5,234 research outputs found

    A Conceptual Model for Virtual Organizational Learning

    Get PDF

    Serial directional evaluation of rhythmic reversal in Axininca

    Get PDF
    This paper updates the analysis of rhythmic reversal in Axininca with a more economical one using serial/directional evaluation that dispenses with alignment constraints. The serial/directional evaluation is more superior to a parallel/directional counterpart with respect to quantity-sensitivity, as adopting directionally evaluated constraints for parallelism cannot avoid overgeneration problems.

    Carbon-Neutralized Joint User Association and Base Station Switching for Green Cellular Networks

    Full text link
    Mitigating climate change and its impacts is one of the sustainable development goals (SDGs) required by United Nations for an urgent action. Increasing carbon emissions due to human activities is the root cause to climate change. Telecommunication networks that provide service connectivity to mobile users contribute great amount of carbon emissions by consuming lots of non-renewable energy sources. Beyond the improvement on energy efficiency, to reduce the carbon footprint, telecom operators are increasing their adoption of renewable energy (e.g., wind power). The high variability of renewable energy in time and location; however, creates difficulties for operators when utilizing renewables for the reduction of carbon emissions. In this paper, we consider a heterogeneous network consisted of one macro base station (MBS) and multiple small base stations (SBSs) where each base station (BS) is powered by both of renewable and non-renewable energy. Different from the prior works that target on the total power consumption, we propose a novel scheme to minimize the carbon footprint of networks by dynamically switching the ON/OFF modes of SBSs and adjusting the association between users and BSs to access renewables as much as possible. Our numerical analysis shows that the proposed scheme significantly reduces up to 86% of the nonrenewable energy consumption compared to two representative baselines.Comment: To appear in IEEE International Conference on Communications (ICC) 202

    Characterization of the Antheraea pernyi abnormal wing disc gene that may contribute to its temperature tolerance

    Get PDF
    It has been known that the abnormal wing disc (awd) gene encodes a nucleoside diphosphate kinase and is closely related to wing development in Drosophila melanogaster and Bombyx mori. In the present study, the awd gene was isolated and characterized from Antheraea pernyi, a well-known wild silkmoth. The isolated cDNA sequence is 666 bp in length with an open reading frame of 462 bp encoding a polypeptide of 153 amino acids, which contains a putative nucleoside diphosphate kinases active site motif and conserved multimer interface. The deduced A. pernyi awd protein sequence reveals 75, 82 and 96% identity with its homologue of Homo sapiens, D. melanogaster, and B. mori, respectively. Semi-quantitative reverse transcriptase-polymerase chain reaction (RT-PCR) analysis showed that the awd gene was transcribed during all four developmental stages (egg, larva, pupa, and moth), and present in all tissues tested (blood, midgut, silk glands, Malpighian tublues, spermaries, ovaries, brain, muscle, fat body and body wall), with the highest abundance in Malpighian tubules. Interestingly, mRNA expression level in pupal fat body was significantly down-regulated after cold shock (4°C) compared with the control (26°C) and significantly up-regulated after heat shock (46°C). The results indicated that the A. pernyi awd gene is inducible, and that its expression effect is different after cold stress and heat stress. Consequently, we refer that the product of the awd gene may contribute to its temperature tolerance.Key words: Antheraea pernyi, abnormal wing disc gene, cloning, expression pattern, temperature stress

    Resource Slack, Innovation Ambidexterity, and Quality Performance: Knowledge Heterogeneity Perspective

    Get PDF
    Abstract. Resource slack and innovation ambidexterity can both be represented and connected conceptually with heterogeneous knowledge structure. Hypothesizing with the logic of knowledge heterogeneity, the present study empirically examined ambidexterity’s mediation effect in the relationship between two forms of resource slacks (i.e., human and financial resources) and product quality. Companies in Taiwanese manufacturing industry were located based on the random inspection conducted by the Department of Budget, Accounting and Statistics of the Government in 2011, and surveyed. Our findings demonstrated that slack resource is only an indirect factor for product quality evaluated by internal developers and producers (i.e. development and delivery processes) and external customers (product-specific quality). Specifically, first, different resource slacks influence differently on ambidexterity; second, both exploration and exploitation positively influence quality of innovation; third, ambidexterity plays a significant mediator’s role that may strategically alter the relationship between slack and quality. Research has paid increasing attention to ambidexterity (i.e., exploration and exploitation) in organizational innovation. Mostly, however, focus on the influencing factors leading to possible ambidextrous design or implementation of innovation. Few have examined ambidexterity’s effects on specific dimensions of innovation as outcomes.Keywords. Resource slacks, Ambidexterity, Quality, Knowledge heterogeneity.JEL. M10; M11; M14

    Investigating the Knowledge-Sharing Behavior ina Professional Virtual Community

    Get PDF
    This research aims at investigating the knowledge sharing-behaviors in a teachers’ professional virtual community. Logs data in the entire community and in special interest groups (SIGs) were analyzed. Some typical behaviors were identified by the clustering analysis in this study. The largest group of member belongs to inactive users. They rarely log in the system, are passive in uploading or downloading teaching materials, and almost never post or reply messages. Another group is active in receiving knowledge while reluctant to give knowledge or to respond. The third group frequently login the system, is the most active in sharing knowledge, and actively searching knowledge. However, the third group contains only a small number of members. Furthermore, fifty-five members of the knowledge-sharing group were interviewed using focus group technique to find out qualitative information as to why they are willing to share information and what are their concerns in sharing information. The results indicated that knowledge sharing is not a common behavior in professional virtual community, and knowledge-sharing culture is difficult to promote even in non-competitive professional communities. Secondly, knowledge cannot flow easily throughout the community even when certain knowledge flow promoting mechanism is provided. Thirdly, professional autonomy may hinder the frequency of interactions with others in professional virtual community. Fourthly, attitudes regarding information ownership are important factors in knowledge sharing of a professional virtual community. Finally, teaching and IT usage experiences are not major factors affecting knowledge-sharing behavior in pro fessional virtual communities

    The Variant of Designated Verifier Signature Scheme with Message Recovery

    Full text link
    In this work, we introduce a strong Designated Verifier Signature (DVS) scheme that incorporates a message recovery mechanism inspired by the concept of the Universal Designated Verifier Signature (UDVS) scheme. It is worth noting that Saeednia's strong designated verifier signature scheme fails to guarantee the privacy of the signature, making it unsuitable for certain applications such as medical record certificates or voting systems. To overcome this limitation, we extend Lee's strong designated verifier signature with a message recovery scheme to develop a universal designated verifier signature scheme. This universal designated verifier scheme is crafted to safeguard the privacy of signature holders, ensuring that only designated verifiers can authenticate the true signer and recover the messages.Comment: 11 page
    • …
    corecore