G. Kokkonis, Vasileios Moysiadis, Theofano M. Kollatou, Sotirios Kontogiannis
This paper describes the procedure for creating tactile interfaces for Android smart phones. It uses the HTML5 Vibration API and the Javascript programming language to create vibration patterns in order to increase the interaction between visually impaired people with their smart phones. Apart from vision, audio and haptics are used to maximize the Human – Computer Interaction between the Android phones and users with visual impairments. Three methods are proposed for the creation of tactile interfaces in smart phones, one is with the use of the HTML image map tag, and the other with the Mask R-CNN Artificial Intelligence algorithm. The Mean Opinion Score procedure is used in order to evaluate the proposed vibration patterns for Human - Computer Interaction Techniques.
{"title":"Design Tactile Interfaces with Vibration Patterns in HTML5 for Smartphone Users with Visual Impairments","authors":"G. Kokkonis, Vasileios Moysiadis, Theofano M. Kollatou, Sotirios Kontogiannis","doi":"10.2139/ssrn.3347047","DOIUrl":"https://doi.org/10.2139/ssrn.3347047","url":null,"abstract":"This paper describes the procedure for creating tactile interfaces for Android smart phones. It uses the HTML5 Vibration API and the Javascript programming language to create vibration patterns in order to increase the interaction between visually impaired people with their smart phones. Apart from vision, audio and haptics are used to maximize the Human – Computer Interaction between the Android phones and users with visual impairments. Three methods are proposed for the creation of tactile interfaces in smart phones, one is with the use of the HTML image map tag, and the other with the Mask R-CNN Artificial Intelligence algorithm. The Mean Opinion Score procedure is used in order to evaluate the proposed vibration patterns for Human - Computer Interaction Techniques.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122802484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-01-31DOI: 10.34218/ijcet.10.1.2019.001
Keerthi D S, Shobha Rani A, T. Basavaraju
In recent years it is witnessed that the Wireless Mesh Networks (WMNs) are becoming the most promising technology as they offer low cost broadband wireless connectivity, larger coverage area, high flexibility and easy deployment. WMNs are an extension of existing wireless networks. WMN is an emerging technology; however, there are certain challenges that still exist in the network such as scalability, load balancing, mobility, power management etc. Here we have proposed a novel routing protocol which considers buffer occupancy of intermediate nodes for route selection. Simulation results convey that the proposed protocol outstandingly enhances the performance of the network by balancing the traffic load among less congested nodes compared to the standard protocol.
{"title":"Buffer Based Routing Mechanism for Load Balancing in Wireless Mesh Networks","authors":"Keerthi D S, Shobha Rani A, T. Basavaraju","doi":"10.34218/ijcet.10.1.2019.001","DOIUrl":"https://doi.org/10.34218/ijcet.10.1.2019.001","url":null,"abstract":"In recent years it is witnessed that the Wireless Mesh Networks (WMNs) are becoming the most promising technology as they offer low cost broadband wireless connectivity, larger coverage area, high flexibility and easy deployment. WMNs are an extension of existing wireless networks. WMN is an emerging technology; however, there are certain challenges that still exist in the network such as scalability, load balancing, mobility, power management etc. Here we have proposed a novel routing protocol which considers buffer occupancy of intermediate nodes for route selection. Simulation results convey that the proposed protocol outstandingly enhances the performance of the network by balancing the traffic load among less congested nodes compared to the standard protocol.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134323113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Neural network modeling often suffers the deficiency of not using a systematic way of improving classical statistical regression models. In this tutorial we exemplify the proposal of the editorial of ASTIN Bulletin 2019/1. We embed a classical generalized linear model into a neural network architecture, and we let this nested network approach explore model structure not captured by the classical generalized linear model. In addition, if the generalized linear model is already close to optimal, then the maximum likelihood estimator of the generalized linear model can be used as initialization of the fitting algorithm of the neural network. This saves computational time because we start the fitting algorithm in a reasonable parameter. As a by-product of our derivations, we present embedding layers and representation learning which often provides a more efficient treatment of categorical features within neural networks than dummy and one-hot encoding.
