1,216 research outputs found

    A Study of MIS Scholar Community Development via a Collaboration Network Structures Analysis

    Get PDF
    The objective of this study is to apply collaborative networks to understanding the development process of the Management Information System (MIS) journals’ knowledge community. This research explores four phenomena: whether a co-author network depends on star collaborators, whether this network is a small world, the structural cohesion within the co-author network, and central scholars. We found that the MIS community has a small-world structure and high structural cohesion, so the MIS network is a dense cluster. Another finding was that a small number of researchers receive disproportionate recognition in MIS communities, indicating the presence of preferential attachment. This means that the MIS network contains clear star authors. Furthermore, we infer how a structural network affects knowledge diffusion and information diffusion. In addition, this study discusses changes in each journal’s central scholars to observe patterns of publication for each journal published by a private for-profit organization or sponsored by academic societies

    Out-Of-Band Management on UEFI System Firmware

    Get PDF
    The modern Redfish is a specification that utilize RESTful interface semantics to access data defined in model format to perform out-of-band (OOB) management through specific OOB software or hardware (such as Baseboard Management Controller, BMC). The OOB management allow users to configure system remotely when the system is in either power-off or power-on state. Industry can expect there are more and more pre-boot firmware drivers (like UEFI drivers) and system peripherals (such as PCI devices, PCI add-on-card and so on) support Redfish Schema/Configuration data model in the near future. This article describes the method to abstract the data communication/synchronization between UEFI drivers and OOB management on UEFI firmware environment. Furthermore, this article is not only restricted to single OOB management on system, the abstracts method described in this article is flexible and extensible to support multiple OOB management instances on one system simultaneously. Not only Redfish OOB management data model is supported, this article fulfills the requirements of any other data model of OOB managements such as OData XML/JSON data model, CIM-XML data model, 3rd party data model and etc

    EFFECTS OF WHOLE BODY VIBRATION TRAINING ON KNEE EXTENSOR MUSCLE STRENGTH AND RATE OF FORCE DEVELOPMENT

    Get PDF
    This study compared the effects of 8-week whole-body vibration (WBV) training programs on knee extensor muscle strength and rate of force development. Twenty physically active male subjects were randomly assigned to a whole-body vibration training group (WBV; n =10) or a sham training group (SHAM; n = 10). Maximal voluntary isometric joint moment, rate of force development (RFD) and contractile impulse of the knee extensors were assessed before and after the training period. There were significant differences between WBV and sham groups on improvement percentage of maximum joint moment, RFD and contractile impulse in knee extensor. We concluded that not only knee extensor muscle strength could be enhanced but also muscle contractile abilty could be faster after a 8-week WBV training program

    A Geometrically Constrained Point Matching based on View-invariant Cross-ratios, and Homography

    Full text link
    In computer vision, finding point correspondence among images plays an important role in many applications, such as image stitching, image retrieval, visual localization, etc. Most of the research worksfocus on the matching of local feature before a sampling method is employed, such as RANSAC, to verify initial matching results via repeated fitting of certain global transformation among the images. However, incorrect matches may still exist, while careful examination of such problems is often skipped. Accordingly, a geometrically constrained algorithm is proposed in this work to verify the correctness of initially matched SIFT keypoints based on view-invariant cross-ratios (CRs). By randomly forming pentagons from these keypoints and matching their shape and location among images with CRs, robust planar region estimation can be achieved efficiently for the above verification, while correct and incorrect matches of keypoints can be examined easily with respect to those shape and location matched pentagons. Experimental results show that satisfactory results can be obtained for various scenes with single as well as multiple planar regions

    Antidepressant-Like Activity of the Ethanolic Extract from Uncaria lanosa Wallich var. appendiculata Ridsd in the Forced Swimming Test and in the Tail Suspension Test in Mice

    Get PDF
    This study investigated the antidepressant activity of ethanolic extract of U. lanosa Wallich var. appendiculata Ridsd (ULEtOH) for two-weeks administrations by using FST and TST on mice. In order to understand the probable mechanism of antidepressant-like activity of ULEtOH in FST and TST, the researchers measured the levels of monoamines and monoamine oxidase activities in mice brain, and combined the antidepressant drugs (fluoxetine, imipramine, maprotiline, clorgyline, bupropion and ketanserin). Lastly, the researchers analyzed the content of RHY in the ULEtOH. The results showed that ULEtOH exhibited antidepressant-like activity in FST and TST in mice. ULEtOH increased the levels of 5-HT and 5-HIAA in cortex, striatum, hippocampus, and hypothalamus, the levels of NE and MHPG in cortex and hippocampus, the level of NE in striatum, and the level of DOPAC in striatum. Two-week injection of IMI, CLO, FLU and KET enhanced the antidepressant-like activity of ULEtOH. ULEtOH inhibited the activity of MAO-A. The amount of RHY in ULEtOH was 17.12 mg/g extract. Our findings support the view that ULEtOH exerts antidepressant-like activity. The antidepressant-like mechanism of ULEtOH may be related to the increase in monoamines levels in the hippocampus, cortex, striatum, and hypothalamus of mice

    Efficient (k, n) : threshold secret sharing method with cheater prevention for QR code application

    Get PDF
    To protect secret message, secret sharing technique divides it into n shares and distributes them to n involved participants. However, it is hardly to prevent a dishonest participant to cheat other by providing a fake share. To overcome this weakness, this paper presents an efficient (k, n)-threshold secret sharing approach with the functionality of cheater identification using meaningful QR codes. The secret message would be split into k pieces, and used as the coefficients of polynomial function to generate n shares. These shares would be concealed into cover QR codes based on its fault tolerance to generate meaningful QR code shares. The meaningful QR code shares are helpful to reduce the curiosity of unrelated persons when transmitted in public channel. The legitimacy of QR code share would be verified before secret reconstruction to prevent cheater in secret revealing procedure. Some experiments were done to evaluate the performance of the proposed scheme. The experimental results show that the proposed scheme is efficient, highly secure and highly robust, and it also achieves a higher embedding capacity compared to previous methods
    corecore