916 resultados para multiple discrepancies theory
Resumo:
We investigated whether belief-based differences exist between students who have strong and weak intentions to integrate complementary and alternative therapy (CAT) into future psychology practice by recommending CAT or specific CAT practitioners to clients. A cross-sectional methodology was used. Psychology undergraduate students (N = 106) participated in a paper-based questionnaire design to explore their underlying beliefs related to CAT integration. The study was undertaken at a major university in Queensland, Australia. The theory of planned behaviour belief-based framework guided the study. Multivariate analyses of variance examined the influence of behavioural, normative, and control beliefs on the strong and weak intention groups. A multiple regression analysis investigated the relative importance of these belief sets for predicting intentions. We found that clear differences emerged between strong and weak intenders on behavioural and normative beliefs, but not control beliefs. Strong intenders perceived the positive outcomes of integrating CAT, such as being able to offer clients a more holistic practice and having confidence in the practitioners/practices, as more likely to occur than weak intenders, and perceived the negative outcome of compromising my professional practice as less likely. Strong in-tenders were more likely than weak intenders to perceive that a range of important referents (e.g., clients) would think they should integrate CAT. Results of the regression analysis revealed the same pattern of results in that behavioural and normative beliefs, but not control beliefs, significantly predicted intentions. The findings from this study can be used to inform policy and educational initiatives that aim to encourage CAT use in psychology practice.
Resumo:
The issues involved in agricultural biodiversity are important and interesting areas for the application of economic theory. However, very little theoretical and empirical work has been undertaken to understand the benefits of conserving agricultural biodiversity. Accordingly, the main objectives of this PhD thesis are to: (1) Investigate farmers’ valuation of agricultural biodiversity; (2) Identify factors influencing farmers’ demand for agricultural biodiversity; (3) Examine farmers’ demand for biodiversity rich farming systems; (4) Investigate the relationship between agricultural biodiversity and farm level technical efficiency. This PhD thesis investigates these issues by using primary data in small-scale farms, along with secondary data from Sri Lanka. The overall findings of the thesis can be summarized as follows. Firstly, owing to educational and poverty issues of those being interviewed, some policy makers in developed countries question whether non-market valuation techniques such as Choice Experiment (CE) can be applied to developing countries such as Sri Lanka. The CE study in this thesis indicates that carefully designed and pre-tested nonmarket valuation techniques can be applied in developing countries with a high level of reliability. The CE findings support the priori assumption that small-scale farms and their multiple attributes contribute positively and significantly to the utility of farm families in Sri Lanka. Farmers have strong positive attitudes towards increasing agricultural biodiversity in rural areas. This suggests that these attitudes can be the basis on which appropriate policies can be introduced to improve agricultural biodiversity. Secondly, the thesis identifies the factors which influence farmers’ demand for agricultural biodiversity and farmers’ demands on biodiversity rich farming systems. As such they provide important tools for the implementation of policies designed to avoid the loss agricultural biodiversity which is shown to be a major impediment to agricultural growth and sustainable development in a number of developing countries. The results illustrate that certain key household, market and other characteristics (such as agricultural subsidies, percentage of investment of owned money and farm size) are the major determinants of demand for agricultural biodiversity on small-scale farms. The significant household characteristics that determine crop and livestock diversity include household member participation on the farm, off-farm income, shared labour, market price fluctuations and household wealth. Furthermore, it is shown that all the included market characteristics as well as agricultural subsidies are also important determinants of agricultural biodiversity. Thirdly, it is found that when the efficiency of agricultural production is measured in practice, the role of agricultural biodiversity has rarely been investigated in the literature. The results in the final section of the thesis show that crop diversity, livestock diversity and mix farming system are positively related to farm level technical efficiency. In addition to these variables education level, number of separate plots, agricultural extension service, credit access, membership of farm organization and land ownerships are significant and direct policy relevant variables in the inefficiency model. The results of the study therefore have important policy implications for conserving agricultural biodiversity in Sri Lanka.
Resumo:
Complex Internet attacks may come from multiple sources, and target multiple networks and technologies. Nevertheless, Collaborative Intrusion Detection Systems (CIDS) emerges as a promising solution by using information from multiple sources to gain a better understanding of objective and impact of complex Internet attacks. CIDS also help to cope with classical problems of Intrusion Detection Systems (IDS) such as zero-day attacks, high false alarm rates and architectural challenges, e. g., centralized designs exposing the Single-Point-of-Failure. Improved complexity on the other hand gives raise to new exploitation opportunities for adversaries. The contribution of this paper is twofold. We first investigate related research on CIDS to identify the common building blocks and to understand vulnerabilities of the Collaborative Intrusion Detection Framework (CIDF). Second, we focus on the problem of anonymity preservation in a decentralized intrusion detection related message exchange scheme. We use techniques from design theory to provide multi-path peer-to-peer communication scheme where the adversary can not perform better than guessing randomly the originator of an alert message.