{"title":"Nesting Classical Actuarial Models into Neural Networks","authors":"Jürg Schelldorfer, Mario V. Wuthrich","doi":"10.2139/ssrn.3320525","DOIUrl":"https://doi.org/10.2139/ssrn.3320525","url":null,"abstract":"Neural network modeling often suffers the deficiency of not using a systematic way of improving classical statistical regression models. In this tutorial we exemplify the proposal of the editorial of ASTIN Bulletin 2019/1. We embed a classical generalized linear model into a neural network architecture, and we let this nested network approach explore model structure not captured by the classical generalized linear model. In addition, if the generalized linear model is already close to optimal, then the maximum likelihood estimator of the generalized linear model can be used as initialization of the fitting algorithm of the neural network. This saves computational time because we start the fitting algorithm in a reasonable parameter. As a by-product of our derivations, we present embedding layers and representation learning which often provides a more efficient treatment of categorical features within neural networks than dummy and one-hot encoding.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133791912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In the first section, Einstein's 1919 paper "Do gravitational fields play an essential role in the structure of elementary particles?", though originally intended to explain atomic structure, helps explain gravitational-electromagnetic (G-EM) unity by being used as inspiration for a “vector-tensor-scalar geometry”. The geometry is then extended, nearly a hundred years later, into “bits (binary digits) and topology” to complete G-EM unity. It also interprets the origin of mass, and of the Higgs boson, in terms of G-EM unity: thus relating the Higgs field to the supposedly unrelated gravitational field. In sections 3 and 4, Einstein’s paper is utilized in its original context by applying vector-tensor-scalar geometry to the Weak force’s bosons, then to the Strong force’s gluons: extending the previous G-EM unification to the remaining fundamental forces.
Sections 2 and 5 are reminiscent of something the Danish physicist Niels Bohr is reported to have said last century, “Your theory is crazy, but it’s not crazy enough to be true.” This article reaches a final conclusion that is, in a word, crazy. But the conclusion appears to be inescapable if mathematics has any value – and the article would therefore be crazy enough to be true. The vector-tensor-scalar relationship can substitute Earth for the Higgs boson and field, making our planet infinite and eternal. Obeying the Copernican principle that Earth does not rest in a special physical position in the universe, everything in the cosmos would be infinite and eternal, composing the Unified Field of the Block Universe Albert Einstein believed in. If the Earth, and everything on or beyond it, is eternally infinite; there can be no Big Bang originating time and the universe. Since a quantum computer is infinite and eternal in actuality,^ it can use 1 and 0 simultaneously (combining them into a so-called qubit). A traditional computer, though infinite and eternal, is built and programmed to function in a much more limited manner. Experiments suggesting that entanglement pervades all space and all time are used to suggest the Cosmic Microwave Background fills the entire sky without being produced by the Big Bang. This eternal infinity is beyond detection by bodily senses and current scientific instruments but is mathematically logical.
Because of the rotating between the x- and y-axes in Wick rotation, there’s a space-time we call imaginary or higher dimensional that is just as real as ordinary space-time. Gravity also leads to mass here - “dark” matter – and that matter’s associated “dark” energy. Use of so-called "imaginary” time and quantum mechanics’ entanglement removes boundaries between the “imaginary” and known realities. Boundaries between the far future’s simulated universe and this known universe are removed by the imaginary’s affecting virtual reality to produce an augmented reality.
