3,827 research outputs found

    The Analysis of Antecedents for the Video Telephony Service Adoption: From the Value-Based Perspective

    Get PDF
    Korean Telecommunications Industry has a large scale market and boasts on high service quality and high technologies enough to provide the Video Telephony Service (VTS) satisfactorily. For many years, Korean telephone companies have been investing enormous sums to advertise their services widely and to allow their customers to change their cell phones for the third-generation (3G) devices indispensable for the service. However, despite their efforts, the VTS adoption rate in Korea is very low and it seems that customers seldom feel the necessity to use. From this viewpoint, it becomes necessary to find the antecedents influencing the intention to use for the VTS empirically. For this purpose, we proposed several hypotheses from the perspective of the Value-based Adoption Model (VAM). VAM is a conceptual model suggested to overcome some limitations of the Technology Acceptance Model (TAM) in explaining the adoption of new Information and Communication Technology (ICT) such as Mobile Internet where customers play the role of service consumer rather than simply technology users. We conducted a survey on 125 samples and found that customers perceive the value of VTS when they can recognize the service is functionally useful (Perceived Usefulness) and when they feel they can put themselves forward by using it (Self-Expression). On the other hand, the other factors including Technical Complexity, Privacy Concern and Perceived Price (Fee) don’t have statistically significant influences on the Perceived Value of VTS

    Knowledge-Augmented Language Model Verification

    Full text link
    Recent Language Models (LMs) have shown impressive capabilities in generating texts with the knowledge internalized in parameters. Yet, LMs often generate the factually incorrect responses to the given queries, since their knowledge may be inaccurate, incomplete, and outdated. To address this problem, previous works propose to augment LMs with the knowledge retrieved from an external knowledge source. However, such approaches often show suboptimal text generation performance due to two reasons: 1) the model may fail to retrieve the knowledge relevant to the given query, or 2) the model may not faithfully reflect the retrieved knowledge in the generated text. To overcome these, we propose to verify the output and the knowledge of the knowledge-augmented LMs with a separate verifier, which is a small LM that is trained to detect those two types of errors through instruction-finetuning. Then, when the verifier recognizes an error, we can rectify it by either retrieving new knowledge or generating new text. Further, we use an ensemble of the outputs from different instructions with a single verifier to enhance the reliability of the verification processes. We validate the effectiveness of the proposed verification steps on multiple question answering benchmarks, whose results show that the proposed verifier effectively identifies retrieval and generation errors, allowing LMs to provide more factually correct outputs. Our code is available at https://github.com/JinheonBaek/KALMV.Comment: EMNLP 202

    A Statistical Verification Method of Random Permutations for Hiding Countermeasure Against Side-Channel Attacks

    Full text link
    As NIST is putting the final touches on the standardization of PQC (Post Quantum Cryptography) public key algorithms, it is a racing certainty that peskier cryptographic attacks undeterred by those new PQC algorithms will surface. Such a trend in turn will prompt more follow-up studies of attacks and countermeasures. As things stand, from the attackers' perspective, one viable form of attack that can be implemented thereupon is the so-called "side-channel attack". Two best-known countermeasures heralded to be durable against side-channel attacks are: "masking" and "hiding". In that dichotomous picture, of particular note are successful single-trace attacks on some of the NIST's PQC then-candidates, which worked to the detriment of the former: "masking". In this paper, we cast an eye over the latter: "hiding". Hiding proves to be durable against both side-channel attacks and another equally robust type of attacks called "fault injection attacks", and hence is deemed an auspicious countermeasure to be implemented. Mathematically, the hiding method is fundamentally based on random permutations. There has been a cornucopia of studies on generating random permutations. However, those are not tied to implementation of the hiding method. In this paper, we propose a reliable and efficient verification of permutation implementation, through employing Fisher-Yates' shuffling method. We introduce the concept of an n-th order permutation and explain how it can be used to verify that our implementation is more efficient than its previous-gen counterparts for hiding countermeasures.Comment: 29 pages, 6 figure

    Aberrant phenotypes of transgenic mice expressing dimeric human erythropoietin

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Dimeric human erythropoietin (dHuEPO) peptides are reported to exhibit significantly higher biological activity than the monomeric form of recombinant EPO. The objective of this study was to produce transgenic (tg) mice expressing dHuEPO and to investigate the characteristics of these mice.</p> <p>Methods</p> <p>A dHuEPO-expressing vector under the control of the goat beta-casein promoter, which produced a dimer of human EPO molecules linked by a 2-amino acid peptide linker (Asp-Ile), was constructed and injected into 1-cell fertilized embryos by microinjection. Mice were screened using genomic DNA samples obtained from tail biopsies. Blood samples were obtained by heart puncture using heparinized tubes, and hematologic parameters were assessed. Using the microarray analysis tool, we analyzed differences in gene expression in the spleens of tg and control mice.</p> <p>Results</p> <p>A high rate of spontaneous abortion or death of the offspring was observed in the recipients of dHuEPO embryos. We obtained 3 founder lines (#4, #11, and #47) of tg mice expressing the <it>dHuEPO </it>gene. However, only one founder line showed stable germline integration and transmission, subsequently establishing the only transgenic line (#11). We obtained 2 F1 mice and 3 F2 mice from line #11. The dHuEPO protein could not be obtained because of repeated spontaneous abortions in the tg mice. Tg mice exhibited symptoms such as short lifespan and abnormal blood composition. The red blood cell count, white blood cell count, and hematocrit levels in the tg mice were remarkably higher than those in the control mice. The spleens of the tg mice (F1 and F2 females) were 11- and -21-fold larger than those of the control mice. Microarray analysis revealed 2,672 spleen-derived candidate genes; more genes were downregulated than upregulated (849/764). Reverse transcriptase-polymerase chain reaction (RT-PCR) and quantitative real-time PCR (qRT-PCR) were used for validating the results of the microarray analysis of mRNA expression.</p> <p>Conclusions</p> <p>In conclusion, dHuEPO tg mice caused excessive erythrocytosis that led to abnormal blood composition, short lifespan, and abnormal splenomegaly. Further, we identified 2,672 genes associated with splenomegaly by microarray analysis. These results could be useful in the development of dHuEPO-producing tg animals.</p

    Broken inversion symmetry in van der Waals topological ferromagnetic metal iron germanium telluride

    Full text link
    Inversion symmetry breaking is critical for many quantum effects and fundamental for spin-orbit torque, which is crucial for next-generation spintronics. Recently, a novel type of gigantic intrinsic spin-orbit torque has been established in the topological van-der-Waals (vdW) magnet iron germanium telluride. However, it remains a puzzle because no clear evidence exists for interlayer inversion symmetry breaking. Here, we report the definitive evidence of broken inversion symmetry in iron germanium telluride directly measured by the second harmonic generation (SHG) technique. Our data show that the crystal symmetry reduces from centrosymmetric P63/mmc to noncentrosymmetric polar P3m1 space group, giving the three-fold SHG pattern with dominant out-of-plane polarization. Additionally, the SHG response evolves from an isotropic pattern to a sharp three-fold symmetry upon increasing Fe deficiency, mainly due to the transition from random defects to ordered Fe vacancies. Such SHG response is robust against temperature, ensuring unaltered crystalline symmetries above and below the ferromagnetic transition temperature. These findings add crucial new information to our understanding of this interesting vdW metal, iron germanium telluride: band topology, intrinsic spin-orbit torque and topological vdW polar metal states.Comment: 32 pages, 9 figures, Accepted by Advanced Material
    corecore