2,777 research outputs found
A Systems Approach to Institutional Diffusion in Taiwan’s Food Traceability System
A food traceability system is an institution that aims to reduce information asymmetry among producers, retailers, and consumers through public disclosure of information about the origin, production, and sales of agriproducts. System effectiveness depends on the changes that result from diffusion. In this study, we use Taiwan’s traceable agricultural products system to integrate mental models of multiple stakeholders to simulate interactions among institutional quality, adopter profitability, profit distribution, and institutional diffusion from a system dynamics perspective. It thus provides a framework for institutional diffusion and change and elucidates the process of institutional diffusion for the causal relations among many critical factors
Revisiting the problem of audio-based hit song prediction using convolutional neural networks
Being able to predict whether a song can be a hit has impor- tant
applications in the music industry. Although it is true that the popularity of
a song can be greatly affected by exter- nal factors such as social and
commercial influences, to which degree audio features computed from musical
signals (whom we regard as internal factors) can predict song popularity is an
interesting research question on its own. Motivated by the recent success of
deep learning techniques, we attempt to ex- tend previous work on hit song
prediction by jointly learning the audio features and prediction models using
deep learning. Specifically, we experiment with a convolutional neural net-
work model that takes the primitive mel-spectrogram as the input for feature
learning, a more advanced JYnet model that uses an external song dataset for
supervised pre-training and auto-tagging, and the combination of these two
models. We also consider the inception model to characterize audio infor-
mation in different scales. Our experiments suggest that deep structures are
indeed more accurate than shallow structures in predicting the popularity of
either Chinese or Western Pop songs in Taiwan. We also use the tags predicted
by JYnet to gain insights into the result of different models.Comment: To appear in the proceedings of 2017 IEEE International Conference on
Acoustics, Speech and Signal Processing (ICASSP
Page Curve of Effective Hawking Radiation
We study the generalized entanglement entropy in the higher dimensional
two-sided eternal black hole by double holography. By introducing an
end-of-the-world ETW brane, which defines the time-dependent effective Hawking
radiation region, we find a new type of Ryu-Takayanagi surface besides the
Hartman-Maldacena surface and the island Ryu-Takayanagi surface known
previously. We study the phase transition among the three Ryu-Takayanagi
surfaces at different temperatures and obtain the phase diagram as well as the
Page curve.Comment: Definitions and descriptions were clarified in sections 2.4 and 3.2,
modified some diagrams and added more for clarification, added more detailed
calculations in section 3.2, corrected some minor typo
A Novel Approach for Data Encryption Depending on User Location
The wide spread of WLAN and the popularity of mobile devices increases the frequency of data transmission between information system and mobile user. However, most of the data encryption technology is location-independent. An encrypted data can be decrypted anywhere. The encryption technology cannot restrict the location of data decryption. In order to meet the demand of data transmission in the future, a location-dependent approach, called location-dependent data encryption algorithm (LDEA), is proposed in this paper. A target latitude/longitude coordinate is determined firstly. The coordinate is incorporated with a random key for data encryption. The receiver can only decrypt the ciphertext when the coordinate acquired from GPS receiver match with the target coordinate. However, current GPS receiver is inaccuracy and inconsistent. The location of a mobile user is difficult to exactly match with the target coordinate. A toleration distance (TD) is also designed in LDEA to increase its practicality. The security analysis shows that the probability to break LDEA is almost impossible since the length of the random key is adjustable. A prototype is also implemented for experimental study. The results show that the ciphertext can only be decrypted under the restriction of TD. It illustrates that LDEA is effective and practical for data transmission to mobile users
- …