7,480 research outputs found

    Mining social network data for personalisation and privacy concerns: A case study of Facebook’s Beacon

    Get PDF
    This is the post-print version of the final published paper that is available from the link below.The popular success of online social networking sites (SNS) such as Facebook is a hugely tempting resource of data mining for businesses engaged in personalised marketing. The use of personal information, willingly shared between online friends' networks intuitively appears to be a natural extension of current advertising strategies such as word-of-mouth and viral marketing. However, the use of SNS data for personalised marketing has provoked outrage amongst SNS users and radically highlighted the issue of privacy concern. This paper inverts the traditional approach to personalisation by conceptualising the limits of data mining in social networks using privacy concern as the guide. A qualitative investigation of 95 blogs containing 568 comments was collected during the failed launch of Beacon, a third party marketing initiative by Facebook. Thematic analysis resulted in the development of taxonomy of privacy concerns which offers a concrete means for online businesses to better understand SNS business landscape - especially with regard to the limits of the use and acceptance of personalised marketing in social networks

    The Demand for Money in a Simultaneous-Equation Framework

    Get PDF
    This paper estimates the demand for money in the U.S. within a model where the money supply function is also considered simultaneously. The explanatory variables for the money demand function include a measure of the interest rate, real income and the exchange rate. The explanatory variables for the money supply function include the output gap and the inflation gap in addition to an interest rate. The parameters estimated for the two equations avoid being biased or inconsistent. The results should be useful to both macroeconomic researchers and policy makers.Money demand, money supply, simultaneous-equation model, output gap, inflation gap, three stage least squares

    Circular frame fixation for calcaneal fractures risks injury to the medial neurovascular structures: a cadaveric description

    Get PDF
    Aim: There is a risk of iatrogenic injury to the soft tissues of the calcaneus and this study assesses the risk of injury to these structures in circular frame calcaneal fracture fixation. Materials and Methods: After olive tip wires were inserted, an L-shaped incision on the lateral and medial aspects of 5 formalin fixed cadaveric feet was performed to expose the underlying soft tissues. The calcaneus was divided into zones corresponding to high, medium and low risk using a grading system. Results: Structures at high risk included the posterior tibial artery, posterior tibial vein and posterior tibial nerve on the medial aspect. Soft tissue structures on the lateral side that were shown to be at lower risk of injury were the small saphenous vein and the sural nerve and the tendons of fibularis longus and fibularis brevis. Conclusion: The lateral surface of the calcaneus provides a lower risk area for external fixation. The risk of injury to significant soft tissues using a circular frame fixation approach has been shown to be greater on the medial aspect. Clinical Relevance: This study highlights the relevant anatomical relations in circular frame fixation for calcaneal fractures to minimize damage to these structures

    Improving route discovery in on-demand routing protocols using local topology information in MANETs

    Get PDF
    Most existing routing protocols proposed for MANETs use flooding as a broadcast technique for the propagation of network control packets; a particular example of this is the dissemination of route requests (RREQs), which facilitate route discovery. In flooding, each mobile node rebroadcasts received packets, which, in this manner, are propagated network-wide with considerable overhead. This paper improves on the performance of existing routing protocols by reducing the communication overhead incurred during the route discovery process by implementing a new broadcast algorithm called the adjusted probabilistic flooding on the Ad-Hoc on Demand Distance Vector (AODV) protocol. AODV [3] is a well-known and widely studied algorithm which has been shown over the past few years to maintain an overall lower routing overhead compared to traditional proactive schemes, even though it uses flooding to propagate RREQs. Our results, as presented in this paper, reveal that equipping AODV with fixed and adjusted probabilistic flooding, instead, helps reduce the overhead of the route discovery process whilst maintaining comparable performance levels in terms of saved rebroadcasts and reachability as achieved by conventional AODV\@. Moreover, the results indicate that the adjusted probabilistic technique results in better performance compared to the fixed one for both of these metrics

    From RHIC to EIC: Nuclear Structure Functions

    Full text link
    We study the nuclear structure function F2AF_2^A and its logarithmic derivative in the high energy limit (small xx region) using the Color Glass Condensate formalism. In this limit the structure function F2F_2 depends on the quark anti-quark dipole-target scattering cross section NF(xbj,rt,bt)N_F (x_{bj}, r_t, b_t). The same dipole cross section appears in single hadron and hadron-photon production cross sections in the forward rapidity region in deuteron (proton)-nucleus collisions at high energy, i.e. at RHIC and LHC. We use a parameterization of the dipole cross section, which has successfully been used to describe the deuteron-gold data at RHIC, to compute the nuclear structure function F2AF_2^A and its log Q2Q^2 derivative (which is related to gluon distribution function in the double log limit). We provide a quantitative estimate of the nuclear shadowing of F2AF_2^A and the gluon distribution function in the kinematic region relevant to a future Electron-Ion Collider.Comment: 13 pages, 6 figure

    Aplikasi Monitoring Manajemen Kuangan Di Madrasah Diniyah PP. Ibnu Kholdun A-Hasyimi Berbasis Web dan Bot Telegram

    Get PDF
    Manajemen keuangan meliputi  segala kegiatan yang berhubungan dengan perolehan, pendanaan serta untuk mengolah aktivitas dengan tujuan semua aktivitas, Termasuk pengolahan manajemen keuangan sekolah dalam sebuah institusi pendidikan merupakan kegiatan penting yang dilaksanakan secara periodik ataupun setiap saat, data-data keuangan tersebut selalu berubah setiap bulan atau setiap tahun, pengeluaran dan pemasukan. Sedangkan informasi dituntut untuk selalu aktual, sehingga dibutuhkan suatu sistem informasi yang bisa mengolah data-data secara cepat dan efektif, diketahui bahwa sistem manajemen keuagan yang sedang berjalan pada Madrasah Diniyah PP.Ibnu kholdun Al-hasyimi masih dilakukan secara manual yang membuat aliran informasi yang lambat, proses pencarian data yang lambat, perhitungan data dalam jumlah banyak sulit dilakukan,  minimnya pemantauan yang dilakukan atasan. Berdasarkan latar belakang permasalahan diatas dapat ditarik kesimpulan bahwa permasalahan yang dihadapi yaitu bagaimana merancang sebuah Aplikasi Monitoring manajemen Keuangan di Madrasah Diniyah PP.Ibnu kholdun  Al-Hasyimi Berbasis  Web Dan Bot Telegram. Dari hasil perancangan Aplikasi Monitoring Manajemen Keuangan di Madrasah Diniyah PP.Ibnu kholdun  Al-Hasyimi Berbasis  Web Dan Bot Telegram. Berdasarkan hasil perhitungan, disimpulkan bahwa pengujian eksternal dengan berjumlah 6 pertanyaan dan 10 penguji, maka dihasilkan persentase yang diperoleh skor 77,5% dengan kategori baik
    corecore