28 resultados para Chunk-based information diffusion

em Aston University Research Archive


Relevância:

100.00% 100.00%

Publicador:

Resumo:

To meet changing needs of customers and to survive in the increasingly globalised and competitive environment, it is necessary for companies to equip themselves with intelligent tools, thereby enabling managerial levels to use the tactical decision in a better way. However, the implementation of an intelligent system is always a challenge in Small- and Medium-sized Enterprises (SMEs). Therefore, a new and simple approach with 'process rethinking' ability is proposed to generate ongoing process improvements over time. In this paper, a roadmap of the development of an agent-based information system is described. A case example has also been provided to show how the system can assist non-specialists, for example, managers and engineers to make right decisions for a continual process improvement. Copyright © 2006 Inderscience Enterprises Ltd.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This thesis describes research into business user involvement in the information systems application building process. The main interest of this research is in establishing and testing techniques to quantify the relationships between identified success factors and the outcome effectiveness of 'business user development' (BUD). The availability of a mechanism to measure the levels of the success factors, and quantifiably relate them to outcome effectiveness, is important in that it provides an organisation with the capability to predict and monitor effects on BUD outcome effectiveness. This is particularly important in an era where BUD levels have risen dramatically, user centred information systems development benefits are recognised as significant, and awareness of the risks of uncontrolled BUD activity is becoming more widespread. This research targets the measurement and prediction of BUD success factors and implementation effectiveness for particular business users. A questionnaire instrument and analysis technique has been tested and developed which constitutes a tool for predicting and monitoring BUD outcome effectiveness, and is based on the BUDES (Business User Development Effectiveness and Scope) research model - which is introduced and described in this thesis. The questionnaire instrument is designed for completion by 'business users' - the target community being more explicitly defined as 'people who primarily have a business role within an organisation'. The instrument, named BUD ESP (Business User Development Effectiveness and Scope Predictor), can readily be used with survey participants, and has been shown to give meaningful and representative results.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Monitoring is essential for conservation of sites, but capacity to undertake it in the field is often limited. Data collected by remote sensing has been identified as a partial solution to this problem, and is becoming a feasible option, since increasing quantities of satellite data in particular are becoming available to conservationists. When suitably classified, satellite imagery can be used to delineate land cover types such as forest, and to identify any changes over time. However, the conservation community lacks (a) a simple tool appropriate to the needs for monitoring change in all types of land cover (e.g. not just forest), and (b) an easily accessible information system which allows for simple land cover change analysis and data sharing to reduce duplication of effort. To meet these needs, we developed a web-based information system which allows users to assess land cover dynamics in and around protected areas (or other sites of conservation importance) from multi-temporal medium resolution satellite imagery. The system is based around an open access toolbox that pre-processes and classifies Landsat-type imagery, and then allows users to interactively verify the classification. These data are then open for others to utilize through the online information system. We first explain imagery processing and data accessibility features, and then demonstrate the toolbox and the value of user verification using a case study on Nakuru National Park, Kenya. Monitoring and detection of disturbances can support implementation of effective protection, assist the work of park managers and conservation scientists, and thus contribute to conservation planning, priority assessment and potentially to meeting monitoring needs for Aichi target 11.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Concept evaluation at the early phase of product development plays a crucial role in new product development. It determines the direction of the subsequent design activities. However, the evaluation information at this stage mainly comes from experts' judgments, which is subjective and imprecise. How to manage the subjectivity to reduce the evaluation bias is a big challenge in design concept evaluation. This paper proposes a comprehensive evaluation method which combines information entropy theory and rough number. Rough number is first presented to aggregate individual judgments and priorities and to manipulate the vagueness under a group decision-making environment. A rough number based information entropy method is proposed to determine the relative weights of evaluation criteria. The composite performance values based on rough number are then calculated to rank the candidate design concepts. The results from a practical case study on the concept evaluation of an industrial robot design show that the integrated evaluation model can effectively strengthen the objectivity across the decision-making processes.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Increasingly users are seen as the weak link in the chain, when it comes to the security of corporate information. Should the users of computer systems act in any inappropriate or insecure manner, then they may put their employers in danger of financial losses, information degradation or litigation, and themselves in danger of dismissal or prosecution. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of inappropriate behaviours, and in so doing, protecting corporate information, is through the formulation and application of a formal ‘acceptable use policy (AUP). Whilst the AUP has attracted some academic interest, it has tended to be prescriptive and overly focussed on the role of the Internet, and there is relatively little empirical material that explicitly addresses the purpose, positioning or content of real acceptable use policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and composition of a sample of authentic policies – taken from the higher education sector – rather than simply making general prescriptions about what they ought to contain. There are two important conclusions to be drawn from this study: (1) the primary role of the AUP appears to be as a mechanism for dealing with unacceptable behaviour, rather than proactively promoting desirable and effective security behaviours, and (2) the wide variation found in the coverage and positioning of the reviewed policies is unlikely to be fostering a coherent approach to security management, across the higher education sector.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Ensuring the security of corporate information, that is increasingly stored, processed and disseminated using information and communications technologies [ICTs], has become an extremely complex and challenging activity. This is a particularly important concern for knowledge-intensive organisations, such as universities, as the effective conduct of their core teaching and research activities is becoming ever more reliant on the availability, integrity and accuracy of computer-based information resources. One increasingly important mechanism for reducing the occurrence of security breaches, and in so doing, protecting corporate information, is through the formulation and application of a formal information security policy (InSPy). Whilst a great deal has now been written about the importance and role of the information security policy, and approaches to its formulation and dissemination, there is relatively little empirical material that explicitly addresses the structure or content of security policies. The broad aim of the study, reported in this paper, is to fill this gap in the literature by critically examining the structure and content of authentic information security policies, rather than simply making general prescriptions about what they ought to contain. Having established the structure and key features of the reviewed policies, the paper critically explores the underlying conceptualisation of information security embedded in the policies. There are two important conclusions to be drawn from this study: (1) the wide diversity of disparate policies and standards in use is unlikely to foster a coherent approach to security management; and (2) the range of specific issues explicitly covered in university policies is surprisingly low, and reflects a highly techno-centric view of information security management.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

