742 research outputs found
The Relationship Between Delegation and Incentives Across Occupations: Evidence and Theory
A large literature, both theoretical and empirical, suggests that delegation of authority and incentives should have a positive relationship. Using data from a large cross section of British establishments, we show that the positive relationship between incentives and delegation that has been consistently documented in the empirical literature masks a stark difference between job types. We classify jobs into two categories: complex jobs include professional, technical and scientific occupations and simple jobs consist of all other occupations with a lower-level code in the Standard Occupational Classification (SOC) system. We find that for simple jobs, the relationship between delegation and incentives is positive as has been found in the previous literature, whereas for complex jobs it is negative. To explain this negative relationship for complex jobs, we develop a model where tasks have a risk-return tradeoff and where a single performance measure has to induce both task selection and effort. We find that if tasks vary sufficiently by risk and return and if effort is noisy to measure, then delegation and incentives have a negative relationship
Inclusive, prompt and non-prompt identification in proton-proton collisions at the Large Hadron Collider using machine learning
Studies related to meson, a bound state of charm and anti-charm
quarks (), in heavy-ion collisions, provide genuine testing grounds
for the theory of strong interaction, quantum chromodynamics (QCD). To better
understand the underlying production mechanism, cold nuclear matter effects,
and influence from the quark-gluon plasma, baseline measurements are also
performed in proton-proton () and proton-nucleus (--A) collisions. The
inclusive measurement has contributions from both prompt and
non-prompt productions. The prompt is produced directly from the
hadronic interactions or via feed-down from directly produced higher charmonium
states, whereas non-prompt comes from the decay of beauty
hadrons. In experiments, is reconstructed through its
electromagnetic decays to lepton pairs, in either or
decay channels. In this work, for the first time, machine
learning techniques are implemented to separate the prompt and non-prompt
dimuon pairs from the background to obtain a better identification of the
signal for different production modes. The study has been
performed in collisions at and 13 TeV simulated using
PYTHIA8. Machine learning models such as XGBoost and LightGBM are explored. The
models could achieve up to 99\% prediction accuracy. The transverse momentum
() and rapidity () differential measurements of inclusive,
prompt, and non-prompt , its multiplicity dependence, and the
dependence of fraction of non-prompt ()
are shown. These results are compared to experimental findings wherever
possible.Comment: Same as the published version in Phys. Rev.
Prevalence of Helicobacter Pylori among Patients undergoing Gastrodudenoscopy in a Hospital in Western Nepal
Introduction: Helicobacter pylori (H. pylori) related chronic gastritis is a major health problem worldwide, specially in the developing countries. The prevalence of H. pylori infection has been reported to vary between and even within countries. There are limited data on this infection in Western Nepal. Our objective was to study the prevalence of H. pylori infection and its association with presenting complains and upper gastrointestinal diseases.
Methods: Medical records of patients undergoing gastrodudenoscopy and biopsy for various upper gastrointestinal symptoms from 1st of January 2015 to 30th of June 2017 were reviewed for presence of H. pylori infection, demographics, indications for gastrodudenoscopy, and histopathology findings. T-test, Chi-square test, and Fisher exact test were applied.
Results: Two hundred fifty six patients (135 male and 121 female) with a mean age of 47 (SD = 16.5) underwent gastroscopic biopsy and had an overall H. pylori prevalence of 24.6%. H. pylori infection was most commonly noted between 41 to 60 years of age. Gender did not seem to be significantly associated (p = 0.82) but gastrointestinal bleed was significantly associated with H. pylori infection (p = 0.006). The most common histopathological diagnosis was gastritis followed by gastrodudenitis; however, none of the diagnosis were found to be significantly associated with H. pylori infection.
Conclusion: The overall prevalence of H. pylori infection was 24.6% and was most common between 40 to 60 years of age. Heart burn was the most common symptom and gastrointestinal bleed was the only significantly associated symptom with H. pylori infection
Pattern of Acute Poisoning Attending a Tertiary Care Hospital of Western Nepal
Introduction: Poisoning with various substances is a major public health problem and a reason for significant morbidity and mortality throughout the globe. It is one of the most common presentation in an emergency department. This study was conducted to determine the sociodemographic, poisoning types, and mode of poisoning in cases attending a tertiary hospital of Western Nepal.
Methods: A retrospective observational study of two years was conducted from July 2014 to June 2016. Demography details, name of poisonous substance, and reasons for poisoning were reviewed and analyzed using descriptive statistics.
