Datasets:
The full dataset viewer is not available (click to read why). Only showing a preview of the rows.
Error code: DatasetGenerationCastError
Exception: DatasetGenerationCastError
Message: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 1 new columns ({'authorships'})
This happened while the json dataset builder was generating data using
hf://datasets/Reviewerly/exHarmony/papers_test_judgeable.jsonl (at revision b2f64cbcb531a437a4007b57dbe71fb3f38f376b), [/tmp/hf-datasets-cache/medium/datasets/99180191215477-config-parquet-and-info-Reviewerly-exHarmony-5eab01d1/hub/datasets--Reviewerly--exHarmony/snapshots/b2f64cbcb531a437a4007b57dbe71fb3f38f376b/papers_test_judgeable.jsonl (origin=hf://datasets/Reviewerly/exHarmony@b2f64cbcb531a437a4007b57dbe71fb3f38f376b/papers_test_judgeable.jsonl)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)
Traceback: Traceback (most recent call last):
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1887, in _prepare_split_single
writer.write_table(table)
File "/usr/local/lib/python3.12/site-packages/datasets/arrow_writer.py", line 674, in write_table
pa_table = table_cast(pa_table, self._schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2272, in table_cast
return cast_table_to_schema(table, schema)
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/table.py", line 2218, in cast_table_to_schema
raise CastError(
datasets.table.CastError: Couldn't cast
id: string
title: string
abstract: string
authorships: list<item: struct<author_position: string, author: struct<id: string, display_name: string, orcid: s (... 381 chars omitted)
child 0, item: struct<author_position: string, author: struct<id: string, display_name: string, orcid: string>, ins (... 369 chars omitted)
child 0, author_position: string
child 1, author: struct<id: string, display_name: string, orcid: string>
child 0, id: string
child 1, display_name: string
child 2, orcid: string
child 2, institutions: list<item: struct<id: string, display_name: string, ror: string, country_code: string, type: string, (... 67 chars omitted)
child 0, item: struct<id: string, display_name: string, ror: string, country_code: string, type: string, country_id (... 55 chars omitted)
child 0, id: string
child 1, display_name: string
child 2, ror: string
child 3, country_code: string
child 4, type: string
child 5, country_id: string
child 6, type_id: string
child 7, lineage: list<item: string>
child 0, item: string
child 3, countries: list<item: string>
child 0, item: string
child 4, country_ids: list<item: string>
child 0, item: string
child 5, is_corresponding: bool
child 6, raw_author_name: string
child 7, raw_affiliation_strings: list<item: string>
child 0, item: string
child 8, raw_affiliation_string: string
to
{'id': Value('string'), 'title': Value('string'), 'abstract': Value('string')}
because column names don't match
During handling of the above exception, another exception occurred:
Traceback (most recent call last):
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 1347, in compute_config_parquet_and_info_response
parquet_operations = convert_to_parquet(builder)
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/src/services/worker/src/worker/job_runners/config/parquet_and_info.py", line 980, in convert_to_parquet
builder.download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 884, in download_and_prepare
self._download_and_prepare(
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 947, in _download_and_prepare
self._prepare_split(split_generator, **prepare_split_kwargs)
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1736, in _prepare_split
for job_id, done, content in self._prepare_split_single(
^^^^^^^^^^^^^^^^^^^^^^^^^^^
File "/usr/local/lib/python3.12/site-packages/datasets/builder.py", line 1889, in _prepare_split_single
raise DatasetGenerationCastError.from_cast_error(
datasets.exceptions.DatasetGenerationCastError: An error occurred while generating the dataset
All the data files must have the same columns, but at some point there are 1 new columns ({'authorships'})
This happened while the json dataset builder was generating data using
hf://datasets/Reviewerly/exHarmony/papers_test_judgeable.jsonl (at revision b2f64cbcb531a437a4007b57dbe71fb3f38f376b), [/tmp/hf-datasets-cache/medium/datasets/99180191215477-config-parquet-and-info-Reviewerly-exHarmony-5eab01d1/hub/datasets--Reviewerly--exHarmony/snapshots/b2f64cbcb531a437a4007b57dbe71fb3f38f376b/papers_test_judgeable.jsonl (origin=hf://datasets/Reviewerly/exHarmony@b2f64cbcb531a437a4007b57dbe71fb3f38f376b/papers_test_judgeable.jsonl)]
Please either edit the data files to have matching columns, or separate them into different configurations (see docs at https://hf.co/docs/hub/datasets-manual-configuration#multiple-configurations)Need help to make the dataset viewer work? Make sure to review how to configure the dataset viewer, and open a discussion for direct support.
