837 resultados para clustering users in social network
Resumo:
Following centuries of feminist struggle, centuries which have born witness to the close relationship between linguistic discrimination and social reality, there is a growing tendency in modern society to acknowledge the vital role played by language in overcoming gender discrimination. Political institutions are currently compensating by instituting the use of non-sexist language through legislative guidelines, and this makes an important contribution to social reform for equality between the sexes. Seeing that translation is so important for the creation of the collective identities on which modern global society depends, it is clear that non-sexist translation is crucial if there is to be non-sexist language. In this article I examine the potential of non-sexist translation in the struggle for gender equality from a both a theoretical and a practical viewpoint, and I end with a critical evaluation of non-sexist translation methods.
Resumo:
Adult illiteracy rates are alarmingly high worldwide. The portability, affordability, and ease of use of mobile (or handheld) devices offer a realistic opportunity to provide novel, context-sensitive literacy resources to adults with limited literacy skills. To this end, we developed the concept of ALEX – a mobile Adult Literacy support application for EXperiential learning (Lumsden et al., 2005). On the basis of a medium-fidelity prototype of this application, we conducted an evaluation of ALEX using participants from our in tended user group. This evaluation had two goals: (a) to assess the usefulness of the ALEX concept and the usability of its current design; and (b) to reflect on the appropriateness of our evaluation process given the literacy-related needs of our participants. This paper outlines our approach to this evaluation as well as the results we obtained and our reflections on the process.
Resumo:
The reasons of a restricted applicability of the models of decision making in social and economic systems. 3 basic principles of growth of their adequacy are proposed: "localization" of solutions, direct account of influencing of the individual on process of decision making ("subjectivity of objectivity") and reduction of influencing of the individual psychosomatic characteristics of the subject (" objectivity of subjectivity ") are offered. The principles are illustrated on mathematical models of decision making in ecologically- economic and social systems.
Resumo:
This article discusses a solution method for Hamilton Problem, which either finds the task's solution, or indicates that the task is unsolvable. Offered method has significantly smaller requirements for computing resources than known algorithms.
Resumo:
Topic classification (TC) of short text messages offers an effective and fast way to reveal events happening around the world ranging from those related to Disaster (e.g. Sandy hurricane) to those related to Violence (e.g. Egypt revolution). Previous approaches to TC have mostly focused on exploiting individual knowledge sources (KS) (e.g. DBpedia or Freebase) without considering the graph structures that surround concepts present in KSs when detecting the topics of Tweets. In this paper we introduce a novel approach for harnessing such graph structures from multiple linked KSs, by: (i) building a conceptual representation of the KSs, (ii) leveraging contextual information about concepts by exploiting semantic concept graphs, and (iii) providing a principled way for the combination of KSs. Experiments evaluating our TC classifier in the context of Violence detection (VD) and Emergency Responses (ER) show promising results that significantly outperform various baseline models including an approach using a single KS without linked data and an approach using only Tweets. Copyright 2013 ACM.
Resumo:
One of the major drawbacks for mobile nodes in wireless networks is power management. Our goal is to evaluate the performance power control scheme to be used to reduce network congestion, improve quality of service and collision avoidance in vehicular network and road safety application. Some of the importance of power control (PC) are improving spatial reuse, and increasing network capacity in mobile wireless communications. In this simulation we have evaluated the performance of existing rate algorithms compared with context Aware Rate selection algorithm (ACARS) and also seen the performance of ACARS and how it can be applied to road safety, improve network control and power management. Result shows that ACARS is able to minimize the total transmit power in the presence of propagation processes and mobility of vehicles, by adapting to the fast varying channels conditions with the Path loss exponent values that was used for that environment which is shown in the network simulation parameter. Our results have shown that ACARS is a very robust algorithm which performs very well with the effect of propagation processes that is prone to every transmitted signal in mobile networks. © 2013 IEEE.
Resumo:
This study explores differences between men and women entrepreneurs and social entrepreneurs. It explores the barriers and discriminatory effects that hinder women’s entrepreneurship, including access to finance in the European Union. The study includes four case studies covering the situation in the Czech Republic, Italy, Sweden, and the United Kingdom.
Resumo:
Higher and further education institutions are increasingly using social software tools to support teaching and learning. A growing body of research investigates the diversity of tools and their range of contributions. However, little research has focused on investigating the role of the educator in the context of a social software initiative, even though the educator is critical for the introduction and successful use of social software in a course environment. Hence, we argue that research on social software should place greater emphasis on the educators, as their roles and activities (such as selecting the tools, developing the tasks and facilitating the student interactions on these tools) are instrumental to most aspects of a social software initiative. To this end, we have developed an agenda for future research on the role of the educator. Drawing on role theory, both as the basis for a systematic conceptualization of the educator role and as a guiding framework, we have developed a series of concrete research questions that address core issues associated with the educator roles in a social software context and provide recommendations for further investigations. By developing a research agenda we hope to stimulate research that creates a better understanding of the educator’s situation and develops guidelines to help educators carry out their social software initiatives. Considering the significant role an educator plays in the initiation and conduct of a social software initiative, our research agenda ultimately seeks to contribute to the adoption and efficient use of social software in the educational domain.
