7,225 research outputs found
Market-oriented product development as an organizational learning capability: findings from two cases
Conceptualizing market orientation at the level of the product development process is relevant, because market orientation is a highly critical factor for new product success and this conceptualization can be used as a starting-point to transform the whole organization into a more market oriented one. Market-oriented product development appears to be more than carrying out a number of marketing activities in a product development process. Using concepts from resourcebased theory and organizational learning theory, we draw up a conceptual framework of marketoriented product development as an organizational learning capability substantiated by findings from two case studies. This capability encapsulates the values and norms, knowledge and skills, technical and managerial knowledge systems, which enable learning about markets through information processing behavior in product development and improve this market learning behavior. This conceptualization stimulates research on operationalizing market orientation in the managerial context of a critical business process and research on enhancing the degree of market orientation.
Constructive pointfree topology eliminates non-constructive representation theorems from Riesz space theory
In Riesz space theory it is good practice to avoid representation theorems
which depend on the axiom of choice. Here we present a general methodology to
do this using pointfree topology. To illustrate the technique we show that
almost f-algebras are commutative. The proof is obtained relatively
straightforward from the proof by Buskes and van Rooij by using the pointfree
Stone-Yosida representation theorem by Coquand and Spitters
Using Preferred Outcome Distributions to Estimate Value and Probability Weighting Functions in Decisions under Risk
In this paper we propose the use of preferred outcome distributions as a new method to elicit individuals’ value and probability weighting functions in decisions under risk. Extant approaches for the elicitation of these two key ingredients of individuals’ risk attitude typically rely on a long, chained sequence of lottery choices. In contrast, preferred outcome distributions can be elicited through an intuitive graphical interface, and, as we show, the information contained in two preferred outcome distributions is sufficient to identify non-parametrically both the value function and the probability weighting function in rank-dependent utility models. To illustrate our method and its advantages, we run an incentive-compatible lab study in which participants use a simple graphical interface – the Distribution Builder (Goldstein et al. 2008) – to construct their preferred outcome distributions, subject to a budget constraint. Results show that estimates of the value function are in line with previous research but that probability weighting biases are diminished, thus favoring our proposed approach based on preferred outcome distributions
Using Preferred Outcome Distributions to estimate Value and Probability Weighting Functions in Decisions under Risk
In this paper we propose the use of preferred outcome distributions as a new method to elicit individuals' value and probability weighting functions in decisions under risk. Extant approaches for the elicitation of these two key ingredients of individuals' risk attitude typically rely on a long, chained sequence of lottery choices. In contrast, preferred outcome distributions can be elicited through an intuitive graphical interface, and, as we show, the information contained in two preferred outcome distributions is sufficient to identify non-parametrically both the value function and the probability weighting function in rank-dependent utility models. To illustrate our method and its advantages, we run an incentive-compatible lab study in which participants use a simple graphical interface - the Distribution Builder (Goldstein et al. 2008) - to construct their preferred outcome distributions, subject to a budget constraint. Results show that estimates of the value function are in line with previous research but that probability weighting biases are diminished, thus favoring our proposed approach based on preferred outcome distributions
Parent-child interaction in Nigerian families: conversation analysis, context and culture
This paper uses a conversation analysis (CA) approach to explore parent child interaction (PCI) within Nigerian families. We illustrate how speech and language therapists (SLTs), by using CA, can tailor recommendations according to the interactional style of each individual family that are consonant with the family’s cultural beliefs. Three parent-child dyads were videoed playing and talking together in their home environments. The analysis uncovered a preference for instructional talk similar to that used in the classroom. Closer examination revealed that this was not inappropriate when considering the context of the activities and their perceived discourse role. Furthermore, this was not necessarily at the expense of responsivity or semantic contingency. The preference for instructional talk appeared to reflect deeply held cultural beliefs about the role of adults and children within the family and it is argued that the cultural paradigm is vitally important to consider when evaluating PCI. Given a potential risk that such young children may be vulnerable in terms of language difficulties, we offer an example of how PCI can be enhanced to encourage language development without disrupting the naturally occurring talk or the underlying purpose of the interaction
Natural supramolecular protein assemblies
Supramolecular protein assemblies are an emerging area within the chemical sciences, which combine the topological structures of the field of supramolecular chemistry and the state-of-the-art chemical biology approaches to unravel the formation and function of protein assemblies. Recent chemical and biological studies on natural multimeric protein structures, including fibers, rings, tubes, catenanes, knots, and cages, have shown that the quaternary structures of proteins are a prerequisite for their highly specific biological functions. In this review, we illustrate that a striking structural diversity of protein assemblies is present in nature. Furthermore, we describe structure–function relationship studies for selected classes of protein architectures, and we highlight the techniques that enable the characterisation of supramolecular protein structures