{"title":"Unifying Gravity with Electromagnetism, the Atomic Nuclear Forces, and the Higgs Eliminates the Universe's Big Bang","authors":"R. Bartlett","doi":"10.2139/ssrn.3376418","DOIUrl":"https://doi.org/10.2139/ssrn.3376418","url":null,"abstract":"In the first section, Einstein's 1919 paper \"Do gravitational fields play an essential role in the structure of elementary particles?\", though originally intended to explain atomic structure, helps explain gravitational-electromagnetic (G-EM) unity by being used as inspiration for a “vector-tensor-scalar geometry”. The geometry is then extended, nearly a hundred years later, into “bits (binary digits) and topology” to complete G-EM unity. It also interprets the origin of mass, and of the Higgs boson, in terms of G-EM unity: thus relating the Higgs field to the supposedly unrelated gravitational field. In sections 3 and 4, Einstein’s paper is utilized in its original context by applying vector-tensor-scalar geometry to the Weak force’s bosons, then to the Strong force’s gluons: extending the previous G-EM unification to the remaining fundamental forces. <br> <br>Sections 2 and 5 are reminiscent of something the Danish physicist Niels Bohr is reported to have said last century, “Your theory is crazy, but it’s not crazy enough to be true.” This article reaches a final conclusion that is, in a word, crazy. But the conclusion appears to be inescapable if mathematics has any value – and the article would therefore be crazy enough to be true. The vector-tensor-scalar relationship can substitute Earth for the Higgs boson and field, making our planet infinite and eternal. Obeying the Copernican principle that Earth does not rest in a special physical position in the universe, everything in the cosmos would be infinite and eternal, composing the Unified Field of the Block Universe Albert Einstein believed in. If the Earth, and everything on or beyond it, is eternally infinite; there can be no Big Bang originating time and the universe. Since a quantum computer is infinite and eternal in actuality,^ it can use 1 and 0 simultaneously (combining them into a so-called qubit). A traditional computer, though infinite and eternal, is built and programmed to function in a much more limited manner. Experiments suggesting that entanglement pervades all space and all time are used to suggest the Cosmic Microwave Background fills the entire sky without being produced by the Big Bang. This eternal infinity is beyond detection by bodily senses and current scientific instruments but is mathematically logical.<br> <br>Because of the rotating between the x- and y-axes in Wick rotation, there’s a space-time we call imaginary or higher dimensional that is just as real as ordinary space-time. Gravity also leads to mass here - “dark” matter – and that matter’s associated “dark” energy. Use of so-called \"imaginary” time and quantum mechanics’ entanglement removes boundaries between the “imaginary” and known realities. Boundaries between the far future’s simulated universe and this known universe are removed by the imaginary’s affecting virtual reality to produce an augmented reality.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"21 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134164873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A learning task is sequential if its data samples become available over time. Kernel adaptive filters (KAF) are sequential learning algorithms. There are two main challenges in KAF: (1) the lack of an effective method to determine the kernel-sizes in the online learning context; (2) how to tune the step-size parameter. We propose a framework for online prediction using KAF which does not require a predefined set of kernel-sizes; rather, the kernel-sizes are both created and updated in an online sequential way. Further, to improve convergence time, we propose an online technique to optimize the step-size parameter. The framework is tested on two real-world data sets, i.e., internet traffic and foreign exchange market. Results show that, without any specific hyperparameter tuning, our proposal converges faster to relatively low values of mean squared error and achieves better accuracy.
{"title":"Learning from Data Streams Using Kernel Adaptive Filtering","authors":"S. García-Vega, Xiao-Jun Zeng, J. Keane","doi":"10.2139/ssrn.3306245","DOIUrl":"https://doi.org/10.2139/ssrn.3306245","url":null,"abstract":"A learning task is sequential if its data samples become available over time. Kernel adaptive filters (KAF) are sequential learning algorithms. There are two main challenges in KAF: (1) the lack of an effective method to determine the kernel-sizes in the online learning context; (2) how to tune the step-size parameter. We propose a framework for online prediction using KAF which does not require a predefined set of kernel-sizes; rather, the kernel-sizes are both created and updated in an online sequential way. Further, to improve convergence time, we propose an online technique to optimize the step-size parameter. The framework is tested on two real-world data sets, i.e., internet traffic and foreign exchange market. Results show that, without any specific hyperparameter tuning, our proposal converges faster to relatively low values of mean squared error and achieves better accuracy.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125567222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
One of the most important steps to describe local features is to estimate the interest region around the feature location to achieve the invariance against different image transformation. The pixels inside the interest region are used to build the descriptor, to represent a feature. Estimating the interest region around a corner location is a fundamental step to describe the corner feature. But the process is challenging under different image conditions. Most of the corner detectors derive appropriate scales to estimate the region to build descriptors. In our approach, we have proposed a new local maxima-based interest region detection method. This region estimation method can be used to build descriptors to represent corners. We have performed a comparative analysis to match the feature points using recent corner detectors and the result shows that our method achieves better precision and recall results than existing methods.
