640 research outputs found

    The vocal behaviour and reproductive strategies of a neotropical duetting wren

    Get PDF
    In tropical bird species where both males and females sing, breeding partners may coordinate their songs in vocal duets. This thesis explores relationships between vocal duetting behaviour and reproductive activities in neotropical Rufous-and-white Wrens (Thryothorus rufalbus). In Chapter 2 I describe the previously unknown genetic mating strategy of this species. Extra-pair paternity accounted for two percent of nestlings in three of 51 broods. In Chapter 3 I test four hypotheses for duet function: the reproductive synchrony, paternity guarding, signalling quality, and signalling commitment hypotheses. I found little support for these hypotheses, although female duet output appears to signal willingness to invest in future reproductive activities. Previous studies demonstrate that duets play an important role in acoustic contact, territory defence, and mate guarding. Together with the findings of this thesis, the cumulative research on Rufous-and-white Wrens suggests duets play a role in other activities more so than in reproductive behaviour

    Cognitive Machine Individualism in a Symbiotic Cybersecurity Policy Framework for the Preservation of Internet of Things Integrity: A Quantitative Study

    Get PDF
    This quantitative study examined the complex nature of modern cyber threats to propose the establishment of cyber as an interdisciplinary field of public policy initiated through the creation of a symbiotic cybersecurity policy framework. For the public good (and maintaining ideological balance), there must be recognition that public policies are at a transition point where the digital public square is a tangible reality that is more than a collection of technological widgets. The academic contribution of this research project is the fusion of humanistic principles with Internet of Things (IoT) technologies that alters our perception of the machine from an instrument of human engineering into a thinking peer to elevate cyber from technical esoterism into an interdisciplinary field of public policy. The contribution to the US national cybersecurity policy body of knowledge is a unified policy framework (manifested in the symbiotic cybersecurity policy triad) that could transform cybersecurity policies from network-based to entity-based. A correlation archival data design was used with the frequency of malicious software attacks as the dependent variable and diversity of intrusion techniques as the independent variable for RQ1. For RQ2, the frequency of detection events was the dependent variable and diversity of intrusion techniques was the independent variable. Self-determination Theory is the theoretical framework as the cognitive machine can recognize, self-endorse, and maintain its own identity based on a sense of self-motivation that is progressively shaped by the machine’s ability to learn. The transformation of cyber policies from technical esoterism into an interdisciplinary field of public policy starts with the recognition that the cognitive machine is an independent consumer of, advisor into, and influenced by public policy theories, philosophical constructs, and societal initiatives

    Exploring the Movement of People in Postclassic and Historic Period Lamanai Using Stable Isotopes

    Get PDF
    The location of the Maya site of Lamanai on the New River Lagoon in northern Belize strategically situated it to participate in both coastal and inland trade routes and communication. This study of human burials at Lamanai examines the phosphate-oxygen isotope compositions of bone and enamel, which reflect drinking water and hence climatic zones, oxygen- and hydrogen-isotope compositions of modern local water, which provide a baseline for drinking water, and carbon- and nitrogen-isotope compositions of bone collagen, which reflect diet. The combination of isotopic, mortuary, osteological, and artifactual data is used to explore mobility at Lamanai during the Postclassic and Historic periods. While these data suggest some mobility, most movement likely occurred within the surrounding lowland region. The origin of Postclassic individuals buried in an unusual face-down position (VPLF) was also investigated. The VPLF group demonstrates variability in demographics and residential history, and its appearance possibly reflects an ideological shift

