7,225 research outputs found

    Market-oriented product development as an organizational learning capability: findings from two cases

    Get PDF
    Conceptualizing market orientation at the level of the product development process is relevant, because market orientation is a highly critical factor for new product success and this conceptualization can be used as a starting-point to transform the whole organization into a more market oriented one. Market-oriented product development appears to be more than carrying out a number of marketing activities in a product development process. Using concepts from resourcebased theory and organizational learning theory, we draw up a conceptual framework of marketoriented product development as an organizational learning capability substantiated by findings from two case studies. This capability encapsulates the values and norms, knowledge and skills, technical and managerial knowledge systems, which enable learning about markets through information processing behavior in product development and improve this market learning behavior. This conceptualization stimulates research on operationalizing market orientation in the managerial context of a critical business process and research on enhancing the degree of market orientation.

    Constructive pointfree topology eliminates non-constructive representation theorems from Riesz space theory

    Get PDF
    In Riesz space theory it is good practice to avoid representation theorems which depend on the axiom of choice. Here we present a general methodology to do this using pointfree topology. To illustrate the technique we show that almost f-algebras are commutative. The proof is obtained relatively straightforward from the proof by Buskes and van Rooij by using the pointfree Stone-Yosida representation theorem by Coquand and Spitters

    Using Preferred Outcome Distributions to Estimate Value and Probability Weighting Functions in Decisions under Risk

    Get PDF
    In this paper we propose the use of preferred outcome distributions as a new method to elicit individuals’ value and probability weighting functions in decisions under risk. Extant approaches for the elicitation of these two key ingredients of individuals’ risk attitude typically rely on a long, chained sequence of lottery choices. In contrast, preferred outcome distributions can be elicited through an intuitive graphical interface, and, as we show, the information contained in two preferred outcome distributions is sufficient to identify non-parametrically both the value function and the probability weighting function in rank-dependent utility models. To illustrate our method and its advantages, we run an incentive-compatible lab study in which participants use a simple graphical interface – the Distribution Builder (Goldstein et al. 2008) – to construct their preferred outcome distributions, subject to a budget constraint. Results show that estimates of the value function are in line with previous research but that probability weighting biases are diminished, thus favoring our proposed approach based on preferred outcome distributions

    Using Preferred Outcome Distributions to estimate Value and Probability Weighting Functions in Decisions under Risk

    Get PDF
    In this paper we propose the use of preferred outcome distributions as a new method to elicit individuals' value and probability weighting functions in decisions under risk. Extant approaches for the elicitation of these two key ingredients of individuals' risk attitude typically rely on a long, chained sequence of lottery choices. In contrast, preferred outcome distributions can be elicited through an intuitive graphical interface, and, as we show, the information contained in two preferred outcome distributions is sufficient to identify non-parametrically both the value function and the probability weighting function in rank-dependent utility models. To illustrate our method and its advantages, we run an incentive-compatible lab study in which participants use a simple graphical interface - the Distribution Builder (Goldstein et al. 2008) - to construct their preferred outcome distributions, subject to a budget constraint. Results show that estimates of the value function are in line with previous research but that probability weighting biases are diminished, thus favoring our proposed approach based on preferred outcome distributions

    Parent-child interaction in Nigerian families: conversation analysis, context and culture

    Get PDF
    This paper uses a conversation analysis (CA) approach to explore parent child interaction (PCI) within Nigerian families. We illustrate how speech and language therapists (SLTs), by using CA, can tailor recommendations according to the interactional style of each individual family that are consonant with the family’s cultural beliefs. Three parent-child dyads were videoed playing and talking together in their home environments. The analysis uncovered a preference for instructional talk similar to that used in the classroom. Closer examination revealed that this was not inappropriate when considering the context of the activities and their perceived discourse role. Furthermore, this was not necessarily at the expense of responsivity or semantic contingency. The preference for instructional talk appeared to reflect deeply held cultural beliefs about the role of adults and children within the family and it is argued that the cultural paradigm is vitally important to consider when evaluating PCI. Given a potential risk that such young children may be vulnerable in terms of language difficulties, we offer an example of how PCI can be enhanced to encourage language development without disrupting the naturally occurring talk or the underlying purpose of the interaction

    Natural supramolecular protein assemblies

    Get PDF
    Supramolecular protein assemblies are an emerging area within the chemical sciences, which combine the topological structures of the field of supramolecular chemistry and the state-of-the-art chemical biology approaches to unravel the formation and function of protein assemblies. Recent chemical and biological studies on natural multimeric protein structures, including fibers, rings, tubes, catenanes, knots, and cages, have shown that the quaternary structures of proteins are a prerequisite for their highly specific biological functions. In this review, we illustrate that a striking structural diversity of protein assemblies is present in nature. Furthermore, we describe structure–function relationship studies for selected classes of protein architectures, and we highlight the techniques that enable the characterisation of supramolecular protein structures

