882 research outputs found
A deliberative model for self-adaptation middleware using architectural dependency
A crucial prerequisite to externalized adaptation is an understanding of how components are interconnected, or more particularly how and why they depend on one another. Such dependencies can be used to provide an architectural model, which provides a reference point for externalized adaptation. In this paper, it is described how dependencies are used as a basis to systems' self-understanding and subsequent architectural reconfigurations. The approach is based on the combination of: instrumentation services, a dependency meta-model and a system controller. In particular, the latter uses self-healing repair rules (or conflict resolution strategies), based on extensible beliefs, desires and intention (EBDI) model, to reflect reconfiguration changes back to a target application under examination
Government marriage education programs do little to address gender inequalities
For the past 14 years, the Federal governmentâs Healthy Marriage Initiative has sought to encourage marriage by helping couples develop relationship skills. While the program may have good intentions, in new research Jennifer M. Randles finds that many of the programâs components reinforce gender stereotypes about how men and women communicate and ignore how gender inequalities can influence power imbalances within relationships
Government âHealthy Marriageâ programs should focus less on the benefits of marriage and more on helping couples to cope.
Since the early 2000s, the federal government has spent nearly $1 billion on the Healthy Marriage Initiative which has the aim of strengthening economic mobility via marriage. Jennifer M. Randles observed marriage education classes closely, interviewing participants and training as a marriage educator. She finds that while healthy marriage policy promotes the idea that marital commitment is a bulwark against poverty, those on low-incomes believe that marriage represents the culmination of prosperity â not a means of achieving it. She writes that relationship policies would likely be more useful if they focused less on the benefits of marriage and more on how economic stress can take an emotional toll on relationships
Time Out: The Statute of Limitations and Fiduciary Theory in Psychotherapist Sexual Misconduct Cases
EM Clustering Approach for Multi-Dimensional Analysis of Big Data Set
Data mining is one of the long known research topics, which is making a comeback especially with the advent of Big Data. âClusteringâ technique is an important component in data mining. As we enter the Big Data era where many realworld datasets consist of multi-dimensional features, clustering has been gaining momentum in importance within this topic. The traditional clustering algorithms often fail to detect meaningful clusters in high-dimensional data set. Therefore, they become computationally expensive when dealing with data comprised of multiple dimensions. In this paper, we have proposed a modified technique that will perform well with high dimensional data set. In our proposed method we used Principle Component Analysis for dimension reduction before applying standard EM algorithm. The performance of the proposed set of algorithms is evaluated on the basis of silhouette index and time of execution
Intelligent Agents for Automated Cloud Computing Negotiation
Presently, cloud providers offer âoff-the-shelfâ Service Level Agreements (SLA), on a âtake it or leave itâ basis. This paper, alternatively, proposes customized SLAs. An automated negotiation is needed to establish customized SLAs between service providers and consumers with no previous knowledge of each other. Traditional negotiations between humans are often fraught with difficulty. Thus, in this work, the use of intelligent agents to represent cloud providers and consumers is advocated. Rubinsteinâs Alternating Offers Protocol offers a suitable technical solution for this challenging problem. The purpose of this paper is to apply the state-of-the-art in negotiation automated algorithms/agents within a described Cloud Computing SLA framework, and to evaluate the most appropriate negotiation approach based on many criteria
Optimized Indoor Positioning for static mode smart devices using BLE
Bluetooth Low Energy (BLE) technology and BLE-based devices such as iBeacons have become popular recently. In this work, an optimized indoor positioning approach using BLE for detecting a smart deviceâs location in an indoor environment is proposed. The first stage of the proposed approach is a calibration stage for initialization. The Received Signal Strength Indicator (RSSI) is collected and pre-processed for a stable outcome, in the second stage. Then the distance is estimated by using the processed RSSI and calibrated factors in the third stage. The final stage is the position estimation using the outputs from the previous steps. The positioning technique, which is an improved Least Square estimation is evaluated against the other well-known techniques such as, Trilateration-Centroid, classic Least Square Estimation in estimating the userâs location in the 2D plane. Experimental results show that our proposed approach has promising results by achieving an accuracy of positioning within 0.2 to 0.35m
A specification method for the scalable self-governance of complex autonomic systems
