(a)Handler and(b)Accounting and Billing Manager.We have also described the function of both components through algorithms.The experimental results validate the performance of our proposed method in comparison with state-of-the-art cloud SLA policies.
文摘Sustainable development requires overcoming opportunist behavior of economic entities towards environmental compartments.Another form of opportunist behavior is revealed in fraudulent financial reporting.The research objective is statistical comparison of environmental law violation against accounting abuses by Russian enterprises.A research hypothesis is put forward that companies,that violated environmental law,prepare financial reporting mostly incorrectly.An exploratory sampling from the economic entities of Russia,that violated environmental law in the course of various activities,was formed.Financial reporting of the sampling companies was analyzed by virtue of the authorial probit regression model,making it possible to reveal accounting misstatements,both overreporting and underreporting.The obtained results make it possible to assess the interrelations between the environmental law violations and financial reporting.
文摘A result from Kieffer, as outlined at the beginning of the article identifies two different candidates for initial time steps, delta t. We assert that this difference in time steps may be related to a specific early universe Lorentz Violation. The author asserts that the existence of early universe Lorentz violation in turn is assisting in a breakup of primordial black holes. And that also has a tie into Kieffer different time steps as outlined. And the wrap up is given in the final part of this document.
文摘Lorentz Invariance is a foundational principle in modern physics, but some recent quantum gravity theories have hinted that it may be violated at extremely high energies. Gamma-ray bursts (GRBs) provide a promising tool for checking and constraining any deviations from Lorentz Invariance due to their huge energies and cosmological distances. Gamma-ray bursts, which are the most intense and powerful explosions in the universe, are traditionally divided into long bursts whose observed duration exceeds 2 s, and short bursts whose observed duration is less than 2 s. In this study, we employ a recent sample of 46 short GRBs to check for any deviation from Lorentz Invariance. We analyze the spectral lag of the bursts in our data sample and check for any redshift dependence in the GRB rest frame, which would indicate a violation of Lorentz Invariance. Our results are consistent, to within 1σ, with no deviation from Lorentz Invariance.
文摘Aiming at the problem that current geographical information systems(GIS)usually does not maintain semantic and user-defined constraints out of three consistency-constrains(third refers to topology constraint),this research focuses on building an efficient spatial data management system using two constraint violation detection methods.An algorithm for constraint violation detection has been derived to maintain the error-free up-to-date spatial database.Results indicate that the developed constraint violation detection(CVD)system is more efficient compared with conventional systems.