228 research outputs found

    Den nye engelske telefonbog

    Get PDF

    Danske telefonbøger

    Get PDF

    An Experimental Analysis of Nash Refinements in Signaling Games

    Get PDF
    This paper investigates the refinements of Nash equilibrium in two person signaling game experiments. The experimental games cover the watershed of the nested refinements: Bayes-Nash, Sequential, Intuitive, Divine, Universally Divine, NWBR, and Stabel. In each game an equilibrium selection problem is defined in which adjacent refinements are considered. The pattern of outcomes suggest that individuals select the more refined equilibria up to the divinity concept. However, an anomaly occurs in the game in which the stable equilibrium is a clear preference among the subjects. Since the concepts are nested this suggests that the outcomes are game specific. Sender behavior does not seem to follow any specific decision rule (e.g., Nash, minmax, PIR, etc.) while receiver actions tend to correspond to the Nash equilibrium outcomes

    Risky Behavior in Online Social Media: Protection Motivation and Social Influence

    Get PDF
    Online Social Media (OSM) websites have attracted millions of users by enabling them to socially interact in ways that were not possible before. While the explosion of OSM use has had many benefits, it also has a darker side where an individual\u27s personal information can potentially be misused. This study develops and tests an empirical model based on a theoretical lens provided by Protection Motivation Theory (PMT) to examine the salient factors that influence an individual\u27s perceptions of threat and their intention to use OSM websites. We investigate this model with a data set representing survey responses from 197 OSM users. Results suggest that rewards, which are largely overlooked in the IS PMT literature, are the primary influence in the perceived threat calculation in the OSM context. In addition, social influence was found to significantly influence behavioral intentions to share information on OSM websites

    Spot-on: Safe Fuel/Air Compression

    Get PDF
    The emission of fuel vapors into the atmosphere from underground storage tanks at filling stations is a common occurrence in many parts the world. The conditions of the vapor in the tanks vary significantly over a 24 hour period such that evaporation and excess air ingestion during the refueling process can cause tank over pressurization and subsequent emissions. At other times during a 24 hour cycle, pressures can fall below atmospheric pressure. The state of California has recognized this emissions problem and has enacted regulations to address it. Due to these low-emission environmental requirements in California, solutions must be implemented that do not entail release of these vapors into the atmosphere. One solution requires that the vapors fill a balloon during the appropriate times. However, the size of the balloon at typical inflation rates requires a significant amount of physical space (approximately 1000-2000 liters), which may not necessarily be available at filling stations in urban areas. Veeder-Root has a patent pending for a system to compress the vapors that are released to a 10:1 ratio, store this compressed vapor in a small storage tank, and then return the vapors to the original underground fuel tank when the conditions are thermodynamically appropriate (see Figure 1 for the schematic representation of this system). The limitation of the compressor, however, is that the compression phase must take place below the ignition temperature of the vapor. For a 10:1 compression ratio, however, the adiabatic temperature rise of a vapor would be above the ignition temperature. Mathematical modeling is necessary here to estimate the performance of the compressor, and to suggest paths in design for improvement. This report starts with a mathematical formulation of an ideal compressor, and uses the anticipated geometry of the compressor to state a simplified set of partial differential equations. The adiabatic case is then considered, assuming that the temporary storage tank is kept at a constant temperature. Next, the heat transfer from the compression chamber through the compressor walls is incorporated into the model. Finally, we consider the case near the valve wall, which is subject to the maximum temperature rise over the estimated 10,000 cycles that will be necessary for the process to occur. We find that for adiabatic conditions, there is a hot spot close to the wall where the vapor temperature can exceed the wall temperature. Lastly, we discuss the implications of our analysis, and its limitations

    Raising the D-dimer threshold for ruling out pulmonary embolism: A single-site, observational study with a historical comparison

    Get PDF
    Objective: The objective of this study was to assess the impact of introduction of a new pulmonary embolism (PE) diagnostic guideline with a raised D-dimer threshold. Methods: This is a single-site, observational, cohort study with a historical comparison. The new guideline raised the D-dimer threshold to 1000 ng/mL for most patients with a Wells' score of 4 or less. Patients investigated for PE with a D-dimer level and/or definitive imaging in 6-month periods before and after the introduction of the guideline were eligible. Patients with D-dimers of 500–1000 ng/mL were prospectively followed up at 3 months for missed PE. Results: During the pre-intervention period, 688 patients were investigated for PE, 366 (53.2%) received definitive imaging and 39 PE were diagnosed (5.7% overall, 10.7% of those imaged). For the 121 patients with D-dimers ≥500 and <1000 ng/mL, 87 (71.9%) were imaged with 7 (5.8%) having a PE diagnosed. Post intervention there were 930 patients, of which 426 (45.8%) received definitive chest imaging and there were 50 patients with PE diagnosed (5.4% overall, 11.7% of those imaged). For the 185 patients with D-dimers ≥500 and <1000 ng/mL, 60 (32.4%) were imaged with 5 (2.7%) having PE diagnosed. No cases of missed PE were identified at 3 months. Conclusion: The introduction of the new guideline was associated with a reduction in overall imaging rates without evidence of missed PE. Further evaluation in other settings is recommended