    THE RISK OF VIOLENCE AND INTIMATE PARTNER CHOICE WITHIN A RISK SOCIETY

    Get PDF
    This dissertation examines the influence of competing risks in shaping individuals\u27 choices about potential intimate relationships. According to Ulrich Beck\u27s risk society theory, the individualization of social risks has direct and measurable consequences for the ways people organize and evaluate potential intimate relationships (Beck & Beck-Gernsheim, 1995, 2002, 2004; Giddens, 1994; Lupton, 2006). This study investigates the ways in which subjective or identity-related risks hypothesized by scholars of late modernity shape the perception and the actual risk of dating violence. Empirical research on dating violence identifies many objective “risk factors” related to a person’s chances of experiencing intimate partner violence; however studies investigating perceptions of dating risk from the subject’s perspective sometimes reveal more personal concerns and priorities. To date, no intimate partner violence research explicitly utilizes a conceptualization of risk informed by risk society theories. The present study explores the potential for utilizing risk society concepts in explaining the relationships between perceptions of instrumental risks and identity-related risks, and how these risk perceptions may impact involvement in dating violence

    Exploring Business Planning Strategies of Women-Owned Small Businesses in the Construction Trades

    Get PDF
    Many small businesses fail to survive past 5 years, listing the primary reason given for failure as inadequate business planning strategies. The construction industry provides the building and upkeep of physical infrastructure (buildings and roadways) in developed societies and is a major contributor to the gross domestic product for many nations. In the United States, the construction trades primarily consist of small businesses, with a smaller portion of the sector classified as women-owned. The purpose of this qualitative multiple case study was to explore the business planning strategies that successful women-owned small business (WOSB) construction leaders in New Jersey use for sustainability and growth. Contingency theory and expectancy theory of motivation served as the conceptual framework for this study. The sample was comprised of 3 women small business owners in the construction trade in New Jersey. Data collection included semistructured face-to-face interviews, a review of organization documents, business website review, and field notes. Member checking strengthened creditability and trustworthiness. Based on Rowley\u27s 3-step data analysis plan and a thematic analysis of the data, 5 themes emerged: constant review of goals and plans, communication and teamwork, reliance on expertise, networking, and continuous education. The findings in this study may contribute to social change by providing knowledge for sustainability and growth of women owned businesses (WOBs). By putting the findings to practical use, WOBs could sustain beyond 5 years, which would positively influence society by enhancing the local economy, promoting job development and fostering positive community relations

    The Second Conference on Lunar Bases and Space Activities of the 21st Century, volume 2

    Get PDF
    These 92 papers comprise a peer-reviewed selection of presentations by authors from NASA, the Lunar and Planetary Institute (LPI), industry, and academia at the Second Conference on Lunar Bases and Space Activities of the 21st Century. These papers go into more technical depth than did those published from the first NASA-sponsored symposium on the topic, held in 1984. Session topics included the following: (1) design and operation of transportation systems to, in orbit around, and on the Moon; (2) lunar base site selection; (3) design, architecture, construction, and operation of lunar bases and human habitats; (4) lunar-based scientific research and experimentation in astronomy, exobiology, and lunar geology; (5) recovery and use of lunar resources; (6) environmental and human factors of and life support technology for human presence on the Moon; and (7) program management of human exploration of the Moon and space

    The 1990 progress report and future plans

    Get PDF
    This document describes the progress and plans of the Artificial Intelligence Research Branch (RIA) at ARC in 1990. Activities span a range from basic scientific research to engineering development and to fielded NASA applications, particularly those applications that are enabled by basic research carried out at RIA. Work is conducted in-house and through collaborative partners in academia and industry. Our major focus is on a limited number of research themes with a dual commitment to technical excellence and proven applicability to NASA short, medium, and long-term problems. RIA acts as the Agency's lead organization for research aspects of artificial intelligence, working closely with a second research laboratory at JPL and AI applications groups at all NASA centers

    Protecting Privacy in Indian Schools: Regulating AI-based Technologies' Design, Development and Deployment