id string | title string | abstract string |
|---|---|---|
https://openalex.org/W4323317762 | Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis | Blockchain technology has been gaining great interest from a variety of sectors including healthcare, supply chain, and cryptocurrencies. However, Blockchain suffers from a limited ability to scale (i.e., low throughput and high latency). Several solutions have been proposed to tackle this. In particular, sharding has ... |
https://openalex.org/W4323317989 | Blockchain-Based Continuous Knowledge Transfer in Decentralized Edge Computing Architecture | Edge computing brings computational ability to network edges to enable low latency based on deploying devices close to the environment where the data is generated. Nevertheless, the limitation of size and energy consumption constrain the scalability and performance of edge device applications such as deep learning, alt... |
https://openalex.org/W4323318830 | Object Detection for Hazardous Material Vehicles Based on Improved YOLOv5 Algorithm | Hazardous material vehicles are a non-negligible mobile source of danger in transport and pose a significant safety risk. At present, the current detection technology is well developed, but it also faces a series of challenges such as a significant amount of computational effort and unsatisfactory accuracy. To address ... |
https://openalex.org/W4323319174 | A survey on what users think about SysML | Abstract Systems Modeling Language (SysML) has been applied in the past years to a variety of software and systems engineering projects, by hundreds of researchers, engineers, and other systems and software professionals. Thus, it is expected that all this experience has been described in research articles. Therefore, ... |
https://openalex.org/W4323322219 | Distance transform learning for structural and functional analysis of coronary artery from dual-view angiography | The structural and functional analysis of coronary arteries in X-ray angiography (XRA) images has great clinical importance for the intraoperative treatment of coronary artery disease. However, due to the complexity of image surroundings, the non-intuition of functional information, and the complex relationships betwee... |
https://openalex.org/W4323338301 | A Data Augmentation Method for English-Vietnamese Neural Machine Translation | The translation quality of machine translation systems depends on the parallel corpus used for training, in particular the quantity and quality of the corpus.However, building a high-quality and large-scale parallel corpus is complex and expensive, particularly for a specific domain parallel corpus.Therefore, data augm... |
https://openalex.org/W4323338343 | Coherent Long-Time Integration and Bayesian Detection With Bernoulli Track-Before-Detect | We consider the problem of detecting small and manoeuvring objects with staring array radars. Coherent processing and long-time integration are key to addressing the undesirably low signal-to-noise/background conditions in this scenario and are complicated by the object manoeuvres. We propose a Bayesian solution that b... |
https://openalex.org/W4323338406 | Semi-Supervised Variational User Identity Linkage via Noise-Aware Self-Learning | User identity linkage, which aims to link identities of a natural person across different social platforms, has attracted increasing research interest recently. Existing approaches usually first embed the identities as deterministic vectors in a shared latent space, and then learn a classifier based on the available an... |
https://openalex.org/W4323338519 | Gradient Prior Dilated Convolution Network for Remote Sensing Image Super-Resolution | Super-resolution (SR) aims to recover highresolution (HR) image from a single or multiple low-resolution (LR) images, compensating for the limitations of satellite sensor imaging. Deep convolutional neural networks (CNN) have made great achievement in remote sensing image super resolution. In this letter, we propose a ... |
https://openalex.org/W4323338593 | Toward Interactive Self-Supervised Denoising | Self-supervised denoising frameworks have recently been proposed to learn denoising models without noisy-clean image pairs, showing great potential in various applications. The denoising model is expected to produce visually pleasant images without noise patterns. However, it is non-trivial to achieve this goal using s... |
https://openalex.org/W4323338721 | Breast Cancer Classification Using Equivariance Transition in Group Convolutional Neural Networks | In computer vision, rotation equivariance and translation invariance are properties of a representation that preserve the geometric structure of a transformed input. These properties are achieved in Convolutional Neural Networks (CNNs) through data augmentation. However, achieving these properties remains a challenge. ... |
https://openalex.org/W4323339337 | Robot Dynamic Path Planning Based on Improved A* and DWA Algorithms | When the traditional A* algorithm is applied to robot path planning, it has the problems of low efficiency and unable to avoid obstacles dynamically. In order to solve the above problems, a fusion algorithm based on improved A* algorithm and DWA algorithm is proposed. The A* algorithm is improved in three aspects: redu... |
https://openalex.org/W4323340108 | Extraction of Validating Shapes from Very Large Knowledge Graphs | Knowledge Graphs (KGs) represent heterogeneous domain knowledge on the Web and within organizations. There exist shapes constraint languages to define validating shapes to ensure the quality of the data in KGs. Existing techniques to extract validating shapes often fail to extract complete shapes, are not scalable, and... |
https://openalex.org/W4323343882 | Auto-Tuning with Reinforcement Learning for Permissioned Blockchain Systems | In a permissioned blockchain, performance dictates its development, which is substantially influenced by its parameters. However, research on auto-tuning for better performance has somewhat stagnated because of the difficulty posed by distributed parameters; thus, it is possible only with difficulty to propose an effec... |
https://openalex.org/W4323344903 | Model for Storing Tokens in Local Storage (Cookies) Using JSON Web Token (JWT) with HMAC (Hash-based Message Authentication Code) in E-Learning Systems | E-learning is a technology that may be used in the learning process to improve not only the distribution of learning materials but also the ability of learners to modify their abilities of various competencies contained in a database. A Web Service is used to integrate the data. Web Service is a set of standards and pr... |
https://openalex.org/W4323345705 | Feature Selection in the Data Stream Based on Incremental Markov Boundary Learning | Recent years have witnessed the proliferation of techniques for streaming data mining to meet the demands of many real-time systems, where high-dimensional streaming data are generated at high speed, increasing the burden on both hardware and software. Some feature selection algorithms for streaming data are proposed t... |
