823 resultados para Social problems in art.
Resumo:
When individuals learn by trial-and-error, they perform randomly chosen actions and then reinforce those actions that led to a high payoff. However, individuals do not always have to physically perform an action in order to evaluate its consequences. Rather, they may be able to mentally simulate actions and their consequences without actually performing them. Such fictitious learners can select actions with high payoffs without making long chains of trial-and-error learning. Here, we analyze the evolution of an n-dimensional cultural trait (or artifact) by learning, in a payoff landscape with a single optimum. We derive the stochastic learning dynamics of the distance to the optimum in trait space when choice between alternative artifacts follows the standard logit choice rule. We show that for both trial-and-error and fictitious learners, the learning dynamics stabilize at an approximate distance of root n/(2 lambda(e)) away from the optimum, where lambda(e) is an effective learning performance parameter depending on the learning rule under scrutiny. Individual learners are thus unlikely to reach the optimum when traits are complex (n large), and so face a barrier to further improvement of the artifact. We show, however, that this barrier can be significantly reduced in a large population of learners performing payoff-biased social learning, in which case lambda(e) becomes proportional to population size. Overall, our results illustrate the effects of errors in learning, levels of cognition, and population size for the evolution of complex cultural traits. (C) 2013 Elsevier Inc. All rights reserved.
Resumo:
The Feller process is an one-dimensional diffusion process with linear drift and state-dependent diffusion coefficient vanishing at the origin. The process is positive definite and it is this property along with its linear character that have made Feller process a convenient candidate for the modeling of a number of phenomena ranging from single-neuron firing to volatility of financial assets. While general properties of the process have long been well known, less known are properties related to level crossing such as the first-passage and the escape problems. In this work we thoroughly address these questions.
Resumo:
OBJECTIVE: Assertive community treatment (ACT) failed to develop in Europe, and its efficacy is debated. In Lausanne, Switzerland, ACT focuses on difficult-to-engage patients and aims to facilitate linkage with outpatient care through time-limited interventions. This study aimed to evaluate the applicability and efficiency of time-limited ACT. METHODS: We retrospectively assessed social, clinical, and functional outcomes and motivation for treatment in 75 consecutively seen subjects treated between 2000 and 2002. RESULTS: With 70% of the interventions lasting less than 6 months, we observed significant improvement in most clinical and social problems, in collaboration, in motivation for treatment, and in social network support, despite high baseline levels of clinical and social problems. The number of hospitalizations decreased significantly. CONCLUSIONS: Time-limited ACT is a useful treatment for difficult-to-engage patients with severe clinical and social problems, and it facilitates linkage to care. This narrower target for ACT may facilitate its implementation in Europe.
Resumo:
REBIUN study on Science 2.0 and social web applications for research. There are three categories: share research, share resources and share results. Describes the applications and selected resources of interest: scientific social networks, scientific databases, research platforms, surveys, concept maps, file sharing, bibliographic management, social bookmarking, citation indexes, blogs and wikis, science news, open access. The services are evaluated and the report describes his interest to libraries.
Resumo:
Recent literature has discussed the unintended consequences of clinical information technologies (IT) on patient safety, yet there has been little discussion about the safety concerns in the area of consumer health IT. This paper presents a range of safety concerns for consumers in social media, with a case study on YouTube. We conducted a scan of abstracts on 'quality criteria' related to YouTube. Five areas regarding the safety of YouTube for consumers were identifi ed: (a) harmful health material targeted at consumers (such as inappropriate marketing of tobaccoor direct-to-consumer drug advertising); (b) public display of unhealthy behaviour (such as people displaying self-injury behaviours or hurting others); (c) tainted public health messages (i.e. the rise of negative voices againstpublic health messages); (d) psychological impact from accessing inappropriate, offensive or biased social media content; and (e) using social media to distort policy and research funding agendas. The examples presented should contribute to a better understanding about how to promote a safe consumption and production of social media for consumers, and an evidence-based approach to designing social media interventions for health. The potential harm associated with the use of unsafe social media content on the Internet is a major concern. More empirical and theoretical studies are needed to examine how social media infl uences consumer health decisions, behaviours and outcomes, and devise ways to deter the dissemination of harmful infl uences in social media.
