Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 7 of 7

Full-Text Articles in Physical Sciences and Mathematics

Research On Evacuation Simulation Method Considering Social Behavior, Yuanyuan Deng, Liping Zheng, Ruiwen Cai Jan 2020

Research On Evacuation Simulation Method Considering Social Behavior, Yuanyuan Deng, Liping Zheng, Ruiwen Cai

Journal of System Simulation

Abstract: In an emergency evacuation scenario, the typical social attributes of an individual impact their evacuation behavior. Two kinds of social factors, such as individual familiarity to the environment and the individual group, are introduced and applied in crowd evacuation simulation. An evacuation simulation method is proposed. The real-time collision avoidance technique of RVO library is used to simulate the dynamic motion of the population. The local target points and its selection mechanism are used to simulate the different social behaviors of the population. Experiments show that the familiarity to the environment and group factors have influence on the evacuation …


The Effects Of Early Confidence Interval Training On User Efficacy In A P300 Brain-Computer Interface Spelling Task, Adam Starkman Jun 2016

The Effects Of Early Confidence Interval Training On User Efficacy In A P300 Brain-Computer Interface Spelling Task, Adam Starkman

Honors Theses

Brain-computer interface (BCI) technology can provide communication for individuals suffering from degenerative neuromuscular disorders. The present study sought to demonstrate improved BCI performance in healthy individuals using confidence interval training with a P300 BCI spelling program. In this BCI interface, electroencephalographic (EEG) activity was recorded as participants attended to a specific target character within a matrix of flashing letters and numbers presented on a computer screen. The BCI uses the P300 Event Related Potential to select the intended character. In a prior patient case, use of a confidence measure that rejected questionable selections improved that user’s spelling efficiency. The present …


Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks Sep 2014

Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks

David J Brooks Dr.

AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The participants were senior managers at a West Australian motel located on the West Coast Highway, Scarborough. The motel consists of four three storey blocks of units, resulting in a total of 75 …


Spalendar: Visualizing A Group's Calendar Events Over A Geographic Space On A Public Display, Chen Xiang, Sebastian Boring, Sheelagh Carpendale, Anthony Tang, Saul Greenberg May 2012

Spalendar: Visualizing A Group's Calendar Events Over A Geographic Space On A Public Display, Chen Xiang, Sebastian Boring, Sheelagh Carpendale, Anthony Tang, Saul Greenberg

Research Collection School Of Computing and Information Systems

Portable paper calendars (i.e., day planners and organizers) have greatly influenced the design of group electronic calendars. Both use time units (hours/days/weeks/etc.) to organize visuals, with useful information (e.g., event types, locations, attendees) usually presented as - perhaps abbreviated or even hidden - text fields within those time units. The problem is that, for a group, this visual sorting of individual events into time buckets conveys only limited information about the social network of people. For example, people’s whereabouts cannot be read ‘at a glance’ but require examining the text. Our goal is to explore an alternate visualization that can …


Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks Apr 2006

Security Risk Assessment: Group Approach To A Consensual Outcome, Ben Beard, David J. Brooks

Australian Information Warfare and Security Conference

AS/NZS4360:2004 suggests that the risk assessment process should not be conducted or information gathered in isolation. This insular method of data collection may lead to inaccurate risk assessment, as stakeholders with vested interests may emphasise their own risks or game the risk assessment process. The study demonstrated how a consensual risk assessment approach may result in a more acceptable risk assessment outcome when compared to individual assessments. The participants were senior managers at a West Australian motel located on the West Coast Highway, Scarborough. The motel consists of four three storey blocks of units, resulting in a total of 75 …


Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello May 2002

Collaborative Problem Solving And Program Development Model, Joanna Defranco-Tommarello

Dissertations

A model to enhance collaborative problem solving and program development is presented. The collaborative model is a detailed cognitive model that takes into consideration the cognitive and social activities that occur during collaborative problem solving and program development. The cognitive activities required for collaborative problem solving and program development are identified and integrated into a six-stage model. An extensive literature review in the associated fields is presented to show the need for the model described in this dissertation. In addition, a comprehensive study of tools to support collaboration during problem solving and program development was also performed as well as …


Group Properties Of Crossover And Mutation, Jonathan E. Rowe, Michael D. Vose, Alden H. Wright Jan 2002

Group Properties Of Crossover And Mutation, Jonathan E. Rowe, Michael D. Vose, Alden H. Wright

Computer Science Faculty Publications

It is supposed that the finite search space Ω has certain symmetries that can be described in terms of a group of permutations acting upon it. If crossover and mutation respect these symmetries, then these operators can be described in terms of a mixing matrix and a group of permutation matrices. Conditions under which certain subsets of Ω are invariant under crossover are investigated, leading to a generalization of the term schema. Finally, it is sometimes possible for the group acting on Ω to induce a group structure on Ω itself.