https://openalex.org/W4323345795 | Communication With Unreliable Entanglement Assistance | Entanglement resources can increase transmission rates substantially. Unfortunately, entanglement is a fragile resource that is quickly degraded by decoherence effects. In order to generate entanglement for optical communication, the transmitter and the receiver first prepare entangled spin-photon pairs locally, and th... |
https://openalex.org/W4323345893 | <i>D</i>-Semifaithful Codes That are Universal Over Both Memoryless Sources and Distortion Measures | We prove the existence of codebooks for <inline-formula xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink"> <tex-math notation="LaTeX">$d$ </tex-math></inline-formula> -semifaithful lossy compression that are simultaneously universal with respect to both the class of finite-alphab... |
https://openalex.org/W4323349042 | SoK: Managing risks of linkage attacks on data privacy | Novel attacks on dataset privacy are usually met with the same range of responses: surprise that a route to information gain exists from information previously thought to be safe; disputes around the viability or validity of the attack in real-world contexts; and, in the case of the computer science community, a drive ... |
https://openalex.org/W4323349954 | A Quantum Image Watermarking Scheme Based on Quantum Hilbert Scrambling and Steganography about the Moiré Fringe | In order to boost the security and confidentiality of information in quantum images, on the foundation of the NEQR model, a novel quantum watermarking scheme combining quantum Hilbert scrambling with steganography based on the Moiré fringe is designed in this paper. First of all, for carrier image, and watermark image,... |
https://openalex.org/W4323350879 | Patch loss: A generic multi-scale perceptual loss for single image super-resolution | In single image super-resolution (SISR), although PSNR is a key metric for signal fidelity, images with high PSNR do not necessarily render high visual quality. As a result, current perception-driven SISR methods employ perceptual metrics close to the human eye to measure the quality of the generated images. Unfortunat... |
https://openalex.org/W4323350962 | A meta-framework for multi-label active learning based on deep reinforcement learning | Multi-label Active Learning (MLAL) is an effective method to improve the performance of the classifier on multi-label problems with less annotation effort by allowing the learning system to actively select high-quality examples (example-label pairs) for labeling. Existing MLAL algorithms mainly focus on designing reaso... |
https://openalex.org/W4323353770 | Information security for big data using the NTRUEncrypt method | Cloud computing processes vast quantities of data and offers a variety of flexible, secure, on-demand, and cost-effective collaboration options for consumers. Due to the increasing prevalence of hosted services, data security has become an increasingly critical concern. Hadoop, the engine at the heart of cloud computin... |
https://openalex.org/W4323362291 | Interval-Valued Hesitant Fuzzy DEMATEL-Based Blockchain Technology Adoption Barriers Evaluation Methodology in Agricultural Supply Chain Management | Blockchain technology is emerging and has high potential to improve and transform the agricultural supply chain. This study investigates the critical barriers to blockchain technology adoption in the Vietnamese agricultural supply chain using a novel interval-valued hesitant fuzzy Decision-Making Trial and Evaluation L... |
https://openalex.org/W4323362765 | Noise simulation in classification with the noisemodel R package: Applications analyzing the impact of errors with chemical data | Abstract Classification datasets created from chemical processes can be affected by errors, which impair the accuracy of the models built. This fact highlights the importance of analyzing the robustness of classifiers against different types and levels of noise to know their behavior against potential errors. In this c... |
https://openalex.org/W4323363009 | A similarity-enhanced hybrid group recommendation approach in cloud manufacturing systems | With the development of cloud manufacturing (CMfg), a huge amount of services appears on the Internet, which makes recommender systems in CMfg service a promising research field. To this end, recent studies mainly focus on solving individual recommendation to meet the requirements of every user. However, due to the tim... |
https://openalex.org/W4323363041 | Multi-occupant dynamic thermal comfort monitoring robot system | Nowadays occupant thermal comfort has been a research focus for people’s increasing indoor time and its potential influence on productivity. Efforts have been paid to develop thermal comfort monitoring systems for building environments. Fixed sensors might be less efficient for non-uniform environment distribution. To ... |
https://openalex.org/W4323364094 | “Everything will be all right (?)”: Discourses on COVID-19 in the Italian linguistic landscape | The study of the linguistic landscape (LL) focuses on the representations of languages on signs placed in the public space and on the ways in which individuals interact with these elements. Regulatory, infrastructural, commercial, and transgressive discourses, among others, emerge in these spaces, overlapping, compleme... |
https://openalex.org/W4323364603 | A Study on the Effectiveness of Deep Learning-Based Anomaly Detection Methods for Breast Ultrasonography | In the medical field, it is delicate to anticipate good performance in using deep learning due to the lack of large-scale training data and class imbalance. In particular, ultrasound, which is a key breast cancer diagnosis method, is delicate to diagnose accurately as the quality and interpretation of images can vary d... |
https://openalex.org/W4323519265 | Bitstream-Based Perceptual Quality Assessment of Compressed 3D Point Clouds | With the increasing demand of compressing and streaming 3D point clouds under constrained bandwidth, it has become ever more important to accurately and efficiently determine the quality of compressed point clouds, so as to assess and optimize the quality-of-experience (QoE) of end users. Here we make one of the first ... |
https://openalex.org/W4323519382 | Speeding at the Edge: An Efficient and Secure Redactable Blockchain for IoT-Based Smart Grid Systems | As a promising approach to extending cloud resources and services, blockchain-enabled Internet of Things (IoT)-based smart grid edge computing has attracted much attention. However, the edge node’s resource-constraint nature makes it difficult to store the entire chain as the sensing IoT data volume increases. To addre... |
