Search results
1 – 10 of over 20000David Bell and Francis McErlean
The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement…
Abstract
The clustering of objects in a layered object storage system is by common consent an exceedingly difficult problem. Studies the performance of three heuristic placement algorithms. A series of eight reasonably realistic case studies were used as a benchmark battery, and several hundred experiments were carried out to evaluate results of using the algorithms. Presents the results and the insights gained from the study.
Details
Keywords
F. McErlean, D.A. Bell, A. Barr and G. Mulvenna
The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been…
Abstract
The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been proposed for real‐world problems with which uncertainty is associated. Considers one of these problems, that of classification, which is encountered in many domains including medicine. Focuses on a classification technique for knowledge discovery (KD). Reasoning about classifications is a primary interest in KD. Deals with obtaining evidence to confirm or refute classes. Searches for any data dependencies which exist between a classifier attribute and any of the property attributes. To illustrate the method compares a neural network classification with one based on Tanimoto’s method. It is important to note that the aim is to demonstrate this approach rather than to compare these two methods of classification. After extracting the data dependency information, employs a non‐numeric evidential reasoning method to see how well this evidence supports each of the two respective classifications.
Details
Keywords
F. McErlean and D.A. Bell
The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been…
Abstract
The management of uncertainty has received much attention recently in the fields of database and artificial intelligence. Several methods of evidential reasoning have been proposed for real‐world problems with which uncertainty is associated. One of these problems is that of classification and it is encountered in many domains including medicine, which is considered here. Focuses on a classification technique for knowledge discovery (KD). Reasoning about classifications is a primary interest in KD. Obtains evidence to confirm or refute classes by searching for any data dependencies which exist between a classifier attribute and any of the property attributes. To illustrate the method, compares a neural network classification with one based on Tanimoto’s method. The aim was to demonstrate the approach rather than to compare the two methods of classification. After extracting the data dependency information, employs a non‐numeric evidential reasoning method to see how well this evidence supports each of the two respective classifications.
Details
Keywords
LIBRARIANS in charge of small municipal collections are sometimes apt to forget, when enviously regarding some of the larger libraries, that, in many ways, a small library has…
Abstract
LIBRARIANS in charge of small municipal collections are sometimes apt to forget, when enviously regarding some of the larger libraries, that, in many ways, a small library has advantages over its larger rivals, and may even carry out ideas and suggestions which are too laborious to be carried out on a very great scale. As an illustration, I wish to cite the experience of my own library at Bingley, and show how, by working out these suggestions, the membership has been raised from 700 to 1,600, and the annual issues from 24,000 to 54,000 volumes.
D.A. BELL and H. JENKINS
Recent methods of data organisation have sought to preserve the original sequence of keys in the address space yet this often also results in the wastage of valuable storage space…
Abstract
Recent methods of data organisation have sought to preserve the original sequence of keys in the address space yet this often also results in the wastage of valuable storage space as a consequence of the simultaneous preservation of gaps in the sequence. The method of key space compression using forbidden zones seeks to minimize such wastage by removing those gaps in the sequence corresponding with keys which the designer knows beforehand cannot occur.
Details
Keywords
D.A. Bell, J.W. Guan and C.M. Shapcott
The Dempster‐Shafer theory of evidence gives a solid basis for reasoning about situations characterized by uncertainty. A key feature of the theory is that propositions are…
Abstract
The Dempster‐Shafer theory of evidence gives a solid basis for reasoning about situations characterized by uncertainty. A key feature of the theory is that propositions are represented as subsets of a set which is called a hypothesis space. This power set along with the set operations is a Boolean algebra. The theory has previously been shown to cover other Boolean algebras including collections of objects such as propositions. The practical advantages of this generalization are that increased flexibility of representation is allowed and that the performance of evidence accumulation can be enhanced. The objects of interest here are geometric forms, and we can encode rectangular and other shaped forms using hexadecimal numbers according to shapes and positions. Boolean algebra of such shapes can then be used directly in evidential reasoning exercised. Discusses how medical and other fields can gain from this approach.
Details
Keywords
The need to assess the perceptions of tomorrow's managers remains critical to forecasting social changes in the management environment. This study examines the views of upper…
Abstract
The need to assess the perceptions of tomorrow's managers remains critical to forecasting social changes in the management environment. This study examines the views of upper division business students at three diverse American institutions. Findings suggest that: (1) women and men both advocate more participation in decision making, (2) women and men both recognize the seriousness of sexual harassment in the workplace, (3) minority students demonstrate the greatest interest in entrepreneurial careers, and (4) support for drug testing is relatively strong except for suspicions about those doing the testing.
