977 resultados para Modeling complexity


Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001 45% (2.7 billion) of the world’s population of approximately 6.1 billion lived in ‘moderate poverty’ on less than US $ 2 per person per day (World Population Summary, 2012). In the last 60 years there have been many theories attempting to explain development, why some countries have the fastest growth in history, while others stagnate and so far no way has been found to explain the differences. Traditional views imply that development is the aggregation of successes from multiple individual business enterprises, but this ignores the interactions between and among institutions, organisations and individuals in the economy, which can often have unpredictable effects. Complexity Development Theory proposes that by viewing development as an emergent property of society, we can help create better development programs at the organisational, institutional and national levels. This paper asks how the principals of CAS can be used to develop CDT principals used to develop and operate development programs at the bottom of the pyramid in developing economies. To investigate this research question we conduct a literature review to define and describe CDT and create propositions for testing. We illustrate these propositions using a case study of an Asset Based Community Development (ABCD) Program for existing and nascent entrepreneurs in the Democratic Republic of the Congo (DRC). We found evidence that all the principals of CDT were related to the characteristics of CAS. If this is the case, development programs will be able to select which CAS needed to test these propositions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Purpose – Context-awareness has emerged as an important principle in the design of flexible business processes. The goal of the research is to develop an approach to extend context-aware business process modeling toward location-awareness. The purpose of this paper is to identify and conceptualize location-dependencies in process modeling. Design/methodology/approach – This paper uses a pattern-based approach to identify location-dependency in process models. The authors design specifications for these patterns. The authors present illustrative examples and evaluate the identified patterns through a literature review of published process cases. Findings – This paper introduces location-awareness as a new perspective to extend context-awareness in BPM research, by introducing relevant location concepts such as location-awareness and location-dependencies. The authors identify five basic location-dependent control-flow patterns that can be captured in process models. And the authors identify location-dependencies in several existing case studies of business processes. Research limitations/implications – The authors focus exclusively on the control-flow perspective of process models. Further work needs to extend the research to address location-dependencies in process data or resources. Further empirical work is needed to explore determinants and consequences of the modeling of location-dependencies. Originality/value – As existing literature mostly focusses on the broad context of business process, location in process modeling still is treated as “second class citizen” in theory and in practice. This paper discusses the vital role of location-dependencies within business processes. The proposed five basic location-dependent control-flow patterns are novel and useful to explain location-dependency in business process models. They provide a conceptual basis for further exploration of location-awareness in the management of business processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The chubby baby who eats well is desirable in our culture. Perceived low weight gains and feeding concerns are common reasons mothers seek advice in the early years. In contrast, childhood obesity is a global public health concern. Use of coercive feeding practices, prompted by maternal concern about weight, may disrupt a child’s innate self regulation of energy intake, promoting overeating and overweight. This study describes predictors of maternal concern about her child undereating/becoming underweight and feeding practices. Mothers in the control group of the NOURISH and South Australian Infants Dietary Intake studies (n = 332) completed a self-administered questionnaire when the child was aged 12–16 months. Weight-for-age z-score (WAZ)was derived from weight measured by study staff. Mean age (SD) was 13.8 (1.3) months, mean WAZ (SD), 0.58 (0.86) and 49% were male. WAZ and two questions describing food refusal were combined in a structural equation model with four items from the Infant feeding Questionnaire (IFQ) to form the factor ‘Concern about undereating/weight’. Structural relationships were drawn between concern and IFQ factors ‘awareness of infant’s hunger and satiety cues’, ‘use of food to calm infant’s fussiness’ and ‘feeding infant on a schedule’, resulting in a model of acceptable fit. Lower WAZ and higher frequency of food refusal predicted higher maternal concern. Higher maternal concern was associated with lower awareness of infant cues (r = −.17, p = .01) and greater use of food to calm (r = .13, p = .03). In a cohort of healthy children, maternal concern about undereating and underweight was associated with practices that have the potential to disrupt self-regulation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This research falls in the area of enhancing the quality of tag-based item recommendation systems. It aims to achieve this by employing a multi-dimensional user profile approach and by analyzing the semantic aspects of tags. Tag-based recommender systems have two characteristics that need to be carefully studied in order to build a reliable system. Firstly, the multi-dimensional correlation, called as tag