https://openalex.org/W4323519386 | Detecting Anomalies in Small Unmanned Aerial Systems via Graphical Normalizing Flows | With the increasing deployment of small unmanned aerial systems (sUASs) on various tasks, it becomes crucial to analyze and detect anomalies from their flight logs. To support research in this area, we curate Drone Log Anomaly (DLA), the first real-world time series anomaly detection dataset in the domain of sUASs, whi... |
https://openalex.org/W4323519610 | A Study on the Impact of Gender, Employment Status, and Academic Discipline on Cyber-Hygiene: A Case Study of University of Nigeria, Nsukka | The COVID-19 pandemic has helped amplify the importance of Cyber-hygiene. As the reliance on the Internet and IT services increased during the pandemic, this in turn has introduced a new wave of criminal activities such as cybercrimes. With the emergent of COVID-19 which lead to increase in cyber-attack incidents, the ... |
https://openalex.org/W4323520568 | The Data Leakage Sentiment Analysis Using Naive Bayes Algorithm Based on Machine Learning Approach | Data leakage is a case that often occurs anywhere. Indonesia is one of the countries with the most population that is currently having data leakage cases. The leak of data on the COVID-19 PeduliLindung tracking application, triggered a public reaction because it was considered dangerous. Based on this, the aim of the s... |
https://openalex.org/W4323520607 | Task Allocation and Path Planning Method For Multi-Autonomous Forklift Navigation | The growth of the e-commerce sector necessitates the automation of warehouses. For the optimal automated warehouse, multi-autonomous forklift research is vital. Factors including computing time, safe navigation, and task effectiveness must be carefully taken into account. In this work, we suggest a system that particip... |
https://openalex.org/W4323520657 | Text Classification Using Machine Learning Techniques: Comparative Analysis | Sharing short reviews on Social Networking Sites has contributed to rising textual data. For this short review text, needed a text classification model to identify short texts, organize them in structured form to define predefined classes efficiently and accurately. In this paper, Imdb movie review text classification ... |
https://openalex.org/W4323520713 | Text Summarization using Textrank and Lexrank through Latent Semantic analysis | This paper's goal is to investigate the applicability of three distinct text summary algorithms to the realm of blogs, with the ultimate goal of identifying the most precise method for indicating a highly trustworthy automatic summarization tool. The most important component of summarizing is selecting a sample that is... |
https://openalex.org/W4323520780 | Software Fault Prediction Using Machine Learning Models | In recent years, computers have great role to the society for their reliability which becoms a key essential in day to day life. The role of software and its captious function in computer system for some certain software has appeared as important achievement for certain infrastructure. Exploitation of system perspectiv... |
https://openalex.org/W4323520834 | AI-based Block Identification and Classification in the Blockchain Integrated IoT | Artificial Intelligence (AI) is gaining popularity in the Internet of Things (IoT) based application-based solution development. Whereas, Blockchain is become unavoidable in IoT for maintaining the end-to-end process in the decentralized approach. Combining these two current-age technologies, this paper details a brief... |
https://openalex.org/W4323520837 | Hierarchical Over-the-Air FedGradNorm | Multi-task learning (MTL) is a learning paradigm to learn multiple related tasks simultaneously with a single shared network where each task has a distinct personalized header network for fine-tuning. MTL can be integrated into a federated learning (FL) setting if tasks are distributed across clients and clients have a... |
https://openalex.org/W4323520876 | Rate Distortion Tradeoff in Private Read Update Write in Federated Submodel Learning | We investigate the rate distortion tradeoff in private read update write (PRUW) in relation to federated submodel learning (FSL). In FSL a machine learning (ML) model is divided into multiple submodels based on different types of data used for training. Each user only downloads and updates the submodel relevant to its ... |
https://openalex.org/W4323520891 | Convolutional Block Design for Learned Fractional Downsampling | The layers of convolutional neural networks (CNNs) can be used to alter the resolution of their inputs, but the scaling factors are limited to integer values. However, in many image and video processing applications, the ability to resize by a fractional factor would be advantageous. One example is conversion between r... |
https://openalex.org/W4323521092 | Inverse Cognition in Nonlinear Sensing Systems | Inverse cognition aims to estimate the ‘estimate’ of a defender's state inferred by an adversarial cognitive system such as radar when the defender observes the attacker's actions in a noisy environment. We develop an inverse extended Kalman filter (IEKF) to address inverse cognition in a non-linear system setting. We ... |
https://openalex.org/W4323527626 | CALIPSO: A Differentiable Solver for Trajectory Optimization with Conic and Complementarity Constraints | We present a new solver for non-convex trajectory optimization problems that is specialized for robotics applications. CALIPSO, or the Conic Augmented Lagrangian Interior-Point SOlver, combines several strategies for constrained numerical optimization to natively handle second-order cones and complementarity constraint... |
https://openalex.org/W4323537215 | Visuo-Textual Explanations of a Robot's Navigational Choices | With the rise in the number of robots in our daily lives, human-robot encounters will become more frequent. To improve human-robot interaction (HRI), people will require explanations of robots' actions, especially if they do something unexpected. Our focus is on robot navigation, where we explain why robots make specif... |
https://openalex.org/W4323537343 | Creative AI for HRI Design Explorations | Design fixation, a phenomenon describing designers' adherence to pre-existing ideas or concepts that constrain design outcomes, is particularly prevalent in human-robot interaction (HRI), for example, due to collectively held and stabilised imaginations of what a robot should look like or behave. In this paper, we expl... |
https://openalex.org/W4323538534 | New wafer shape measurement technique for 300mm blank vertically held silicon wafer | Wave Front Phase Imaging (WFPI) is a new technique for measuring the free shape of a silicon wafer. To avoid the effects of gravity affecting the wafer shape, the silicon wafer is held vertically while measured using a custom made three-point wafer holder. The wave front phase is measuring using a non-coherent light so... |