IBM, amongst many others, have sought to endow computer systems with selfmanagement capabilities by delegating vital functions to the software itself and proposed the Autonomic Computing model. Hence inducing the so-called self-* properties including the system's ability to be self-configuring, self-optimising, self-healing and self-protecting. Initial attempts to realise such a vision have so far mostly relied on a passive adaptation whereby Design by Contract and Event-Condition-Action (ECA) type constructs are used to regulate the target systems behaviour: When a specific event makes a certain condition true then an action is triggered which executes either within the system or on its environment Whilst, such a model works well for closed systems, its effectiveness and applicability of approach diminishes as the size and complexity of the managed system increases, necessitating frequent updates to the ECA rule set to cater for new and/or unforeseen systems' behaviour. More recent research works are now adopting the parametric adaptation model, where the events, conditions and actions may be adjusted at runtime in response to the system's observed state. Such an improved control model works well up to a point, but for large scale systems of systems, with very many component interactions, the predictability and traceability of the regulation and its impact on the whole system is intractable. The selforganising systems theory, however, offers a scaleable alternative to systems control utilising emerging behaviour, observed at a global level, resulting from the low-level interactions of the distributed components. Whereby, for instance, key signals (signs) for ECA style feedback control need no longer be recognised or understood in the context of the design time system but are defined by their relevance to the runtime system. Nonetheless this model still suffers from a usually inaccessible control model with no intrinsic meaning assigned to data extraction from the systems operation. In other words, there is no grounded definition of particular observable events occurring in the system. This condition is termed the Signal Grounding Problem. This problem cannot usually be solved by analytical or algorithmic methods, as these solutions generally require precise problem formulations and a static operating domain. Rather cognitive techniques will be needed that perform effectively to evaluate and improve performance in the presence of complex, incomplete, dynamic and evolving environments. In order to develop a specification method for scalable self-governance of autonomic systems of systems, this thesis presents a number of ways to alleviate, or circumvent, the Signal Grounding Problem through the utilisation of cognitive systems and the properties of complex systems. After reviewing the specification methods available for governance models, the Situation Calculus dialect of first order logic is described with the necessary modalities for the specification of deliberative monitoring in partially observable environments with stochastic actions. This permits a specification method that allows the depiction of system guards and norms, under central control, as well as the deliberative functions required for decentralised components to present techniques around the Signal Grounding problem, engineer emergence and generally utilise the properties of large complex systems for their own self-governance. It is shown how these large-scale behaviours may be implemented and the properties assessed and utilised by an Observer System through fully functioning implementations and simulations. The work concludes with two case studies showing how the specification would be achieved in practice: An observer based meta-system for a decision support system in medicine is described, specified and implemented up to parametric adaptation and a NASA project is described with a specification given for the interactions and cooperative behaviour that leads to scale-free connectivity, which the observer system may then utilise for a previously described efficient monitoring strategy
Assorted Aspects and Implementation Patterns of Artificial Intelligence to Reduce Cyber Crimes
Cyber crime was a major problem even before the epidemic, and it skyrocketed as the globe became increasingly digital after the pandemic began. It is crucial to think about how to make the web safer in the post-pandemic period, since the number of cyber scams is rising rapidly. With more people doing remote work and more people quickly embracing new technology, as well as with decreased monitoring and controls, hackers have more opportunities to attack weaknesses in the system. Individuals and businesses were rendered more vulnerable to cyber fraud as a result of each of these developments brought on by the epidemic. Since cybercriminals are just as technically savvy as their cyber security counterparts, a lot of effort and money must be spent on prevention. Professionals in the field of cyber security and cybercriminals nowadays share many of the same skills and use many of the same tools. Both cyber security experts and cybercriminals rely on them, but the former to protect their systems from the latter
Eyes wide shut? UK consumer perceptions on aviation climate impacts and travel decisions to New Zealand
The purview of climate change concern has implicated air travel, as evidenced in a growing body of academic literature concerned with aviation CO2 emissions. This article assesses the relevance of climate change to long haul air travel decisions to New Zealand for United Kingdom consumers. Based on 15 semi-structured open-ended interviews conducted in Bournemouth, UK during June 2009, it was found that participants were unlikely to forgo potential travel decisions to New Zealand because of concern over air travel emissions. Underpinning the intervieweesâ understandings and responses to air travelâs climate impact was a spectrum of awareness and attitudes to air travel and climate change. This spectrum ranged from individuals who were unaware of air travelâs climate impact to those who were beginning to consume air travel with a âcarbon conscienceâ. Within this spectrum were some who were aware of the impact but not willing to change their travel behaviours at all. Rather than implicating long haul air travel, the empirical evidence instead exemplifies changing perceptions towards frequent short haul air travel and voices calls for both government and media in the UK to deliver more concrete messages on air travelâs climate impact
- âŠ