3,862 research outputs found

    Making sense of project value from a value-co-creation perspective: an exploratory conceptual framework

    Full text link
    This paper proposes a conceptual framework to make sense of how project value is created in projects. We study the extant project management value creation literature using a value co-creation lens based on service-dominant (S-D) logic. We explore how project value is proposed, exchanged and then realized following a project life-cycle. This leads to the identification of an exploratory “value co-creation life-cycle” framework. This framework shows value as a whole transcends the limitation of measurable products value normally used to define the project value. In particular, it shows how operant resources (or actors) - typically referred to as stakeholders - within the project management system exchange services and integrate resources in order to co-create value. The exploratory framework, in turn, would enable future investigation of real projects with the view to unpacking the complex dynamic behavior of project value creation

    Isotropic-medium three-dimensional cloaks for acoustic and electromagnetic waves

    Full text link
    We propose a generalization of the two-dimensional eikonal-limit cloak derived from a conformal transformation to three dimensions. The proposed cloak is a spherical shell composed of only isotropic media; it operates in the transmission mode and requires no mirror or ground plane. Unlike the well-known omnidirectional spherical cloaks, it may reduce visibility of an arbitrary object only for a very limited range of observation angles. In the short-wavelength limit, this cloaking structure restores not only the trajectories of incident rays, but also their phase, which is a necessary ingredient to complete invisibility. Both scalar-wave (acoustic) and transverse vector-wave (electromagnetic) versions are presented.Comment: 17 pages, 12 figure

    Audio Properties of Perceived Boundaries in Music

    Get PDF

    A Functional Taxonomy of Music Generation Systems

    Get PDF
    Digital advances have transformed the face of automatic music generation since its beginnings at the dawn of computing. Despite the many breakthroughs, issues such as the musical tasks targeted by different machines and the degree to which they succeed remain open questions. We present a functional taxonomy for music generation systems with reference to existing systems. The taxonomy organizes systems according to the purposes for which they were designed. It also reveals the inter-relatedness amongst the systems. This design-centered approach contrasts with predominant methods-based surveys and facilitates the identification of grand challenges to set the stage for new breakthroughs.Comment: survey, music generation, taxonomy, functional survey, survey, automatic composition, algorithmic compositio

    A Strict Test of Stellar Evolution Models: The Absolute Dimensions of Massive Benchmark Eclipsing Binary V578 Mon

    Get PDF
    We determine the absolute dimensions of the eclipsing binary V578 Mon, a detached system of two early B-type stars (B0V + B1V, P==2.40848 d) in the star-forming region NGC 2244 of the Rosette Nebula. From the light curve analysis of 40 yr of photometry and the analysis of HERMES spectra, we find radii of 5.41±0.045.41\pm0.04 Rsun and 4.29±0.054.29\pm 0.05 Rsun, and temperatures of 30000±500 30000\pm 500~K and 25750±435 25750\pm 435 K respectively. We find that our disentangled component spectra for V578 Mon agree well previous spectral disentangling from the literature. We also reconfirm the previous spectroscopic orbit of V578 Mon finding that masses of 14.54±0.08 14.54\pm 0.08 Msun and 10.29±0.06 10.29\pm 0.06 Msun are fully compatible with the new analysis. We compare the absolute dimensions to the rotating models of the Geneva and Utrecht groups and the models of Granada group. We find all three sets of models marginally reproduce the absolute dimensions of both stars with a common age within uncertainty for gravity-effective temperature isochrones. However - there are some apparent age discrepancies for the corresponding mass-radius isochrones. Models with larger convective overshoot >0.35>0.35 worked best. Combined with our previously determined apsidal motion of 0.070890.00013+0.000210.07089^{+0.00021}_{-0.00013} deg cycle1^{-1}, we compute the internal structure constants (tidal Love number) for the newtonian and general relativistic contribution to the apsidal motion, logk2=1.975±0.017\log{k_2}=-1.975\pm0.017 and logk2=3.412±0.018\log{k_2}=-3.412\pm0.018 respectively. We find the relativistic contribution to the apsidal motion of be small <4%<4\%. We find that the prediction of logk2,theo=2.005±0.025\log{k_{\rm 2,theo}}=-2.005\pm0.025 of the Granada models fully agrees with our observed logk2\log{k_2}.Comment: accepted for publication in AJ 05/02/201

    A. H. Greene & R. E. Chew to Capt. A. Bouanchaud (8 September 1864)

    Get PDF
    Request for a 48 hour pass to Macon, Georgia for the purpose of buying clothing.https://egrove.olemiss.edu/ciwar_corresp/1368/thumbnail.jp

    A Self-Organized Method for Computing the Epidemic Threshold in Computer Networks

    Full text link
    In many cases, tainted information in a computer network can spread in a way similar to an epidemics in the human world. On the other had, information processing paths are often redundant, so a single infection occurrence can be easily "reabsorbed". Randomly checking the information with a central server is equivalent to lowering the infection probability but with a certain cost (for instance processing time), so it is important to quickly evaluate the epidemic threshold for each node. We present a method for getting such information without resorting to repeated simulations. As for human epidemics, the local information about the infection level (risk perception) can be an important factor, and we show that our method can be applied to this case, too. Finally, when the process to be monitored is more complex and includes "disruptive interference", one has to use actual simulations, which however can be carried out "in parallel" for many possible infection probabilities
    corecore