845 resultados para Chaotic behaviors
Resumo:
Real-world AI systems have been recently deployed which can automatically analyze the plan and tactics of tennis players. As the game-state is updated regularly at short intervals (i.e. point-level), a library of successful and unsuccessful plans of a player can be learnt over time. Given the relative strengths and weaknesses of a player’s plans, a set of proven plans or tactics from the library that characterize a player can be identified. For low-scoring, continuous team sports like soccer, such analysis for multi-agent teams does not exist as the game is not segmented into “discretized” plays (i.e. plans), making it difficult to obtain a library that characterizes a team’s behavior. Additionally, as player tracking data is costly and difficult to obtain, we only have partial team tracings in the form of ball actions which makes this problem even more difficult. In this paper, we propose a method to overcome these issues by representing team behavior via play-segments, which are spatio-temporal descriptions of ball movement over fixed windows of time. Using these representations we can characterize team behavior from entropy maps, which give a measure of predictability of team behaviors across the field. We show the efficacy and applicability of our method on the 2010-2011 English Premier League soccer data.
Resumo:
Online travel reviews are emerging as a powerful source of information affecting tourists' pre-purchase evaluation of a hotel organization. This trend has highlighted the need for a greater understanding of the impact of online reviews on consumer attitudes and behaviors. In view of this need, we investigate the influence of online hotel reviews on consumers' attributions of service quality and firms' ability to control service delivery. An experimental design was used to examine the effects of four independent variables: framing; valence; ratings; and target. The results suggest that in reviews evaluating a hotel, remarks related to core services are more likely to induce positive service quality attributions. Recent reviews affect customers' attributions of controllability for service delivery, with negative reviews exerting an unfavorable influence on consumers' perceptions. The findings highlight the importance of managing the core service and the need for managers to act promptly in addressing customer service problems.
Resumo:
The Queensland Government has implemented strategies promoting a shift from individual car use to active transport, a transition which requires drivers to adapt to sharing the road with increased numbers of people cycling through transport network. For this to occur safely, changes in both road infrastructure and road user expectations and behaviors will be needed. Creating separate cycle infrastructure does not remove the need for cyclists to commence, cross or finish travel on shared roads. Currently intersections are one of the predominant shared road spaces where crashes result in cyclists being injured or killed. This research investigates how Brisbane cyclists and drivers perceive risk when interacting with other road users at intersections. The current study replicates a French study conducted by co-authors Chaurand and Delhomme in 2011 and extends it to assess gender effects which have been reported in other Australian cycling research. An online survey was administered to experienced cyclists and drivers. Participants rated the level of risk they felt when imagining a number of different road situations. Based on the earlier French study it is expected that perceived crash risk will be influenced both by the participant’s mode of travel and the type of interacting vehicle and perceived risk will be greater when the interaction is with a car than a bicycle. It is predicted that risk perception will decrease as the level of experience increases and that male participants will have a higher perception of skill and lower perception of risk than females. The findings of this Queensland study will provide a valuable insight into perceived risk and the traffic behaviours of drivers and cyclists when interacting with other road users and results will be available for presentation at the Congress.
Resumo:
In this work, the thermal expansion properties of carbon nanotube (CNT)-reinforced nanocomposites with CNT content ranging from 1 to 15 wt% were evaluated using a multi-scale numerical approach, in which the effects of two parameters, i.e., temperature and CNT content, were investigated extensively. For all CNT contents, the obtained results clearly revealed that within a wide low-temperature range (30°C ~ 62°C), thermal contraction is observed, while thermal expansion occurs in a high-temperature range (62°C ~ 120°C). It was found that at any specified CNT content, the thermal expansion properties vary with temperature - as temperature increases, the thermal expansion rate increases linearly. However, at a specified temperature, the absolute value of the thermal expansion rate decreases nonlinearly as the CNT content increases. Moreover, the results provided by the present multi-scale numerical model were in good agreement with those obtained from the corresponding theoretical analyses and experimental measurements in this work, which indicates that this multi-scale numerical approach provides a powerful tool to evaluate the thermal expansion properties of any type of CNT/polymer nanocomposites and therefore promotes the understanding on the thermal behaviors of CNT/polymer nanocomposites for their applications in temperature sensors, nanoelectronics devices, etc.
