Search results

1 – 10 of 40
Per page
102050
Citations:
Loading...
Access Restricted. View access options
Article
Publication date: 22 March 2013

Alexander Scheidler, Daniel Merkle and Martin Middendorf

Swarm controlled emergence is proposed as an approach to control emergent effects in (artificial) swarms. The method involves the introduction of specific control agents into the…

280

Abstract

Purpose

Swarm controlled emergence is proposed as an approach to control emergent effects in (artificial) swarms. The method involves the introduction of specific control agents into the swarm systems. Control agents behave similar to the normal agents and do not directly influence the behavior of the normal agents. The specific design of the control agents depends on the particular swarm system considered. The aim of this paper is to apply the method to ant clustering. Ant clustering, as an emergent effect, can be observed in nature and has inspired the design of several technical systems, e.g. moving robots, and clustering algorithms.

Design/methodology/approach

Different types of control agents for that ant clustering model are designed by introducing slight changes to the behavioural rules of the normal agents. The clustering behaviour of the resulting swarms is investigated by extensive simulation studies.

Findings

It is shown that complex behavior can emerge in systems with two types of agents (normal agents and control agents). For a particular behavior of the control agents, an interesting swarm size dependent effect was found. The behaviour prevents clustering when the number of control agents is large, but leads to stronger clustering when the number of control agents is relatively small.

Research limitations/implications

Although swarm controlled emergence is a general approach, in the experiments of this paper the authors concentrate mainly on ant clustering. It remains for future research to investigate the application of the method in other swarm systems. Swarm controlled emergence might be applied to control emergent effects in computing systems that consist of many autonomous components which make decentralized decisions based on local information.

Practical implications

The particular finding, that certain behaviours of control agents can lead to stronger clustering, can help to design improved clustering algorithms by using heterogeneous swarms of agents.

Originality/value

In general, the control of (unwanted) emergent effects in artificial systems is an important problem. However, to date not much research has been done on this topic. This paper proposes a new approach and opens a different research direction towards future control principles for self‐organized systems that consist of a large number of autonomous components.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 6 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Access Restricted. View access options
Article
Publication date: 28 March 2008

Stefan Janson, Daniel Merkle and Martin Middendorf

The purpose of this paper is to present an approach for the decentralization of swarm intelligence algorithms that run on computing systems with autonomous components that are…

1883

Abstract

Purpose

The purpose of this paper is to present an approach for the decentralization of swarm intelligence algorithms that run on computing systems with autonomous components that are connected by a network. The approach is applied to a particle swarm optimization (PSO) algorithm with multiple sub‐swarms. PSO is a nature inspired metaheuristic where a swarm of particles searches for an optimum of a function. A multiple sub‐swarms PSO can be used for example in applications where more than one optimum has to be found.

Design/methodology/approach

In the studied scenario the particles of the PSO algorithm correspond to data packets that are sent through the network of the computing system. Each data packet contains among other information the position of the corresponding particle in the search space and its sub‐swarm number. In the proposed decentralized PSO algorithm the application specific tasks, i.e. the function evaluations, are done by the autonomous components of the system. The more general tasks, like the dynamic clustering of data packets, are done by the routers of the network.

Findings

Simulation experiments show that the decentralized PSO algorithm can successfully find a set of minimum values for the used test functions. It was also shown that the PSO algorithm works well for different type of networks, like scale‐free network and ring like networks.

Originality/value

The proposed decentralization approach is interesting for the design of optimization algorithms that can run on computing systems that use principles of self‐organization and have no central control.

Details

International Journal of Intelligent Computing and Cybernetics, vol. 1 no. 1
Type: Research Article
ISSN: 1756-378X

Keywords

Access Restricted. View access options
Article
Publication date: 1 April 1996

Graham R. Walden

As we approach the millennium, we find ourselves in a world that places ever greater weight and significance on the outcome of polls, surveys, and market research. The advent of…

230

Abstract

As we approach the millennium, we find ourselves in a world that places ever greater weight and significance on the outcome of polls, surveys, and market research. The advent of modern polling began with the use of scientific sampling in the mid‐1930s and has progressed vastly beyond the initial techniques and purposes of the early practitioners such as George Gallup, Elmo Roper, and Archibald Crossley. In today's environment, the computer is an integral part of most commercial survey work, as are the efforts by academic and nonprofit enterprises. It should be noted that the distinction between the use of the words “poll” and “survey” is somewhat arbitrary, with the mass media seeming to prefer “polling,” and with academia selecting “survey research.” However, searching online systems will yield differing results, hence this author's inclusion of both terms in the title of this article.

Details

Reference Services Review, vol. 24 no. 4
Type: Research Article
ISSN: 0090-7324

Access Restricted. View access options
Book part
Publication date: 9 March 2021

Hak J. Kim

Abstract

Access Restricted. View access options
Book part
Publication date: 9 March 2021

Deniz Appelbaum

Abstract

Details

The Emerald Handbook of Blockchain for Business
Type: Book
ISBN: 978-1-83982-198-1

Keywords

Access Restricted. View access options
Article
Publication date: 8 July 2014

Evandro Alencar Rigon, Carla Merkle Westphall, Daniel Ricardo dos Santos and Carlos Becker Westphall

This paper aims at presenting a cyclical evaluation model of information security (IS) maturity. The lack of a security evaluation method might expose organizations to several…

1511

Abstract

Purpose

This paper aims at presenting a cyclical evaluation model of information security (IS) maturity. The lack of a security evaluation method might expose organizations to several risky situations.

