4,498 research outputs found

    Examining the Personal and Institutional Determinants of Research Productivity in Hospitality and Tourism Management

    Full text link
    The transition toward a post-capitalist knowledge-oriented economy has resulted in an increasingly competitive academic environment, where the success of faculty is dependent on their research productivity. This study examines the personal and institutional determinants of the quantity and quality of the research productivity of hospitality and tourism management faculty in US institutions. A survey of 98 faculty found that a different set of determinants impact the quantity and quality aspects of research productivity. Also, institutional determinants were found to play a larger role, indicating the need for administrators to strive for a culture that is supportive of and an infrastructure that is conducive to their faculty’s research success. The authors use the field of hospitality and tourism management as a case study to develop a holistic and cohesive framework for knowledge worker productivity that can guide the evaluation, hiring, and development of researchers

    Navigation/traffic control satellite mission study. Volume 3 - System concepts

    Get PDF
    Satellite network for air traffic control, solar flare warning, and collision avoidanc

    Cyclic-routing of Unmanned Aerial Vehicles

    Get PDF
    © 2019 Various missions carried out by Unmanned Aerial Vehicles (UAVs) are concerned with permanent monitoring of a predefined set of ground targets under relative deadline constraints, i.e., the targets have to be revisited ‘indefinitely’ and there is an upper bound on the time between two consecutive successful scans of each target. A solution to the problem is a set of routes—one for each UAV—that jointly satisfy these constraints. Our goal is to find a solution with the least number of UAVs. We show that the decision version of the problem (given k, is there a solution with k UAVs?) is PSPACE-complete. On the practical side, we propose a portfolio approach that combines the strengths of constraint solving and model checking. We present an empirical evaluation of the different solution methods on several hundred randomly generated instances

    On the impact of covariance functions in multi-objective Bayesian optimization for engineering design

    Get PDF
    This is the author accepted manuscript. The final version is available from the publisher via the DOI in this recordMulti-objective Bayesian optimization (BO) is a highly useful class of methods that can effectively solve computationally expensive engineering design optimization problems with multiple objectives. However, the impact of covariance function, which is an important part of multi-objective BO, is rarely studied in the context of engineering optimization. We aim to shed light on this issue by performing numerical experiments on engineering design optimization problems, primarily low-fidelity problems so that we are able to statistically evaluate the performance of BO methods with various covariance functions. In this paper, we performed the study using a set of subsonic airfoil optimization cases as benchmark problems. Expected hypervolume improvement was used as the acquisition function to enrich the experimental design. Results show that the choice of the covariance function give a notable impact on the performance of multi-objective BO. In this regard, Kriging models with Matern-3/2 is the most robust method in terms of the diversity and convergence to the Pareto front that can handle problems with various complexities.Natural Environment Research Council (NERC

    Security Evaluation of Support Vector Machines in Adversarial Environments

    Full text link
    Support Vector Machines (SVMs) are among the most popular classification techniques adopted in security applications like malware detection, intrusion detection, and spam filtering. However, if SVMs are to be incorporated in real-world security systems, they must be able to cope with attack patterns that can either mislead the learning algorithm (poisoning), evade detection (evasion), or gain information about their internal parameters (privacy breaches). The main contributions of this chapter are twofold. First, we introduce a formal general framework for the empirical evaluation of the security of machine-learning systems. Second, according to our framework, we demonstrate the feasibility of evasion, poisoning and privacy attacks against SVMs in real-world security problems. For each attack technique, we evaluate its impact and discuss whether (and how) it can be countered through an adversary-aware design of SVMs. Our experiments are easily reproducible thanks to open-source code that we have made available, together with all the employed datasets, on a public repository.Comment: 47 pages, 9 figures; chapter accepted into book 'Support Vector Machine Applications

    Combination of linear classifiers using score function -- analysis of possible combination strategies

    Full text link
    In this work, we addressed the issue of combining linear classifiers using their score functions. The value of the scoring function depends on the distance from the decision boundary. Two score functions have been tested and four different combination strategies were investigated. During the experimental study, the proposed approach was applied to the heterogeneous ensemble and it was compared to two reference methods -- majority voting and model averaging respectively. The comparison was made in terms of seven different quality criteria. The result shows that combination strategies based on simple average, and trimmed average are the best combination strategies of the geometrical combination

    Investigating knowledge management factors affecting Chinese ICT firms performance: An integrated KM framework

    Get PDF
    This is an Author's Accepted Manuscript of an article published in the Journal of Information Systems Management, 28(1), 19 - 29, 2011, copyright Taylor & Francis, available online at: http://www.tandfonline.com/10.1080/10580530.2011.536107.This article sets out to investigate the critical factors of Knowledge Management (KM) which are considered to have an impact on the performance of Chinese information and communication technology (ICT) firms. This study confirms that the cultural environment of an enterprise is central to its success in the context of China. It shows that a collaborated, trusted, and learning environment within ICT firms will have a positive impact on their KM performance

    Choosing party leaders: Anglophone democracies, British parties and the limits of comparative politics

    Get PDF
    Since 1965, Britain’s major political parties have radically, and repeatedly, changed the ways in which they choose their leaders. Building on a recent comparative study of party leadership selection in the five principal Anglophone (‘Westminster’) parliamentary democracies (Cross and Blais, 2012a), this article first outlines a theoretical framework that purports to explain why the major parties in three of those countries, including Britain, have adopted such reform. It then examines why five major British parties have done so since 1965. It argues that, while Cross and Blais’ study makes a significant contribution to our knowledge and understanding of processes of party leadership selection reform in Anglophone parliamentary democracies, it has limited explanatory power when applied to changes enacted by the major parties in modern and contemporary Britain. Instead, the adoption of such reform in the British context is ultimately best understood and explained by examining both the internal politics and external circumstances of individual parties

    Using differential reinforcement of high rates of behavior to improve work productivity : a replication and extension

    Full text link
    Background: Due to deficits in adaptive and cognitive functioning, productivity may pose challenges for individuals with intellectual disability in the workplace.Method: Using a changing‐criterion embedded in a multiple baseline across partici‐pants design, we examined the effects of differential reinforcement of high rates of behaviour (DRH) on the rate of data entry (i.e., productivity) in four adults with intel‐lectual disability.Results: Although the DRH procedure increased the rate of correct data entry in all four participants, none of the participants achieved the criterion that we set with novice undergraduate students.Conclusions: Our results indicate that DRH is an effective intervention to increase rate of correct responding in individuals with intellectual disability, but that achiev‐ing the same productivity as workers without disability may not always be possible
    corecore