5,909 research outputs found

    Software Piracy and Ethical Decision Making Behavior of Chinese Consumers

    Get PDF
    China has one of the highest software piracy rate in the world. It is important to understand consumers' ethical response to software piracy in the Chinese markets and design effective preventive strategies. This paper proposes a conceptual framework for an understanding of consumer ethical decision making. In the proposed framework, the transformation from legal problem recognition to ethical problem recognition is added to the traditional research framework and viewed as the first and most important step in consumer ethical decision making in regards to software piracy. The effects of two culture-related constructs— assumption of responsibility and attitude towards copyright laws on consumer ethical decision making— are examined and two propositions are made. The influence of Chinese culture and history on consumer ethical decision making is discussed. This paper contributes to our understanding of consumer ethical decision making in software piracy and provides new and constructive interpretations of the cultural influence

    Threshold for the Outbreak of Cascading Failures in Degree-degree Uncorrelated Networks

    Get PDF
    In complex networks, the failure of one or very few nodes may cause cascading failures. When this dynamical process stops in steady state, the size of the giant component formed by remaining un-failed nodes can be used to measure the severity of cascading failures, which is critically important for estimating the robustness of networks. In this paper, we provide a cascade of overload failure model with local load sharing mechanism, and then explore the threshold of node capacity when the large-scale cascading failures happen and un-failed nodes in steady state cannot connect to each other to form a large connected sub-network. We get the theoretical derivation of this threshold in degree-degree uncorrelated networks, and validate the effectiveness of this method in simulation. This threshold provide us a guidance to improve the network robustness under the premise of limited capacity resource when creating a network and assigning load. Therefore, this threshold is useful and important to analyze the robustness of networks.Comment: 11 pages, 4 figure

    Re-examination of chinese semantic processing and syntactic processing: Evidence from conventional ERPs and reconstructed ERPs by residue iteration decomposition (RIDE)

    Get PDF
    © 2015 Wang et al. A number of studies have explored the time course of Chinese semantic and syntactic processing. However, whether syntactic processing occurs earlier than semantics during Chinese sentence reading is still under debate. To further explore this issue, an event-related potentials (ERPs) experiment was conducted on 21 native Chinese speakers who read individually-presented Chinese simple sentences (NP1+VP+NP2) word-by-word for comprehension and made semantic plausibility judgments. The transitivity of the verbs was manipulated to form three types of stimuli: congruent sentences (CON), sentences with a semantically violated NP2 following a transitive verb (semantic violation, SEM), and sentences with a semantically violated NP2 following an intransitive verb (combined semantic and syntactic violation, SEM+SYN). The ERPs evoked from the target NP2 were analyzed by using the Residue Iteration Decomposition (RIDE) method to reconstruct the ERP waveform blurred by trial-to-trial variability, as well as by using the conventional ERP method based on stimulus-locked averaging. The conventional ERP analysis showed that, compared with the critical words in CON, those in SEM and SEM+SYN elicited an N400-P600 biphasic pattern. The N400 effects in both violation conditions were of similar size and distribution, but the P600 in SEM+SYN was bigger than that in SEM. Compared with the conventional ERP analysis, RIDE analysis revealed a larger N400 effect and an earlier P600 effect (in the time window of 500-800 ms instead of 570-810ms). Overall, the combination of conventional ERP analysis and the RIDE method for compensating for trial-to-trial variability confirmed the non-significant difference between SEM and SEM+SYN in the earlier N400 time window. Converging with previous findings on other Chinese structures, the currentstudy provides further precise evidence that syntactic processing in Chinese does not occur earlier than semantic processing.Link_to_subscribed_fulltex

    Safe storage guidelines for soybeans at different temperatures and moisture contents: Poster

    Get PDF
    Poor storage capacity of soybean makes it prone to fungal spoilage and heating during storage, resulting in lower quality. Early prediction of the fungal spoilage in stored soybeans is very difficult because fungi are often too small to be seen with the naked eye. Here a new method for fungus to early detection is adopted: it is called counting fungal spores. Soybeans with moisture contents of 11.4, 12.1, 13.0, 13.9, 14.3 and 14.7%, were held at 6 temperatures 10, 15, 20, 25, 30 and 35? for180d. Samples were taken at regular intervals and the fungal spores counted. The safe storage conditions (temperature, moisture content, duration) were estimated by means of a curve fitted using the power function fitting. It can predict of soybean spoilage by fungus before there is visible damage.Poor storage capacity of soybean makes it prone to fungal spoilage and heating during storage, resulting in lower quality. Early prediction of the fungal spoilage in stored soybeans is very difficult because fungi are often too small to be seen with the naked eye. Here a new method for fungus to early detection is adopted: it is called counting fungal spores. Soybeans with moisture contents of 11.4, 12.1, 13.0, 13.9, 14.3 and 14.7%, were held at 6 temperatures 10, 15, 20, 25, 30 and 35? for180d. Samples were taken at regular intervals and the fungal spores counted. The safe storage conditions (temperature, moisture content, duration) were estimated by means of a curve fitted using the power function fitting. It can predict of soybean spoilage by fungus before there is visible damage

    Cap4Video: What Can Auxiliary Captions Do for Text-Video Retrieval?

    Full text link
    Most existing text-video retrieval methods focus on cross-modal matching between the visual content of videos and textual query sentences. However, in real-world scenarios, online videos are often accompanied by relevant text information such as titles, tags, and even subtitles, which can be utilized to match textual queries. This insight has motivated us to propose a novel approach to text-video retrieval, where we directly generate associated captions from videos using zero-shot video captioning with knowledge from web-scale pre-trained models (e.g., CLIP and GPT-2). Given the generated captions, a natural question arises: what benefits do they bring to text-video retrieval? To answer this, we introduce Cap4Video, a new framework that leverages captions in three ways: i) Input data: video-caption pairs can augment the training data. ii) Intermediate feature interaction: we perform cross-modal feature interaction between the video and caption to produce enhanced video representations. iii) Output score: the Query-Caption matching branch can complement the original Query-Video matching branch for text-video retrieval. We conduct comprehensive ablation studies to demonstrate the effectiveness of our approach. Without any post-processing, Cap4Video achieves state-of-the-art performance on four standard text-video retrieval benchmarks: MSR-VTT (51.4%), VATEX (66.6%), MSVD (51.8%), and DiDeMo (52.0%). The code is available at https://github.com/whwu95/Cap4Video .Comment: Accepted by CVPR 2023. Selected as a Highlight (Top 2.5% of ALL submissions

    Investigation on management of dangerous chemicals in laboratories of Middle Schools in Shanghai

    Get PDF
    • …
    corecore