Multi-level knowledge transfer in software development outsourcing projects : the agency theory view
Resumo:
In recent years, software development outsourcing has become even more complex. Outsourcing partner have begun‘re- outsourcing’ components of their projects to other outsourcing companies to minimize cost and gain efficiencies, creating a multi-level hierarchy of outsourcing. This research in progress paper presents preliminary findings of a study designed to understand knowledge transfer effectiveness of multi-level software development outsourcing projects. We conceptualize the SD-outsourcing entities using the Agency Theory. This study conceptualizes, operationalises and validates the concept of Knowledge Transfer as a three-phase multidimensional formative index of 1) Domain knowledge, 2) Communication behaviors, and 3) Clarity of requirements. Data analysis identified substantial, significant differences between the Principal and the Agent on two of the three constructs. Using Agency Theory, supported by preliminary findings, the paper also provides prescriptive guidelines of reducing the friction between the Principal and the Agent in multi-level software outsourcing.
Resumo:
The history of war is blighted with astonishing reminders of man’s ability to cast his sense of humanity aside and inflict unspeakable harm upon one another. The ruthless bombing of Dresden, the callousness of the Nazi concentration camps and the massacre of the Tutsis are but a few of the atrocities that have haunted our past. In response to these atrocities, society has imposed an ever-increasing number of laws and rules to regulate warfare. Amongst these is the doctrine of command responsibility. The doctrine of command responsibility states that a commander is criminally liable for the crimes of his subordinates if he knew or should have known of their crimes. This paper will examine whether the doctrine is an appropriate and realistic legal standard to hold commanders accountable to or whether the doctrine is more a reflection of social sentiment and legal rhetoric. If the doctrine, and indeed the law of war in general, is unrealistic then the law cannot fulfil its purpose - that is, the prevention of atrocities. Instead of being solely a reflection of moral authority and social sentiments the law must also be a tool that guides and shapes the decisions and actions of the military through the chaotic and brutal nature of war...
Resumo:
This paper explores concepts of desire and rhizomatic working through a series of intergenerational collaborative drawing episodes. Particularly, mother/daughter relationships are examined via drawings created by the author and her young daughter. Drawings hold on their surface unpredictable connections to things experienced, known, conceptualized and imagined. In the context of this paper desire is seen to drive adults and children into expressing and making a mark, to make an imprint. Here, the prompts that inform a drawing are regarded as a rhizomatic network of chaotic actions and thoughts that connect each drawer to the tools, the paper and each other in unpredictable and mutable ways. The paper concludes by discussing how these intergenerational collaborative drawing episodes offer opportunities to re-imagine relationships, communications and learning in early childhood education.
Resumo:
In this paper, we present initial results of an inductive, longitudinal case study of four firms that applied bricolage behaviors during resource constraints in firm emergence. Building on these cases, we discuss and extend existing research in bricolage theories by investigating how bricolage enables or hinders progress within firm creation. We explore the factors that places limits on the use of bricolage effectiveness during emergence. Specifically, in this paper, we discuss the impact of commitment and attention on bricolage effectiveness and how these influences may shape attempts to further progress and continue despite the resource constraints entrepreneurs often face in venture creation processes.
Resumo:
Crowds of noncombatants play a large and increasingly recognized role in modern military operations and often create substantial difficulties for the combatant forces involved. However, realistic models of crowds are essentially absent from current military simulations. To address this problem, the authors are developing a crowd simulation capable of generating crowds of noncombatant civilians that exhibit a variety of realistic individual and group behaviors at differing levels of fidelity. The crowd simulation is interoperable with existing military simulations using a standard, distributed simulation architecture. Commercial game technology is used in the crowd simulation to model both urban terrain and the physical behaviors of the human characters that make up the crowd. The objective of this article is to present the design and development process of a simulation that integrates commercially available game technology with current military simulations to generate realistic and believable crowd behavior.
Resumo:
Biorobotics has the potential to provide an integrated understanding from neural systems to behavior that is neither ethical nor technically feasible with living systems. Robots that can interact with animals in their natural environment open new possibilities for empirical studies in neuroscience. However, designing a robot that can interact with a rodent requires considerations that span a range of disciplines. For the rat's safety, the body form and movements of the robot need to take into consideration the safety of the animal, an appropriate size for the rodent arenas, and behaviors for interaction. For the robot's safety, its form must be robust in the face of typically inquisitive and potentially aggressive behaviors by the rodent, which can include chewing on exposed parts, including electronics, and deliberate or accidental fouling. We designed a rat-sized robot, the iRat (intelligent rat animat technology) for studies in neuroscience. The iRat is about the same size as a rat and has the ability to navigate autonomously around small environments. In this study we report the first interactions between the iRat and real rodents in a free exploration task. Studies with five rats show that the rats and iRat interact safely for both parties.