Resumo:
A newly developed computational approach is proposed in the paper for the analysis of multiple crack problems based on the eigen crack opening displacement (COD) boundary integral equations. The eigen COD particularly refers to a crack in an infinite domain under fictitious traction acting on the crack surface. With the concept of eigen COD, the multiple cracks in great number can be solved by using the conventional displacement discontinuity boundary integral equations in an iterative fashion with a small size of system matrix to determine all the unknown CODs step by step. To deal with the interactions among cracks for multiple crack problems, all cracks in the problem are divided into two groups, namely the adjacent group and the far-field group, according to the distance to the current crack in consideration. The adjacent group contains cracks with relatively small distances but strong effects to the current crack, while the others, the cracks of far-field group are composed of those with relatively large distances. Correspondingly, the eigen COD of the current crack is computed in two parts. The first part is computed by using the fictitious tractions of adjacent cracks via the local Eshelby matrix derived from the traction boundary integral equations in discretized form, while the second part is computed by using those of far-field cracks so that the high computational efficiency can be achieved in the proposed approach. The numerical results of the proposed approach are compared not only with those using the dual boundary integral equations (D-BIE) and the BIE with numerical Green's functions (NGF) but also with those of the analytical solutions in literature. The effectiveness and the efficiency of the proposed approach is verified. Numerical examples are provided for the stress intensity factors of cracks, up to several thousands in number, in both the finite and infinite plates.
Resumo:
This work identifies the limitations of n-way data analysis techniques in multidimensional stream data, such as Internet chat room communications data, and establishes a link between data collection and performance of these techniques. Its contributions are twofold. First, it extends data analysis to multiple dimensions by constructing n-way data arrays known as high order tensors. Chat room tensors are generated by a simulator which collects and models actual communication data. The accuracy of the model is determined by the Kolmogorov-Smirnov goodness-of-fit test which compares the simulation data with the observed (real) data. Second, a detailed computational comparison is performed to test several data analysis techniques including svd [1], and multi-way techniques including Tucker1, Tucker3 [2], and Parafac [3].
Resumo:
This work investigates the accuracy and efficiency tradeoffs between centralized and collective (distributed) algorithms for (i) sampling, and (ii) n-way data analysis techniques in multidimensional stream data, such as Internet chatroom communications. Its contributions are threefold. First, we use the Kolmogorov-Smirnov goodness-of-fit test to show that statistical differences between real data obtained by collective sampling in time dimension from multiple servers and that of obtained from a single server are insignificant. Second, we show using the real data that collective data analysis of 3-way data arrays (users x keywords x time) known as high order tensors is more efficient than centralized algorithms with respect to both space and computational cost. Furthermore, we show that this gain is obtained without loss of accuracy. Third, we examine the sensitivity of collective constructions and analysis of high order data tensors to the choice of server selection and sampling window size. We construct 4-way tensors (users x keywords x time x servers) and analyze them to show the impact of server and window size selections on the results.
Resumo:
An engaging narrative is maintained throughout this edited collection of articles that address the issue of militarism in international relations. The book seamlessly integrates historical and contemporary perspectives on militarism with theory and relevant international case studies, resulting in a very informative read. The work is comprised of three parts. Part 1 deals with the theorisation of militarism and includes chapters by Anna Stavrianakis and Jan Selby, Martin Shaw, Simon Dalby, and Nicola Short. It covers a range of topics relating to historical and contemporary theories of militarism, geopolitical threat construction, political economy, and the US military’s ‘cultural turn’.
Resumo:
A whole-genome scan was conducted to map quantitative trait loci (QTL) for BSE resistance or susceptibility. Cows from four half-sib families were included and 173 microsatellite markers were used to construct a 2835-cM (Kosambi) linkage map covering 29 autosomes and the pseudoautosomal region of the sex chromosome. Interval mapping by linear regression was applied and extended to a multiple-QTL analysis approach that used identified QTL on other chromosomes as cofactors to increase mapping power. In the multiple-QTL analysis, two genome-wide significant QTL (BTA17 and X/Y ps) and four genome-wide suggestive QTL (BTA1, 6, 13, and 19) were revealed. The QTL identified here using linkage analysis do not overlap with regions previously identified using TDT analysis. One factor that may explain the disparity between the results is that a more extensive data set was used in the present study. Furthermore, methodological differences between TDT and linkage analyses may affect the power of these approaches.
