Toward universal laws of technology evolution: modeling multi-century advances in mobile direct-fire systems

Author(s):  
Alexander Kott

This paper explores the question of whether a single regularity of technological growth might apply to a broad range of technologies, over a period of multiple centuries. To this end, the paper investigates a collection of diverse weapon systems called here the mobile direct-fire systems. These include widely different families of technologies that span the period of 1300–2015 CE: foot soldiers armed with weapons from bows to assault rifles; horse-mounted soldiers with a variety of weapons; foot artillery and horse artillery; towed antitank guns; self-propelled antitank and assault guns; and tanks. The main contribution of this paper is that, indeed, a single, parsimonious regularity describes the historical growth of this extremely broad collection of systems. Multiple, widely different families of weapon systems—from a bowman to a tank—fall closely on the same curve, a simple function of time. This suggests a general model that unites allometric relations (such as Kleiber’s Law) and exponential growth relations (such as Moore’s Law). To this author’s knowledge, no prior research describes a regularity in the temporal growth of technology that covers such widely different technologies and over such a long period of history. This regularity is suitable for technology forecasting, as this paper illustrates with explorations of two systems that might appear 30 years in the future from this writing: a heavy infantryman and a tank. In both cases, the regularity helped lead to nonobvious conclusions, particularly regarding the power of the weapons of such future systems. Furthermore, this result suggests a possibility—and related research questions—that even broader collections of technology families might evolve historically in accordance with what might be called universal laws of technological evolution.

Author(s):  
Ali Yazici ◽  
Ziya Karakaya ◽  
Mohammed Alayyoub

The choice of the most effective stream processing framework (SPF) for Big Data has been an important issue among the researchers and practioners. Each of the SPFs has different cutting edge technologies in their steps of processing the data in motion that gives them a better advantage over the others. Even though, these technologies used in each SPF might better them, it is still difficult to conclude which framework berforms better under different scenarios and conditions. In this paper, we aim to show trends and differences about several SPFs for Big Data by using the so called Systematic Mapping (SM) approach using the related research outcomes. To achieve this objective, nine research questions (RQs) were raised, in which 91 studies that were conducted between 2010 and 2015 were evaluated. We present the trends by classifying the research on SPFs with respect to the proposed RQs which can direct researchers in getting an state-of-art overview of the field.


1995 ◽  
Vol 53 ◽  
pp. 25-38
Author(s):  
Mireille Donkervoort ◽  
Loekie Eibers

The main goal of this research is to investigate whether the Principle of Contrastive Usage holds for the linguistic input that young children receive from their parents. This principle predicts that words which are used contrastively are not only different but also similar in meaning. That is, contrasted words will tend (a) to be semantically related, and (b) the semantic relation will tend to be the coordinate relation, since coordinates are conceptually similar (e.g., cat and dog both refer to a kind of animal). Related research questions are what forms of 'contrasting' and/or 'correcting' can be distinguished in the input to children, and what role individual and situational variables play in the occurrence of these forms. The spontaneous speech produced by two mother-child dyads, in natural interaction at home, was analysed. Speech samples had been collected at regular intervals over the second half of the children's third year. Only nouns were examined. Two communicative situations were distinguished, 'free conversation' and 'visually guided conversation' (book reading, making a jig-saw puzzle). Several subcatego-ries of contrast and correction were discriminated. Subcategories shared by both are corrective explicit contrast and corrective implicit contrast. A contrast-specific subcategory is descriptive contrast, correction-specific subcategories are global negation, specific negation, correction by demonstration, and correction by acknowledging similarity. It was found that contrast and correction are strongly correlated in the input, and tend to go together. However, it was also found that contrast but not correction is sensitive to aspects of communicative situation, whereas correction but not contrast is sensitive to individual differences. As to the character of the relationships between the contrasted terms, it was found that the coordinate relation is indeed predominant, most notably in descriptive contrast. Additionally, it was found that parents, when correcting their children, have a clear preference for explicit over implicit contrast when there is any kind of similarity between referents involved, i.e., when the relation between contrasted terms is either coordinate (conceptual similarity) or is based on perceptual or functional similarity.


Author(s):  
Washington Garcia-Quilachamin ◽  
Julieta Evangelina Sánchez - Cano ◽  
Luzmila Pro Concepción

Among the technological evolution is the application of algorithms in cameras for the detection and recognition of people, being a contribution to the security and surveillance in commercial, home areas, and smart cities. The objective of this research is to know and identify algorithms in the detection of patterns of a person, considering the criteria of Kitchengam. For this purpose, the following research questions were asked: Q1) How many studies refer to algorithms in pattern recognition? Q2: What types of algorithm models exist in an environment related to pattern recognition? and Q3: What types of pattern recognition algorithms currently exist? The search process was carried out in the digital libraries IEEE Xplore, ACM Digital Library, Springer Link and Science Direct (Elsevier). Obtained 1402 potentially eligible studies and obtained a final sample of 28 papers considered as main research studies. The results obtained allow us to consider the Support Vector Machines model with 92% recognition and the Viola-Jones algorithm with effective detection of 97,53%, are a contribution to the surveillance and safety of people within the recognition and detection of a person’s pattern, considering also as a challenge its feasibility focused on energy efficiency, in domestic, business and smart cities.


2020 ◽  
Vol 45 (2) ◽  
pp. 143-159
Author(s):  
JENS-MORTEN HANSSEN

Henrik Ibsen's Peer Gynt remained a rarely performed play throughout the author's lifetime. It was not until around the outbreak of the First World War that stage productions of the play began to proliferate. This article examines the pre-1945 production history of the play in the light of a concept that signifies a particular way of composing a repertoire, the repertory system. It was first and foremost prominent stages in Germany that paved the way for Peer Gynt to become incorporated into this system, leading to an exponential growth in the number of stage events. The production history illustrates how plays that are performed over a long period of time question the notion of production as a fixed mise en scène. Supporting Linda Hutcheon's argument about adaptation as a continuous process, the productions examined here demonstrate that there was no such thing as a standard way to adapt Peer Gynt for the stage.


Author(s):  
Ani Calinescu ◽  
Janet Efstathiou

Networked systems, natural or designed, have always been part of life. Their sophistication degree and complexity have increased through either natural evolution or technological progress. However, recent theoretical results have shown that a previously unexpected number of different classes of networks share similar network architectures and universal laws. Examples of such networks include metabolic pathways and ecosystems, the Internet and the World Wide Web, and organizational, social, and neural networks. Complex systems-related research questions investigated by researchers nowadays include: how consciousness arises out of the interactions of the neurons in the brain and between the brain and the environment (Amaral & Ottino, 2004; Barabási, 2005; Barabási & Oltvai, 2004; Neuman, 2003b) and how this understanding could be used for designing networked organizations or production networks whose behavior satisfies a given specification.


Author(s):  
Michael S. Danielson

Despite intense migratory flows between Mexico and the United States, migrants have had surprisingly low participation and impact in national politics in Mexico. Nevertheless, this book begins by hypothesizing that participation may be more robust and impact more noteworthy at the subnational level due to the fact that the economic and social importance of migration varies widely within Mexico. Based on this framing, three related research questions are presented and the need for a mixed-method approach to answer them addressed. While case studies of significant migrant impact are insufficient to fully capture the breadth of effects, quantitative studies are inadequate to the task of uncovering the historical processes and causal mechanisms behind observed correlations. Finally, the chapter summarizes the different data sources used, justifies the case selection rationale, and outlines the structure of the rest of the book.


2018 ◽  
Vol 50 (3) ◽  
pp. 329-358 ◽  
Author(s):  
Richard Wetzel ◽  
Khaled Bachour ◽  
Martin Flintham

Background. Research games are challenging to design as they seek to fulfil a research agenda as well as work as a game. We have successfully collaborated with a group of artists in a research game about people’s perception of provenance called The Apocalypse of the Ministry of Provenance (MoP). The web-based game ran for 6 months with a total of 1004 players signing up over its lifetime with 490 consenting to their data being used for research purposes. While the game allowed us to answer our provenance-related research questions, in this article we look at the game design process of such a collaborative research game. Aim. The co-creation approach created tensions that had to be carefully negotiated between everyone involved. The purpose of this article is to investigate the nature of these tensions, what has caused them, and how we managed (or failed) to mitigate them. This leads to recommendations for future researchers co-creating a research game with artists. Method. We use the form of a post-mortem reflection on the development of the game, based on our own experiences, a one-hour long interview with the two artists involved, and post-game phone interviews with players (n=8). Results. We identify the following three tensions that had a high impact on the overall process: 1) Translating research questions into engaging gameplay elements; 2) Creation of research-relevant content by artists; 3) Artistic vision conflicting with research agenda. We contextualize these tensions by describing six vignettes concerning our collaboration in rich detail that highlight the salient issues of the overall process and resulting game from different perspectives. Lastly, we present seven mitigation strategies on how to deal with the tensions or prevent them from arising. Conclusions. A collaboration with artists for the purpose of creating a research game is a rewarding but also challenging process. Overcoming the resulting tensions is possible by utilizing mitigation strategies that need to be implemented jointly between researchers and artists to guarantee the success as an engaging research game.


2017 ◽  
Vol 7 (1) ◽  
pp. 169 ◽  
Author(s):  
Stephen D. Risavy

The resume remains a common selection method used by organizations; however, much of the resume research literature is dated and there is a lack of an organizing framework regarding future resume-related research. Thus, the purpose of the current paper is to provide: (1) a synthesis of the historical empirical research literature through the lens of the advice that has accumulated to date; and (2) an organizing framework containing future research questions that need to be investigated in order to continue moving the literature forward. The current paper will be of use to job applicants, business communication instructors, and researchers.


2020 ◽  
Author(s):  
Nicolas Bérubé ◽  
Gita Ghiasi ◽  
Maxime Sainte-Marie ◽  
Vincent Larivière

Gender information is often absent from databases available to scholars, thus hindering the proper problematization, investigation, and answering of various gender-related research questions. Named-based algorithms represent the most simple, yet effective used gender detection methods: such methods proceed by generating first-name-to-gender mapping tables based on user records in a given dataset and then applying such mapping tables "in reversal" to other databases for completion or validation purposes. The present research aims to develop a gender detection algorithm focusing on the gender detection of eponymous Wikipedia pages and compare its performance to that of other well-known gender detection databases, using the author names indexed in the Web of Science.


2020 ◽  
Vol 15 (6) ◽  
pp. 175-194
Author(s):  
AGNIESZKA KARMAN ◽  

Circular Economy (CE) can be promoted and supported by the creation of new and innovative business models which embed CE principles into organisations’ value chains. This paper provides a review of approaches to the circular business model (CBM). We conducted a literature review, including content analysis, and examined publications (51 papers) on circular business models published in English in peerreviewed journals. Our objective was to provide an overview and systematize the stateof-the-art in CE-oriented business model approaches. The following research questions were posed in relation to the objective: Which sub-processes and components are included in the Circular Business Models (CBM)? Which CBM archetypes have already been established? Which strategies and other factors support the creation/ transformation of the CBM? The results of the studies were presented in five areas encompassing the following: 1) development (including the methodologies of development and transformation), value proposition, creation and delivery, 2) CBM archetypes, 3) circular strategies, 4) the determinants of development and transformation of business models for CE. The paper contributes to the improved understanding of circular business models. It consolidates related research by offering an overarching conceptual framework. It also points to the directions of future research.


Sign in / Sign up

Export Citation Format

Share Document