862 resultados para Context-based
Resumo:
This paper examined the incidence of intrafirmcausalambiguity in the management's perception concerning the critical drivers of their firms’ performance. Building on insights from the resource-based view we developed and tested hypotheses that examine (1) linkage ambiguity as a discrepancy between perceived and measured resource–performance linkages, (2) characteristic ambiguity for resources and capabilities with a high degree of complexity and tacitness, and (3) the negative association between linkage ambiguity and performance. The observations based on the explicit perceptions of 356 surveyed managers were contrasted with the empirical findings of the resource/performance relationship derived by structural equation modelling from the same data sample. The findings validate the presence of linkage ambiguity particularly in the case of resources and capabilities with higher degree of characteristic ambiguity. The findings also provide empirical evidence in support of the advocacy for a negative relationship between intrafirmcausalambiguity and performance. The paper discusses the potential reasons for the disparities between empirical findings and management's perceptions of the key determinants of export success and makes recommendations for future research.
Resumo:
Contemporary artists exploring Jewish identity in the UK are caught between two exclusions, broadly speaking: an art community that that sees itself as ‘post –identity’ and a ‘black’ art scene that revolves around the organizations that emerged out of the Identity debates of the 1980s and 1990s, namely Iniva, Third Text, Autograph. These organizations and those debates, don’t usually include Jewish identity within their remit as Jewish artists are considered to be well represented in the British art scene and, in any case, white. Out of these assumptions, questions arise in relation to the position of Jews in Britain and what is at stake for an artist in exploring Jewish Identity in their work. There is considerable scholarship, relatively speaking on art and Jewish Identity in the US (such as Lisa Bloom; Norman Kleeblatt; Catherine Sousslouf), which inform the debates on visual culture and Jews. In this chapter, I will be drawing out some of the distinctions between the US and the UK debates within my analysis, building on my own writing over the last ten years as well as the work of Juliet Steyn, Jon Stratton and Griselda Pollock. In short, this chapter aims to explore the problematic of what Jewish Identity can offer the viewer as art; what place such art inhabits within a wider artistic context and how, if at all, it is received. There is a predominance of lens based work that explores Identity arising out of the provenance of feminist practices and the politics of documentary that will be important in the framing of the work. I do not aim to consider what constitutes a Jewish artist, that has been done elsewhere and is an inadequate and somewhat spurious conversation . I will also not be focusing on artists whose intention is to celebrate an unproblematised Jewishness (however that is constituted in any given work). Recent artworks and scholarship has in any case rendered the trumpeting of attachment to any singular identity anachronistic at best. I will focus on artists working in the UK who incorporate questions of Jewishness into a larger visual enquiry that build on Judith Butler’s notion of identity as process or performative as well as the more recent debates and artwork that consider the intersectionality of identifications that co-constitute provisional identities (Jones, Modood, Sara Ahmed, Braidotti/Nikki S Lee, Glenn Ligon). The case studies to think through these questions of identity, will be artworks by Susan Hiller, Doug Fishbone and Suzanne Triester. In thinking through works by these artists, I will also serve to contextualise them, situating them briefly within the history of the landmark exhibition in the UK, Rubies and Rebels and the work of Ruth Novaczek, Lily Markewitz, Oreet Ashery and myself.
Resumo:
This paper presents a video surveillance framework that robustly and efficiently detects abandoned objects in surveillance scenes. The framework is based on a novel threat assessment algorithm which combines the concept of ownership with automatic understanding of social relations in order to infer abandonment of objects. Implementation is achieved through development of a logic-based inference engine based on Prolog. Threat detection performance is conducted by testing against a range of datasets describing realistic situations and demonstrates a reduction in the number of false alarms generated. The proposed system represents the approach employed in the EU SUBITO project (Surveillance of Unattended Baggage and the Identification and Tracking of the Owner).
Resumo:
This essay aims to make a contribution to the conversation between IR and nationalism literatures by considering a particular question: What is the relationship between interstate military competition and the emergence of nationalism as a potent force in world politics? The conventional wisdom among international security scholars, especially neorealists, holds that nationalism can be more or less treated like a “technology” that allowed states to extract significant resources as well as manpower from their respective populations. This paper underlines some of the problems involved with this perspective and pushes forward an interpretation that is based on the logic of political survival. I argue that nationalism’s emergence as a powerful force in world politics followed from the “mutation” and absorption of the universalistic/cosmopolitan republican ideas that gained temporary primacy in Europe during the eighteenth century into particularistic nationalist ideologies. This transformation, in turn, can be best explained by the French Revolution’s dramatic impacts on rulers’ political survival calculi vis-à-vis both interstate and domestic political challenges. The analysis offered in this essay contributes to our understanding of the relationship between IR and nationalism while also highlighting the potential value of the political survival framework for exploring macrohistorical puzzles.