assignment , should be appropriately modelled in order to create the user profiles [1]. Secondly, the semantics behind the tags should be considered properly as the flexibility with their design can cause semantic problems such as synonymy and polysemy [2]. This research proposes to address these two challenges for building a tag-based item recommendation system by employing tensor modeling as the multi-dimensional user profile approach, and the topic model as the semantic analysis approach. The first objective is to optimize the tensor model reconstruction and to improve the model performance in generating quality rec-ommendation. A novel Tensor-based Recommendation using Probabilistic Ranking (TRPR) method [3] has been developed. Results show this method to be scalable for large datasets and outperforming the benchmarking methods in terms of accuracy. The memory efficient loop implements the n-mode block-striped (matrix) product for tensor reconstruction as an approximation of the initial tensor. The probabilistic ranking calculates the probabil-ity of users to select candidate items using their tag preference list based on the entries generated from the reconstructed tensor. The second objective is to analyse the tag semantics and utilize the outcome in building the tensor model. This research proposes to investigate the problem using topic model approach to keep the tags nature as the “social vocabulary” [4]. For the tag assignment data, topics can be generated from the occurrences of tags given for an item. However there is only limited amount of tags availa-ble to represent items as collection of topics, since an item might have only been tagged by using several tags. Consequently, the generated topics might not able to represent the items appropriately. Furthermore, given that each tag can belong to any topics with various probability scores, the occurrence of tags cannot simply be mapped by the topics to build the tensor model. A standard weighting technique will not appropriately calculate the value of tagging activity since it will define the context of an item using a tag instead of a topic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper, we present a pathloss characterization for vehicle-to-vehicle (V2V) communications based on empirical data collected from extensive measurement campaign performed under line-of-sight (LOS), non-line-of-sight (NLOS) and varying traffic densities. The experiment was conducted in three different V2V propagation environments: highway, suburban and urban at 5.8GHz. We developed pathloss models for each of the three different V2V environments considered. Based on a log-distance power law model, the values for the pathloss exponent and the standard deviation of shadowing were reported. The average pathloss exponent ranges from 1.77 for highway, 1.68 for the urban to 1.53 for the suburban environment. The reported results can contribute to vehicular network (VANET) simulators and can be used by system designers to develop, evaluate and validate new protocols and system designs under realistic propagation conditions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we propose and study low complexity algorithms for on-line estimation of hidden Markov model (HMM) parameters. The estimates approach the true model parameters as the measurement noise approaches zero, but otherwise give improved estimates, albeit with bias. On a nite data set in the high noise case, the bias may not be signi cantly more severe than for a higher complexity asymptotically optimal scheme. Our algorithms require O(N3) calculations per time instant, where N is the number of states. Previous algorithms based on earlier hidden Markov model signal processing methods, including the expectation-maximumisation (EM) algorithm require O(N4) calculations per time instant.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Supervisory Control and Data Acquisition systems (SCADA) are widely used to control critical infrastructure automatically. Capturing and analyzing packet-level traffic flowing through such a network is an essential requirement for problems such as legacy network mapping and fault detection. Within the framework of captured network traffic, we present a simple modeling technique, which supports the mapping of the SCADA network topology via traffic monitoring. By characterizing atomic network components in terms of their input-output topology and the relationship between their data traffic logs, we show that these modeling primitives have good compositional behaviour, which allows complex networks to be modeled. Finally, the predictions generated by our model are found to be in good agreement with experimentally obtained traffic.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The network reconfiguration is an important stage of restoring a power system after a complete blackout or a local outage. Reasonable planning of the network reconfiguration procedure is essential for rapidly restoring the power system concerned. An approach for evaluating the importance of a line is first proposed based on the line contraction concept. Then, the interpretative structural modeling (ISM) is employed to analyze the relationship among the factors having impacts on the network reconfiguration. The security and speediness of restoring generating units are considered with priority, and a method is next proposed to select the generating unit to be restored by maximizing the restoration benefit with both the generation capacity of the restored generating unit and the importance of the line in the restoration path considered. Both the start-up sequence of generating units and the related restoration paths are optimized together in the proposed method, and in this way the shortcomings of separately solving these two issues in the existing methods are avoided. Finally, the New England 10-unit 39-bus power system and the Guangdong power system in South China are employed to demonstrate the basic features of the proposed method.