3,827 research outputs found
The Analysis of Antecedents for the Video Telephony Service Adoption: From the Value-Based Perspective
Korean Telecommunications Industry has a large scale market and boasts on high service quality and high technologies enough to provide the Video Telephony Service (VTS) satisfactorily. For many years, Korean telephone companies have been investing enormous sums to advertise their services widely and to allow their customers to change their cell phones for the third-generation (3G) devices indispensable for the service. However, despite their efforts, the VTS adoption rate in Korea is very low and it seems that customers seldom feel the necessity to use. From this viewpoint, it becomes necessary to find the antecedents influencing the intention to use for the VTS empirically. For this purpose, we proposed several hypotheses from the perspective of the Value-based Adoption Model (VAM). VAM is a conceptual model suggested to overcome some limitations of the Technology Acceptance Model (TAM) in explaining the adoption of new Information and Communication Technology (ICT) such as Mobile Internet where customers play the role of service consumer rather than simply technology users. We conducted a survey on 125 samples and found that customers perceive the value of VTS when they can recognize the service is functionally useful (Perceived Usefulness) and when they feel they can put themselves forward by using it (Self-Expression). On the other hand, the other factors including Technical Complexity, Privacy Concern and Perceived Price (Fee) don’t have statistically significant influences on the Perceived Value of VTS
Knowledge-Augmented Language Model Verification
Recent Language Models (LMs) have shown impressive capabilities in generating
texts with the knowledge internalized in parameters. Yet, LMs often generate
the factually incorrect responses to the given queries, since their knowledge
may be inaccurate, incomplete, and outdated. To address this problem, previous
works propose to augment LMs with the knowledge retrieved from an external
knowledge source. However, such approaches often show suboptimal text
generation performance due to two reasons: 1) the model may fail to retrieve
the knowledge relevant to the given query, or 2) the model may not faithfully
reflect the retrieved knowledge in the generated text. To overcome these, we
propose to verify the output and the knowledge of the knowledge-augmented LMs
with a separate verifier, which is a small LM that is trained to detect those
two types of errors through instruction-finetuning. Then, when the verifier
recognizes an error, we can rectify it by either retrieving new knowledge or
generating new text. Further, we use an ensemble of the outputs from different
instructions with a single verifier to enhance the reliability of the
verification processes. We validate the effectiveness of the proposed
verification steps on multiple question answering benchmarks, whose results
show that the proposed verifier effectively identifies retrieval and generation
errors, allowing LMs to provide more factually correct outputs. Our code is
available at https://github.com/JinheonBaek/KALMV.Comment: EMNLP 202
A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks
As NIST is putting the final touches on the standardization of PQC (Post
Quantum Cryptography) public key algorithms, it is a racing certainty that
peskier cryptographic attacks undeterred by those new PQC algorithms will
surface. Such a trend in turn will prompt more follow-up studies of attacks and
countermeasures. As things stand, from the attackers' perspective, one viable
form of attack that can be implemented thereupon is the so-called "side-channel
attack". Two best-known countermeasures heralded to be durable against
side-channel attacks are: "masking" and "hiding". In that dichotomous picture,
of particular note are successful single-trace attacks on some of the NIST's
PQC then-candidates, which worked to the detriment of the former: "masking". In
this paper, we cast an eye over the latter: "hiding". Hiding proves to be
durable against both side-channel attacks and another equally robust type of
attacks called "fault injection attacks", and hence is deemed an auspicious
countermeasure to be implemented. Mathematically, the hiding method is
fundamentally based on random permutations. There has been a cornucopia of
studies on generating random permutations. However, those are not tied to
implementation of the hiding method. In this paper, we propose a reliable and
efficient verification of permutation implementation, through employing
Fisher-Yates' shuffling method. We introduce the concept of an n-th order
permutation and explain how it can be used to verify that our implementation is
more efficient than its previous-gen counterparts for hiding countermeasures.Comment: 29 pages, 6 figure
Aberrant phenotypes of transgenic mice expressing dimeric human erythropoietin
<p>Abstract</p> <p>Background</p> <p>Dimeric human erythropoietin (dHuEPO) peptides are reported to exhibit significantly higher biological activity than the monomeric form of recombinant EPO. The objective of this study was to produce transgenic (tg) mice expressing dHuEPO and to investigate the characteristics of these mice.</p> <p>Methods</p> <p>A dHuEPO-expressing vector under the control of the goat beta-casein promoter, which produced a dimer of human EPO molecules linked by a 2-amino acid peptide linker (Asp-Ile), was constructed and injected into 1-cell fertilized embryos by microinjection. Mice were screened using genomic DNA samples obtained from tail biopsies. Blood samples were obtained by heart puncture using heparinized tubes, and hematologic parameters were assessed. Using the microarray analysis tool, we analyzed differences in gene expression in the spleens of tg and control mice.</p> <p>Results</p> <p>A high rate of spontaneous abortion or death of the offspring was observed in the recipients of dHuEPO embryos. We obtained 3 founder lines (#4, #11, and #47) of tg mice expressing the <it>dHuEPO </it>gene. However, only one founder line showed stable germline integration and transmission, subsequently establishing the only transgenic line (#11). We obtained 2 F1 mice and 3 F2 mice from line #11. The dHuEPO protein could not be obtained because of repeated spontaneous abortions in the tg mice. Tg mice exhibited symptoms such as short lifespan and abnormal blood composition. The red blood cell count, white blood cell count, and hematocrit levels in the tg mice were remarkably higher than those in the control mice. The spleens of the tg mice (F1 and F2 females) were 11- and -21-fold larger than those of the control mice. Microarray analysis revealed 2,672 spleen-derived candidate genes; more genes were downregulated than upregulated (849/764). Reverse transcriptase-polymerase chain reaction (RT-PCR) and quantitative real-time PCR (qRT-PCR) were used for validating the results of the microarray analysis of mRNA expression.</p> <p>Conclusions</p> <p>In conclusion, dHuEPO tg mice caused excessive erythrocytosis that led to abnormal blood composition, short lifespan, and abnormal splenomegaly. Further, we identified 2,672 genes associated with splenomegaly by microarray analysis. These results could be useful in the development of dHuEPO-producing tg animals.</p
Broken inversion symmetry in van der Waals topological ferromagnetic metal iron germanium telluride
Inversion symmetry breaking is critical for many quantum effects and
fundamental for spin-orbit torque, which is crucial for next-generation
spintronics. Recently, a novel type of gigantic intrinsic spin-orbit torque has
been established in the topological van-der-Waals (vdW) magnet iron germanium
telluride. However, it remains a puzzle because no clear evidence exists for
interlayer inversion symmetry breaking. Here, we report the definitive evidence
of broken inversion symmetry in iron germanium telluride directly measured by
the second harmonic generation (SHG) technique. Our data show that the crystal
symmetry reduces from centrosymmetric P63/mmc to noncentrosymmetric polar P3m1
space group, giving the three-fold SHG pattern with dominant out-of-plane
polarization. Additionally, the SHG response evolves from an isotropic pattern
to a sharp three-fold symmetry upon increasing Fe deficiency, mainly due to the
transition from random defects to ordered Fe vacancies. Such SHG response is
robust against temperature, ensuring unaltered crystalline symmetries above and
below the ferromagnetic transition temperature. These findings add crucial new
information to our understanding of this interesting vdW metal, iron germanium
telluride: band topology, intrinsic spin-orbit torque and topological vdW polar
metal states.Comment: 32 pages, 9 figures, Accepted by Advanced Material
- …