883 resultados para Information theory in aesthetics
Resumo:
Black hole's response to external perturbations will carry significant information about these exotic objects. Its response, shortly after the initial `kick', is known to be ruled by the damped oscillation of the perturbating eld, called quasinormal modes(QNMs), followed by the tails of decay and is the characteristic of the background black hole spacetime. In the last three decades, several shortcomings came out in the Einstein's General Theory of Relativity(GTR). Such issues come, especially, from observational cosmology and quantum eld theory. In the rst case, for example, the observed accelerated expansion of the universe and the hypothesized mysterious dark energy still lack a satisfactory explanation. Secondly, GTR is a classical theory which does not work as a fundamental theory, when one wants to achieve a full quantum description of gravity. Due to these facts modi cation to GTR or alternative theories for gravity have been considered. Two potential approaches towards these problems are the quintessence model for dark energy and Ho rava-Lifshitz(HL) gravity. Quintessence is a dynamical model of dark energy which is often realized by scalar eld mechanism. HL gravity is the recently proposed theory of gravity, which is renormalizable in power counting arguments. The two models are considered as a potential candidate in explaining these issues.
Resumo:
It has been recently shownthat localfield potentials (LFPs)fromthe auditory and visual cortices carry information about sensory stimuli, but whether this is a universal property of sensory cortices remains to be determined. Moreover, little is known about the temporal dynamics of sensory information contained in LFPs following stimulus onset. Here we investigated the time course of the amount of stimulus information in LFPs and spikes from the gustatory cortex of awake rats subjected to tastants and water delivery on the tongue. We found that the phase and amplitude of multiple LFP frequencies carry information about stimuli, which have specific time courses after stimulus delivery. The information carried by LFP phase and amplitude was independent within frequency bands, since the joint information exhibited neither synergy nor redundancy. Tastant information in LFPs was also independent and had a different time course from the information carried by spikes. These findings support the hypothesis that the brain uses different frequency channels to dynamically code for multiple features of a stimulus.
Resumo:
This paper aims to crystallize recent research performed at the University of Worcester to investigate the feasibility of using the commercial game engine ‘Unreal Tournament 2004’ (UT2004) to produce ‘Educational Immersive Environments’ (EIEs) suitable for education and training. Our research has been supported by the UK Higher Education Academy. We discuss both practical and theoretical aspects of EIEs. The practical aspects include the production of EIEs to support high school physics education, the education of architects, and the learning of literacy by primary school children. This research is based on the development of our novel instructional medium, ‘UnrealPowerPoint’. Our fundamental guiding principles are that, first, pedagogy must inform technology, and second, that both teachers and pupils should be empowered to produce educational materials. Our work is informed by current educational theories such as constructivism, experiential learning and socio-cultural approaches as well as elements of instructional design and game principles.
Resumo:
Abstract : The use of social media tools to support small and medium-sized enterprises (SME) to support their business activities throughout the product life cycle (PLC) phases represents an interesting opportunity. SMEs operate in very competitive environments, and face significant challenges primarily caused by their size disadvantage. By nature, social media tools and platforms can enable them to overcome some of these challenges, as they are often very inexpensive, familiar and easy to use, allowing them to reach large audiences they would not be able to reach with traditional and expensive marketing initiatives. To provide solutions to this problem, this research identified three main objectives. The first objective was to draw a picture of the existing academic literature on the use of social media tools in the PLC context to better understand how these tools were studied and used in businesses, and for what purpose. Second, this research aimed at understanding how SMEs actually use social media tools to support their different business activities to identify the gap between academic research and actual business practices. Finally, based on the findings highlighted from the previous objectives, this research aimed at developing theory on this topic by proposing a conceptual framework of customer engagement enabled by social media. The conceptual framework aimed at answering general questions that emerged from the initial two objectives: Why do some SMEs use social media to support customer engagement, while others do not? Why do firms use different social media tools to support their customer engagement initiatives? Why does the scope of customer engagement initiatives (i.e., across different PLC phases) vary between SMEs? What are the potential outcomes of conducting customer engagement initiatives for the organizing firms? In order to achieve these research objectives, the methodology employed for this research is threefold. First, a systematic literature review was performed in order to properly understand how the use of social media tools in the PLC context had been studied. The final results consisted of 78 academic articles which were analyzed based on their bibliometric information and their content. Second, in order to draw the contrast between the academic publications and managerial reality of SMEs, six semi-structured interviews were conducted to understand how these firms actually use social media to support different activities in each of the PLC phases. Third, five additional semi-structured interviews were performed to gather a deeper understanding of this phenomenon and generate theory to support the proposed conceptual framework. The conceptual framework focuses on the degree of customer engagement, which is comprised of the scope (PLC phases) of customer engagement and the technology (social media tools) employed to support these initiatives. Two sets of antecedents were examined, firm motivators and firm impediments, as they could both potentially affect the scope and the social media tools used to support customer engagement initiatives. Finally, potential customer engagement outcomes for SMEs developing these initiatives were also examined. The semi-structured interviews lasted approximately 25-35 minutes, and were performed using an interview grid consisting of 24 open-ended questions. The interview grid