370 research outputs found
The Influence of Technological Improvement in the Development of Ready-to-Wear from 1850 to 1920s: The Implications for the Future of the Apparel Industry
The purpose of this study is to research the influence of technological improvement in the clothing industry after sewing machine was invented in 1846, in order to apply the interpretation of this research to the direction for future apparel manufacturing system. The qualitative research method was used to find the answers for following questions: What did clothing industry do with sewing machine invention in their manufacturing system? Will new technology change the shape of both fashion industry and our culture as it happened in the past? And it should be the same frame or it should the different approach? Although the purpose of this research was finding the answers for questions and predicting where current fashion industry will go further with which types of new technology and strategy, this study also have led researcher to look at another direction for the future of apparel industry
Beauty and Legacy of War
In this creative design research, the origin of slashing as a design detail that trended during the Renaissance period was investigated and interpreted to explore this design process. The main characteristic that I intended to deliver was a contemporary look that also conveys a strong concept of the bitter legacy of the era because, during the Renaissance, slashing was in fashion as an unintentional development after returning from the battlefield. I used an abundant slash decoration, along with a silver crinkle surface texture, glittering silver powdered surface, and silver and black transparent surface to express the spirit of the Renaissance fashion, which was considered an impressive display of luxury. Furthermore, a great amount of slashing over the jacket’s bodice was created in a traditional way, but the horizontal slashes with ribbon interlacing over the sleeves and skirts was intended to convey a contemporary look
Technology-based Practical Blockchain System Audit Maturity Model
Information system auditing can reveal the quality of such systems, and standard audit items are crucial elements of system and audit quality. Blockchain
technology is currently being applied to various areas including the financial, manufacturing, healthcare, distribution, and public sectors, and an increasing number of systems
that apply such technologies are also being developed.The current audit model is insufficient for application in the field, and the auditing of systems applying new technologies,
such as blockchain, has not been given sufficient attention. Furthermore, it is difficult to evaluate the relative levels of audited systems using audit results. Existing studies
have only examined the auditing of systems that apply blockchain. Although the Korea Association of Information Systems Audit has suggested a checklist for systems
applying blockchain, it has yet to be adopted. To address this problem, 50 existing audit result reports and technical data were collected, from which sixteen factors of four
audit quality properties consisting of blockchain system, technology compliance, software quality, and document were derived. Furthermore, an audit maturity model was
presented after evaluating the priorities of the 16 derived factors. The results of the evaluation of the priorities of audit items indicated that auditors give a higher importance
to technology-based than document-based audits of information systems. This study contributes to the literature by deriving field-oriented audit items including blockchain
technology, thus enabling practical audits to be conducted in a short time. Further, this study enables the maturity of systems to be compared based on audit results by
presenting audit maturity
Kako su aktivnosti na Twitteru povezane s ponašanjem najpoznatijih kriptovaluta? Dokazi iz analize društvenih mreža i analize sentimenta
Cryptocurrencies have embraced Twitter as a major channel of
communication. Employing social network analysis and
sentiment analysis, this study investigates the Twitter-mediated
communication behaviors among cryptocurrencies. This study
determines whether a significant association exists between
cryptocurrencies\u27 Twitter networks and their credit scores. Data
were drawn from the Twitter pages of several top
cryptocurrencies. The results indicate that reply–mention
networks had the densest structure, that the following–follower
network structure was correlated with the reply–mention
structure, and that the reply–mention and co–tweet networks
were positively correlated. The results also indicate that
cryptocurrencies\u27 active networking strategies affected their
credit scores and more importantly, that cryptocurrencies
frequently linked with fellow currencies tended to have high
credit scores.Kriptovalute su prigrlile Twitter kao glavni kanal komunikacije
kojim prenose novosti i grade odnose s (potencijalnim)
ulagačima i kupcima. Služeći se analizom društvenih mreža i
analizom sentimenta, rad istražuje Twitterom posredovano
komunikacijsko ponašanje kriptovaluta proučavanjem
učestalosti tvitova te njihovih struktura: following-follower,
reply-mention i co-tweet. Ocjene tržišta često znatno utječu i
na proizvođače (tj. programere) i na potrošače (tj. vlasnike
kriptovaluta). Stoga ovo istraživanje utvrđuje postoji li
povezanost između Twitterovih mreža kriptovaluta i njihovih
kreditnih ocjena. Podaci su prikupljeni na Twitterovim
stranicama niza najpoznatijih kriptovaluta. Rezultati
pokazuju da su reply-mention mreže imale najgušću
strukturu, da je mrežna struktura following-follower
povezana sa strukturom reply-mention i da su reply-mention
i co-tweet mreže pozitivno povezane. Rezultati također
upućuju na to da su aktivne mrežne strategije kriptovaluta
utjecale na njihove kreditne ocjene i, što je još važnije, da
kriptovalute koje se češće povezuju sa srodnim valutama
obično imaju visoke kreditne ocjene
The Effect Of Abnormal Pay Dispersion On Earnings Management
This study examines the effect of the abnormal pay dispersion on earnings management. Prior studies find that pay dispersion among top executives affect firm performance and executive turnover. We expect that abnormal pay dispersion among top executives affects financial reporting practice as well as firm performance and turnover and provide evidence of positive association between abnormal pay dispersion and earnings management. This result suggests that executives are more likely to be engaged in earnings management to increase their compensation when they feel unfairness from the relative level of compensation. This finding helps financial statement users interpret firm performance and anticipate future outcomes by implying that additional managerial incentives for financial reporting are derived from internal pay dispersion. Our finding that abnormal pay dispersion leads to higher agency costs should also be of interest to shareholders
