542 research outputs found

    Love motels : oriental phenomenon or emergent sector?

    Get PDF
    This study explores the 'Love Motel' concept by examining the changing attitude of consumers in Taiwan. This will increase knowledge of the sector and define love motels. The literature review charts the development of Taiwanese love motels from a duel origin; American Motels and Japanese 'Love Hotels.' This is followed by an empirical qualitative study consisting of a two-stage collection strategy: focus groups of hospitality and tourism professionals to gather a wide range of opinions on the subject area followed by semi-structured interviews with consumers. The findings split into three interrelated areas: growth of Taiwanese love motels due to more liberal attitudes towards sexual practice; a change in the public perception of motels due to increased standards and an increased satisfaction with the personal consumption experience; these hotels are designed for couples. The empirical element of this study is an exploration of consumer experience in Taiwanese love hotels. Due to the sensitive nature of some of the data that was gathered a qualitative approach has been adopted. The sexual associations with this product appear almost coincidental. If the love motel product is considered in its purest form it is simply a hotel product that provides complete anonymity for its guests. Therefore, despite its application in South East Asia, this hospitality concept has potential to be applied in a variety of guises. The phenomenon of 'Love Hotels' is absent from hospitality management literature; this paper begins to fill that gap by beginning a discussion on this possibly controversial sector

    Neuronal activation for semantically reversible sentences

    Get PDF
    Semantically reversible sentences are prone to misinterpretation and take longer for typically developing children and adults to comprehend; they are also particularly problematic for those with language difficulties such as aphasia or Specific Language Impairment. In our study, we used fMRI to compare the processing of semantically reversible and nonreversible sentences in 41 healthy participants to identify how semantic reversibility influences neuronal activation. By including several linguistic and nonlinguistic conditions within our paradigm, we were also able to test whether the processing of semantically reversible sentences places additional load on sentence-specific processing, such as syntactic processing and syntactic-semantic integration, or on phonological working memory. Our results identified increased activation for reversible sentences in a region on the left temporal–parietal boundary, which was also activated when the same group of participants carried out an articulation task which involved saying “one, three” repeatedly. We conclude that the processing of semantically reversible sentences places additional demands on the subarticulation component of phonological working memory

    At risk of being risky: The relationship between "brain age" under emotional states and risk preference.

    Get PDF
    Developmental differences regarding decision making are often reported in the absence of emotional stimuli and without context, failing to explain why some individuals are more likely to have a greater inclination toward risk. The current study (N=212; 10-25y) examined the influence of emotional context on underlying functional brain connectivity over development and its impact on risk preference. Using functional imaging data in a neutral brain-state we first identify the "brain age" of a given individual then validate it with an independent measure of cortical thickness. We then show, on average, that "brain age" across the group during the teen years has the propensity to look younger in emotional contexts. Further, we show this phenotype (i.e. a younger brain age in emotional contexts) relates to a group mean difference in risk perception - a pattern exemplified greatest in young-adults (ages 18-21). The results are suggestive of a specified functional brain phenotype that relates to being at "risk to be risky.

    Security Theorems via Model Theory

    Full text link
    A model-theoretic approach can establish security theorems for cryptographic protocols. Formulas expressing authentication and non-disclosure properties of protocols have a special form. They are quantified implications for all xs . (phi implies for some ys . psi). Models (interpretations) for these formulas are *skeletons*, partially ordered structures consisting of a number of local protocol behaviors. Realized skeletons contain enough local sessions to explain all the behavior, when combined with some possible adversary behaviors. We show two results. (1) If phi is the antecedent of a security goal, then there is a skeleton A_phi such that, for every skeleton B, phi is satisfied in B iff there is a homomorphism from A_phi to B. (2) A protocol enforces for all xs . (phi implies for some ys . psi) iff every realized homomorphic image of A_phi satisfies psi. Hence, to verify a security goal, one can use the Cryptographic Protocol Shapes Analyzer CPSA (TACAS, 2007) to identify minimal realized skeletons, or "shapes," that are homomorphic images of A_phi. If psi holds in each of these shapes, then the goal holds

    Representing First-Order Logic Using Graphs

    Get PDF
    Abstract. We show how edge-labelled graphs can be used to represent first-order logic formulae. This gives rise to recursively nested structures, in which each level of nesting corresponds to the negation of a set of existentials. The model is a direct generalisation of the negative application conditions used in graph rewriting, which count a single level of nesting and are thereby shown to correspond to the fragment ∃¬∃ of first-order logic. Vice versa, this generalisation may be used to strengthen the notion of application conditions. We then proceed to show how these nested models may be flattened to (sets of) plain graphs, by allowing some structure on the labels. The resulting formulae-as-graphs may form the basis of a unification of the theories of graph transformation and predicate transformation

    A Partial-Closure Canonicity Test to Increase the Efficiency of CbO-Type Algorithms

    Get PDF
    Computing formal concepts is a fundamental part of Formal Concept Analysis and the design of increasingly efficient algorithms to carry out this task is a continuing strand of FCA research. Most approaches suffer from the repeated computation of the same formal concepts and, initially, algorithms concentrated on efficient searches through already computed results to detect these repeats, until the so-called canonicity test was introduced. The canonicity test meant that it was sufficient to examine the attributes of a computed concept to determine its newness: searching through previously computed concepts was no longer necessary. The employment of this test in Close-by-One type algorithms has proved to be highly effective. The typical CbO approach is to compute a concept and then test its canonicity. This paper describes a more efficient approach, whereby a concept need only be partially computed in order to carry out the test. Only if it passes the test does the computation of the concept need to be completed. This paper presents this ‘partial-closure’ canonicity test in the In-Close algorithm and compares it to a traditional CbO algorithm to demonstrate the increase in efficiency