Resumo:
The goal was to quantitatively estimate and compare the fidelity of images acquired with a digital imaging system (ADAR 5500) and generated through scanning of color infrared aerial photographs (SCIRAP) using image-based metrics. Images were collected nearly simultaneously in two repetitive flights to generate multi-temporal datasets. Spatial fidelity of ADAR was lower than that of SCIRAP images. Radiometric noise was higher for SCIRAP than for ADAR images, even though noise from misregistration effects was lower. These results suggest that with careful control of film scanning, the overall fidelity of SCIRAP imagery can be comparable to that of digital multispectral camera data. Therefore, SCIRAP images can likely be used in conjunction with digital metric camera imagery in long-term landcover change analyses.
Resumo:
We propose and demonstrate a fully probabilistic (Bayesian) approach to the detection of cloudy pixels in thermal infrared (TIR) imagery observed from satellite over oceans. Using this approach, we show how to exploit the prior information and the fast forward modelling capability that are typically available in the operational context to obtain improved cloud detection. The probability of clear sky for each pixel is estimated by applying Bayes' theorem, and we describe how to apply Bayes' theorem to this problem in general terms. Joint probability density functions (PDFs) of the observations in the TIR channels are needed; the PDFs for clear conditions are calculable from forward modelling and those for cloudy conditions have been obtained empirically. Using analysis fields from numerical weather prediction as prior information, we apply the approach to imagery representative of imagers on polar-orbiting platforms. In comparison with the established cloud-screening scheme, the new technique decreases both the rate of failure to detect cloud contamination and the false-alarm rate by one quarter. The rate of occurrence of cloud-screening-related errors of >1 K in area-averaged SSTs is reduced by 83%. Copyright © 2005 Royal Meteorological Society.
Resumo:
Construction procurement is complex and there is a very wide range of options available to procurers. Inappropriate choices about how to procure may limit practical opportunities for innovation. In particular, traditional approaches to construction procurement set up many obstacles for technology suppliers to provide innovative solutions. This is because they are often employed as sub-contractors simply to provide and install equipment to specifications developed before the point at which they become involved in a project. A research team at the University of Reading has developed a procurement framework that comprehensively defines the various options open to procurers in a more fine-grained way than has been known in the past. This enables informed decisions that can establish tailor-made procurement approaches that take into account the needs of specific clients. It enables risk and reward structures to be aligned so that contracts and payment mechanisms are aligned precisely with what a client seeks to achieve. This is not a “one-size-fits-all” approach. Rather, it is an approach that enables informed decisions about how to organize individual procurements that are appropriate to particular circumstances, acknowledging that they differ for each client and for each procurement exercise. Within this context, performance-based contracting (PBC) is explored in terms of the different ways in which technology suppliers within constructed facilities might be encouraged and rewarded for the kinds of innovation sought by the ultimate clients. Examples from various industry sectors are presented, from public sector and from private sector, with a commentary about what they sought to achieve and the extent to which they were successful. The lessons from these examples are presented in terms of feasibility in relation to financial issues, governance, economics, strategic issues, contractual issues and cash flow issues for clients and for contractors. Further background documents and more detailed readings are provided in an appendix for those who wish to find out more.
Resumo:
Context: Variation in photosynthetic activity of trees induced by climatic stress can be effectively evaluated using remote sensing data. Although adverse effects of climate on temperate forests have been subjected to increased scrutiny, the suitability of remote sensing imagery for identification of drought stress in such forests has not been explored fully. Aim: To evaluate the sensitivity of MODIS-based vegetation index to heat and drought stress in temperate forests, and explore the differences in stress response of oaks and beech. Methods: We identified 8 oak and 13 beech pure and mature stands, each covering between 4 and 13 MODIS pixels. For each pixel, we extracted a time series of MODIS NDVI from 2000 to 2010. We identified all sequences of continuous unseasonal NDVI decline to be used as the response variable indicative of environmental stress. Neural Networks-based regression modelling was then applied to identify the climatic variables that best explain observed NDVI declines. Results: Tested variables explained 84–97% of the variation in NDVI, whilst air temperature-related climate extremes were found to be the most influential. Beech showed a linear response to the most influential climatic predictors, while oak responded in a unimodal pattern suggesting a better coping mechanism. Conclusions: MODIS NDVI has proved sufficiently sensitive as a stand-level indicator of climatic stress acting upon temperate broadleaf forests, leading to its potential use in predicting drought stress from meteorological observations and improving parameterisation of forest stress indices.
