177 resultados para social information processing, aggression, victimization, violence


Relevância:

100.00% 100.00%

Publicador:

Resumo:

In the field of process mining, the use of event logs for the purpose of root cause analysis is increasingly studied. In such an analysis, the availability of attributes/features that may explain the root cause of some phenomena is crucial. Currently, the process of obtaining these attributes from raw event logs is performed more or less on a case-by-case basis: there is still a lack of generalized systematic approach that captures this process. This paper proposes a systematic approach to enrich and transform event logs in order to obtain the required attributes for root cause analysis using classical data mining techniques, the classification techniques. This approach is formalized and its applicability has been validated using both self-generated and publicly-available logs.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Complexity is a major concern which is aimed to be overcome by people through modeling. One way of reducing complexity is separation of concerns, e.g. separation of business process from applications. One sort of concerns are cross-cutting concerns i.e. concerns which are scattered and tangled through one of several models. In business process management, examples of such concerns are security and privacy policies. To deal with these cross-cutting concerns, the aspect orientated approach was introduced in the software development area and recently also in the business process management area. The work presented in this paper elaborates on aspect oriented process modelling. It extends earlier work by defining a mechanism for capturing multiple concerns and specifying a precedence order according to which they should be handled in a process. A formal syntax of the notation is presented precisely capturing the extended concepts and mechanisms. Finally, the relevant of the approach is demonstrated through a case study.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Effective risk management is crucial for any organisation. One of its key steps is risk identification, but few tools exist to support this process. Here we present a method for the automatic discovery of a particular type of process-related risk, the danger of deadline transgressions or overruns, based on the analysis of event logs. We define a set of time-related process risk indicators, i.e., patterns observable in event logs that highlight the likelihood of an overrun, and then show how instances of these patterns can be identified automatically using statistical principles. To demonstrate its feasibility, the approach has been implemented as a plug-in module to the process mining framework ProM and tested using an event log from a Dutch financial institution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes a method for measuring the creative potential of computer games. The research approach applies a behavioral and verbal protocol to analyze the factors that influence the creative processes used by people as they play computer games from the puzzle genre. Creative potential is measured by examining task motivation and domain-relevant and creativity-relevant skills. This paper focuses on the reliability of the factors used for measurement, determining those factors that are more strongly related to creativity. The findings show that creative potential may be determined by examining the relationship between skills required and the effect of intrinsic motivation within game play activities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The mining environment, being complex, irregular and time varying, presents a challenging prospect for stereo vision. The objective is to produce a stereo vision sensor suited to close-range scenes consisting primarily of rocks. This sensor should be able to produce a dense depth map within real-time constraints. Speed and robustness are of foremost importance for this investigation. A number of area based matching metrics have been implemented, including the SAD, SSD, NCC, and their zero-meaned versions. The NCC and the zero meaned SAD and SSD were found to produce the disparity maps with the highest proportion of valid matches. The plain SAD and SSD were the least computationally expensive, due to all their operations taking place in integer arithmetic, however, they were extremely sensitive to radiometric distortion. Non-parametric techniques for matching, in particular, the rank and the census transform, have also been investigated. The rank and census transforms were found to be robust with respect to radiometric distortion, as well as being able to produce disparity maps with a high proportion of valid matches. An additional advantage of both the rank and the census transform is their amenability to fast hardware implementation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The mining environment, being complex, irregular and time varying, presents a challenging prospect for stereo vision. For this application, speed, reliability, and the ability to produce a dense depth map are of foremost importance. This paper assesses the suitability of a number of matching techniques for use in a stereo vision sensor for close range scenes consisting primarily of rocks. These include traditional area-based matching metrics, and non-parametric transforms, in particular, the rank and census transforms. Experimental results show that the rank and census transforms exhibit a number of clear advantages over area-based matching metrics, including their low computational complexity, and robustness to certain types of distortion.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