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In this paper we propose a new multivariate GARCH model with time-varying conditional correlation structure. The time-varying conditional correlations change smoothly between two extreme states of constant correlations according to a predetermined or exogenous transition variable. An LM–test is derived to test the constancy of correlations and LM- and Wald tests to test the hypothesis of partially constant correlations. Analytical expressions for the test statistics and the required derivatives are provided to make computations feasible. An empirical example based on daily return series of five frequently traded stocks in the S&P 500 stock index completes the paper.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This pilot study aims to examine the effect of work-integrated learning (WIL) on work self-efficacy (WSE) for undergraduate students from the Queensland University of Technology. A WSE instrument was used to examine the seven subscales of WSE. These were; learning, problem solving, pressure, role expectations, team work, sensitivity and work politics. The results of this pilot study revealed that, overall the WSE scores were highest when the students’ did not participate in the WIL unit (comparison group) in comparison to the WIL group. The current paper suggests that WSE scores were changed as a result of WIL participation. These findings open a new path for future studies allowing them to explore the relationship between WIL and the specific subscales of WSE.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Structural equation modeling (SEM) is a versatile multivariate statistical technique, and applications have been increasing since its introduction in the 1980s. This paper provides a critical review of 84 articles involving the use of SEM to address construction related problems over the period 1998–2012 including, but not limited to, seven top construction research journals. After conducting a yearly publication trend analysis, it is found that SEM applications have been accelerating over time. However, there are inconsistencies in the various recorded applications and several recurring problems exist. The important issues that need to be considered are examined in research design, model development and model evaluation and are discussed in detail with reference to current applications. A particularly important issue concerns the construct validity. Relevant topics for efficient research design also include longitudinal or cross-sectional studies, mediation and moderation effects, sample size issues and software selection. A guideline framework is provided to help future researchers in construction SEM applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The ambiguity acceptance test is an important quality control procedure in high precision GNSS data processing. Although the ambiguity acceptance test methods have been extensively investigated, its threshold determine method is still not well understood. Currently, the threshold is determined with the empirical approach or the fixed failure rate (FF-) approach. The empirical approach is simple but lacking in theoretical basis, while the FF-approach is theoretical rigorous but computationally demanding. Hence, the key of the threshold determination problem is how to efficiently determine the threshold in a reasonable way. In this study, a new threshold determination method named threshold function method is proposed to reduce the complexity of the FF-approach. The threshold function method simplifies the FF-approach by a modeling procedure and an approximation procedure. The modeling procedure uses a rational function model to describe the relationship between the FF-difference test threshold and the integer least-squares (ILS) success rate. The approximation procedure replaces the ILS success rate with the easy-to-calculate integer bootstrapping (IB) success rate. Corresponding modeling error and approximation error are analysed with simulation data to avoid nuisance biases and unrealistic stochastic model impact. The results indicate the proposed method can greatly simplify the FF-approach without introducing significant modeling error. The threshold function method makes the fixed failure rate threshold determination method feasible for real-time applications.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

It is well known that, for major infrastructure networks such as electricity, gas, railway, road, and urban water networks, disruptions at one point have a knock on effect throughout the network. There is an impressive amount of individual research projects examining the vulnerability of critical infrastructure network. However, there is little understanding of the totality of the contribution made by these projects and their interrelationships. This makes their review a difficult process for both new and existing researchers in the field. To address this issue, a two-step literature review process is used, to provide an overview of the vulnerability of the transportation network in terms of four main themes - research objective, transportation mode, disruption scenario and vulnerability indicator –involving the analysis of related articles from 2001 to 2013. Two limitations of existing research are identified: (1) the limited amount of studies relating to multi-layer transportation network vulnerability analysis, and (2) the lack of evaluation methods to explore the relationship between structure vulnerability and dynamical functional vulnerability. In addition to indicating that more attention needs to be paid to these two aspects in future, the analysis provides a new avenue for the discovery of knowledge, as well as an improved understanding of transportation network vulnerability.