Resumo:
Background: Self-based achievement goals use one’s own intrapersonal trajectory as a standard of evaluation, and this intrapersonal trajectory may be grounded in one’s past (past-based goals) or one’s future potential potential-based goals). Potential-based goals have been overlooked in the literature to date. Aims: The primary aim of the present research is to address this oversight within the context of the 3 x 2 achievement goal framework. Samples: The Study 1 sample was 381 U.S. undergraduates; the Study 2 sample was 310 U.S. undergraduates. Methods: In Study 1, we developed scales to assess otential-approach and potential-avoidance goals, and tested their factorial validity with exploratory and confirmatory factor analyses. In Study 2, we used confirmatory factor analysis to test both the separability of past-based and potential-based goals and their higher order integration within the self-based category. Results: Study 1 supported the factorial validity of the potential-approach and potential-avoidance goal scales. Study 2 supported the separability of past-based and potential-based goals, as well as their higher order integration within the self-based category. Conclusions: This research documents the utility of the proposed distinction, and paves the way for subsequent work on antecedent and consequences of potential-approach and potential-avoidance goals. It highlights the importance
Resumo:
Most developers of behavior change support systems (BCSS) employ ad hoc procedures in their designs. This paper presents a novel discussion concerning how analyzing the relationship between attitude toward target behavior, current behavior, and attitude toward change or maintaining behavior can facilitate the design of BCSS. We describe the three-dimensional relationships between attitude and behavior (3D-RAB) model and demonstrate how it can be used to categorize users, based on variations in levels of cognitive dissonance. The proposed model seeks to provide a method for analyzing the user context on the persuasive systems design model, and it is evaluated using existing BCSS. We identified that although designers seem to address the various cognitive states, this is not done purposefully, or in a methodical fashion, which implies that many existing applications are targeting users not considered at the design phase. As a result of this work, it is suggested that designers apply the 3D-RAB model in order to design solutions for targeted users.
Resumo:
Policy makers are in broad agreement that demand response should play a major role in EU electricity systems and provide much needed future system flexibility. Yet, little demand response has been forthcoming in member states to date. This paper identifies some of the technical potential for demand response, based on empirical data from one UK demand aggregator. Half-hourly electricity readings of demand during normal operation and during response events have been analysed for different industry and service sectors. We review these findings in the context of ongoing EU policy developments with particular focus on the role appropriate arrangements to enhance the available resource. We conclude that in some sectors appropriate policy and regulation could triple the available response capacity and thereby lead to stronger commercial uptake of demand response.
Resumo:
Although no GM crops currently are licensed for commercial production in the UK, as opposition to GM crops by consumers softens, this could change quickly. Although past studies have examined attitudes of UK farmers toward GM technologies in general, there has been little work on the impact of possible coexistence measures on their attitudes toward GM crop production. This could be because the UK Government has not engaged in any public dialogue on the coexistence measures that might be applied on farms. Based on a farm survey, this article examines farmers’ attitudes toward GM technologies and planting intentions for three crops (maize, oilseed rape, and sugar beet) based on a GM availability scenario. The article then nuances this analysis with a review of farmer perceptions of the level of constraint associated with a suite of notional farm-level coexistence measures and issues, based on current European Commission guidelines and practice in other EU Member States.
Resumo:
This paper reports on the construction of a full-scale Bronze Age-type sewn-plank boat based on the Ferriby boats. The boat, which was named Morgawr, was constructed in the National Maritime Museum Cornwall in Falmouth, England, during 2012 and the first months of 2013, as part of a larger exhibition in the museum. This paper provides the background and context of the project, describes the process of building the craft, and reflects in particular on differences between Morgawr and the ‘hypothetical reconstruction of a complete sewn-plank boat’ published in 1990 by Ted Wright and John Coates which formed the basis for this project.
Resumo:
The notion that learning can be enhanced when a teaching approach matches a learner’s learning style has been widely accepted in classroom settings since the latter represents a predictor of student’s attitude and preferences. As such, the traditional approach of ‘one-size-fits-all’ as may be applied to teaching delivery in Educational Hypermedia Systems (EHSs) has to be changed with an approach that responds to users’ needs by exploiting their individual differences. However, establishing and implementing reliable approaches for matching the teaching delivery and modalities to learning styles still represents an innovation challenge which has to be tackled. In this paper, seventy six studies are objectively analysed for several goals. In order to reveal the value of integrating learning styles in EHSs, different perspectives in this context are discussed. Identifying the most effective learning style models as incorporated within AEHSs. Investigating the effectiveness of different approaches for modelling students’ individual learning traits is another goal of this study. Thus, the paper highlights a number of theoretical and technical issues of LS-BAEHSs to serve as a comprehensive guidance for researchers who interest in this area.
Resumo:
Threat detection is a challenging problem, because threats appear in many variations and differences to normal behaviour can be very subtle. In this paper, we consider threats on a parking lot, where theft of a truck’s cargo occurs. The threats range from explicit, e.g. a person attacking the truck driver, to implicit, e.g. somebody loitering and then fiddling with the exterior of the truck in order to open it. Our goal is a system that is able to recognize a threat instantaneously as they develop. Typical observables of the threats are a person’s activity, presence in a particular zone and the trajectory. The novelty of this paper is an encoding of these threat observables in a semantic, intermediate-level representation, based on low-level visual features that have no intrinsic semantic meaning themselves. The aim of this representation was to bridge the semantic gap between the low-level tracks and motion and the higher-level notion of threats. In our experiments, we demonstrate that our semantic representation is more descriptive for threat detection than directly using low-level features. We find that a person’s activities are the most important elements of this semantic representation, followed by the person’s trajectory. The proposed threat detection system is very accurate: 96.6 % of the tracks are correctly interpreted, when considering the temporal context.