Has come to the researcher's discovery algorithm?

The end of the writing process is written in the name of the personal data in the report. The method of finding the gap between the data presented in the research paper and the dishonesty of the researcher has come. According to a report by the Economist, some of the US researchers have created computer algorithms that are useful for examining the gap between published research. The algorithm set by them could potentially be a blessing for journal or editorial editors.

Some researchers from the United States have created computer algorithms that are useful for examining open-ended research. Symbolic picture: Reuters
The end of the writing process is written in the name of the personal data in the report. The method of finding the gap between the data presented in the research paper and the dishonesty of the researcher has come. According to a report by the Economist, some of the US researchers have created computer algorithms that are useful for examining the gap between published research. The algorithm set by them could potentially be a blessing for journal or editorial editors.

Economists say that the data used in scientific research, which is often used to be open, is not open to everyone. The researchers were asked about the source of the data. But sometimes it does not get to be possible. Of course, now there are some changes in mentality. Yet many researchers still claim to own ownership of their data source. These data have been collected and analyzed by their claims and they do not want to exchange with other rivals.

Although this view of the research seems to be 'self-centered', its cause is unknown and it is considered to be normal. But there are also bad aspects of claiming that the data of research is itself. There may be many occasions to achieve the secret purpose. The statistics that are presented in a study paper may have been curtailed to achieve specific and desired results. In other words, the writer or researcher can take refuge in cheating. If he opens the original source of that data, then his betrayal can become obvious and he can be caught as a fraud. So he wants the source to be hidden.

But that opportunity may not be in the future. Because, it will be difficult to hide information. Specifically, if a data set is set to a full number of data within a known range, it will be more difficult. In response to many questions such as psychological testing. If researchers take cheating in such a data set, it will be easily caught.

Illinois University researcher Shawn Wilner and his colleagues found a solution to the issue. They have created a special type of algorithm. They presented the topic in a research article called 'Syivevik Preintents'. They produced the results criteria that algorithms have created, their name is 'Complete Recovery of Values ​​in Diophantine System' or 'Carvids in Short'.

Researchers have claimed that, in the case of any research data, carvings can be used. If you can not show a valid data set in Corvids while showing any results, then the results will obviously be doubtful. If it can show a well-organized data set, it can be easily understood whether it is trustworthy or not.

The technique of Cravids is that it uses mathematical formulas to find all possible coordinates of numbers. To find possible irregularities, the converts potential data sets into a histogram and create three-dimensional charts. This makes any unusual structure visible. Under this method, if there is any bias in the information collection or if there is fraud in the data then it can be found.

Those who review or edit academic journals may be blessed with the blessing of the Cowwids. You will be able to catch the problem of the paper submitted at the beginning. Then he can tell the problem to the writer or researcher. It will not be necessary to collect statistics by taking separate data related to each research. If there is any unsafe problem, the opportunity to work on systemic issues will be created.

Karvids also has some weaknesses. In some cases it may take a long time to run.

However, there are other algorithms called 'Sample Parameter Reconstruction Via Ethertev Techniques' or 'Sprite' to fill the deficit in the taxways.

James Heather of North Eastern University in Boston, USA, describes the story of Spirits in the 'Pierre's Priions' magazine. According to him, the Sprite is the 'Heuristic Search Algorithm'. This means that it can not show all possible results in this method. However, it can speed up early primary work. If it does not show any strange data, it can be trusted.

The Economist says that many statistical reports of statistics have spread in the study articles. Now there are many available randomized research. This kind of fraud can easily be caught due to the presence of the algorithm, such as carvids and sprays. In the field of scientific research the credibility of the study will move one step further.

sourch:prothomalo

More: News

COMMENTS

BLOGGER
Name

Android Apps,1,Blogging,3,China,1,Computer,3,Cricket,1,Decoration,1,Digital Marketing,2,Economy,2,Education News,1,Facebook,10,FIFA,4,Finance,2,Football,4,Google,2,Google Pixel king of selfie?,1,Guest Post,13,Health news,5,How to,2,Life Style,2,Make Money Online,4,Mobile Phone,11,Mobile Review,1,Myanmar,2,NASA's Parker is near the Sun.,1,News,17,Online Business,5,politics,3,Review,1,Security,2,Social Media,9,Sports News,6,Tech News,98,Tennis News,1,USA,5,Yahoo,1,YouTube,1,
ltr
item
ITInfoWorld.org: Has come to the researcher's discovery algorithm?
Has come to the researcher's discovery algorithm?
The end of the writing process is written in the name of the personal data in the report. The method of finding the gap between the data presented in the research paper and the dishonesty of the researcher has come. According to a report by the Economist, some of the US researchers have created computer algorithms that are useful for examining the gap between published research. The algorithm set by them could potentially be a blessing for journal or editorial editors.
https://1.bp.blogspot.com/-hUfgmUpKbGU/WzECoEI34hI/AAAAAAAAABg/Icr3JLZAsIAwPl7emi_Jp_00SqtwjUeqACLcBGAs/s640/news.jpg
https://1.bp.blogspot.com/-hUfgmUpKbGU/WzECoEI34hI/AAAAAAAAABg/Icr3JLZAsIAwPl7emi_Jp_00SqtwjUeqACLcBGAs/s72-c/news.jpg
ITInfoWorld.org
https://www.itinfoworld.org/2018/06/has-come-to-researchers-discovery.html
https://www.itinfoworld.org/
https://www.itinfoworld.org/
https://www.itinfoworld.org/2018/06/has-come-to-researchers-discovery.html
true
1300099689924863944
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All We recommended for you more: Category ARCHIVE Your Search ALL POSTS Sorry! your search did not match any article or documents.

My Suggestions for you:

Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy