information gathering
Recently Published Documents


TOTAL DOCUMENTS

1373
(FIVE YEARS 335)

H-INDEX

43
(FIVE YEARS 7)

Author(s):  
Ronanld P. Gruber ◽  
Carlos Montemayor ◽  
Richard A. Block

There is a long standing ‘two times problem’ in that a satisfactory reconciliation between the time of physics and that of psychology has not been realized. A partial solution to the past/present/future phenomenon has been successfully given by the Hartle information gathering and processing system (IGUS) view. That model IGUS robot is enhanced here for the entire ‘two times problem’ to deal with not only the temporal experiences of the flow of time but also those of manifest time. A dualistic robot is proposed which has a veridical system of temporal experiences that are compatible with various spacetime cosmologies. It also has an illusory system of corresponding temporal experiences. This dualistic IGUS robot was made possible by discovering temporal experience within the brain that correspond to those of physics. The dualistic theory suggests that the veridical system, as a result of evolution, begets the illusory system to enhance behavioral adaptation. Thus, there is just one fundamental physical time which the brain does, indeed, possess and then enhances with illusory counterparts. Therefore, there should no longer be a need to reify illusory temporal experiences as modern spacetime cosmologies tend to do. Physical time already resides within human time.


2021 ◽  
Author(s):  
Miki Takami ◽  
Eiko Nishiumi ◽  
Eiko Nakanishi ◽  
Kyoko Ishigaki

The objective of this study was to clarify gaze information patterns of nurses gathering patient information using electronic health records. We recorded the electronic health record screen on which nurses’ gazes were presented using an eye tracker and analyzed the recorded images. The analysis revealed two types of gaze information patterns of nurses engaged in patient information gathering. However, no regularity was observed in the gaze information patterns of the nurses viewing the electronic health record sections after selecting a patient.


2021 ◽  
Author(s):  
Jochen Michely ◽  
Ingrid M. Martin ◽  
Raymond J. Dolan ◽  
Tobias U. Hauser

Serotonin is implicated in the valuation of aversive costs, such as delay or physical effort. However, its role in governing sensitivity to cognitive effort, for example deliberation costs during information gathering, is unclear. We show that week-long treatment with a serotonergic antidepressant enhances a willingness to gather information when trying to maximize reward. Using computational modelling, we show this arises from a diminished sensitivity to subjective deliberation costs during the sampling process. This result is consistent with the notion that serotonin alleviates sensitivity to aversive costs in a domain-general fashion, with implications for its potential contribution to a positive impact on motivational deficits in psychiatric disorders.


Over the past few years, the advancement of technology in universities have led to rise in the number of vulnerabilities in University computer Network (UCN). To ensure robustness and hardness of UCN, an efficient Vulnerability Management System is required. The focus of current work is on the importance of vulnerability management in a UCN. A plethora of tools are used for vulnerability scanning and assessment. This paper also focuses on the implementation of vulnerability scanning tools on UCN. Assessment of scan results is done to identify vulnerabilities in the network that need to be resolved on priority basis. Based on the scan results obtained after scanning the network using scanning tools, the decision can be taken to mitigate the vulnerabilities on priority basis. Vulnerability Management in a UCN is a stepwise procedure that needs to be implemented to keep the network secure. An effective VM framework is important and inevitable to prevent cyber security breaches in a UCN as it regularly checks for new vulnerabilities on and also provide solutions to remediate or resolve the vulnerabilities. The scanning tools used for the current work were Nmap and Nexpose. Nmap was used for information gathering of network and Nexpose was used for scanning the network for vulnerability detection.


Author(s):  
Isabelle Böhm ◽  
Samuel Lolagar

AbstractOpen Source Intelligence (OSINT) has gained importance in more fields of application than just in intelligence agencies. This paper provides an overview of the fundamental methods used to conduct OSINT investigations and presents different use cases where OSINT techniques are applied. Different models of the information cycle applied to OSINT are addressed. Additionally, the terms data, information, and intelligence are explained and correlated with the intelligence cycle. A classification system for entities during OSINT investigations is introduced. By presenting the capabilities of modern search engines, techniques for research within social networks and for penetration tests, the fundamental methods used for information gathering are explained. Furthermore, possible countermeasures to protect one’s privacy against the misuse of openly available information as well as the legal environment in Germany, and the ethical perspective are discussed.