Design/methodology/approach

This model was developed through the definition of a set of steps to be followed to obtain periodical evaluation of maturity and continuous improvement of controls.

Findings

This model, based on controls present in ISO/IEC 27002, provides a means to measure the current situation of IS management through the use of a maturity model and provides a subsidy to take appropriate and feasible improvement actions, based on risks. A case study is performed, and the results indicate that the method is efficient for evaluating the current state of IS, to support IS management, risks identification and business and internal control processes.

Research limitations/implications

It is possible that modifications to the process may be needed where there is less understanding of security requirements, such as in a less mature organization.

Originality/value

This paper presents a generic model applicable to all kinds of organizations. The main contribution of this paper is the use of a maturity scale allied to the cyclical process of evaluation, providing the generation of immediate indicators for the management of IS.

Details

Information Management & Computer Security, vol. 22 no. 3
Type: Research Article
ISSN: 0968-5227

Keywords

Access Restricted. View access options
Article
Publication date: 6 June 2008

Art Carden

The purpose of this paper is to explore the relationship between beliefs and economic policy in the context of gasoline prices following Hurricane Katrina.

658

Abstract

Purpose

The purpose of this paper is to explore the relationship between beliefs and economic policy in the context of gasoline prices following Hurricane Katrina.

Design/methodology/approach

The paper applies three contributions – by North, Caplan and Higgs – to the question of gasoline pricing policy; and surveys public opinion regarding interference with prices.

Findings

The paper identifies evidence of “anti‐market bias” in polling data, press releases, and legislation, and argues that the uncertainty emanating from statutes restricting “price gouging” may reduce investment in the provision of “necessary goods and services” after natural disasters.

Originality/value

The paper is of value in offering evidence of anti‐market and anti‐foreign bias among what might be called political first responders to Hurricane Katrina, and posits the view that interference with prices compounded the shortages facing the Gulf coast or any other disaster‐stricken area.

Details

International Journal of Social Economics, vol. 35 no. 7
Type: Research Article
ISSN: 0306-8293

Keywords

Access Restricted. View access options
Article
Publication date: 29 May 2020

Matúš Grežo

This meta-analysis reviews and summarizes the results of 34 studies to investigate the relationship between overconfidence and financial decision-making.

2736

Abstract

Purpose

This meta-analysis reviews and summarizes the results of 34 studies to investigate the relationship between overconfidence and financial decision-making.

Design/methodology/approach

A correlation meta-analysis was conducted with three moderators of the relationship between overconfidence and financial decision-making examined: the type of overconfidence construct, the type of overconfidence measuring method and the type of financial decision-making.

Findings

It was found that the effect of overconfidence on financial decision-making was significant, but the magnitude of this effect was low. Additionally, indirect measures of overconfidence showed to have stronger effect than direct measures, and the overconfidence was mostly related to investment, followed by trading and innovativeness.

Originality/value

This was the first attempt to meta-analytically integrate results concerning the relationship between overconfidence and financial decision-making. Although overconfidence is described as a keystone for understanding financial decision-making, it was shown that it has rather limited effect on individuals' financial decisions. The findings suggest that indirect measures increase the overall effect and may cause the overvaluation of overconfidence in literature. The results call for more rigorous and consistent conceptualization of overconfidence in behavioral research.

Details

Review of Behavioral Finance, vol. 13 no. 3
Type: Research Article
ISSN: 1940-5979

Keywords

Access Restricted. View access options
Book part
Publication date: 16 January 2023

Lennart Ante

This chapter introduces the concept of cryptocurrencies such as bitcoin, ether, or litecoin. The chapter describes the history of cryptocurrency, blockchain technology, and the…

Abstract

This chapter introduces the concept of cryptocurrencies such as bitcoin, ether, or litecoin. The chapter describes the history of cryptocurrency, blockchain technology, and the quest for secure digital money, followed by a discussion of cryptocurrency as a phenomenon. Next, it discusses individual cryptocurrencies, including an overview of bitcoin and relevant subgroups, such as so-called forks or privacy coins. It also explains developments such as stablecoins or central bank digital currencies, which are potentially much more in line with bitcoin’s original idea of digital cash. Overall, the chapter provides a basic understanding of cryptocurrencies, their defining characteristics, challenges, and markets.

Details

The Emerald Handbook on Cryptoassets: Investment Opportunities and Challenges
Type: Book
ISBN: 978-1-80455-321-3

Keywords

Access Restricted. View access options
Book part
Publication date: 5 November 2016

Kristian J. Sund

There is growing evidence that managers perceive the general environment inaccurately, but very few studies have looked at the accuracy of specific strategic issue probability…

Abstract

There is growing evidence that managers perceive the general environment inaccurately, but very few studies have looked at the accuracy of specific strategic issue probability estimates, and at whether or not managers are aware of the accuracy or inaccuracy of their perceptions, something referred to as knowledge miscalibration. I explore perceptual inaccuracy and knowledge miscalibration in the form of overconfidence, in the context of demographic ageing, an issue currently affecting the tourism and hospitality industry. Using data from a survey of hotel managers, I find a high prevalence of perceptual error and evidence of a relatively large minority of respondents displaying knowledge overconfidence. Furthermore, I find a link between accurate environmental perceptions and strategic issue importance, suggesting that managers are better at accurately perceiving an issue when it is strategically important for their business. The same link does not exist with overconfidence, lending support to scholars arguing that overconfidence may be a trait, rather than being question-specific.

Details

Uncertainty and Strategic Decision Making
Type: Book
ISBN: 978-1-78635-170-8

Keywords

1 – 10 of 40
Per page
102050