With the development of social media tools such as Facebook and Twitter, mainstream media organizations including newspapers and TV media have played an active role in engaging with their audience and strengthening their influence on the recently emerged platforms. In this paper, we analyze the behavior of mainstream media on Twitter and study how they exert their influence to shape public opinion during the UK's 2010 General Election. We first propose an empirical measure to quantify mainstream media bias based on sentiment analysis and show that it correlates better with the actual political bias in the UK media than the pure quantitative measures based on media coverage of various political parties. We then compare the information diffusion patterns from different categories of sources. We found that while mainstream media is good at seeding prominent information cascades, its role in shaping public opinion is being challenged by journalists since tweets from them are more likely to be retweeted and they spread faster and have longer lifespan compared to tweets from mainstream media. Moreover, the political bias of the journalists is a good indicator of the actual election results. Copyright 2013 ACM.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We investigated the role of local and global information on perceptual encoding of faces in patient HJA, who shows prosopagnosia and visual agnosia following occipito-temporal damage. HJA and an age-matched control were tested in a simultaneous matching task which focused on detection of local changes in faces: the inversion of central parts (eyes and mouth) relative to their context (as in the Thatcher illusion). Same-different judgements were made to normal, “thatcherised” and mixed type face pairs. Whole faces (Experiment 1), or face parts (Experiment 2), were presented in upright and inverted orientations. Compared to the control, HJA was severely impaired at matching whole faces, but he improved dramatically when face parts were presented in isolation. This suggests an inhibitory influence of face context on HJAs processing of local parts and a relatively intact ability to process part-based information from a face (when context cannot interfere). Face inversion did not affect HJAs performance. A control experiment (Experiment 3) with non-face stimuli (houses) suggested that the inhibitory influence of context on HJAs performance was restricted to faces. These results indicate that contextual information in a face can have an adverse influence on the processing of local part-based information in prosopagnosia.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