    Knowledge formalization in experience feedback processes : an ontology-based approach

    Get PDF
    Because of the current trend of integration and interoperability of industrial systems, their size and complexity continue to grow making it more difficult to analyze, to understand and to solve the problems that happen in their organizations. Continuous improvement methodologies are powerful tools in order to understand and to solve problems, to control the effects of changes and finally to capitalize knowledge about changes and improvements. These tools involve suitably represent knowledge relating to the concerned system. Consequently, knowledge management (KM) is an increasingly important source of competitive advantage for organizations. Particularly, the capitalization and sharing of knowledge resulting from experience feedback are elements which play an essential role in the continuous improvement of industrial activities. In this paper, the contribution deals with semantic interoperability and relates to the structuring and the formalization of an experience feedback (EF) process aiming at transforming information or understanding gained by experience into explicit knowledge. The reuse of such knowledge has proved to have significant impact on achieving themissions of companies. However, the means of describing the knowledge objects of an experience generally remain informal. Based on an experience feedback process model and conceptual graphs, this paper takes domain ontology as a framework for the clarification of explicit knowledge and know-how, the aim of which is to get lessons learned descriptions that are significant, correct and applicable

    HuR cytoplasmic expression is associated with increased cyclin A expression and poor outcome with upper urinary tract urothelial carcinoma

    Get PDF
    BACKGROUND: HuR is an RNA-binding protein that post-transcriptionally modulates the expressions of various target genes implicated in carcinogenesis, such as CCNA2 encoding cyclin A. No prior study attempted to evaluate the significance of HuR expression in a large cohort with upper urinary tract urothelial carcinomas (UTUCs). METHODS: In total, 340 cases of primary localized UTUC without previous or concordant bladder carcinoma were selected. All of these patients received ureterectomy or radical nephroureterectomy with curative intents. Pathological slides were reviewed, and clinical findings were collected. Immunostaining for HuR and cyclin A was performed and evaluated by using H-score. The results of cytoplasmic HuR and nuclear cyclin A expressions were correlated with disease-specific survival (DSS), metastasis-free survival (MeFS), urinary bladder recurrence-free survival (UBRFS), and various clinicopathological factors. RESULTS: HuR cytoplasmic expression was significantly related to the pT status, lymph node metastasis, a higher histological grade, the pattern of invasion, vascular and perineurial invasion, and cyclin A expression (p = 0.005). Importantly, HuR cytoplasmic expression was strongly associated with a worse DSS (p < 0.0001), MeFS (p < 0.0001), and UBRFS (p = 0.0370) in the univariate analysis, and the first two results remained independently predictive of adverse outcomes (p = 0.038, relative risk [RR] = 1.996 for DSS; p = 0.027, RR = 1.880 for MeFS). Cyclin A nuclear expression was associated with a poor DSS (p = 0.0035) and MeFS (p = 0.0015) in the univariate analysis but was not prognosticatory in the multivariate analyses. High-risk patients (pT3 or pT4 with/without nodal metastasis) with high HuR cytoplasmic expression had better DSS if adjuvant chemotherapy was performed (p = 0.015). CONCLUSIONS: HuR cytoplasmic expression was correlated with adverse phenotypes and cyclin A overexpression and also independently predictive of worse DSS and MeFS, suggesting its roles in tumorigenesis or carcinogenesis and potentiality as a prognostic marker of UTUC. High HuR cytoplasmic expression might identify patients more likely to be beneficial for adjuvant chemotherapy

    Educational Attainment at Age 10–11 Years Predicts Health Risk Behaviors and Injury Risk During Adolescence

    Get PDF
    Purpose: To examine the effect of educational attainment in primary school on later adolescent health. Methods: Education data attainments at age 7 and 11 were linked with (1) primary and secondary care injury consultation/admissions and (2) the Health Behaviour in School-aged Children survey. Cox regression was carried out to examine if attainment in primary school predicts time to injury in adolescence. Results: Pupils that achieve attainment at age 7 but not at age 11 (i.e., declining attainment over time in primary school) are more likely to have an injury during adolescence. These children are also more likely to self-report drinking in adolescence. Conclusions: Interventions aimed at children with declining attainment in primary school could help to improve adolescent health

    Methodology for a Comprehensive Health Impact Assessment in Water Supply and Sanitation Programmes for Brazil

    Get PDF
    Based on the broader concept of health proposed by the Pan-American Health Organization/World Health Organization (PAHO/ WHO), 2018, and the absence in the literature of indices that translate the causal relationship between sanitation and health, a methodology for assessing the health impact of a water and sanitation programmes, known as a Health Impact Assessment (HIA), was developed, specifically in the Brazilian context, and focused on a school in the northeast of the country. Through exploratory and descriptive evidence, and using documentary research as a method, a retrospective survey was carried out from 2000 to 2022 using documents proposing evaluation methodologies. A single document was found to fit the research objective, which was used to develop the proposed HIA methodology. Development of the methodology consisted of two stages: definition of the health dimensions and selection of the indicators making up each dimension. The HIA methodology was then applied to a school in northeast Brazil to test its use, before a water-efficient management intervention was going to be used. The overall score of 46% indicated that there was room for improvement, which the new management approach could facilitate. This methodology is therefore proposed to be an instrument for the evaluation of public water and sanitation policies, thus assisting managers in the decision-making process and in guiding sanitation programs and plans
    corecore