    Stability and convergence in discrete convex monotone dynamical systems

    Full text link
    We study the stable behaviour of discrete dynamical systems where the map is convex and monotone with respect to the standard positive cone. The notion of tangential stability for fixed points and periodic points is introduced, which is weaker than Lyapunov stability. Among others we show that the set of tangentially stable fixed points is isomorphic to a convex inf-semilattice, and a criterion is given for the existence of a unique tangentially stable fixed point. We also show that periods of tangentially stable periodic points are orders of permutations on nn letters, where nn is the dimension of the underlying space, and a sufficient condition for global convergence to periodic orbits is presented.Comment: 36 pages, 1 fugur

    Співставлення чіткого та нечіткого підходів до розв’язку задач інформаційної безпеки

    Get PDF
    Проведено порівняння чіткого та нечіткого підходів із метою виявлення їх спільних рис та відмінностей. У задачі розподілу ресурсів захисту інформації проаналізовано принципи формування функцій належності до нечітких множин і їх вплив на кінцеві результати. Показано, що нечіткий підхід дає змогу оптимізувати показники системи захисту інформації за рахунок раціонального вибору функцій належності, які відображають основну характеристику об’єктів — їх динамічну вразливість. На прикладі системи з двох об’єктів із різними вразливостями встановлені умови, за яких досягається найвищий рівень співпадіння результатів у разі використання двох підходів. Методика може бути використана під час розрахунку допустимих витрат в інформаційних системах із довільною кількістю об’єктів, котрі відрізняються кількістю розміщеної інформації, вразливістю та рівнем допустимих втрат. Окреслені шляхи подальшого застосування приведеної методики в задачах інформаційної безпеки.Проведено сравнение четкого и нечеткого подходов с целью выявления их общих черт и различий. В задаче распределения ресурсов защиты информации проанализированы принципы формирования функций принадлежности к нечетким множествам и их влияние на конечные результаты. Показано, что нечеткий подход дает возможность оптимизировать показатели системы защиты информации за счет рационального выбора функций принадлежности, которые отражают основную характеристику объектов — их динамическую уязвимость. На примере системы из двух объектов с различными уязвимостями установлены условия, при которых достигается наивысший уровень совпадения результатов при использовании двух подходов. Методика может быть использована при расчете допустимых затрат в информационных системах с произвольным количеством объектов, которые отличаются объемом размещенной информации, уязвимостью и уровнем допустимых потерь. Обозначены пути дальнейшего применения приведенной методики в задачах информационной безопасности.A comparison of explicit and fuzzy approaches to identify their similarities and differences is carried out. In the problem of distribution of resources of information protection the principles of the formation of the membership functions to the fuzzy sets and their effect on the final results are analyzed. It is shown that the fuzzy approach gives the possibility to optimize the indicators of the system of information security through a rational choice of the membership functions, which reflect the basic characteristic of the objects - their dynamic vulnerability. Through the example of the system of two objects with different vulnerabilities the conditions under which the highest level of results coincidence is achieved using two approaches are established. The technique can be used when calculating the eligible costs of information systems with an arbitrary number of objects that have different volume of the placed information, vulnerability and level of acceptable losses. The ways of further application of the method in problems of information security are identified

    Structure and the Physico-Mechanical Properties of the Ceramic Coatings Obtained by the Cumulative -Detonation Device

    Get PDF
    Dense, with good adhesion to the substrate, hard, wear-resistant coatings from the powder of Al2O3 were obtained on the surface of the steel (STE255) by using the cumulative-detonation device. The results of investigations of the structure and physico-mechanical properties of the coatings by using scanning, optical microscopy, X-ray phase analysis, microhardness and tribological tests are presented. It was found that optimization of plasma spraying to helps reduce the porosity of coatings of Al2O3 less than 1 % and to increase the hardness of them to 1250 HV0.3. The tribological investigations have shown that the coatings of Al2O3 significantly increase the wear resistance of the sample STE255 and provide a low ability to wear out the coating. When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/3546

    Expressiveness modulo Bisimilarity of Regular Expressions with Parallel Composition (Extended Abstract)

    Get PDF
    The languages accepted by finite automata are precisely the languages denoted by regular expressions. In contrast, finite automata may exhibit behaviours that cannot be described by regular expressions up to bisimilarity. In this paper, we consider extensions of the theory of regular expressions with various forms of parallel composition and study the effect on expressiveness. First we prove that adding pure interleaving to the theory of regular expressions strictly increases its expressiveness up to bisimilarity. Then, we prove that replacing the operation for pure interleaving by ACP-style parallel composition gives a further increase in expressiveness. Finally, we prove that the theory of regular expressions with ACP-style parallel composition and encapsulation is expressive enough to express all finite automata up to bisimilarity. Our results extend the expressiveness results obtained by Bergstra, Bethke and Ponse for process algebras with (the binary variant of) Kleene's star operation.Comment: In Proceedings EXPRESS'10, arXiv:1011.601
    corecore