https://openalex.org/W4323543671 | Space-to-speed architecture supporting acceleration on VHR image processing | One of the major focuses in the remote sensing community is the rapid processing of deep neural networks (DNNs) on very high resolution (VHR) aerial images. Few studies have investigated the acceleration of training and prediction by optimizing the architecture of the DNN system rather than designing a lightweight DNN.... |
https://openalex.org/W4323545768 | Counterfactual attention alignment for visible-infrared cross-modality person re-identification | Visible-infrared person re-identification (VI-ReID) copes with cross-modality matching between the daytime visible and night-time infrared images. Existing methods try to use attention modules to enhance multi-modality feature representations, but ignore measures of attention quality and lack direct and effective super... |
https://openalex.org/W4323565097 | Weight distributions of generalized quasi-cyclic codes over <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML" altimg="si1.svg"><mml:msub><mml:mrow><mml:mi mathvariant="double-struck">F</mml:mi></mml:mrow><mml:mrow><mml:mi>q</mml:mi></mml:mrow></mml:msub><mml:mo linebreak="goodbreak" linebreakstyle="after">+</mml... | In this paper, by Gauss sums, we determine Hamming weight distributions of generalized quasi-cyclic (GQC) codes over the finite chain ring Fq+uFq, where u2=0. As applications, some new infinite families of minimal linear codes with WminWmax≤q−1q and projective two-weight codes are constructed. |
https://openalex.org/W4323565430 | How VR Technological Features Prompt Tourists’ Visiting Intention: An Integrated Approach | To achieve sustainable tourism, the tourism development authorities have used advanced technologies to promote destinations, attract visitors, and protect the environment. Accordingly, while the available research on tourism technologies indicates that virtual reality (VR) matters in the visit intention of potential to... |
https://openalex.org/W4323566680 | Transfer Learning and Analogical Inference: A Critical Comparison of Algorithms, Methods, and Applications | Artificial intelligence and machine learning (AI/ML) research has aimed to achieve human-level performance in tasks that require understanding and decision making. Although major advances have been made, AI systems still struggle to achieve adaptive learning for generalization. One of the main approaches to generalizat... |
https://openalex.org/W4323566976 | The weaponization of artificial intelligence: What the public needs to be aware of | Technological progress has brought about the emergence of machines that have the capacity to take human lives without human control. These represent an unprecedented threat to humankind. This paper starts from the example of chemical weapons, now banned worldwide by the Geneva protocol, to illustrate how technological ... |
https://openalex.org/W4323568917 | Blockchain-Based Decentralized Identification in IoT: An Overview of Existing Frameworks and Their Limitations | The popularity of the Internet of Things (IoT) and Industrial IoT (IIoT) has caused a rapid increase in connected entities and exposed its lack of adequate Identity Management (IdM). Traditional IdM systems are highly dependent on central authorities; any failure can potentially compromise the entire system. To elimina... |
https://openalex.org/W4323644068 | Adaptive Kernel Kalman Filter | Sequential Bayesian filters in non-linear dynamic systems require the recursive estimation of the predictive and posterior distributions. This paper introduces a Bayesian filter called the adaptive kernel Kalman filter (AKKF). With this filter, the arbitrary predictive and posterior distributions of hidden states are a... |
https://openalex.org/W4323644329 | SMNet: Synchronous Multi-Scale Low Light Enhancement Network With Local and Global Concern | Limited by objectively poor lighting conditions and hardware devices, low-light images with low visual quality and low visibility are inevitable in the real world. Accurate local details and reasonable global information play their essential and distinct roles in low-light image enhancement: local details contribute to... |
https://openalex.org/W4323645693 | Gumbel MuZero for the Game of 2048 | In recent years, AlphaZero and MuZero have achieved remarkable success in a broad range of applications. AlphaZero masters playing without human knowledge, while MuZero also learns the game rules and environment's dynamics without the access to a simulator during planning, which makes it applicable to complex environme... |
https://openalex.org/W4323654309 | An Adaptive Learning Environment for Programming Based on Fuzzy Logic and Machine Learning | In this paper, we present an Intelligent Tutoring System (ITS), for use in teaching the logic of computer programming and the programming language ‘C’. The aim of the ITS is to adapt the delivered learning material and the lesson sequence to the knowledge level and learning needs of each individual student. The adaptat... |
https://openalex.org/W4323654402 | Prostate cancer classification with MRI using Taylor-Bird Squirrel Optimization based Deep Recurrent Neural Network | Prostate cancer is a type of cancer that develops in the prostate. The prostate is a little gland in men that resembles a walnut and secretes seminal fluid, which nourishes and transports sperm. A Taylor-Bird Squirrel Optimization based Deep Recurrent Neural Network (Taylor-BSO based Deep RNN) is created to determine t... |
https://openalex.org/W4323654530 | Image encryption algorithm based on 2D‐CLICM chaotic system | Abstract Image encryption algorithm based on a two‐dimensional Chebyshev‐Logistic‐Infinite Collapse Map (2D‐CLICM) is proposed. A new two‐dimensional chaotic map is designed, and numerical studies show that 2D‐CLICM has a larger chaotic region, better randomness and more complex chaotic behavior. An image encryption al... |
https://openalex.org/W4323656255 | flowMC: Normalizing flow enhanced sampling package for probabilistic inference in JAX | Across scientific fields, the Bayesian framework is used to account for uncertainties in inference (Ellison, 2004;Lancaster, 2004;Von Toussaint, 2011).However, for models with more than a few parameters, exact inference is intractable.A frequently used strategy is to approximately sample the posterior distribution on a... |
https://openalex.org/W4323656858 | A Deterministic Kaczmarz Algorithm for Solving Linear Systems | .We propose a new deterministic Kaczmarz algorithm for solving consistent linear systems \(A{\bf x}={\bf b}\) . Basically, the algorithm replaces orthogonal projections with reflections in the original scheme of Stefan Kaczmarz. Building on this, we give a geometric description of solutions of linear systems. Suppose \... |