{"title":"Effective Interest Region Estimation Model to Represent Corners for Image","authors":"Naurin Afrin, Wei Lai","doi":"10.5121/sipij.2018.9603","DOIUrl":"https://doi.org/10.5121/sipij.2018.9603","url":null,"abstract":"One of the most important steps to describe local features is to estimate the interest region around the feature location to achieve the invariance against different image transformation. The pixels inside the interest region are used to build the descriptor, to represent a feature. Estimating the interest region around a corner location is a fundamental step to describe the corner feature. But the process is challenging under different image conditions. Most of the corner detectors derive appropriate scales to estimate the region to build descriptors. In our approach, we have proposed a new local maxima-based interest region detection method. This region estimation method can be used to build descriptors to represent corners. We have performed a comparative analysis to match the feature points using recent corner detectors and the result shows that our method achieves better precision and recall results than existing methods.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132091505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yusuf Mohammed Danlami, Abba Almu, Hassan Mairoh, Mohammed Kabiru Hamza
Antenatal and postnatal processes and services is a component of Hospital Management Systems that has been given very little attention. Most healthcare institution carries out the antenatal and postnatal processes manually and keeps records of the whole processes on paper. In most cases in most hospital, records kept on paper and files get missing or misplaced leading to the loss of important records of clients which would have been very helpful for future pregnancies and clinical diagnosis. Report generation and statistical figures are difficult to generate with the manual based system. Data errors, security, and privacy are another problems associated with the manual system. In this paper, the antenatal and postnatal services were incorporated into the Hospital Management System of Usmanu Danfodiyo University, Sokoto with a view to reducing the issues and inconsistencies encountered with the manual procedure. Dreamweaver, PHP, CSS, JavaScript, Ajax, HTML and MySQL are the technological tools used to automate the incorporated antenatal and postnatal services in the system. The usefulness of the proposed system was evaluated using the System Usability Scale (SUS) questionnaire and some clinical users. The experimental evaluation shows that the developed system is beneficial to the clinic and the general public based on the result obtained in this study. The results also demonstrated that the developed system can fit into the antenatal and postnatal routine of many hospitals with little or no modification.
{"title":"Integrating Antenatal and Postnatal Pregnancy Services to Hospital Management System","authors":"Yusuf Mohammed Danlami, Abba Almu, Hassan Mairoh, Mohammed Kabiru Hamza","doi":"10.22178/39-3","DOIUrl":"https://doi.org/10.22178/39-3","url":null,"abstract":"Antenatal and postnatal processes and services is a component of Hospital Management Systems that has been given very little attention. Most healthcare institution carries out the antenatal and postnatal processes manually and keeps records of the whole processes on paper. In most cases in most hospital, records kept on paper and files get missing or misplaced leading to the loss of important records of clients which would have been very helpful for future pregnancies and clinical diagnosis. Report generation and statistical figures are difficult to generate with the manual based system. Data errors, security, and privacy are another problems associated with the manual system. In this paper, the antenatal and postnatal services were incorporated into the Hospital Management System of Usmanu Danfodiyo University, Sokoto with a view to reducing the issues and inconsistencies encountered with the manual procedure. Dreamweaver, PHP, CSS, JavaScript, Ajax, HTML and MySQL are the technological tools used to automate the incorporated antenatal and postnatal services in the system. The usefulness of the proposed system was evaluated using the System Usability Scale (SUS) questionnaire and some clinical users. The experimental evaluation shows that the developed system is beneficial to the clinic and the general public based on the result obtained in this study. The results also demonstrated that the developed system can fit into the antenatal and postnatal routine of many hospitals with little or no modification.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115336890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Relying on a comprehensive data set of news releases, we construct monthly firm-level news sentiment scores during the 2000–2016 period and document a news momentum phenomenon of stocks with more positive news in the past generating more positive news in the future. We propose three hypotheses to explain this phenomenon and find that news momentum is driven by the persistence of firms’ fundamentals rather than stale news or firms’ strategic disclosure. A trading strategy that combines a long position in a good news quintile portfolio with a short position in a bad news portfolio generates a 7.45% risk-adjusted return annually. This return anomaly appears on both news and non-news days. Overall, these findings suggest that the cross-sectional prediction of news is not fully incorporated into the stock price by investors.