We hear much about 'race' and 'racism' in public discourse, but these terms are frequently used without clear definitions or practical examples of how these phenomena actually work. Racisms introduces practical methods which enable students to think coherently and sociologically about this complex feature of the global landscape. This text: - Defines 'race', 'racism' 'instiutional racism' and 'racialization' - Provides examples of how these function in fields like the natural sciences and asylum seeking - Clearly sets out theoretical arguments around collective identities ('race', class, gender, nation, religion) - Uses empirical case studies, including some drawn from the author's own fieldwork - Points students and other readers toward sources of further web and text-based information.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Data integration for the purposes of tracking, tracing and transparency are important challenges in the agri-food supply chain. The Electronic Product Code Information Services (EPCIS) is an event-oriented GS1 standard that aims to enable tracking and tracing of products through the sharing of event-based datasets that encapsulate the Electronic Product Code (EPC). In this paper, the authors propose a framework that utilises events and EPCs in the generation of "linked pedigrees" - linked datasets that enable the sharing of traceability information about products as they move along the supply chain. The authors exploit two ontology based information models, EEM and CBVVocab within a distributed and decentralised framework that consumes real time EPCIS events as linked data to generate the linked pedigrees. The authors exemplify the usage of linked pedigrees within the fresh fruit and vegetables supply chain in the agri-food sector.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The article offers the authors insights on how to manage children who eat a limited diet. Topics discussed include the role of parents and caregivers in helping children to develop healthy eating habits, the Child Feeding Guide consists of ways how to increase fruit and vegetable intake of children, and the Child Feeding Guide app for tablets and smartphones provides evidence-based information for people who are concerned about the eating behavior of children.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Neural networks are statistical models and learning rules are estimators. In this paper a theory for measuring generalisation is developed by combining Bayesian decision theory with information geometry. The performance of an estimator is measured by the information divergence between the true distribution and the estimate, averaged over the Bayesian posterior. This unifies the majority of error measures currently in use. The optimal estimators also reveal some intricate interrelationships among information geometry, Banach spaces and sufficient statistics.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Purpose – In the 1990s, a growing number of companies adopted value-based management (VBM) techniques in the UK. The purpose of this paper is to explore the motivations for the adoption or non-adoption of VBM for managing a business. Design/methodology/approach – An interview-based study of 37 large UK companies. Insights from diffusion theory and institutional theory are utilised to theorise these motivations. Findings – It was found that the rate of adoption of VBM in the sample companies does follow the classical S-shape. It also suggests that the supply-side of the diffusion process, most notably the role played by consultants, was an influence on many companies. This was not, however, a sufficient condition for companies to adopt the technique. The research also finds evidence of relocation diffusion, as several adopters are influenced by new officers, for example chief executive officers and finance directors, importing VBM techniques that they have used in organizations within which they have previously worked. Research limitations/implications – It is quite a small scale study and further work would be needed to develop the findings. Practical implications – Understanding and theorising the adoption of new management techniques will help understand the management of a business. Originality/value – This research adds further evidence to the value of studying management accounting, and more specifically management accounting change, in practice. It shows the developments in the adoption of a new technique and hence how a technique becomes accepted in practice.

Relevância:

40.00% 40.00%

Publicador:

Resumo:

Market-level information diffused by print media may contribute to the legitimation of an emerging technology and thus influence the diffusion of competing technological standards. After analyzing more than 10,000 trade media abstracts from the Local Area Networks (LAN) industry published between 1981 and 2000, we found the presence of differential effects on the adoption of competing standards by two market-level information types: technology and product availability. The significance of these effects depends on the technology's order of entry and suggests that high-tech product managers should make strategic use of market-level information by appropriately focusing the content of their communications. © 2007 Elsevier B.V. All rights reserved.