Area-Optimized Fully-Flexible BCH Decoder for Multiple GF Dimensions
Recently, there are increasing demands for fully flexible Bose Chaudhuri Hocquenghem (BCH) decoders, which can support different dimensions of Galois fields (GF) operations. As the previous BCH decoders are mainly targeting the fixed GF operations, the conventional techniques are no longer suitable for multiple GF dimensions. For the area-optimized flexible BCH decoders, in this paper, we present several optimization schemes for reducing hardware costs of multi-dimensional GF operations. In the proposed optimizations, we first reformulate the matrix operations in syndrome calculation and Chien search for sharing more common sub-expressions between GF operations having different dimensions. The cell based multi-m GF multiplier is newly introduced for the area-efficient flexible key-equation solver. As case studies, we design several prototype flexible BCH decoders for digital video broadcasting systems and NAND flash memory controllers managing different page sizes. The implementation results show that the proposed fully-flexible BCH decoder architecture remarkably enhances the area-efficiency compared with the conventional solutions.112Ysciescopu
The Scope and Presupposition of the Additive Particle -to
This paper investigates the scopal behavior of the Korean additive particle -to; specifically how the presupposition due to the additive particle interacts scopally with another quantificational element in the sentence, and how changes in word order due to scrambling affect the presupposition. In the course of this investigation, I identify three factors that affect the scope pattern of the -to phrase: scrambling, the kind of function in the preceding context, and the nature of the focused phrase, which leads to an ordering restriction between a referential expression and a functional expression. The analysis is composed of three elements, each of which is independently motivated. First, I argue, following Kripke (1990) and Heim (1992) among others, that the anaphoric approach to the additive particle is superior to the existential approach. Secondly, I claim that syntactic binding is not the only mechanism for variable binding. I show that semantic binding is also available, which is operative when we are dealing with functional dependencies. Finally, I propose two principles of economy that regulate reconstruction and type raising. Both operations are allowed only when they are motivated. The motivation of reconstruction is a change in truth-conditions. If reconstruction only affects presupposition, it is not licensed. Similarly, type raising is possible when it is motivated by the lexical entry of the additive particle, namely to avoid a type-mismatch
The syntax and semantics of focus particles
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Linguistics and Philosophy, 2004.Includes bibliographical references (p. 202-210).(cont.) (iii) covert operations such as reconstruction and type raising are constrained by an economy principle so that they are disallowed when not motivated.This dissertation investigates the syntax and semantics of two focus particles in Korean with special reference to their scopal behavior. The two particles under consideration are the exclusive particle man and the additive particle to. The main empirical concern of this work is to show that despite apparent syntactic similarities between focused phrases (i.e. phrases containing focus particles) and standard QPs, the former exhibits more diverse scopal behavior than the latter. The claims that are made in the course of the discussion of the scope patterns constitute the theoretical contribution of this work. The scope of the particle man 'only' varies with the morphological marking of the man-phrase, which is puzzling under the assumption that the particle is a scope-bearing element. I argue that despite appearances, the particle is not a scope-bearing element, but an agreement morpheme, and that the quantificational meaning comes from a null head ONLY. I also claim that the position of the ONLY head can be deduced from the order of nominal affixes, thanks to the strong correlation between morphology and syntax. This new correlation between nominal affixes and the scope of focus particles supports Baker's Mirror Principle in a new area outside the verbal domain. The scopal behavior of to-phrases is also distinct from that of QPs. Three factors are identified that affect the scope of to-phrases: scrambling, the kind of function in the preceding context, and the nature of the focused phrase. I claim that (i) the anaphoric view of additive particles is superior to the existential view, (ii) both syntactic and semantic mechanisms are available for variable binding, thus the presence of a bound variable in a dislocated position does not imply syntactic reconstruction, andby Youngjoo Lee.Ph.D
Selective deep convolutional neural network for low cost distorted image classification
Neural networks trained using images with a certain type of distortion should be better at classifying test images with the same type of distortion than generally-trained neural networks, given other factors being equal. Based on this observation, an ensemble of convolutional neural networks (CNNs) trained with different types and degrees of distortions is used. However, instead of simply classifying test images of unknown distortion types with the entire ensemble of CNNs, an extra tiny CNN is specifically trained to distinguish between the different types and degrees of distortions. Then, only the dedicated CNN for that specific type and degree of distortion, as determined by the tiny CNN, is activated and used to classify a possibly distorted test image. This proposed architecture, referred to as a \textit{selective deep convolutional neural network (DCNN)}, is implemented and found to result in high accuracy with low hardware costs. Detailed simulations with realistic image distortion scenarios using three popular datasets show that memory, MAC operations, and energy savings of up to 93.68%, 93.61%, and 91.92%, respectively, can be achieved with almost no reduction in image classification accuracy. The proposed selective DCNN scores up to 2.18x higher than the state-of-the-art DCNN model when evaluated using NetScore, a comprehensive metric that considers both CNN performance and hardware cost. In addition, it is shown that even higher hardware cost reduction can be achieved when selective DCNN is combined with previously proposed model compression techniques. Finally, experiments conducted with extended types and degrees of image distortion show that selective DCNN is highly scalable.11Ysciescopu
- …