2021 ◽  
Author(s):  
◽  
Naomi Lamb

<p>This thesis analyses some key factors of what is often considered a marginalised cultural and creative practice, VJing. The term VJ historically refers to Video Jockey, though in its own right VJ can be used to umbrella a number of various practices that utilise live visual media performances. This study is based on the researcher's active participation in the New Zealand (Kiwi) VJ scene for over thriteen years. Chapter One introduces some of the traditional principles and factors that are still in use in contemporary VJ practices, as well as the characteristics of the Kiwi VJ scene. Chapter Two outlines and analyses an experiment that takes these factors and characteristics into consideration. The case study utilises peer to peer information gathering through an experiment designed to generate a disruption to the intuitive mode of working to which four veteran VJs have been accustomed. The case study experiment sought to isolate key factors that impact on content creation and selection for live VJ mixing that utilise traditional principles. During the analysis, the following factors were identified: time, sight, memory, finance, environment, technology, availability, efficiency, compatibility, loops, silence, form, rhythm, movement, shape, colour and music. The experiment centred around a sample library of original content that the four VJs were asked to respond to, both through conversational dialogue and a live VJ performance. The DVD contains the results of the individual performances.</p>


2021 ◽  
Author(s):  
◽  
Naomi Lamb

<p>This thesis analyses some key factors of what is often considered a marginalised cultural and creative practice, VJing. The term VJ historically refers to Video Jockey, though in its own right VJ can be used to umbrella a number of various practices that utilise live visual media performances. This study is based on the researcher's active participation in the New Zealand (Kiwi) VJ scene for over thriteen years. Chapter One introduces some of the traditional principles and factors that are still in use in contemporary VJ practices, as well as the characteristics of the Kiwi VJ scene. Chapter Two outlines and analyses an experiment that takes these factors and characteristics into consideration. The case study utilises peer to peer information gathering through an experiment designed to generate a disruption to the intuitive mode of working to which four veteran VJs have been accustomed. The case study experiment sought to isolate key factors that impact on content creation and selection for live VJ mixing that utilise traditional principles. During the analysis, the following factors were identified: time, sight, memory, finance, environment, technology, availability, efficiency, compatibility, loops, silence, form, rhythm, movement, shape, colour and music. The experiment centred around a sample library of original content that the four VJs were asked to respond to, both through conversational dialogue and a live VJ performance. The DVD contains the results of the individual performances.</p>


Author(s):  
Carmen Lizeth Orduño Soto ◽  
Juan Antonio Leos Rodríguez ◽  
Enrique Genaro Martínez González ◽  
Jorge Aguilar Ávila

Objective: To identify the profile of the companies participating in the Mexican National Exportation Award (NEA) in the Large Agricultural Exporting Companies category (LAEC), by an information-gathering tool to determine the commercial lines of those businesses, their state of origin, and the exports destination. Methodology: a total of 17 questionnaires (n = 17), applied by the NEA to the LAEC category participants during the 2010-2018 period, were analyzed to determine the commercial business lines, their state of origin, and the destination of the exports. A problem tree was created to find opportunity areas to design solution proposals. The collected information was processed in the NetDraw 2.097 software to show the networks, their dominant actors (countries to which they export), and the products that the companies exported the most. Results: pork and vegetables business lines were identified. The latter revealed a sub-network of tomatoes and strawberries. A network was generated with an open structure comprising 17 nodes and 46 links where three export destination countries stood out: the USA with 15 links, Canada with six, and Japan with five. The highest exported product was the tomato in its different varieties, mainly to the U.S. and Canada. Limitations: Scarce information about the award on the internet. Access restrictions. Most of the exporting companies did not respond to the survey. Conclusions: the perishability of exported products determines the number of destination countries. The precariousness of Mexican agricultural exports was identified because companies trade only one product or a reduced number of them to only one country.


2021 ◽  
Vol 5 (1) ◽  
pp. 135-142
Author(s):  
DR. MOHAMMAD DAUD ALI ◽  
DR. SYED IMAD SHAH ◽  
MUHAMMAD TARIQ

This paper is a description of how marketing occurs in the forests of Malaysia, a focus made on the direct selling and relationship marketing in those jungles where marketers/sales people get access to their customers. These potential customers living in the shelter houses temporarily prepared in the jungles where the customers are employed for various assignments. An observation method for data and information gathering is acquired. Discussion/ unstructured interviews are made with the sales people and customers to understand the essence of direct selling and the relationship that the marketers have developed with the customers who live in the jungles. Also, pictures were drawn with a digital camera to reveal how the customers and the marketers relate while dealing with each other.


Sign in / Sign up

Export Citation Format

Share Document