7,653 research outputs found
Local Hall effect in hybrid ferromagnetic/semiconductor devices
We have investigated the magnetoresistance of ferromagnet-semiconductor
devices in an InAs two-dimensional electron gas system in which the magnetic
field has a sinusoidal profile. The magnetoresistance of our device is large.
The longitudinal resistance has an additional contribution which is odd in
applied magnetic field. It becomes even negative at low temperature where the
transport is ballistic. Based on the numerical analysis, we confirmed that our
data can be explained in terms of the local Hall effect due to the profile of
negative and positive field regions. This device may be useful for future
spintronic applications.Comment: 4 pages with 4 fugures. Accepted for publication in Applied Physics
Letter
Constraints for electron-capture decays mimicking production of axion-like particles in nuclei
We give for the first time, theoretical estimates of
ground-state-to-ground-state (GS-to-GS) electron-capture (EC) branch decay
rates of Ti, Co, and Ce. The nuclear-structure
calculations have been done exploiting the nuclear shell model (NSM) with
well-established Hamiltonians and an advanced theory of decay. In the
absence of experimental measurements of these GS-to-GS branches, these
estimates are of utmost importance for terrestrial searches of axion-like
particles (ALPs). Predictions are made for EC-decay rates of 2-forbidden
unique (FU) and 2-forbidden non-unique (FNU) EC transitions that can
potentially mimic nuclear axion production in experiments designed to detect
ALPs in nuclear environments
The Effect of Trust and its Antecedents on Robot Acceptance
As social and socially assistive robots are becoming more prevalent in our
society, it is beneficial to understand how people form first impressions of
them and eventually come to trust and accept them. This paper describes an
Amazon Mechanical Turk study (n = 239) that investigated trust and its
antecedents trustworthiness and first impressions. Participants evaluated the
social robot Pepper's warmth and competence as well as trustworthiness
characteristics ability, benevolence and integrity followed by their trust in
and intention to use the robot. Mediation analyses assessed to what degree
participants' first impressions affected their willingness to trust and use it.
Known constructs from user acceptance and trust research were introduced to
explain the pathways in which one perception predicted the next. Results showed
that trustworthiness and trust, in serial, mediated the relationship between
first impressions and behavioral intention.Comment: In SCRITA 2023 Workshop Proceedings (arXiv:2311.05401) held in
conjunction with 32nd IEEE International Conference on Robot & Human
Interactive Communication, 28/08 - 31/08 2023, Busan (Korea
Teaching Tip: What You Need to Know about Gamification Process of Cybersecurity Hands-on Lab Exercises: Lessons and Challenges
Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on training to engage and motivate cybersecurity students, especially beginner learners. Given the dearth of guiding examples, this paper aims to describe the holistic process of converting traditional cybersecurity hands-on lab exercises to gamified lab exercises in an undergraduate network security course. We find that the gamified cybersecurity lab promotes students’ engagement, learning experience, and learning outcomes. The results show the positive acceptance of gamification by students as well as instructors. While gamification has been used in competitions and training, the success in the classroom and students’ desire for more gamification show that further investment in gamification will be more important in the classroom. We expect this paper to help instructors who are interested in gamification 1) convert traditional lab exercises to gamified labs; 2) estimate the extra workload and potential benefits; and 3) plan resources for implementation. This process is applicable to any cybersecurity courses with hands-on assignments
THE INFLUENCE OF SOCIAL PRESENCE ON EVALUATING PERSONALIZED RECOMMENDER SYSTEMS
Providing recommendations is acknowledged as an important feature of a business-to-consumer online storefront. Although many studies have been conducted the algorithms and operational procedures relating to personalized recommender systems, empirical evidence demonstrating relationships between social presence and two important outcomes of evaluating recommender systems, reuse intention and trust, remains lacking. To test the existence of a causal link between social presence and reuse intention, and the mediating role of trust between these two variables, this study conducted experiments varying the levels of social presence while providing personalized recommendations to users based on their explicit preferences. This study also compared these effects in two different product contexts: hedonic and utilitarian products. Interactions of social presence and customer reviews were also investigated in these experiments. The results show that higher social presence increases both reuse intention and trust in recommender systems. In addition, the influence of social presence on reuse intention in the context of recommending utilitarian products is less than that in the context of recommending hedonic products
- …