9 research outputs found

    What determines logistics sub-degree students’ decision to pursue a bachelor’s degree?

    Get PDF
    With the growing importance of the logistics industry and the increasing demand for logistics professionals with a bachelor’s degree qualification, the government and industry in China have long been looking for ways to attract more logistics sub-degree students to pursue higher education. This article aims to provide insights into the factors that determine logistics sub-degree students’ intention to pursue a bachelor’s degree. The study extended the theory of reasoned action (TRA) model to include four variables, namely perceived difficulty, job opportunities, job starting salary and genuine interest. The findings from the study involving 361 logistics sub-degree students from three institutions show that logistics sub-degree students’ decision to pursue a bachelor’s degree is determined by attitude, subjective norm, perceived difficulty, job opportunities, job starting salary and genuine interest. Genuine interest is identified as a new precursor of intention. The findings also show that there is a significant difference between students from different types of programmes. Based on the findings, this article proposes some measures for the relevant parties to motivate and attract logistics sub-degree students to further their study at bachelor’s degree level

    Isotropic photonic band gap and anisotropic structures in transmission spectra of two-dimensional 5-fold and 8-fold symmetric quasiperiodic photonic crystals

    Get PDF
    We measured and calculated transmission spectra of two-dimensional quasiperiodic photonic crystals (PCs) based on a 5-fold (Penrose) or 8-fold (octagonal) symmetric quasiperiodic pattern. The photonic crystal consisted of dielectric cylindrical rods in air placed normal to the basal plane on vertices of tiles composing the quasiperiodic pattern. An isotropic photonic band gap (PBG) appeared in the TM mode, where electric fields were parallel to the rods, even when the real part of a dielectric constant of the rod was as small as 2.4. An isotropic PBG-like dip was seen in tiny Penrose and octagonal PCs with only 6 and 9 rods, respectively. These results indicate that local multiple light scattering within the tiny PC plays an important role in the PBG formation. Besides the isotropic PBG, we found dips depending on the incident angle of the light. This is the first report of anisotropic structures clearly observed in transmission spectra of quasiperiodic PCs. Based on rod-number and rod-arrangement dependence, it is thought that the shapes and positions of the anisotropic dips are determined by global multiple light scattering covering the whole system. In contrast to the isotropic PBG due to local light scattering, we could not find any PBGs due to global light scattering even though we studied transmission spectra of a huge Penrose PC with 466 rods.Comment: One tex file for manuscript and 12 PNG files for figures consisting of Fig.1a-d, 2,3, ...

    Worldwide variation in cardiovascular magnetic resonance practice models

    Get PDF
    INTRODUCTION: The use of cardiovascular magnetic resonance (CMR) for diagnosis and management of a broad range of cardiac and vascular conditions has quickly expanded worldwide. It is essential to understand how CMR is utilized in different regions around the world and the potential practice differences between high-volume and low-volume centers. METHODS: CMR practitioners and developers from around the world were electronically surveyed by the Society for Cardiovascular Magnetic Resonance (SCMR) twice, requesting data from 2017. Both surveys were carefully merged, and the data were curated professionally by a data expert using cross-references in key questions and the specific media access control IP address. According to the United Nations classification, responses were analyzed by region and country and interpreted in the context of practice volumes and demography. RESULTS: From 70 countries and regions, 1092 individual responses were included. CMR was performed more often in academic (695/1014, 69%) and hospital settings (522/606, 86%), with adult cardiologists being the primary referring providers (680/818, 83%). Evaluation of cardiomyopathy was the top indication in high-volume and low-volume centers (p = 0.06). High-volume centers were significantly more likely to list evaluation of ischemic heart disease (e.g., stress CMR) as a primary indicator compared to low-volume centers (p < 0.001), while viability assessment was more commonly listed as a primary referral reason in low-volume centers (p = 0.001). Both developed and developing countries noted cost and competing technologies as top barriers to CMR growth. Access to scanners was listed as the most common barrier in developed countries (30% of responders), while lack of training (22% of responders) was the most common barrier in developing countries. CONCLUSION: This is the most extensive global assessment of CMR practice to date and provides insights from different regions worldwide. We identified CMR as heavily hospital-based, with referral volumes driven primarily by adult cardiology. Indications for CMR utilization varied by center volume. Efforts to improve the adoption and utilization of CMR should include growth beyond the traditional academic, hospital-based location and an emphasis on cardiomyopathy and viability assessment in community centers

    Representational predicaments for employees: Their impact on perceptions of supervisors\u27 individualized consideration and on employee job satisfaction

    Get PDF
    A representational predicament for a subordinate vis-à-vis his or her immediate superior involves perceptual incongruence with the superior about the subordinate\u27s work or work context, with unfavourable implications for the employee. An instrument to measure the incidence of two types of representational predicament, being neglected and negative slanting, was developed and then validated through an initial survey of 327 employees. A subsequent substantive survey with a fresh sample of 330 employees largely supported a conceptual model linking being neglected and negative slanting to perceptions of low individualized consideration by superiors and to low overall job satisfaction. The respondents in both surveys were all Hong Kong Chinese. Two case examples drawn from qualitative interviews illustrate and support the conceptual model. Based on the research findings, we recommend some practical exercises to use in training interventions with leaders and subordinates. © 2013 Copyright Taylor and Francis Group, LLC

    An Empirical Study of Leadership Style of Middle Managers in Taiwan’s University Libraries

    No full text
    本研究以問卷調查法探討台灣地區大學圖書館中階主管之領導風格,期望此研究能增進國內圖書資訊學界與圖書館組織對中階主管領導行為之瞭解,從而建立我國大學圖書館中階主管領導風格之整體概念。本研究計有85位大學圖書館中階主管及343位館員參與問卷調查,研究結果顯示,大學圖書館中階主管之領導風格多屬高任務建構-高關懷體恤型及低任務建構-低關懷體恤型,同時,中階主管對個人領導行為之自我評估與館員所認知者確實存在著明顯的差異,而館員個人背景因素亦會影響其對中階主管領導行為的認知。Few studies have addressed the topic on leadership within the field of librarianship. With a hope to add to the narrative literature of the leadership, the researcher employed literature review and analysis, questionnaires, and statistics analysis, to explore the leadership style of middle managers in the university libraries in Taiwan area. 343 university librarians and 85 department heads participated in this survey. The survey data indicates that there is a discrepancy between middle managers’ selfexpressed leadership behavior profiles and those perceived by subordinate librarians. And some subordinate librarians’ demographics may affect their perceptions of leadership behavior demonstrated by department heads

    Beyond eCK: Perfect Forward Secrecy under Actor Compromise and Ephemeral-Key Reveal ⋆

    No full text
    Abstract. We show that it is possible to achieve perfect forward secrecy in two-message or one-round key exchange (KE) protocols that satisfy even stronger security properties than provided by the extended Canetti-Krawczyk (eCK) security model. In particular, we consider perfect forward secrecy in the presence of adversaries that can reveal ephemeral secret keys and the long-term secret keys of the actor of a session (similar to Key Compromise Impersonation). We propose two new game-based security models for KE protocols. First, we formalize a slightly stronger variant of the eCK security model that we call eCK w. Second, we integrate perfect forward secrecy into eCK w, which gives rise to the even stronger eCK-PFS model. We propose a securitystrengthening transformation (i. e., a compiler) between our new models. Given a two-message Diffie-Hellman type protocol secure in eCK w, our transformation yields a two-message protocol that is secure in eCK-PFS. As an example, we show how our transformation can be applied to the NAXOS protocol
    corecore