Multi-level knowledge transfer in software development outsourcing projects : the agency theory view
Resumo:
In recent years, software development outsourcing has become even more complex. Outsourcing partner have begun‘re- outsourcing’ components of their projects to other outsourcing companies to minimize cost and gain efficiencies, creating a multi-level hierarchy of outsourcing. This research in progress paper presents preliminary findings of a study designed to understand knowledge transfer effectiveness of multi-level software development outsourcing projects. We conceptualize the SD-outsourcing entities using the Agency Theory. This study conceptualizes, operationalises and validates the concept of Knowledge Transfer as a three-phase multidimensional formative index of 1) Domain knowledge, 2) Communication behaviors, and 3) Clarity of requirements. Data analysis identified substantial, significant differences between the Principal and the Agent on two of the three constructs. Using Agency Theory, supported by preliminary findings, the paper also provides prescriptive guidelines of reducing the friction between the Principal and the Agent in multi-level software outsourcing.
Resumo:
Academically gifted students are recognised as possessing considerable achievement potential. Yet many fail to perform at a level commensurate with their ability. Often gifted students in early adolescence are faced with a forced choice between fulfilment of potential and achieving stable positive relationships with peers. This choice can affect their achievement and may have far-reaching personal and social costs. This case study explored the viability of self-presentation theory to explain students' ways of negotiating their sense of self whilst developing public identity and the concomitant affects on achievement and the fulfilment of potential. It examined how gifted students moderate their images in their learning and extra-curricular environments. Further, the study identifies those self-presentation strategies adopted that either facilitate or hinder achievement. This study may assist parents, educators and school counsellors to provide greater support for gifted adolescents.
Resumo:
The biosafety of carbon nanomaterial needs to be critically evaluated with both experimental and theoretical validations before extensive biomedical applications. In this letter, we present an analysis of the binding ability of two dimensional monolayer carbon nanomaterial on actin by molecular simulation to understand their adhesive characteristics on F-actin cytoskeleton. The modelling results indicate that the positively charged carbon nanomaterial has higher binding stability on actin. Compared to crystalline graphene, graphene oxide shows higher binding influence on actin when carrying 11 positive surface charge. This theoretical investigation provides insights into the sensitivity of actin-related cellular activities on carbon nanomaterial.
Resumo:
The main purpose of this longitudinal study was to investigate the role of motivational climates, perceived competence and motivational regulations as antecedents of self-reported physical activity during junior high school years. The participants included 237 Finnish students (101 girls, 136 boys) that were 13 years old at the first stage of the study. Students completed the motivational climate and perceived competence questionnaires at Grade 7, motivation towards physical education questionnaire at Grade 8, and self-reported physical activity questionnaire at Grade 9. A path analysis revealed a path from task-involving motivational climate via perceived competence and intrinsic motivation to self-reported physical activity. Perceived competence and intrinsic motivation were statistically significant mediators between task-involving motivational climate and self-reported physical activity. This finding supports the four-stage causal sequence model of motivation.
Resumo:
This paper presents a new approach for the inclusion of human expert cognition into autonomous trajectory planning for unmanned aerial systems (UASs) operating in low-altitude environments. During typical UAS operations, multiple objectives may exist; therefore, the use of multicriteria decision aid techniques can potentially allow for convergence to trajectory solutions which better reflect overall mission requirements. In that context, additive multiattribute value theory has been applied to optimize trajectories with respect to multiple objectives. A graphical user interface was developed to allow for knowledge capture from a human decision maker (HDM) through simulated decision scenarios. The expert decision data gathered are converted into value functions and corresponding criteria weightings using utility additive theory. The inclusion of preferences elicited from HDM data within an automated decision system allows for the generation of trajectories which more closely represent the candidate HDM decision preferences. This approach has been demonstrated in this paper through simulation using a fixed-wing UAS operating in low-altitude environments.
Resumo:
The use of Wireless Sensor Networks (WSNs) for Structural Health Monitoring (SHM) has become a promising approach due to many advantages such as low cost, fast and flexible deployment. However, inherent technical issues such as data synchronization error and data loss have prevented these distinct systems from being extensively used. Recently, several SHM-oriented WSNs have been proposed and believed to be able to overcome a large number of technical uncertainties. Nevertheless, there is limited research verifying the applicability of those WSNs with respect to demanding SHM applications like modal analysis and damage identification. This paper first presents a brief review of the most inherent uncertainties of the SHM-oriented WSN platforms and then investigates their effects on outcomes and performance of the most robust Output-only Modal Analysis (OMA) techniques when employing merged data from multiple tests. The two OMA families selected for this investigation are Frequency Domain Decomposition (FDD) and Data-driven Stochastic Subspace Identification (SSI-data) due to the fact that they both have been widely applied in the past decade. Experimental accelerations collected by a wired sensory system on a large-scale laboratory bridge model are initially used as clean data before being contaminated by different data pollutants in sequential manner to simulate practical SHM-oriented WSN uncertainties. The results of this study show the robustness of FDD and the precautions needed for SSI-data family when dealing with SHM-WSN uncertainties. Finally, the use of the measurement channel projection for the time-domain OMA techniques and the preferred combination of the OMA techniques to cope with the SHM-WSN uncertainties is recommended.