    Get PDF
    Education is one of the priority areas for the Indian government, where Artificial Intelligence (AI) technologies are touted to bring digital transformation. Several Indian states have also started deploying facial recognition-enabled CCTV cameras, emotion recognition technologies, fingerprint scanners, and Radio frequency identification tags in their schools to provide personalised recommendations, ensure student security, and predict the drop-out rate of students but also provide 360-degree information of a student. Further, Integrating Aadhaar (digital identity card that works on biometric data) across AI technologies and learning and management systems (LMS) renders schools a ‘panopticon’. Certain technologies or systems like Aadhaar, CCTV cameras, GPS Systems, RFID tags, and learning management systems are used primarily for continuous data collection, storage, and retention purposes. Though they cannot be termed AI technologies per se, they are fundamental for designing and developing AI systems like facial, fingerprint, and emotion recognition technologies. The large amount of student data collected speedily through the former technologies is used to create an algorithm for the latter-stated AI systems. Once algorithms are processed using machine learning (ML) techniques, they learn correlations between multiple datasets predicting each student’s identity, decisions, grades, learning growth, tendency to drop out, and other behavioural characteristics. Such autonomous and repetitive collection, processing, storage, and retention of student data without effective data protection legislation endangers student privacy. The algorithmic predictions by AI technologies are an avatar of the data fed into the system. An AI technology is as good as the person collecting the data, processing it for a relevant and valuable output, and regularly evaluating the inputs going inside an AI model. An AI model can produce inaccurate predictions if the person overlooks any relevant data. However, the state, school administrations and parents’ belief in AI technologies as a panacea to student security and educational development overlooks the context in which ‘data practices’ are conducted. A right to privacy in an AI age is inextricably connected to data practices where data gets ‘cooked’. Thus, data protection legislation operating without understanding and regulating such data practices will remain ineffective in safeguarding privacy. The thesis undergoes interdisciplinary research that enables a better understanding of the interplay of data practices of AI technologies with social practices of an Indian school, which the present Indian data protection legislation overlooks, endangering students’ privacy from designing and developing to deploying stages of an AI model. The thesis recommends the Indian legislature frame better legislation equipped for the AI/ML age and the Indian judiciary on evaluating the legality and reasonability of designing, developing, and deploying such technologies in schools

    A Hybrid Modelling Framework for Real-time Decision-support for Urgent and Emergency Healthcare

    Get PDF
    In healthcare, opportunities to use real-time data to support quick and effective decision-making are expanding rapidly, as data increases in volume, velocity and variety. In parallel, the need for short-term decision-support to improve system resilience is increasingly relevant, with the recent COVID-19 crisis underlining the pressure that our healthcare services are under to deliver safe, effective, quality care in the face of rapidly-shifting parameters. A real-time hybrid model (HM) which combines real-time data, predictions, and simulation, has the potential to support short-term decision-making in healthcare. Considering decision-making as a consequence of situation awareness focuses the HM on what information is needed where, when, how, and by whom with a view toward sustained implementation. However the articulation between real-time decision-support tools and a sociotechnical approach to their development and implementation is currently lacking in the literature. Having identified the need for a conceptual framework to support the development of real-time HMs for short-term decision-support, this research proposed and tested the Integrated Hybrid Analytics Framework (IHAF) through an examination of the stages of a Design Science methodology and insights from the literature examining decision-making in dynamic, sociotechnical systems, data analytics, and simulation. Informed by IHAF, a HM was developed using real-time Emergency Department data, time-series forecasting, and discrete-event simulation. The application started with patient questionnaires to support problem definition and to act as a formative evaluation, and was subsequently evaluated using staff interviews. Evaluation of the application found multiple examples where the objectives of people or sub-systems are not aligned, resulting in inefficiencies and other quality problems, which are characteristic of complex adaptive sociotechnical systems. Synthesis of the literature, the formative evaluation, and the final evaluation found significant themes which can act as antecedents or evaluation criteria for future real-time HM studies in sociotechnical systems, in particular in healthcare. The generic utility of IHAF is emphasised for supporting future applications in similar domains
    • 

    corecore