was developed based on the findings of the systematic literature review, and this qualitative approach allowed for a rich understanding of the interviewed SMEs’ use of social media tools to support and engage customers in their different PLC activities. The main results highlighted by this project demonstrate that this field is relatively recent and sees constant increase in research interest since 2008. However, most of the academic research focuses on the use of social media tools to support innovation activities during the new product development process, while the interviewed firms almost exclusively used the tools to engage customers in the later phases of the PLC, primarily for promotion, customer service support, and business development activities. Interestingly, the interviewed firms highlighted several benefits of using social media tools to engage customers, some of which could help them overcome certain size disadvantages previously mentioned. These firms are in need of further guidelines to properly implement such initiatives and reap the expected benefits. Results suggest that SMEs are far behind both large companies and academic research in their use of social media to engage customers in different business activities. The proposed conceptual framework serves as a great tool to better understand their reality and eventually better support them in their social media and customer engagement efforts. However, this framework needs to be further developed and improved. This research project provides a 360-degree view of the phenomenon of the use of social media to support customer engagement for SMEs, by providing both a thorough systematic review of the academic research and an understanding of the managerial reality of SMEs behind this phenomenon. From this analysis, a conceptual framework is then proposed and serves as a stepping stone for future researchers who are interested in developing theory in this field.
Resumo:
Internet users consume online targeted advertising based on information collected about them and voluntarily share personal information in social networks. Sensor information and data from smart-phones is collected and used by applications, sometimes in unclear ways. As it happens today with smartphones, in the near future sensors will be shipped in all types of connected devices, enabling ubiquitous information gathering from the physical environment, enabling the vision of Ambient Intelligence. The value of gathered data, if not obvious, can be harnessed through data mining techniques and put to use by enabling personalized and tailored services as well as business intelligence practices, fueling the digital economy. However, the ever-expanding information gathering and use undermines the privacy conceptions of the past. Natural social practices of managing privacy in daily relations are overridden by socially-awkward communication tools, service providers struggle with security issues resulting in harmful data leaks, governments use mass surveillance techniques, the incentives of the digital economy threaten consumer privacy, and the advancement of consumergrade data-gathering technology enables new inter-personal abuses. A wide range of fields attempts to address technology-related privacy problems, however they vary immensely in terms of assumptions, scope and approach. Privacy of future use cases is typically handled vertically, instead of building upon previous work that can be re-contextualized, while current privacy problems are typically addressed per type in a more focused way. Because significant effort was required to make sense of the relations and structure of privacy-related work, this thesis attempts to transmit a structured view of it. It is multi-disciplinary - from cryptography to economics, including distributed systems and information theory - and addresses privacy issues of different natures. As existing work is framed and discussed, the contributions to the state-of-theart done in the scope of this thesis are presented. The contributions add to five distinct areas: 1) identity in distributed systems; 2) future context-aware services; 3) event-based context management; 4) low-latency information flow control; 5) high-dimensional dataset anonymity. Finally, having laid out such landscape of the privacy-preserving work, the current and future privacy challenges are discussed, considering not only technical but also socio-economic perspectives.
Resumo:
Russian e-commerce has drawn a lot of attention in academic publications as well as in public media lately. The market is growing with a speed of rocket offering companies enormous business opportunities. However, combination of Russian culture, consumer online purchasing and decision-making process forms a subject yet completely unknown. From international online business perspective it is vital for companies to know how a culture affects consumer’s purchase decision and what are the key elements that need to be modified in order to successfully expand online operations to Russian market. Here, the main purpose is to define the key factors affecting Russian consumer’s online purchase intention. In order to answer the main research question, firstly the role of culture in purchase intention context is researched. Secondly, focus is drawn to the factors that affect online purchase intention. Lastly, it is researched how Russian culture is affecting e-commerce attributes modification. The objective is not only to expand the theoretical understanding of the subject but also to provide companies with a clear vision on how the online operations should be conducted in Russian online market. Ranganathan’s and Jha’s conceptual framework was chosen as a ground theory in this study. Here, three main categories Computer Self-Efficacy and Past Online Experience, Website Quality and Costumer Concerns form basis for the study. Various articles and academic literature supplemented this theoretical approach. Qualitative research method was adapted and the study was conducted through five expert interviews. As a conclusion it can be stated that culture forms a ground for entire purchase decision-making process in online context. Results from the interviews were grouped according to main three theoretic categories and placed with Ranganathan’s and Jha’s original framework. This formed a new theoretical framework that defines diverse factors affecting specifically Russian consumer’s online purchase intention. This study suggests that following factors need to be taking into serious consideration in Russian online context: photography style, detailed product and company information, colors, language, product variety, reviews, recommendations, strong social media presence, fast check out and minimalistic order information, counterfeit fear, cash on delivery payment, training and guidance, extensive customer service, consumers’ insecurity, inexperience, high interest for technology and their individualistic personality.