As business process management technology matures, organisations acquire more and more business process models. The management of the resulting collections of process models poses real challenges. One of these challenges concerns model retrieval where support should be provided for the formulation and efficient execution of business process model queries. As queries based on only structural information cannot deal with all querying requirements in practice, there should be support for queries that require knowledge of process model semantics. In this paper we formally define a process model query language that is based on semantic relationships between tasks in process models and is independent of any particular process modelling notation.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Communication processes are vital in the lifecycle of BPM projects. With this in mind, much research has been performed into facilitating this key component between stakeholders. Amongst the methods used to support this process are personalized process visualisations. In this paper, we review the development of this visualization trend, then, we propose a theoretical analysis framework based upon communication theory. We use this framework to provide theoretical support to the conjecture that 3D virtual worlds are powerful tools for communicating personalised visualisations of processes within a workplace. Meta requirements are then derived and applied, via 3D virtual world functionalities, to generate example visualisations containing personalized aspects, which we believe enhance the process of communcation between analysts and stakeholders in BPM process (re)design activities.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This paper describes the implementation of the first portable, embedded data acquisition unit (BabelFuse) that is able to acquire and timestamp generic sensor data and trigger General Purpose I/O (GPIO) events against a microsecond-accurate wirelessly-distributed ‘global’ clock. A significant issue encountered when fusing data received from multiple sensors is the accuracy of the timestamp associated with each piece of data. This is particularly important in applications such as Simultaneous Localisation and Mapping (SLAM) where vehicle velocity forms an important part of the mapping algorithms; on fast-moving vehicles, even millisecond inconsistencies in data timestamping can produce errors which need to be compensated for. The timestamping problem is compounded in a robot swarm environment especially if non-deterministic communication hardware (such as IEEE-802.11-based wireless) and inaccurate clock synchronisation protocols are used. The issue of differing timebases makes correlation of data difficult and prevents the units from reliably performing synchronised operations or manoeuvres. By utilising hardware-assisted timestamping, clock synchronisation protocols based on industry standards and firmware designed to minimise indeterminism, an embedded data acquisition unit capable of microsecond-level clock synchronisation is presented.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Norms regulate the behaviour of their subjects and define what is legal and what is illegal. Norms typically describe the conditions under which they are applicable and the normative effects as a results of their applications. On the other hand, process models specify how a business operation or service is to be carried out to achieve a desired outcome. Norms can have significant impact on how business operations are conducted and they can apply to the whole or part of a business process. For example, they may impose conditions on the different aspects of a process (e.g., perform tasks in a specific sequence (control-flow), at a specific time or within a certain time frame (temporal aspect), by specific people (resources)). We propose a framework that provides the formal semantics of the normative requirements for determining whether a business process complies with a normative document (where a normative document can be understood in a very broad sense, ranging from internal policies to best practice policies, to statutory acts). We also present a classification of normal requirements based on the notion of different types of obligations and the effects of violating these obligations.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Although there is an increasing recognition of the impacts of climate change on communities, residents often resist changing their lifestyle to reduce the effects of the problem. By using a landscape architectural design medium, this paper argues that public space, when designed as an ecological system, has the capacity to create social and environmental change and to increase the quality of the human environment. At the same time, this ecological system can engage residents, enrich the local economy, and increase the social network. Through methods of design, research and case study analysis, an alternative master plan is proposed for a sustainable tourism development in Alacati, Turkey. Our master plan uses local geographical, economic and social information within a sustainable landscape architectural design scheme that addresses the key issues of ecology, employment, public space and community cohesion. A preliminary community empowerment model (CEM) is proposed to manage the designs. The designs address: the coexistence of local agricultural and sustainable energy generation; state of the art water management; and the functional and sustainable social and economic interrelationship of inhabitants, NGOs, and local government.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Educational reforms currently being enacted in Kuwaiti Family and Consumer Sciences (FCS) in response to contemporary demands for increased student-centred teaching and learning are challenging for FCS teachers due to their limited experience with student-centred learning tools such as Graphic Organisers (GOs). To adopt these reforms, Kuwaiti teachers require a better understanding of and competency in promoting cognitive learning processes that will maximise student-centred learning approaches. This study followed the experiences of four Grade 6 FCS Kuwaiti teachers as they undertook a Professional Development (PD) program specifically designed to advance their understanding of the use of GOs and then as they implemented what they had learned in their Grade 6 FCS classroom. The PD program developed for this study was informed by Nasseh.s competency PD model as well as Piaget and Ausubel.s cognitive theories. This model enabled an assessment and evaluation of the development of the teachers. competencies as an outcome of the PD program in terms of the adoption of GOs, in particular, and their capacity to use GOs to engage students in personalised, in-depth, learning through critical thinking and understanding. The research revealed that the PD program was influential in reforming the teachers. learning, understanding of and competency in, cognitive and visual theories of learning, so that they facilitated student-centred teaching and learning processes that enabled students to adopt and adapt GOs in constructivist learning. The implementation of five GOs - Flow Chart, Concept Maps, K-W-L Chart, Fishbone Diagram and Venn Diagram - as learning tools in classrooms was investigated to find if changes in pedagogical approach for supporting conceptual learning through cognitive information processing would reduce the cognitive work load of students and produce better learning approaches. The study as evidenced by the participant teachers. responses and classroom observations, showed a marked increase in student interest, participation, critical thought, problem solving skills, as a result of using GOs, compared to using traditional teaching and learning methods. A theoretical model was developed from the study based on the premise that teachers. knowledge of the subject, pedagogy and student learning precede the implementation of student-centred learning reform, that it plays an important role in the implementation of student-centred learning and that it brings about a change in teaching practice. The model affirmed that observed change in teaching-practice included aspects of teachers. beliefs, as well as confidence and effect on workplace and on student learning, including engagement, understanding, critical thinking and problem solving. The model assumed that change in teaching practice is inseparable from teachers. lifelong PD needs related to knowledge, understanding, skills and competency. These findings produced a set of preliminary guidelines for establishing student-centred constructivist strategies in Kuwaiti education while retaining Kuwait.s cultural uniqueness.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

