313,052 research outputs found
Aerospace Medicine and Biology: a Continuing Bibliography with Indexes (Supplement 328)
This bibliography lists 104 reports, articles and other documents introduced into the NASA Scientific and Technical Information System during September, 1989. Subject coverage includes: aerospace medicine and psychology, life support systems and controlled environments, safety equipment, exobiology and extraterrestrial life, and flight crew behavior and performance
Recommended from our members
Short papers and letters on the 'linear micro-element' theory of mental mechanism; and related questions of scientific method
Seven papers/letters further developing the ideas raised in Monographs #12 and #15 (q.v.), and in two papers published in Kybernetes (vols 5 and 7) -- later incorporated into the Thesis (q.v.) as "Part A". In particular:
*Chapters I & VI: apply the postulated 'linear elements' to explain Piaget's notion of how the mental concept of 'object' is developed.
*Chapter II: extends this to account for the rudiments of 'personal identity'.
*Chapter III: answers criticisms and queries raised by Dr N.E.Wetherick, mainly on the plausibility of RNA and infra-red as a Second (multiplexed) Neurotransmitting System.
*Other chapters offer critiques of some accepted views on scientific method
Parameterized complexity of machine scheduling: 15 open problems
Machine scheduling problems are a long-time key domain of algorithms and
complexity research. A novel approach to machine scheduling problems are
fixed-parameter algorithms. To stimulate this thriving research direction, we
propose 15 open questions in this area whose resolution we expect to lead to
the discovery of new approaches and techniques both in scheduling and
parameterized complexity theory.Comment: Version accepted to Computers & Operations Researc
Almost as helpful as good theory: Some conceptual possibilities for the online classroom
Interest and activity in the use of C&IT in higher education is growing, and while there is effort to understand the complexity of the transition to virtual space, aspects of development, particularly clarity about the nature of the learning community, may only be lightly theorized. Based on an ongoing action research study involving postgraduate students studying in the UK and USA, this paper will identify some theoretical roots and derive from these six conceptual areas that seem to the authors to have relevance and significance for behaviour online. An exploration of these forms the basis for a two‐dimensional model which can account for what happens when groups come together to learn in cyberspace. In depicting this model, there is acknowledgement of the existence of third and fourth dimensions at work. However, the explanatory power of taking these extra dimensions into account is beyond the scope of the analysis thus far
Model of cybersecurity means financing with the procedure of additional data obtaining by the protection side
The article describes the model of cybersecurity means financing strategies of the information object with incomplete information about the financial resources of the attacking side. The proposed model is the core of the module of the developed decision support system in the problems of choosing rational investing variants for information protection and cybersecurity of various information objects. The model allows to find financial solutions using the tools of the theory of multistep games with several terminal surfaces. The authors proposed an approach that allows information security management to make a preliminary assessment of strategies for financing the effective cybersecurity systems. The model is distinguished by the assumption that the protection side does not have complete information, both about the financing strategies of the attacking side, and about its financial resources state aimed at overcoming cybersecurity lines of the information object. At the same time, the protection side has the opportunity to obtain additional information by the part of its financial resources. This makes it possible for the protection side to obtain a positive result for itself in the case when it can not be received without this procedure. The solution was found using a mathematical apparatus of a nonlinear multistep quality game with several terminal surfaces with alternate moves. In order to verify the adequacy of the model there was implemented a multivariate computational experiment. The results of this experiment are described in the article. © 2005 - ongoing JATIT & LL
A graph-based mathematical morphology reader
This survey paper aims at providing a "literary" anthology of mathematical
morphology on graphs. It describes in the English language many ideas stemming
from a large number of different papers, hence providing a unified view of an
active and diverse field of research
- …