970 resultados para Spectral theory (Mathematics)


Relevância:

20.00% 20.00%

Publicador:

Resumo:

The Design Science Research Roadmap (DSR-Roadmap) [1] aims to give detailed methodological guidance to novice researchers in Information Systems (IS) DSR. Focus group evaluation, one phase of the overall study, of the evolving DSR-Roadmap revealed that a key difficulty faced by both novice and expert researchers in DSR, is abstracting design theory from design. This paper explores the extension of the DSR-Roadmap by employing IS deep structure ontology (BWW [2-4]) as a lens on IS design to firstly yield generalisable design theory, specifically 'IS Design Theory' (ISDT) elements [5]. Consideration is next given to the value of BWW in the application of the design theory by practitioners. Results of mapping BWW constructs to ISDT elements suggest that the BWW is promising as a common language between design researchers and practitioners, facilitating both design theory and design implementation

Relevância:

20.00% 20.00%

Publicador:

Resumo:

This thesis analysed the theoretical and ontological issues of previous scholarship concerning information technology and indigenous people. As an alternative, the thesis used the framework of actor-network-theory, especially through historiographical and ethnographic techniques. The thesis revealed an assemblage of indigenous/digital enactments striving for relevance and avoiding obsolescence. It also recognised heterogeneities- including user-ambivalences, oscillations, noise, non-coherences and disruptions - as part of the milieu of the daily digital lives of indigenous people. By taking heterogeneities into account, the thesis ensured that the data “speaks for itself” and that social inquiry is not overtaken by ideology and ontology.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A one-time program is a hypothetical device by which a user may evaluate a circuit on exactly one input of his choice, before the device self-destructs. One-time programs cannot be achieved by software alone, as any software can be copied and re-run. However, it is known that every circuit can be compiled into a one-time program using a very basic hypothetical hardware device called a one-time memory. At first glance it may seem that quantum information, which cannot be copied, might also allow for one-time programs. But it is not hard to see that this intuition is false: one-time programs for classical or quantum circuits based solely on quantum information do not exist, even with computational assumptions. This observation raises the question, "what assumptions are required to achieve one-time programs for quantum circuits?" Our main result is that any quantum circuit can be compiled into a one-time program assuming only the same basic one-time memory devices used for classical circuits. Moreover, these quantum one-time programs achieve statistical universal composability (UC-security) against any malicious user. Our construction employs methods for computation on authenticated quantum data, and we present a new quantum authentication scheme called the trap scheme for this purpose. As a corollary, we establish UC-security of a recent protocol for delegated quantum computation.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evolutionary computation is an effective tool for solving optimization problems. However, its significant computational demand has limited its real-time and on-line applications, especially in embedded systems with limited computing resources, e.g., mobile robots. Heuristic methods such as the genetic algorithm (GA) based approaches have been investigated for robot path planning in dynamic environments. However, research on the simulated annealing (SA) algorithm, another popular evolutionary computation algorithm, for dynamic path planning is still limited mainly due to its high computational demand. An enhanced SA approach, which integrates two additional mathematical operators and initial path selection heuristics into the standard SA, is developed in this work for robot path planning in dynamic environments with both static and dynamic obstacles. It improves the computing performance of the standard SA significantly while giving an optimal or near-optimal robot path solution, making its real-time and on-line applications possible. Using the classic and deterministic Dijkstra algorithm as a benchmark, comprehensive case studies are carried out to demonstrate the performance of the enhanced SA and other SA algorithms in various dynamic path planning scenarios.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Evidence within Australia and internationally suggests parenthood as a risk factor for inactivity; however, research into understanding parental physical activity is scarce. Given that active parents can create active families and social factors are important for parents’ decision making, the authors investigated a range of social influences on parents’ intentions to be physically active. Parents (N = 580; 288 mothers and 292 fathers) of children younger than 5 years completed an extended Theory of Planned Behavior questionnaire either online or paper based. For both genders, attitude, control factors, group norms, friend general support, and an active parent identity predicted intentions, with social pressure and family support further predicting mothers’ intentions and active others further predicting fathers’ intentions. Attention to these factors and those specific to the genders may improve parents’ intentions to be physically active, thus maximizing the benefits to their own health and the healthy lifestyle practices for other family members.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

BACKGROUND: Donor retention is vital to blood collection agencies. Past research has highlighted the importance of early career behavior for long-term donor retention, yet research investigating the determinants of early donor behavior is scarce. Using an extended Theory of Planned Behavior (TPB), this study sought to identify the predictors of first-time blood donors' early career retention. STUDY DESIGN AND METHODS: First-time donors (n = 256) completed three surveys on blood donation. The standard TPB predictors and self-identity as a donor were assessed 3 weeks (Time 1) and at 4 months (Time 2) after an initial donation. Path analyses examined the utility of the extended TPB to predict redonation at 4 and 8 months after initial donation. RESULTS: The extended TPB provided a good fit to the data. Post-Time 1 and 2 behavior was consistently predicted by intention to redonate. Further, intention was predicted by attitudes, perceived control, and self-identity (Times 1 and 2). Donors' intentions to redonate at Time 1 were the strongest predictor of intention to donate at Time 2, while donors' behavior at Time 1 strengthened self-identity as a blood donor at Time 2. CONCLUSION: An extended TPB framework proved efficacious in revealing the determinants of first-time donor retention in an initial 8-month period. The results suggest that collection agencies should intervene to bolster donors' attitudes, perceived control, and identity as a donor during this crucial post–first donation period.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

The representation of business process models has been a continuing research topic for many years now. However, many process model representations have not developed beyond minimally interactive 2D icon-based representations of directed graphs and networks, with little or no annotation for information overlays. In addition, very few of these representations have undergone a thorough analysis or design process with reference to psychological theories on data and process visualization. This dearth of visualization research, we believe, has led to problems with BPM uptake in some organizations, as the representations can be difficult for stakeholders to understand, and thus remains an open research question for the BPM community. In addition, business analysts and process modeling experts themselves need visual representations that are able to assist with key BPM life cycle tasks in the process of generating optimal solutions. With the rise of desktop computers and commodity mobile devices capable of supporting rich interactive 3D environments, we believe that much of the research performed in computer human interaction, virtual reality, games and interactive entertainment have much potential in areas of BPM; to engage, provide insight, and to promote collaboration amongst analysts and stakeholders alike. We believe this is a timely topic, with research emerging in a number of places around the globe, relevant to this workshop. This is the second TAProViz workshop being run at BPM. The intention this year is to consolidate on the results of last year's successful workshop by further developing this important topic, identifying the key research topics of interest to the BPM visualization community.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rises recorded for girls’ violence in countries like Australia, Canada, United Kingdom and United States have been hotly contested. One view is these rising rates of violence are an artefact of new forms of policy, policing, criminalisation and social control over young women. Another view is that young women may indeed have become more violent as they have increasingly participated in youth subcultural activities involving gangs and drugs, and cyber‐cultural activities that incite and reward girls’ violence. Any comprehensive explanation will need to address how a complex interplay of cultural, social, behavioural, and policy responses contribute to these rises. This article argues that there is no singular cause, explanation or theory that accounts for the rises in adolescent female violence, and that many of the simple explanations circulating in popular culture are driven by an anti‐feminist ideology. By concentrating on females as victims of violence and very rarely as perpetrators, feminist criminology has for the most part ducked the thorny issue of female violence, leaving a discursive space for anti‐feminist sentiment to reign. The article concludes by arguing the case for developing a feminist theory of female violence.