Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Institution
- Publication
- Publication Type
Articles 1 - 7 of 7
Full-Text Articles in Physical Sciences and Mathematics
Research On Evacuation Simulation Method Considering Social Behavior, Yuanyuan Deng, Liping Zheng, Ruiwen Cai
Research On Evacuation Simulation Method Considering Social Behavior, Yuanyuan Deng, Liping Zheng, Ruiwen Cai
Journal of System Simulation
Abstract: In an emergency evacuation scenario, the typical social attributes of an individual impact their evacuation behavior. Two kinds of social factors, such as individual familiarity to the environment and the individual group, are introduced and applied in crowd evacuation simulation. An evacuation simulation method is proposed. The real-time collision avoidance technique of RVO library is used to simulate the dynamic motion of the population. The local target points and its selection mechanism are used to simulate the different social behaviors of the population. Experiments show that the familiarity to the environment and group factors have influence on the evacuation …
The Effects Of Early Confidence Interval Training On User Efficacy In A P300 Brain-Computer Interface Spelling Task, Adam Starkman
The Effects Of Early Confidence Interval Training On User Efficacy In A P300 Brain-Computer Interface Spelling Task, Adam Starkman
Honors Theses
Brain-computer interface (BCI) technology can provide communication for individuals suffering from degenerative neuromuscular disorders. The present study sought to demonstrate improved BCI performance in healthy individuals using confidence interval training with a P300 BCI spelling program. In this BCI interface, electroencephalographic (EEG) activity was recorded as participants attended to a specific target character within a matrix of flashing letters and numbers presented on a computer screen. The BCI uses the P300 Event Related Potential to select the intended character. In a prior patient case, use of a confidence measure that rejected questionable selections improved that user’s spelling efficiency. The present …
Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks
Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks
David J Brooks Dr.
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The participants were senior managers at a West Australian motel located on the West Coast Highway, Scarborough. The motel consists of four three storey blocks of units, resulting in a total of 75 …
Spalendar: Visualizing A Group's Calendar Events Over A Geographic Space On A Public Display, Chen Xiang, Sebastian Boring, Sheelagh Carpendale, Anthony Tang, Saul Greenberg
Spalendar: Visualizing A Group's Calendar Events Over A Geographic Space On A Public Display, Chen Xiang, Sebastian Boring, Sheelagh Carpendale, Anthony Tang, Saul Greenberg
Research Collection School Of Computing and Information Systems
Portable paper calendars (i.e., day planners and organizers) have greatly influenced the design of group electronic calendars. Both use time units (hours/days/weeks/etc.) to organize visuals, with useful information (e.g., event types, locations, attendees) usually presented as - perhaps abbreviated or even hidden - text fields within those time units. The problem is that, for a group, this visual sorting of individual events into time buckets conveys only limited information about the social network of people. For example, people’s whereabouts cannot be read ‘at a glance’ but require examining the text. Our goal is to explore an alternate visualization that can …
Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks
Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks
Australian Information Warfare and Security Conference
AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The participants were senior managers at a West Australian motel located on the West Coast Highway, Scarborough. The motel consists of four three storey blocks of units, resulting in a total of 75 …
Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello
Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello
Dissertations
A model to enhance collaborative problem solving and program development is presented. The collaborative model is a detailed cognitive model that takes into consideration the cognitive and social activities that occur during collaborative problem solving and program development. The cognitive activities required for collaborative problem solving and program development are identified and integrated into a six-stage model. An extensive literature review in the associated fields is presented to show the need for the model described in this dissertation. In addition, a comprehensive study of tools to support collaboration during problem solving and program development was also performed as well as …
Group Properties Of Crossover And Mutation, Jonathan E. Rowe, Michael D. Vose, Alden H. Wright
Group Properties Of Crossover And Mutation, Jonathan E. Rowe, Michael D. Vose, Alden H. Wright
Computer Science Faculty Publications
It is supposed that the finite search space Ω has certain symmetries that can be described in terms of a group of permutations acting upon it. If crossover and mutation respect these symmetries, then these operators can be described in terms of a mixing matrix and a group of permutation matrices. Conditions under which certain subsets of Ω are invariant under crossover are investigated, leading to a generalization of the term schema. Finally, it is sometimes possible for the group acting on Ω to induce a group structure on Ω itself.