Results: A total of 65 cases of poisoning were recorded. The occurrence was more common in female (n=44, 67.7%) than in male (n=21, 32.3%) with a F:M ratio of 2.1:1. Poisoning was most common in the age group of 11-20 years (32.3%). Most of the cases were students (37%) followed by farmers (26%). The most commonly abused poisoning substance were organophosphorous compounds, zinc-phosphate, and kerosene in adults, adolescents, and children respectively. Oral route was the most common (99%) route of administration. Suicidal attempt, as a mode of poisoning, accounted for 70.8% of total poisoning cases.
Conclusion: Female and young people are at greater risk of acute poisoning. Insecticide was the most common agent and self administer poisoning was the most common mode of poisoning. The occurrence of poisoning and its morbidity and mortality can be reduced by developing and implementation of effective prevention strategies like restricting easy poison sales, establishing drug and poison information centers, and community awareness programs
Effects of clustered nuclear geometry on the anisotropic flow in O--O collisions at the LHC within a multiphase transport model framework
To understand the true origin of flow-like signatures and applicability of
hydrodynamics in small collision systems, effects of soft QCD dynamics, the
sensitivity of jet-like correlations, and non-equilibrium effects, efforts are
being made to perform \textit{p}--O and O--O collisions at the LHC and RHIC
energies. It is equally interesting to look into the possible signatures of an
--clustered nuclear geometry in O--O collisions by
studying the initial-state effects on the final-state observables. In this
work, within a multiphase transport model, we implement an --cluster
tetrahedral density profile in the Oxygen nucleus along with the default
Woods-Saxon density profile. We study the eccentricity (),
triangularity (), normalized symmetric cumulants (NCS(2,3)),
elliptic flow (), and triangular flow () in O--O
collisions at TeV. The constituent quark number scaling
of the elliptic flow is also reported. For the most central collisions,
enhanced effects in
and with a negative value of
NSC(2,3), and an away-side broadening in the two-particle azimuthal correlation
function () of the identified particles are observed in the
presence of an --clustered geometry.Comment: 11 pages and 8 captioned figures. Submitted for publicatio
Envelope Protection for Autonomous Unmanned Aerial Vehicles
This paper describes the design, development, and testing of an automatic envelope protection system as implemented on Georgia Institute of Technology's unmanned helicopter GTMax. The envelope protection system makes use of online-learning adaptive neural networks to generate online dynamic models, which are used to estimate limits on controller commands. The system provides command capability up to the limit boundaries while preventing envelope exceedance. Simulation and flight-test results are provided for load factor and rotor stall limit protection during aggressive maneuvering
Optimal Incentives in Problem Solving Teams
Workers in problem solving teams- these are short term teams that are set up to generate ideas for improving a production process or a product- are often rewarded through group incentive pay. This is even though group incentives give workers an incentive to free ride. In our paper, we show how problem solving creates implicit incentives to reduce free riding, which in turn lowers the cost of using group incentive pay. In fact, when an employer has initial bargaining power and implicit incentives are strong, group incentive pay yields higher profits than monitoring workers, even when monitoring is costless
A study of Email date attacks in Network Security
Abstract:- phishers have made uses of an increase email of delivery systems handing over confidential and personal information. After 12 years of spoofing attacks publicity, spoofing attacks to the professional whose run them. While spoofed mail developing phisher attack vectors, protect their customer personal data. Business Customer has become way of “officially” e-mail data and question the integrity of the web sites they now connected to as their confidence With various governments and industry groups to preventing any organizations can takes a proactive approach’s in combining the email attacks threat. the tool understand and technique use by these professional criminals, and analyze flaw in their own perimeters securities or application, organization can preventing successfully data spoofing attack techniques .These update paper cover the technologies and securities flaw spoofed exploit to conducted their attack, and provide detail vendor advice on what the organization can do to preventing data attack. The information, security professionals and customer can works to protect them selve again the next attack scam to reached their mail inboxes. An office worker clicks on an attachment in email. This infect each Personal computer with malware that components of other machine in each office by snooped password that travel across the MAN. Anthers of the attacks techniques that make sense only in a networks context is web hacking.
DOI: 10.17762/ijritcc2321-8169.15014
Heterogeneity in Organizations
We explain why some organizations cohere around a mission, with members having similar mission preferences, whereas other organizations allow their mission to be contested by members whose preferences differ. Like in earlier work, coherence aligns interests over missions. But in contrast to previous work, this alignment comes at the cost of lower motivation: when resources are scarce and when members care about similar missions there is a free riding problem. This tradeoff between mission alignment and free riding determines the optimal mission structure. We draw on several case studies of government agencies to support our theory
- …