6,532 research outputs found

    Local Hall effect in hybrid ferromagnetic/semiconductor devices

    Full text link
    We have investigated the magnetoresistance of ferromagnet-semiconductor devices in an InAs two-dimensional electron gas system in which the magnetic field has a sinusoidal profile. The magnetoresistance of our device is large. The longitudinal resistance has an additional contribution which is odd in applied magnetic field. It becomes even negative at low temperature where the transport is ballistic. Based on the numerical analysis, we confirmed that our data can be explained in terms of the local Hall effect due to the profile of negative and positive field regions. This device may be useful for future spintronic applications.Comment: 4 pages with 4 fugures. Accepted for publication in Applied Physics Letter

    The Effect of Trust and its Antecedents on Robot Acceptance

    Full text link
    As social and socially assistive robots are becoming more prevalent in our society, it is beneficial to understand how people form first impressions of them and eventually come to trust and accept them. This paper describes an Amazon Mechanical Turk study (n = 239) that investigated trust and its antecedents trustworthiness and first impressions. Participants evaluated the social robot Pepper's warmth and competence as well as trustworthiness characteristics ability, benevolence and integrity followed by their trust in and intention to use the robot. Mediation analyses assessed to what degree participants' first impressions affected their willingness to trust and use it. Known constructs from user acceptance and trust research were introduced to explain the pathways in which one perception predicted the next. Results showed that trustworthiness and trust, in serial, mediated the relationship between first impressions and behavioral intention.Comment: In SCRITA 2023 Workshop Proceedings (arXiv:2311.05401) held in conjunction with 32nd IEEE International Conference on Robot & Human Interactive Communication, 28/08 - 31/08 2023, Busan (Korea

    Teaching Tip: What You Need to Know about Gamification Process of Cybersecurity Hands-on Lab Exercises: Lessons and Challenges

    Get PDF
    Cybersecurity education is becoming increasingly important in modern society, and hands-on practice is an essential element. Although instructors provide hands-on labs in their cybersecurity courses, traditional lab exercises often fail to effectively motivate students. Hence, many instructors desire to incorporate gamification in hands-on training to engage and motivate cybersecurity students, especially beginner learners. Given the dearth of guiding examples, this paper aims to describe the holistic process of converting traditional cybersecurity hands-on lab exercises to gamified lab exercises in an undergraduate network security course. We find that the gamified cybersecurity lab promotes students’ engagement, learning experience, and learning outcomes. The results show the positive acceptance of gamification by students as well as instructors. While gamification has been used in competitions and training, the success in the classroom and students’ desire for more gamification show that further investment in gamification will be more important in the classroom. We expect this paper to help instructors who are interested in gamification 1) convert traditional lab exercises to gamified labs; 2) estimate the extra workload and potential benefits; and 3) plan resources for implementation. This process is applicable to any cybersecurity courses with hands-on assignments

    THE INFLUENCE OF SOCIAL PRESENCE ON EVALUATING PERSONALIZED RECOMMENDER SYSTEMS

    Get PDF
    Providing recommendations is acknowledged as an important feature of a business-to-consumer online storefront. Although many studies have been conducted the algorithms and operational procedures relating to personalized recommender systems, empirical evidence demonstrating relationships between social presence and two important outcomes of evaluating recommender systems, reuse intention and trust, remains lacking. To test the existence of a causal link between social presence and reuse intention, and the mediating role of trust between these two variables, this study conducted experiments varying the levels of social presence while providing personalized recommendations to users based on their explicit preferences. This study also compared these effects in two different product contexts: hedonic and utilitarian products. Interactions of social presence and customer reviews were also investigated in these experiments. The results show that higher social presence increases both reuse intention and trust in recommender systems. In addition, the influence of social presence on reuse intention in the context of recommending utilitarian products is less than that in the context of recommending hedonic products

    An Efficient ISAR Imaging Method for Multiple Targets

    Get PDF
    This paper proposes an efficient method to obtain TSAR images of multiple targets flying in formation. The proposed method improves the coarse alignment and segmentation of the existing method. The improved coarse alignment method models the flight trajectory using a combination of a polynomial and Gaussian basis functions, and the optimum parameter of the trajectory is found using particle swarm optimization. In the improved segmentation, the binary image of the bulk TSAR image that contains all targets is constructed using a two-dimensional constant false alarm detector, then the image closing method is applied to the binary image. Finally, the connected set of binary pixels is used to segment each target from the bulk image. Simulations using three targets composed of point scattering centers and the measured data of the Boeing747 aircraft prove the effectiveness of the proposed method to segment three targets flying in formation.X113Ysciescopu
    corecore