https://openalex.org/W4323659873 | Commonsense knowledge graph-based adapter for aspect-level sentiment classification | Attention- and graph-based models are widely applied to existing aspect-level sentiment classification (ALSC) tasks. In spite of the effectiveness, most of these studies ignore commonsense knowledge of aspects. When sentences have the same syntactic structures and opinion words, the sentiment polarities toward aspects ... |
https://openalex.org/W4323660266 | Visual-semantic consistency matching network for generalized zero-shot learning | Generalized zero-shot learning aims to classify samples of seen and unseen classes by providing only the labels of seen classes. Most GZSL methods directly associate seen classes' visual features with semantic information or leverage semantic information to synthesize samples of unseen classes to transfer the knowledge... |
https://openalex.org/W4323661409 | Using 360-degree immersive videos to assess multiple transdiagnostic symptoms: A study focusing on fear of negative evaluation, paranoid thoughts, negative automatic thoughts, and craving | Over the last 20 years, virtual reality (VR) has gained a great interest for both assessment and treatment of various psychopathologies. However, due to high costs and material specificity, VR remains disadvantageous for clinicians. Adopting a multiple transdiagnostic approach, this study aims at testing the validity o... |
https://openalex.org/W4323663038 | Transformer-Based Visual Grounding with Cross-Modality Interaction | This article tackles the challenging yet important task of Visual Grounding (VG), which aims to localize a visual region in the given image referred by a natural language query. Existing efforts on the VG task are twofold: (1) two-stage methods first extract region proposals and then rank them according to their simila... |
https://openalex.org/W4323663531 | An Accelerated Double-Integral ZNN with Resisting Linear Noise for Dynamic Sylvester Equation Solving and Its Application to the Control of the SFM Chaotic System | The dynamic Sylvester equation (DSE) is frequently encountered in engineering and mathematics fields. The original zeroing neural network (OZNN) can work well to handle DSE under a noise-free environment, but may not work in noise. Though an integral-enhanced zeroing neural network (IEZNN) can be employed to solve the ... |
https://openalex.org/W4323663595 | Automated Arabic Long-Tweet Classification Using Transfer Learning with BERT | Social media platforms like Twitter are commonly used by people interested in various activities, interests, and subjects that may cover their everyday activities and plans, as well as their thoughts on religion, technology, or the products they use. In this paper, we present bidirectional encoder representations from ... |
https://openalex.org/W4323664374 | UAV Abnormal State Detection Model Based on Timestamp Slice and Multi-Separable CNN | With the rapid development of UAVs (Unmanned Aerial Vehicles), abnormal state detection has become a critical technology to ensure the flight safety of UAVs. The position and orientation system (POS) data, etc., used to evaluate UAV flight status are from different sensors. The traditional abnormal state detection mode... |
https://openalex.org/W4323664888 | Multi-view clustering via matrix factorization assisted k-means | Matrix factorization based multi-view clustering algorithms has attracted much attention in recent years due to the strong interpretability and efficient implementation. In general, these approaches firstly compute the coefficient matrices of each data views, and learn a consensus matrix simultaneously. By applying the... |
https://openalex.org/W4323665430 | Deep convolutional neural networks using an active learning strategy for cervical cancer screening and diagnosis | Cervical cancer (CC) is the fourth most common malignant tumor among women worldwide. Constructing a high-accuracy deep convolutional neural network (DCNN) for cervical cancer screening and diagnosis is important for the successful prevention of cervical cancer. In this work, we proposed a robust DCNN for cervical canc... |
https://openalex.org/W4323666674 | Strategic academic leadership and high-tech economic growth | Considering the context of the Fourth Industrial Revolution, higher education must play a significant role in the social-investment model of economic growth. To what extent higher education supports strategic academic leadership and high-tech economic development is still being determined. The article proposes direct a... |
https://openalex.org/W4323668014 | Spatiotemporal adaptive attention 3D multiobject tracking for autonomous driving | Three-dimensional (3D) multiobject tracking (MOT) is an essential perception task for autonomous vehicles (AVs). Studies have indicated that multimodal data fusion can provide more stable and efficient perception information to AVs than a single sensor. Therefore, this paper proposes a new spatiotemporal adaptive atten... |
https://openalex.org/W4323769994 | Metanalysis: A connected-wall video installation based on the movement of traditional Chinese ink painting | The authors present the visual display installation as the basis for creating the artwork series “Metanalysis”. The work explores the visual algorithmic representation of traditional Chinese ink painting and provides a video installation designed to showcase this visualization project. Exploring these visual representa... |
https://openalex.org/W4323777564 | Stumbling Blocks and Alternative Paths: Reconsidering the Walkthrough Method for Analyzing Apps | The walkthrough method was developed as a way to trace an app or platform’s technological mechanisms and cultural references to understand how it guides users. This article explores the method’s enduring strengths and emergent weaknesses regarding technological advances and developments in app studies. It engages with ... |
https://openalex.org/W4323794385 | A Theoretical Framework for End-to-End Learning of Deep Neural Networks With Applications to Robotics | Deep Learning (DL) systems are difficult to analyze and proving convergence of DL algorithms like backpropagation is an extremely challenging task as it is a highly non-convex and high-dimensional problem. When using DL algorithms in robotic systems, theoretical analysis of stability, convergence, and robustness is a v... |
https://openalex.org/W4323794423 | PCSF: Privacy-Preserving Content-Based Spam Filter | The purpose of privacy-preserving spam filtering is to inspect email while preserving the privacy of its detection rules and the email content. Although many solutions have emerged, they suffer from the following: 1) The <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">p... |
