5,615 research outputs found

    The Technology Structure and Appropriation of Server-Based Computing: A Case Study of a Taiwanese High Tech Firm

    Get PDF
    IT usage is key issue in MIS research. However, a variety of models such as Technology Acceptance Model (TAM) have neglected the role of technology structure in studying IT usage. Alternatively, IT appropriation considers how IT is called into use in terms of IT technology structures. However, the practices of IT appropriation have not yet been convincingly demonstrated. This paper explores the issues of IT appropriation. Specifically, we conduct our study in the context of Server-Based Computing (SBC), due to its unique technology structures, where the issues of appropriation process of SBC becomes relevant and important. In this paper, the Adaptive Structuration Theory (AST) provides a conceptual framework that helps to capture the appropriation process. Drawing on a Taiwanese case study, three perspectives of SBC appropriation process are examined including the faithfulness of appropriation, the attitudes toward use, and the consensus on appropriation. The case findings suggest that incremental change, identity development and interaction are of critical importance in the SBC appropriation process. Our findings contribute to the literature on IT infrastructure deployment, innovation and cooperative behavior, and the social perspective of information management. The implications and future research directions are also discussed

    The Trajectory Analysis of Bevel Planetary Gear Trains

    Get PDF
    Introduction In the theory of Kinematics of Mechanisms, trajectories generated by planetary gear trains form an important family of curves, known as Epitrochoids or Hypotrochoids, depending on whether the gearing is external or internal In this paper, the geometry of trajectories generated by a tracer point on the planet of bevel planetary gear trains is studied. This study serves as a precursor to the workspace analysis of a new class of gear-coupled, three DOF (Degrees Of Freedom), four-jointed wrist mechanisms. Before further discussion, it is helpful to review briefly the trajectories generated by a spur planetary gear train because of the analogy between them

    Ergonomic principles and techniques in facilitating advanced laparoendoscopic single site (LESS) urinary tract reconstruction with conventional laparoscopic instruments

    Get PDF
    Background/PurposeThe technical and ergonomic details of laparoendoscopic single site (LESS) reconstruction have not been reported. In this study, we explored the feasibility and safety of performing advanced LESS upper urinary tract reconstruction with conventional laparoscopic instruments.MethodsBetween September 2010 and March 2011, we retrospectively reviewed prospectively collected data from five patients who underwent LESS urinary tract reconstruction. The LESS reconstruction included pyeloureterostomy (N = 1), dismembered pyeloplasty (N = 2), ureteroneocystostomy (N = 1), and ureteroplasty for bifid blind ending ureter (N = 1). The perioperative and postoperative parameters were collected for analysis. The ergonomic principles and techniques are detailed.ResultsAll reconstructive LESS procedures were completed successfully without open conversion or laparoscopic conversion. Ancillary ports or ancillary instruments were not applied in any of the patients. The mean patient age was 40.4 years. The mean operative time was 213 ± 69 minutes, the estimated blood loss ranged from minimal to 50 mL, and the mean hospital stay was 4.4 ± 4 days. No operation-related complication occurred.ConclusionBased on our ergonomic principles and suturing/knotting techniques, conventional laparoscopic instruments are feasible and safe for LESS urinary reconstructive procedures

    Human parvovirus B19 nonstructural protein NS1 enhanced the expression of cleavage of 70 kDa U1-snRNP autoantigen

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Human parvovirus B19 (B19) is known to induce apoptosis that has been associated with a variety of autoimmune disorders. Although we have previously reported that B19 non-structural protein (NS1) induces mitochondrial-dependent apoptosis in COS-7 cells, the precise mechanism of B19-NS1 in developing autoimmunity is still obscure.</p> <p>Methods</p> <p>To further examine the effect of B19-NS1 in presence of autoantigens, COS-7 cells were transfected with pEGFP, pEGFP-B19-NS1 and pEGFP-NS1K334E, a mutant form of B19-NS1, and detected the expressions of autoantigens by various autoantibodies against Sm, U1 small nuclear ribonucleoprotein (U1-snRNP), SSA/Ro, SSB/La, Scl-70, Jo-1, Ku, and centromere protein (CENP) A/B by using Immunoblotting.</p> <p>Results</p> <p>Significantly increased apoptosis was detected in COS-7 cells transfected with pEGFP-B19-NS1 compared to those transfected with pEGFP. Meanwhile, the apoptotic 70 kDa U1-snRNP protein in COS-7 cells transfected with pEGFP-B19-NS1 is cleaved by caspase-3 and converted into a specific 40 kDa product, which were recognized by anti-U1-snRNP autoantibody. In contrast, significantly decreased apoptosis and cleaved 40 kDa product were observed in COS-7 cells transfected with pEGFP-NS1K334E compared to those transfected with pEGFP-B19-NS1.</p> <p>Conclusions</p> <p>These findings suggested crucial association of B19-NS1 in development of autoimmunity by inducing apoptosis and specific cleavage of 70 kDa U1-snRNP.</p

    Comments on Three Multi-Server Authentication Protocols

    Get PDF
    Recently, Tsai et al., Liao et al. and Li et al. each proposed a multi-server authentication protocol. They claimed their protocols are secure and can withstand various attacks. However, we found some security loopholes in each of their schemes, for example, both Tsai et al.’s and Liao et al.‘s schemes suffers from server spoofing attack by an insider server. Li et al.s’ suffers from the lost smart card password-guessing attack. In addition, Liao et al.‘s scheme also has the off-line password-guessing attack. In this paper, we will first review then show the attacks on each of the schemes. Then, based on Li et al.’s scheme, we proposed a novel one and examined its security in several security features. After security analysis, we concluded that our protocol outperformed Li et al.’s scheme in the security feature of lost smart card password-guessing attack. Keywords: multi-server, password authentication protoco

    Phylogenetics and Biogeography of the Phalaenopsis violacea (Orchidaceae) Species Complex Based on Nuclear and Plastid DNA

    Get PDF
    The Phalaenopsis violacea complex includes two species P violacea Witte and Phalaenopsis bellina (Rchb f) E A Christ However three forms of P violacea have been found in different areas including Sumatra the Malay Peninsula and Mentawai Island The phylogenetic tree inferred from the internal transcribed spacer (ITS) region of nuclear ribosomal DNA (nrDNA) the trnL intron and the atpB rbcL spacer of plastid DNA were used to clarify the phylogenetics and biogeography of the P violacea complex Analyses of the trnL intron sequences and of the atpB rbcL spacer did not allow for apparent discrimination among these three species of the P violacea complex Based on the phylogenetic tree inferred from th

    Smart Grid as a Service: A Discussion on Design Issues

    Get PDF
    Smart grid allows the integration of distributed renewable energy resources into the conventional electricity distribution power grid such that the goals of reduction in power cost and in environment pollution can be met through an intelligent and efficient matching between power generators and power loads. Currently, this rapidly developing infrastructure is not as “smart” as it should be because of the lack of a flexible, scalable, and adaptive structure. As a solution, this work proposes smart grid as a service (SGaaS), which not only allows a smart grid to be composed out of basic services, but also allows power users to choose between different services based on their own requirements. The two important issues of service-level agreements and composition of services are also addressed in this work. Finally, we give the details of how SGaaS can be implemented using a FIPA-compliant JADE multiagent system
    • 

    corecore