For any discipline to be regarded as a professional undertaking by which its members may be treated as true “professionals” in a specific area, practitioners must clearly understand that discipline’s history as well as the place and significance of that history in current practice as well as its relevance to available technologies and artefacts at the time. This is common for many professional disciplines such as medicine, pharmacy, engineering, law and so on but not yet, this paper submits, in information technology. Based on twenty five elapsed years of experience in developing and delivering Cybersecurity courses at undergraduate and postgraduate levels, this paper proposes a rationale and set of differing perspectives for the planning and development of curricula relevant to the delivery of appropriate courses in the history of cybersecurity or information assurance to information and communications technology (ICT) students and thus to potential information technology professionals.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Evolutionary theory predicts that herbivorous insects should lay eggs on plants in a way that reflects the suitability of each plant species for larval development. Empirical studies, however, often fail to find any relationship between an adult insect’s choice of host–plant and offspring fitness, and in such cases, it is generally assumed that other ‘missing’ factors (e.g. predation, host–plant abundance, learning and adult feeding sites) must be contributing to overall host suitability. Here, I consider an alternative theory – that a fitness cost inherent in the olfactory mechanism could constrain the evolution of insect host selection. I begin by reviewing current knowledge of odour processing in the insect antennal lobe with the aid of a simple schematic: the aim being to explain the workings of this mechanism to scientists who do not have prior knowledge in this field. I then use the schematic to explore how an insect’s perception of host and non-host odours is governed by a set of processing rules, or algorithm. Under the assumptions of this mechanistic view, the perception of every plant odour is interrelated, and seemingly bad host choices can still arise as part of an overall adaptive behavioural strategy. I discuss how an understanding of mechanism can improve the interpretation of theoretical and empirical studies in insect behaviour and evolution.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Process-aware information systems (PAISs) can be configured using a reference process model, which is typically obtained via expert interviews. Over time, however, contextual factors and system requirements may cause the operational process to start deviating from this reference model. While a reference model should ideally be updated to remain aligned with such changes, this is a costly and often neglected activity. We present a new process mining technique that automatically improves the reference model on the basis of the observed behavior as recorded in the event logs of a PAIS. We discuss how to balance the four basic quality dimensions for process mining (fitness, precision, simplicity and generalization) and a new dimension, namely the structural similarity between the reference model and the discovered model. We demonstrate the applicability of this technique using a real-life scenario from a Dutch municipality.