https://openalex.org/W4323794864 | Enhanced Vehicle Re-Identification for Smart City Applications Using Zone Specific Surveillance | Vehicle re-identification is an important feature of an intelligent transportation system as part of a smart city application. Vehicle re-identification aims at matching vehicles from images acquired by surveillance cameras at different locations. During rush hours, vehicles are densely occupied across regions such as ... |
https://openalex.org/W4323795150 | Toward Realistic 3D Human Motion Prediction With a Spatio-Temporal Cross- Transformer Approach | Human motion prediction intends to predict how humans move given a historical sequence of 3D human motions. Recent transformer-based methods have attracted increasing attentions and demonstrated their promising performance in 3D human motion prediction. However, existing methods generally decompose the input of human m... |
https://openalex.org/W4323830248 | Video captioning: A comparative review of where we are and which could be the route | Video captioning is the process of describing the content of a sequence of images capturing its semantic relationships and meanings. Dealing with this task with a single image is arduous, not to mention how difficult it is for a video (or image sequence). The amount and relevance of the applications of video captioning... |
https://openalex.org/W4323851615 | Multi-UAV Path Planning in GPS and Communication Denial Environment | This paper proposes a feature fusion algorithm for solving the path planning problem of multiple unmanned aerial vehicles (UAVs) using GPS and communication denial conditions. Due to the blockage of GPS and communication, UAVs cannot obtain the precise position of a target, which leads to the failure of path planning a... |
https://openalex.org/W4323852638 | A Novel Image Classification Method Based on Residual Network, Inception, and Proposed Activation Function | In deeper layers, ResNet heavily depends on skip connections and Relu. Although skip connections have demonstrated their usefulness in networks, a major issue arises when the dimensions between layers are not consistent. In such cases, it is necessary to use techniques such as zero-padding or projection to match the di... |
https://openalex.org/W4323869131 | Controlling fracture propagation using deep reinforcement learning | Mechanical discontinuity embedded in a material plays an essential role in determining the bulk mechanical, physical, and chemical properties. The ability to control mechanical discontinuity is relevant for industries dependent on natural, synthetic and composite materials, e.g. construction, aerospace, oil and gas, ce... |
https://openalex.org/W4323870331 | <i>iVisit-Communicate</i> for AEC Education: Using Virtual Humans to Practice Communication Skills in 360-Degree Virtual Field Trips | To prepare graduates for the dynamic and complex working environment in the architecture, engineering, and construction (AEC) industry, educational institutions have distinctly emphasized the significance of communication skills. Field trips are a widely utilized strategy to provide students with a situated learning se... |
https://openalex.org/W4323870502 | Coffee, Tea, Robots? | We present an ethnographic observational study of six robot cafes in Japan to understand how service robots are performatively staged and presented to the public. We particularly attend to the diverse ways in which the physical setting and ambience of the cafes, the verbal characterization of and staff behaviors toward... |
https://openalex.org/W4323891817 | IRE: Improved Image Super-Resolution Based on Real-ESRGAN | Image degradation technique has been the focus of current research in image superresolution(SR).The High-order Deterioration Model(HDM) of Real-ESRGAN is more effective than the conventional bicubic kernel interpolation in simulating the degradation of real-world images.However, the images reconstructed by Real-ESRGAN ... |
https://openalex.org/W4323891821 | Affective Image Captioning for Visual Artworks Using Emotion-Based Cross-Attention Mechanisms | Within the museum community, the automatic generation of artwork description is expected to accelerate the improvement of accessibility for visually impaired visitors.Captions that describe artworks should be based on emotions because art is inseparable from viewers' emotional reactions.By contrast, artworks typically ... |
https://openalex.org/W4323891867 | Location Privacy-Aware Task Offloading in Mobile Edge Computing | In mobile edge computing (MEC), users can offload tasks to nearby MEC servers to reduce computation cost. Considering that the size of offloaded tasks could disclose user location information, several location privacy-preserving task offloading mechanisms have been proposed under the single-server scenario. However, to... |
https://openalex.org/W4323894719 | A Hybrid CNN-LSTM Model With Word-Emoji Embedding For Improving The Twitter Sentiment Analysis on Indonesia's PPKM Policy | The policy of limiting community mobilization is implemented to reduce the daily rate of COVID-19. However, a high-accuracy sentiment analysis model can determine public sentiment toward such policies. Our research aims to improve the accuracy of the LSTM model on sentiment analysis of the Jakarta community towards PPK... |
https://openalex.org/W4323896828 | Inspiration Transfer for Intelligent Design: A Generative Adversarial Network With Fashion Attributes Disentanglement | Traditional fashion design is heavily dependent on the talent and inspiration of designers. However, for inexperienced designers or common consumers, it is difficult to complete the design of ready-to-wear clothes. In this paper, we introduce a novel fashion attributes disentanglement generative adversarial network (Fa... |
https://openalex.org/W4323903875 | MAP Inference in Probabilistic Answer Set Programs | Abstract Reasoning with uncertain data is a central task in artificial intelligence. In some cases, the goal is to find the most likely assignment to a subset of random variables, named query variables, while some other variables are observed. This task is called Maximum a Posteriori (MAP). When the set of query variab... |
https://openalex.org/W4323903909 | Approximate Inference in Probabilistic Answer Set Programming for Statistical Probabilities | Abstract “Type 1” statements were introduced by Halpern in 1990 with the goal to represent statistical information about a domain of interest. These are of the form “x% of the elements share the same property”. The recently proposed language PASTA (Probabilistic Answer set programming for STAtistical probabilities) ext... |
https://openalex.org/W4323914373 | Expressivity of Variational Quantum Machine Learning on the Boolean Cube | Categorical data plays an important part in machine learning research and appears in a variety of applications. Models that can express large classes of real-valued functions on the Boolean cube are useful for problems involving discrete-valued data types, including those which are not Boolean. To this date, the common... |