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Resumo:
In economics of information theory, credence products are those whose quality is difficult or impossible for consumers to assess, even after they have consumed the product (Darby & Karni, 1973). This dissertation is focused on the content, consumer perception, and power of online reviews for credence services. Economics of information theory has long assumed, without empirical confirmation, that consumers will discount the credibility of claims about credence quality attributes. The same theories predict that because credence services are by definition obscure to the consumer, reviews of credence services are incapable of signaling quality. Our research aims to question these assumptions. In the first essay we examine how the content and structure of online reviews of credence services systematically differ from the content and structure of reviews of experience services and how consumers judge these differences. We have found that online reviews of credence services have either less important or less credible content than reviews of experience services and that consumers do discount the credibility of credence claims. However, while consumers rationally discount the credibility of simple credence claims in a review, more complex argument structure and the inclusion of evidence attenuate this effect. In the second essay we ask, “Can online reviews predict the worst doctors?” We examine the power of online reviews to detect low quality, as measured by state medical board sanctions. We find that online reviews are somewhat predictive of a doctor’s suitability to practice medicine; however, not all the data are useful. Numerical or star ratings provide the strongest quality signal; user-submitted text provides some signal but is subsumed almost completely by ratings. Of the ratings variables in our dataset, we find that punctuality, rather than knowledge, is the strongest predictor of medical board sanctions. These results challenge the definition of credence products, which is a long-standing construct in economics of information theory. Our results also have implications for online review users, review platforms, and for the use of predictive modeling in the context of information systems research.
Resumo:
Tropical forests have decreased drastically especially in the Peruvian Amazon. In Peru deforestation is caused especially by migrant people; building of houses and infrastructure, clearing land for agricultural purposes and illegal logging and mining. Deforestation results in hindering ecosystem vitality, boosting climate change and decreasing livelihood possibilities. As a counterpoint to cutting down trees there is reforestation, which refers to re-establishment of forest cover. Deforestation and reforestation can be analysed in the light of Forest Transition theory. According to it, due to economic growth, the amount forest cover first diminishes but then starts to increase as the economy in general strengthens. Thus, the research framework is set to this theory. In this study the focus is on analysing socioeconomically sustainable reforestation possibilities in the community of Tingana, Peru. It is situated in a municipal conservation area around which deforestation has been heavy. Land cover change is analysed from LandsatTM satellite images covering a 15 year time period, 1995–2010, in the surroundings of the study area. Semi-structured interviews have been done with a sample size of 25 people and shed light on the perspectives on forests, reforestation and economical activities. The synthesis created from the two methods gives information about the possibilities to enforce reforestation in Tingana and the phase of forest transition in the area. The results show that forest cover has decreased around the surroundings of Tingana leaving the conservation area isolated from larger forest areas. Knowing that forest cover has also decreased inside the conservation area due to agricultural expansion it is certain that fragmentation harms biodiversity causing changes in local climate, which can have knock-on effects for farming and local livelihoods. Therefore reforestation is welcomed when it ensures both conservation and financial benefits and when carried out on locals’ terms. Regarding conservation and incomes the best option would be to plant native timber species together with fruit production species to create agroforestry systems. Economically the community should aim towards an economy that relies on ecotourism as it already practiced in the area. Reforestation could increase ecotourism, which then could in turn increase reforestation via revenues. Regarding forest transition it is likely that forest re-establishment will occur if reforestation along with ecotourism is implemented on long time scale.
Resumo:
The analysis of system calls is one method employed by anomaly detection systems to recognise malicious code execution. Similarities can be drawn between this process and the behaviour of certain cells belonging to the human immune system, and can be applied to construct an artificial immune system. A recently developed hypothesis in immunology, the Danger Theory, states that our immune system responds to the presence of intruders through sensing molecules belonging to those invaders, plus signals generated by the host indicating danger and damage. We propose the incorporation of this concept into a responsive intrusion detection system, where behavioural information of the system and running processes is combined with information regarding individual system calls.