Stability and convergence in discrete convex monotone dynamical systems
We study the stable behaviour of discrete dynamical systems where the map is
convex and monotone with respect to the standard positive cone. The notion of
tangential stability for fixed points and periodic points is introduced, which
is weaker than Lyapunov stability. Among others we show that the set of
tangentially stable fixed points is isomorphic to a convex inf-semilattice, and
a criterion is given for the existence of a unique tangentially stable fixed
point. We also show that periods of tangentially stable periodic points are
orders of permutations on letters, where is the dimension of the
underlying space, and a sufficient condition for global convergence to periodic
orbits is presented.Comment: 36 pages, 1 fugur
Співставлення чіткого та нечіткого підходів до розв’язку задач інформаційної безпеки
Проведено порівняння чіткого та нечіткого підходів із метою виявлення їх спільних рис та відмінностей. У задачі розподілу ресурсів захисту інформації проаналізовано принципи формування функцій належності до нечітких множин і їх вплив на кінцеві результати. Показано, що нечіткий підхід дає змогу оптимізувати показники системи захисту інформації за рахунок раціонального вибору функцій належності, які відображають основну характеристику об’єктів — їх динамічну вразливість. На прикладі системи з двох об’єктів із різними вразливостями встановлені умови, за яких досягається найвищий рівень співпадіння результатів у разі використання двох підходів. Методика може бути використана під час розрахунку допустимих витрат в інформаційних системах із довільною кількістю об’єктів, котрі відрізняються кількістю розміщеної інформації, вразливістю та рівнем допустимих втрат. Окреслені шляхи подальшого застосування приведеної методики в задачах інформаційної безпеки.Проведено сравнение четкого и нечеткого подходов с целью выявления их общих черт и различий. В задаче распределения ресурсов защиты информации проанализированы принципы формирования функций принадлежности к нечетким множествам и их влияние на конечные результаты. Показано, что нечеткий подход дает возможность оптимизировать показатели системы защиты информации за счет рационального выбора функций принадлежности, которые отражают основную характеристику объектов — их динамическую уязвимость. На примере системы из двух объектов с различными уязвимостями установлены условия, при которых достигается наивысший уровень совпадения результатов при использовании двух подходов. Методика может быть использована при расчете допустимых затрат в информационных системах с произвольным количеством объектов, которые отличаются объемом размещенной информации, уязвимостью и уровнем допустимых потерь. Обозначены пути дальнейшего применения приведенной методики в задачах информационной безопасности.A comparison of explicit and fuzzy approaches to identify their similarities and differences is carried out. In the problem of distribution of resources of information protection the principles of the formation of the membership functions to the fuzzy sets and their effect on the final results are analyzed. It is shown that the fuzzy approach gives the possibility to optimize the indicators of the system of information security through a rational choice of the membership functions, which reflect the basic characteristic of the objects - their dynamic vulnerability. Through the example of the system of two objects with different vulnerabilities the conditions under which the highest level of results coincidence is achieved using two approaches are established. The technique can be used when calculating the eligible costs of information systems with an arbitrary number of objects that have different volume of the placed information, vulnerability and level of acceptable losses. The ways of further application of the method in problems of information security are identified
Structure and the Physico-Mechanical Properties of the Ceramic Coatings Obtained by the Cumulative -Detonation Device
Dense, with good adhesion to the substrate, hard, wear-resistant coatings from the powder of Al2O3 were
obtained on the surface of the steel (STE255) by using the cumulative-detonation device. The results of investigations
of the structure and physico-mechanical properties of the coatings by using scanning, optical microscopy,
X-ray phase analysis, microhardness and tribological tests are presented. It was found that optimization
of plasma spraying to helps reduce the porosity of coatings of Al2O3 less than 1 % and to increase the hardness
of them to 1250 HV0.3. The tribological investigations have shown that the coatings of Al2O3 significantly increase
the wear resistance of the sample STE255 and provide a low ability to wear out the coating.
When you are citing the document, use the following link http://essuir.sumdu.edu.ua/handle/123456789/3546
Expressiveness modulo Bisimilarity of Regular Expressions with Parallel Composition (Extended Abstract)
The languages accepted by finite automata are precisely the languages denoted
by regular expressions. In contrast, finite automata may exhibit behaviours
that cannot be described by regular expressions up to bisimilarity. In this
paper, we consider extensions of the theory of regular expressions with various
forms of parallel composition and study the effect on expressiveness. First we
prove that adding pure interleaving to the theory of regular expressions
strictly increases its expressiveness up to bisimilarity. Then, we prove that
replacing the operation for pure interleaving by ACP-style parallel composition
gives a further increase in expressiveness. Finally, we prove that the theory
of regular expressions with ACP-style parallel composition and encapsulation is
expressive enough to express all finite automata up to bisimilarity. Our
results extend the expressiveness results obtained by Bergstra, Bethke and
Ponse for process algebras with (the binary variant of) Kleene's star
operation.Comment: In Proceedings EXPRESS'10, arXiv:1011.601
- …