Resumo:
Measuring adolescent wellness can assist researchers and practitioners in determining lifestyle behaviors in which adolescents are deficient. An appropriate objective assessment may assist male adolescents who feel uncomfortable revealing behaviors that may indicate wellness deficits. The authors examined the test-retest reliability of the Five Factor Wellness Inventory (5F-Wel) with a sample of male adolescents. Thirty-five participants self-completed the 5F-Wel on two separate occasions, 7 days apart. Limits of agreement, intraclass correlation coefficients, and paired t tests were calculated to investigate agreement and whether systematic differences existed between administrations. The initial findings indicate the 5F-Wel is reliable for use among male adolescents and support its use in research.
Resumo:
The field of cyberbullying is relatively new and there is no universal consensus on its definition, measurement and intervention. Authors agree that bullying has entered into the digital domain and professionals require the skills to help identify and prevent these behaviours. Ninety two students were surveyed to determine their experience with different types of bullying behaviors (face-to-face, cyberbullying or both), as bully, victim or witness. Our objective was to explore the association between those types of bullying and anxiety. The results suggest a significant association between face-to-face bullying and anxiety. Similarly, there was significant association between experiencing both types of bullying and anxiety. Further studies are required with larger and more diverse samples in order to verify current findings and to test for additional associations.
Resumo:
The rapid growth of visual information on Web has led to immense interest in multimedia information retrieval (MIR). While advancement in MIR systems has achieved some success in specific domains, particularly the content-based approaches, general Web users still struggle to find the images they want. Despite the success in content-based object recognition or concept extraction, the major problem in current Web image searching remains in the querying process. Since most online users only express their needs in semantic terms or objects, systems that utilize visual features (e.g., color or texture) to search images create a semantic gap which hinders general users from fully expressing their needs. In addition, query-by-example (QBE) retrieval imposes extra obstacles for exploratory search because users may not always have the representative image at hand or in mind when starting a search (i.e. the page zero problem). As a result, the majority of current online image search engines (e.g., Google, Yahoo, and Flickr) still primarily use textual queries to search. The problem with query-based retrieval systems is that they only capture users’ information need in terms of formal queries;; the implicit and abstract parts of users’ information needs are inevitably overlooked. Hence, users often struggle to formulate queries that best represent their needs, and some compromises have to be made. Studies of Web search logs suggest that multimedia searches are more difficult than textual Web searches, and Web image searching is the most difficult compared to video or audio searches. Hence, online users need to put in more effort when searching multimedia contents, especially for image searches. Most interactions in Web image searching occur during query reformulation. While log analysis provides intriguing views on how the majority of users search, their search needs or motivations are ultimately neglected. User studies on image searching have attempted to understand users’ search contexts in terms of users’ background (e.g., knowledge, profession, motivation for search and task types) and the search outcomes (e.g., use of retrieved images, search performance). However, these studies typically focused on particular domains with a selective group of professional users. General users’ Web image searching contexts and behaviors are little understood although they represent the majority of online image searching activities nowadays. We argue that only by understanding Web image users’ contexts can the current Web search engines further improve their usefulness and provide more efficient searches. In order to understand users’ search contexts, a user study was conducted based on university students’ Web image searching in News, Travel, and commercial Product domains. The three search domains were deliberately chosen to reflect image users’ interests in people, time, event, location, and objects. We investigated participants’ Web image searching behavior, with the focus on query reformulation and search strategies. Participants’ search contexts such as their search background, motivation for search, and search outcomes were gathered by questionnaires. The searching activity was recorded with participants’ think aloud data for analyzing significant search patterns. The relationships between participants’ search contexts and corresponding search strategies were discovered by Grounded Theory approach. Our key findings include the following aspects: - Effects of users' interactive intents on query reformulation patterns and search strategies - Effects of task domain on task specificity and task difficulty, as well as on some specific searching behaviors - Effects of searching experience on result expansion strategies A contextual image searching model was constructed based on these findings. The model helped us understand Web image searching from user perspective, and introduced a context-aware searching paradigm for current retrieval systems. A query recommendation tool was also developed to demonstrate how users’ query reformulation contexts can potentially contribute to more efficient searching.
Resumo:
The underlying logic of enterprise policy is that there are impediments to change in economic systems that can be traced to the path-dependent behaviors of economic actors that prevent them from exploring new knowledge and new ways of doing things. Enterprise policy involves firm-level interventions delivered by distributed networks of business advisors coordinated by knowledge intermediaries. These metagovernance arrangements are able to disrupt the path-dependent behaviors of organizations. The logic and benefits of enterprise policy are explored through reference to public administration, strategic management and evolutionary theory, and three case studies.