Resumo:
It has been recently shownthat localfield potentials (LFPs)fromthe auditory and visual cortices carry information about sensory stimuli, but whether this is a universal property of sensory cortices remains to be determined. Moreover, little is known about the temporal dynamics of sensory information contained in LFPs following stimulus onset. Here we investigated the time course of the amount of stimulus information in LFPs and spikes from the gustatory cortex of awake rats subjected to tastants and water delivery on the tongue. We found that the phase and amplitude of multiple LFP frequencies carry information about stimuli, which have specific time courses after stimulus delivery. The information carried by LFP phase and amplitude was independent within frequency bands, since the joint information exhibited neither synergy nor redundancy. Tastant information in LFPs was also independent and had a different time course from the information carried by spikes. These findings support the hypothesis that the brain uses different frequency channels to dynamically code for multiple features of a stimulus.
Resumo:
International audience
Resumo:
(Deep) neural networks are increasingly being used for various computer vision and pattern recognition tasks due to their strong ability to learn highly discriminative features. However, quantitative analysis of their classication ability and design philosophies are still nebulous. In this work, we use information theory to analyze the concatenated restricted Boltzmann machines (RBMs) and propose a mutual information-based RBM neural networks (MI-RBM). We develop a novel pretraining algorithm to maximize the mutual information between RBMs. Extensive experimental results on various classication tasks show the eectiveness of the proposed approach.
Resumo:
Neuroaesthetics is the study of the brain’s response to artistic stimuli. The neuroscientist V.S. Ramachandran contends that art is primarily “caricature” or “exaggeration.” Exaggerated forms hyperactivate neurons in viewers’ brains, which in turn produce specific, “universal” responses. Ramachandran identifies a precursor for his theory in the concept of rasa (literally “juice”) from classical Hindu aesthetics, which he associates with “exaggeration.” The canonical Sanskrit texts of Bharata Muni’s Natya Shastra and Abhinavagupta’s Abhinavabharati, however, do not support Ramachandran’s conclusions. They present audiences as dynamic co-creators, not passive recipients. I believe we could more accurately model the neurology of Hindu aesthetic experiences if we took indigenous rasa theory more seriously as qualitative data that could inform future research.
Resumo:
In knowledge technology work, as expressed by the scope of this conference, there are a number of communities, each uncovering new methods, theories, and practices. The Library and Information Science (LIS) community is one such community. This community, through tradition and innovation, theories and practice, organizes knowledge and develops knowledge technologies formed by iterative research hewn to the values of equal access and discovery for all. The Information Modeling community is another contributor to knowledge technologies. It concerns itself with the construction of symbolic models that capture the meaning of information and organize it in ways that are computer-based, but human understandable. A recent paper that examines certain assumptions in information modeling builds a bridge between these two communities, offering a forum for a discussion on common aims from a common perspective. In a June 2000 article, Parsons and Wand separate classes from instances in information modeling in order to free instances from what they call the “tyranny” of classes. They attribute a number of problems in information modeling to inherent classification – or the disregard for the fact that instances can be conceptualized independent of any class assignment. By faceting instances from classes, Parsons and Wand strike a sonorous chord with classification theory as understood in LIS. In the practice community and in the publications of LIS, faceted classification has shifted the paradigm of knowledge organization theory in the twentieth century. Here, with the proposal of inherent classification and the resulting layered information modeling, a clear line joins both the LIS classification theory community and the information modeling community. Both communities have their eyes turned toward networked resource discovery, and with this conceptual conjunction a new paradigmatic conversation can take place. Parsons and Wand propose that the layered information model can facilitate schema integration, schema evolution, and interoperability. These three spheres in information modeling have their own connotation, but are not distant from the aims of classification research in LIS. In this new conceptual conjunction, established by Parsons and Ward, information modeling through the layered information model, can expand the horizons of classification theory beyond LIS, promoting a cross-fertilization of ideas on the interoperability of subject access tools like classification schemes, thesauri, taxonomies, and ontologies. This paper examines the common ground between the layered information model and faceted classification, establishing a vocabulary and outlining some common principles. It then turns to the issue of schema and the horizons of conventional classification and the differences between Information Modeling and Library and Information Science. Finally, a framework is proposed that deploys an interpretation of the layered information modeling approach in a knowledge technologies context. In order to design subject access systems that will integrate, evolve and interoperate in a networked environment, knowledge organization specialists must consider a semantic class independence like Parsons and Wand propose for information modeling.