{"title":"The Momentum of News","authors":"Y. Wang, Bohui Zhang, Xiaoneng Zhu","doi":"10.2139/ssrn.3267337","DOIUrl":"https://doi.org/10.2139/ssrn.3267337","url":null,"abstract":"Relying on a comprehensive data set of news releases, we construct monthly firm-level news sentiment scores during the 2000–2016 period and document a news momentum phenomenon of stocks with more positive news in the past generating more positive news in the future. We propose three hypotheses to explain this phenomenon and find that news momentum is driven by the persistence of firms’ fundamentals rather than stale news or firms’ strategic disclosure. A trading strategy that combines a long position in a good news quintile portfolio with a short position in a bad news portfolio generates a 7.45% risk-adjusted return annually. This return anomaly appears on both news and non-news days. Overall, these findings suggest that the cross-sectional prediction of news is not fully incorporated into the stock price by investors.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129402948","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-10-01DOI: 10.33166/AETIC.2018.04.003
Ahmed S. Abu Daia, R. Ramadan, M. Fayek
Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without physical guarding duty. That makes the network susceptible to physical attacks. The communication nature between sensor nodes is another reason, where intruders can easily send/receive information if they are located in the network communication range. In this paper, most of the possible WSN attacks are discussed, different security services expected in WSN are explained, and trust-based solutions proposed in the literature are listed. Moreover, the state-of-the-art of the attacks’ mitigation and avoidance techniques are presented. Besides, this paper is enriched with a new classification of the WSNs attacks regarding attacks’ characteristics. It will be beneficial to researchers in the field of WSNs security if they can distinguish between different attacks that have common characteristics.
{"title":"Sensor Networks Attacks Classifications and Mitigation","authors":"Ahmed S. Abu Daia, R. Ramadan, M. Fayek","doi":"10.33166/AETIC.2018.04.003","DOIUrl":"https://doi.org/10.33166/AETIC.2018.04.003","url":null,"abstract":"Wireless Sensor Networks (WSNs) are exposed to many security attacks, and it can be easily compromised. One of the main reasons for these vulnerabilities is the deployment nature, where sensor nodes are deployed without physical guarding duty. That makes the network susceptible to physical attacks. The communication nature between sensor nodes is another reason, where intruders can easily send/receive information if they are located in the network communication range. In this paper, most of the possible WSN attacks are discussed, different security services expected in WSN are explained, and trust-based solutions proposed in the literature are listed. Moreover, the state-of-the-art of the attacks’ mitigation and avoidance techniques are presented. Besides, this paper is enriched with a new classification of the WSNs attacks regarding attacks’ characteristics. It will be beneficial to researchers in the field of WSNs security if they can distinguish between different attacks that have common characteristics.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130023634","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Open software projects are usually portrayed by focusing on charismatic leaders, friendly communities, and meritocratic language. We dig under the surface of this stereotypical picture and analyse the social relationships of the people involved; specifically, whether they are related through personal proximity or they are distant social partners. We contribute to the literature on free/open source innovation in three ways. First, we highlight the continuum of roles played by individual leaders in the open source project, as brokers and/or initiators. Second, we delve deeper in the social networks of the Videolan software community to layout where and how leaders are organised in groups and play the role of brokers and initiators. We study leadership emergence over time by taking into account the context of activities. Finally, we produce a typology of three Videolan communities with specific social networks that evolved over time in terms of leaders and social structure.
{"title":"Personal and Social Proximity: Shaping Leadership in a Free Software Project","authors":"Clément Bert-Erboul, Nicholas S. Vonortas","doi":"10.2139/ssrn.3251327","DOIUrl":"https://doi.org/10.2139/ssrn.3251327","url":null,"abstract":"Open software projects are usually portrayed by focusing on charismatic leaders, friendly communities, and meritocratic language. We dig under the surface of this stereotypical picture and analyse the social relationships of the people involved; specifically, whether they are related through personal proximity or they are distant social partners. We contribute to the literature on free/open source innovation in three ways. First, we highlight the continuum of roles played by individual leaders in the open source project, as brokers and/or initiators. Second, we delve deeper in the social networks of the Videolan software community to layout where and how leaders are organised in groups and play the role of brokers and initiators. We study leadership emergence over time by taking into account the context of activities. Finally, we produce a typology of three Videolan communities with specific social networks that evolved over time in terms of leaders and social structure.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-09-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132365692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}