Sirpa Kärkkäinen, Anu Hartikainen-Ahia, Anna-Liisa Elorinne, Johanna Hokkanen and Katri Hämeen-Anttila
The purpose of this paper is to assess the socioscientific issue (SSI) method as a way of improving seventh graders’ nutrition know-how on dietary supplements (DS), and to…
Abstract
Purpose
The purpose of this paper is to assess the socioscientific issue (SSI) method as a way of improving seventh graders’ nutrition know-how on dietary supplements (DS), and to describe how students experience learning nutritional issues through the SSI method.
Design/methodology/approach
Participants were seventh graders from three different classes (n=43). Health education intervention lasted 7 h and it embodied the three-staged model: the scenario, the inquiry and the decision-making stages. The study was qualitative in nature. The data were collected through a questionnaire before and after the intervention. The data were analyzed using summative content analysis.
Findings
Intervention tended to deepen students’ know-how on vitamins and rational use of DS. Students’ experiences of learning nutritional issues through the SSI method were generally positive. The scenario stage was considered current and authentic. The inquiry stage and decision-making stage helped in understanding the societal connections between the study task and the rational use of DS.
Practical implications
SSI method enhances students’ knowledge about the rational use of DS. E-learning environment gave students possibilities to work collaboratively. Especially, possibilities to discuss with peers and share own experiences supported learning.
Originality/value
To solve the need of dietary supplements (DS) is a complex nutritional issue for society and for individuals. Since consumption of special diets has increased among adolescents, the rational consumption of DS is relevant and interesting learning topic at secondary school.
Details
Keywords
Ehinome Ikhalia, Alan Serrano, David Bell and Panos Louvieris
Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering…
Abstract
Purpose
Online social network (OSN) users have a high propensity to malware threats due to the trust and persuasive factors that underpin OSN models. The escalation of social engineering malware encourages a growing demand for end-user security awareness measures. The purpose of this paper is to take the theoretical cybersecurity awareness model TTAT-MIP and test its feasibility via a Facebook app, namely social network criminal (SNC).
Design/methodology/approach
The research employs a mixed-methods approach to evaluate the SNC app. A system usability scale measures the usability of SNC. Paired samples t-tests were administered to 40 participants to measure security awareness – before and after the intervention. Finally, 20 semi-structured interviews were deployed to obtain qualitative data about the usefulness of the App itself.
Findings
Results validate the effectiveness of OSN apps utilising a TTAT-MIP model – specifically the mass interpersonal persuasion (MIP) attributes. Using TTAT-MIP as a guidance, practitioners can develop security awareness systems that better leverage the intra-relationship model of OSNs.
Research limitations/implications
The primary limitation of this study is the experimental settings. Although the results testing the TTAT-MIP Facebook app are promising, these were set under experimental conditions.
Practical implications
SNC enable persuasive security behaviour amongst employees and avoid potential malware threats. SNC support consistent security awareness practices by the regular identification of new threats which may inspire the creation of new security awareness videos.
Social implications
The structure of OSNs is making it easier for malicious users to carry out their activities without the possibility of detection. By building a security awareness programme using the TTAT-MIP model, organisations can proactively manage security awareness.
Originality/value
Many security systems are cumbersome, inconsistent and non-specific. The outcome of this research provides organisations and security practitioners with a framework for designing and developing proactive and tailored security awareness systems.
Details
Keywords
Z. An, D.A. Bell and J.G. Hughes
Presents an investigation of some aspects of the axiomization of conditional independence of probability. Contributes to the understanding of Pearl's completeness conjecture and…
Abstract
Presents an investigation of some aspects of the axiomization of conditional independence of probability. Contributes to the understanding of Pearl's completeness conjecture and identifies a direction for revision which could remove some of the difficulties of Pearl's axiom set, but this alternative is not without its own difficulties. This approach largely simplifies the definition of conditional independence. Then shows the completeness conjecture to be incorrect by presenting counter examples; a new axiom based on the counter examples follows. Discusses the reason for the conjecture being incorrect. Notes that an alternative conjecture could be suggested, but this raises many new questions and increases complexity. Finally, shows that “the disjointness condition on variable sets” is in fact necessary. Concludes that while the axiomization of conditional independence has attractions, it is probably too complex to be pragmatic. Suggests an alternative way forward in inexact reasoning.
Details