Resumo:
This paper deals with the goodness of the Gaussian assumption when designing second-order blind estimationmethods in the context of digital communications. The low- andhigh-signal-to-noise ratio (SNR) asymptotic performance of the maximum likelihood estimator—derived assuming Gaussiantransmitted symbols—is compared with the performance of the optimal second-order estimator, which exploits the actualdistribution of the discrete constellation. The asymptotic study concludes that the Gaussian assumption leads to the optimalsecond-order solution if the SNR is very low or if the symbols belong to a multilevel constellation such as quadrature-amplitudemodulation (QAM) or amplitude-phase-shift keying (APSK). On the other hand, the Gaussian assumption can yield importantlosses at high SNR if the transmitted symbols are drawn from a constant modulus constellation such as phase-shift keying (PSK)or continuous-phase modulations (CPM). These conclusions are illustrated for the problem of direction-of-arrival (DOA) estimation of multiple digitally-modulated signals.
Resumo:
This paper is concerned with the organization of societies in north-eastern Iberia (present-day Catalonia) during the Iron Age, using data provided by domestic architecture and settlement organization. I offer an analysis of the social differences detected in the dwellings based on a sample of houses excavated at different types of settlement. Although many Iberian houses had simple layouts and small surface areas, some larger dwellings at the main sites are distinguished by the shape of their ground plans, their surface areas, architectural features, and central locations; these houses are believed to be the residences of the Iberian elite. Such dwellings are not found at all sites and the data suggest that there was a relationship between the category of the settlement (or its function) and the types of dwelling in it.
Resumo:
Tämän Pro gradu-tutkielman tavoitteena olirakentaa esiymmärrys sosiaalisen pääoman roolista ja mittaamisesta uuden teknologian start-up yrityksissä. Pääasiallisena tarkoituksena tässä tutkimuksessa olilöytää sosiaalisen pääoman ja start-up yrityksen tuloksellisuuden välille yhdistävä tekijä. Tutkimuksen empiirinen aineisto kerättiin pääasiallisesti kuuden OKO Venture Capitalin sijoitusportfolioon sisältyvien case-yritysten kvalitatiivisten teemahaastatteluiden sekä kvantitatiivisten kyselylomakkeiden avulla. Kvalitatiivisten haastatteluiden tulosten perusteella sosiaalisen pääoman ja tuloksellisuuden välille löytyi yhdistävä tekijä, jota käytettiin myöhemmin hyväksi kvantitatiivisessa kyselylomakkeessa. Tämän tutkielman tulokset osoittivat, että startegisen päätöksenteon kautta sosiaalinen pääoma vaikuttaa osittain start-up yritysten tuloksellisuuteen. Manageriaalisesti tärkempi löydös tässä tutkimuksessa oli kuitenkin se, että sosiaalista pääomaa voidaan käyttää hyväksi ennustettaessa uuden teknologian start-up yritysten tulevaisuuden kassavirtoja.
Resumo:
Abstract The solvability of the problem of fair exchange in a synchronous system subject to Byzantine failures is investigated in this work. The fair exchange problem arises when a group of processes are required to exchange digital items in a fair manner, which means that either each process obtains the item it was expecting or no process obtains any information on, the inputs of others. After introducing a novel specification of fair exchange that clearly separates safety and liveness, we give an overview of the difficulty of solving such a problem in the context of a fully-connected topology. On one hand, we show that no solution to fair exchange exists in the absence of an identified process that every process can trust a priori; on the other, a well-known solution to fair exchange relying on a trusted third party is recalled. These two results lead us to complete our system model with a flexible representation of the notion of trust. We then show that fair exchange is solvable if and only if a connectivity condition, named the reachable majority condition, is satisfied. The necessity of the condition is proven by an impossibility result and its sufficiency by presenting a general solution to fair exchange relying on a set of trusted processes. The focus is then turned towards a specific network topology in order to provide a fully decentralized, yet realistic, solution to fair exchange. The general solution mentioned above is optimized by reducing the computational load assumed by trusted processes as far as possible. Accordingly, our fair exchange protocol relies on trusted tamperproof modules that have limited communication abilities and are only required in key steps of the algorithm. This modular solution is then implemented in the context of a pedagogical application developed for illustrating and apprehending the complexity of fair exchange. This application, which also includes the implementation of a wide range of Byzantine behaviors, allows executions of the algorithm to be set up and monitored through a graphical display. Surprisingly, some of our results on fair exchange seem contradictory with those found in the literature of secure multiparty computation, a problem from the field of modern cryptography, although the two problems have much in common. Both problems are closely related to the notion of trusted third party, but their approaches and descriptions differ greatly. By introducing a common specification framework, a comparison is proposed in order to clarify their differences and the possible origins of the confusion between them. This leads us to introduce the problem of generalized fair computation, a generalization of fair exchange. Finally, a solution to this new problem is given by generalizing our modular solution to fair exchange