https://openalex.org/W4323923487 | On robustness of neural ODEs image classifiers | Neural Ordinary Differential Equations (Neural ODEs), as a family of novel deep models, delicately link conventional neural networks and dynamical systems, which bridges the gap between theory and practice. However, they have not made substantial progress on activation functions, and ReLU is always utilized by default.... |
https://openalex.org/W4323923544 | A supervised data augmentation strategy based on random combinations of key features | Data augmentation strategies have always been important in machine learning techniques and play a unique role in model performance optimization processes. Therefore, in recent years, these techniques have become popular in the artificial intelligence field. In this paper, a new data augmentation strategy is proposed ba... |
https://openalex.org/W4323923995 | Contrastive Learning Based Graph Convolution Network for Social Recommendation | Exploiting social networks is expected to enhance the performance of recommender systems when interaction information is sparse. Existing social recommendation models focus on modeling multi-graph structures and then aggregating the information from these multiple graphs to learn potential user preferences. However, th... |
https://openalex.org/W4323925158 | A transformative shift toward blockchain‐based <scp>IoT</scp> environments: Consensus, smart contracts, and future directions | Abstract Recently, Internet‐of‐Things (IoT) based applications have shifted from centralized infrastructures to decentralized ecosystems, owing to user data's security and privacy limitations. The shift has opened new doors for intruders to launch distributed attacks in diverse IoT scenarios that jeopardize the applica... |
https://openalex.org/W4323925967 | Knowledge representation and acquisition for ethical AI: challenges and opportunities | Abstract Machine learning (ML) techniques have become pervasive across a range of different applications, and are now widely used in areas as disparate as recidivism prediction, consumer credit-risk analysis, and insurance pricing. Likewise, in the physical world, ML models are critical components in autonomous agents ... |
https://openalex.org/W4323926101 | ProtoGAN: Towards high diversity and fidelity image synthesis under limited data | Recent years have witnessed tremendous progress with regard to few-shot learning methods, especially for classification and segmentation tasks. However, the challenging few-shot image generation has garnered less attention. Training GANs with limited data is a formidable task since discriminator overfitting and memoriz... |
https://openalex.org/W4323928244 | An improved differential evolution algorithm based on basis vector type and its application in fringe projection 3D imaging | According to the different generation methods, the types of candidate position (basis vector) in the meta-heuristic algorithm can be divided into stochastic, deterministic, and probabilistic. The stochastic type is beneficial to the preservation of population diversity, deterministic model can accelerate convergence, a... |
exHarmony: Authorship and Citations for Benchmarking the Reviewer Assignment Problem
Quick links: 📃 Paper | ⚙️ Code
Dataset Summary
exHarmony is a large-scale benchmark dataset for the Reviewer Assignment Problem (RAP), reframing reviewer recommendation as an information retrieval task. It leverages publication metadata from OpenAlex to construct a collection of papers, their authors, citation links, and multiple qrel definitions for evaluation.
The dataset allows researchers to systematically study reviewer recommendation under different assumptions of reviewer expertise (e.g., authorship, citation networks, and similarity-filtered citations).
exHarmony was introduced in the paper:
exHarmony: Authorship and Citations for Benchmarking the Reviewer Assignment Problem Ebrahimi, Salamat, Arabzadeh, Bashari, Bagheri (ECIR 2025)
- Collection split: A large set of scientific papers used for indexing.
- Test split: Papers held out for evaluation.
- Authors' works mapping: Links each author to their published works.
- Authors' information: Includes metadata such as citation counts, institutional affiliation, and years of experience.
Usage
from datasets import load_dataset
dataset = load_dataset("Reviewerly/exHarmony", "Papers") # Select data type from ['Papers', 'Qrels']
# Example: Access paper collection
papers = dataset["papers_collection"]
print(papers[0])
# Example: Access paper collection
qrels = dataset["qrels_authors"]
print(qrels[0])
Dataset Structure
Data Files
| Description | File Name | File Size | Num Records | Format |
|---|---|---|---|---|
| Collection | papers_collection.jsonl |
1.6 GB | 1,204,150 | paper_id, title, abstract |
| Test | papers_test.jsonl |
15 MB | 9,771 | paper_id, title, abstract |
| Test (judgable) | papers_test_judgable.jsonl |
14 MB | 7,944 | paper_id, title, abstract |
| Authors’ Works Mapping | authors_works_collection_ids.jsonl |
222 MB | 1,589,723 | author_id, list_of_authors_papers |
| Authors’ Information | authors_info.jsonl |
225 MB | 1,589,723 | author_id, citation, works_count, experience_years, institution |
Format: JSON Lines (.jsonl), one JSON object per record.
Example Records
Paper record:
{"id": "https://openalex.org/W4323317762", "title": "Sharding-Based Proof-of-Stake Blockchain Protocols: Key Components & Probabilistic Security Analysis", "abstract": "Blockchain technology has been gaining great interest from a variety of sectors including healthcare, supply chain, and cryptocurrencies..."}
Author works mapping:
{"id": "https://openalex.org/A5083262615", "works": ["https://openalex.org/W4323317762", "https://openalex.org/W4285189682"]}
Author information:
{"id": "https://openalex.org/A5083262615", "citations": 238, "works_count": 14, "experience_years": 5, "institution": "Université de Montréal"}
Qrel Files
exHarmony provides multiple qrels to evaluate RAP under different assumptions:
| Qrel Set | Description |
|---|---|
| exHarmony-Authors | Authors of each paper are considered relevant. |
| exHarmony-Cite | Authors of the most similar paper in the test set are considered relevant. |
| exHarmony-SimCite | Narrows citation-based relevance to the top-10 most similar cited papers. |
Citation
If you use this resource, please cite our paper:
@inproceedings{ebrahimi2025exharmony,
author = {Ebrahimi, Sajad and Salamat, Sara and Arabzadeh, Negar and Bashari, Mahdi and Bagheri, Ebrahim},
title = {exHarmony: Authorship and Citations for Benchmarking the Reviewer Assignment Problem},
year = {2025},
isbn = {978-3-031-88713-0},
publisher = {Springer-Verlag},
doi = {10.1007/978-3-031-88714-7_1},
booktitle = {Advances in Information Retrieval: 47th European Conference on Information Retrieval, ECIR 2025, Lucca, Italy, April 6–10, 2025, Proceedings, Part III},
pages = {1–16},
}
- Downloads last month
- 41