    Crater population and resurfacing of the Martian north polar layered deposits

    Get PDF
    Present-day accumulation in the north polar layered deposits (NPLD) is thought to occur via deposition on the north polar residual cap. Understanding current mass balance in relation to current climate would provide insight into the climatic record of the NPLD. To constrain processes and rates of NPLD resurfacing, a search for craters was conducted using images from the Mars Reconnaissance Orbiter Context Camera. One hundred thirty craters have been identified on the NPLD, 95 of which are located within a region defined to represent recent accumulation. High Resolution Imaging Science Experiment images of craters in this region reveal a morphological sequence of crater degradation that provides a qualitative understanding of processes involved in crater removal. A classification system for these craters was developed based on the amount of apparent degradation and infilling and where possible depth/diameter ratios were determined. The temporal and spatial distribution of crater degradation is interpreted to be close to uniform. Through comparison of the size-frequency distribution of these craters with the expected production function, the craters are interpreted to be an equilibrium population with a crater of diameter D meters having a lifetime of ~30.75D^(1.14) years. Accumulation rates within these craters are estimated at 7.2D^(−0.14) mm/yr, which corresponds to values of ~3–4 mm/yr and are much higher than rates thought to apply to the surrounding flat terrain. The current crater population is estimated to have accumulated in the last ~20 kyr or less

    Design and delivery of an online information systems management course for MBA programs

    Get PDF
    Aim/Purpose In this paper, we present our experience in design and delivery of a graduate Information Systems Management (ISM) course in an online MBA program. Also presented are a detailed examination of the design and delivery of the online course, survey results of students\u27 perceptions and backgrounds, course evaluation results, best practices and lessons learned, and potential changes and future actions. Background This graduate ISM course needs to not only cover a broad range of dynamic technology and business topics, but also strike a balance between the width and depth of the content. Effective course design and delivery are critical to improved teaching and learning, especially when the course is delivered online. Methodology We provided a comprehensive review of the related literature to develop guidelines for the design and delivery of our ISM course; we collected survey data to evaluate the students\u27 backgrounds and their perceptions of the course; we used data analysis and content analysis methods to assess the course evaluation results. Contribution A review of the related literature indicates that IS researchers and educators have not adequately studied online graduate education. Given the importance of the graduate ISM course in most MBA programs, and the lack of attention from the IS community, it is critical to address this gap in the research. We believe we have done so with this paper. Findings The paper\u27s major findings are embedded in a detailed examination of the de-sign and delivery of the online course, survey results of students\u27 perceptions and backgrounds, course evaluation results, best practices and lessons learned, and potential changes and future actions. Recommendations for Practitioners Even though our experience may not be fully applicable to other institutions, we hope our IS colleagues can learn from the design and delivery of this online course, as well as our best practices and lessons learned to improve the teaching and learning effectiveness in IS online graduate education, in general. Furthermore, we provide instructors with an actionable framework onto which they can map their current course offering, and compare their current pedagogical offering to literature driven best practices for ISM courses, in particular. Recommendations for Researchers It is our hope that the design and delivery of this online course, and our best practices and lessons learned can inspire our IS colleagues to search for innovative ways to improve the teaching and learning effectiveness in IS online graduate education. In addition, we distill a literature driven framework for ISM courses design and delivery that can help researchers frame their pedagogical research questions. Impact on Society The online course in this study prepares students for more efficiently and ef-fectively delivering IT systems in organizations. Many MBA students work for non-profits and other socially-focused organizations and are able to use the skills learned in the course for the betterment of society. Future Research We will continue to monitor the impact of the changes on student learning effectiveness and attempt to identify additional innovative ways to improve the design and delivery of this online ISM course

    The VPS4 component of the ESCRT machinery plays an essential role in HPV infectious entry and capsid disassembly.

    Get PDF
    Human Papillomavirus (HPV) infection involves multiple steps, from cell attachment, through endocytic trafficking towards the trans-Golgi network, and, ultimately, the entry into the nucleus during mitosis. An essential viral protein in infectious entry is the minor capsid protein L2, which engages different components of the endocytic sorting machinery during this process. The ESCRT machinery is one such component that seems to play an important role in the early stages of infection. Here we have analysed the role of specific ESCRT components in HPV infection, and we find an essential role for VPS4. Loss of VPS4 blocks infection with multiple PV types, suggesting an evolutionarily conserved critical step in infectious entry. Intriguingly, both L1 and L2 can interact with VPS4, and appear to be in complex with VPS4 during the early stages of virus infection. By using cell lines stably expressing a dominant-negative mutant form of VPS4, we also show that loss of VPS4 ATPase activity results in a marked delay in capsid uncoating, resulting in a defect in the endocytic transport of incoming PsVs. These results demonstrate that the ESCRT machinery, and in particular VPS4, plays a critical role in the early stages of PV infection

    Stochastic modeling, analysis and verification of mission-critical systems and processes

    Get PDF
    Software and business processes used in mission-critical defence applications are often characterised by stochastic behaviour. The causes for this behaviour range from unanticipated environmental changes and built-in random delays to component and communication protocol unreliability. This paper overviews the use of a stochastic modelling and analysis technique called quantitative verication to establish whether mission-critical software and business processes meet their reliability, performance and other quality-of-service requirements
    corecore