Resumo:
We advance research on human capital and entrepreneurial entry and posit that, in order to generate value, social entrepreneurship requires different configurations of human capital than commercial entrepreneurship. We develop a multilevel framework to analyse the commonalities and differences between social and commercial entrepreneurship, including the impact of general and specific human capital, of national context and its moderating effect on the human capital-entrepreneurship relationship. We find that specific entrepreneurial human capital is relatively more important in commercial entrepreneurship, and general human capital in social entrepreneurship, and that the effects of human capital depend on the rule of law.
Resumo:
A tanulmány Magyarország egyik legnagyobb foglalkoztatójának megrendelésére készült abból a célból, hogy milyen megoldásokkal lehetne a vállalati működést hatékonyabbá tenni. Ennek keretében a szerzők megvizsgálták, hol tart ma a HR adatbányászati kutatás a világban. Milyen eszközök állnak rendelkezésre ahhoz, hogy a munkavállalói elmenetelt előre jelezzék, illetve figyeljék, valamint milyen lehetőség van a hálózati kutatások felhasználására a biztonság területén. Szerencsés, hogy a vállalkozói kérdések és erőforrások találkozhattak a kutatói szféra aktuális kutatási területeivel. A tanulmány szerzői úgy gondolják, hogy a cikkben megfogalmazott állítások, következtetések, eredmények a jövőben hasznosíthatók lesznek a vállalat és más cégek számára is. _____ The authors were pleased to take part in this research project initiated by one of Hungary’s largest employer. The goal of the project was to work out BI solutions to improve upon their business process. In the framework of the project first the authors made a survey on the current trends in the world of HR datamining. They reviewed the available tools for the prediction of employee promotion and investigated the question on how to utilize results achieved in social network analysis in the field of enterprise security. When real business problems and resources meet the mainstream research of the scientific community it is always a fortunate and it is rather fruitful. The authors are certain that the results published in this document will be beneficial for Foxconn in the near future. Of course, they are not done. There are continually new research perspectives opening up and huge amount of information is accumulating in the enterprises just waiting for getting discovered and analysed. Also the environment in which an enterprise operates is dynamically changing and thus the company faces new challenges and new type of business problems arise. The authors are in the hope that their research experience will help decision makers also in the future to solve real world business problems.
Resumo:
Recent advances in electronic and computer technologies lead to wide-spread deployment of wireless sensor networks (WSNs). WSNs have wide range applications, including military sensing and tracking, environment monitoring, smart environments, etc. Many WSNs have mission-critical tasks, such as military applications. Thus, the security issues in WSNs are kept in the foreground among research areas. Compared with other wireless networks, such as ad hoc, and cellular networks, security in WSNs is more complicated due to the constrained capabilities of sensor nodes and the properties of the deployment, such as large scale, hostile environment, etc. Security issues mainly come from attacks. In general, the attacks in WSNs can be classified as external attacks and internal attacks. In an external attack, the attacking node is not an authorized participant of the sensor network. Cryptography and other security methods can prevent some of external attacks. However, node compromise, the major and unique problem that leads to internal attacks, will eliminate all the efforts to prevent attacks. Knowing the probability of node compromise will help systems to detect and defend against it. Although there are some approaches that can be used to detect and defend against node compromise, few of them have the ability to estimate the probability of node compromise. Hence, we develop basic uniform, basic gradient, intelligent uniform and intelligent gradient models for node compromise distribution in order to adapt to different application environments by using probability theory. These models allow systems to estimate the probability of node compromise. Applying these models in system security designs can improve system security and decrease the overheads nearly in every security area. Moreover, based on these models, we design a novel secure routing algorithm to defend against the routing security issue that comes from the nodes that have already been compromised but have not been detected by the node compromise detecting mechanism. The routing paths in our algorithm detour those nodes which have already been detected as compromised nodes or have larger probabilities of being compromised. Simulation results show that our algorithm is effective to protect routing paths from node compromise whether detected or not.
Resumo:
This study investigated how students perceived their motivation in high school social studies classes in school and to determine if a correlation exists between students’ grade level, race, gender, and their motivation. The sample included 337 high school students in Broward County, Florida. To assess students’ perceptions on their motivation the academic self-regulation questionnaire was utilized. Results indicate that social studies students show high levels of external regulation, with a mean score at 22.31 on a scale of 36 points. The results show a mean score of 24 on a scale of 28 points for identified regulation among social studies students. Findings revealed that student motivation could be gauged. No statistical significance was found between high school students’ grade level, race, gender, and their motivation in social studies classes. The findings of this study have shown that students at Boyd H. Anderson High School want to learn social studies.