401 research outputs found

    Applications of outer measures to separation properties of lattices and regular or σ

    Get PDF
    Associated with a 0−1 measure μ∈I(ℒ) where ℒ is a lattice of subsets of X are outer measures μ′ and μ˜; associated with a σ-smooth 0−1 measure μ∈Iσ(ℒ) is an outer measure μ″ or with μ∈Iσ(ℒ′), ℒ′ being the complementary lattice, another outer measure μ˜˜. These outer measures and their associated measurable sets are used to establish separation properties on ℒ and regularity and σ-smoothness of μ. Separation properties between two lattices ℒ1 and ℒ2, ℒ1⫅ℒ2, are similarly investigated. Notions of strongly σ-smooth and slightly regular measures are also used

    Circular arch analysis

    Get PDF
    This work presents an analysis of a two-hinged circular arch by both the elastic theory and the deflection theory. The basic assumption made in this analysis was that the moment of inertia of the arch rib and the normal force vary as the secant of the angle with respect to the crown. The increase of maximum moment as found by the deflection theory was in the range of 30% --Abstract, page 2

    Project Management Changes in Digital Transformation

    Get PDF
    Digital transformation has brought business disruption in business models, enabled organizations to engage in customers in innovative ways, and improved efficiency in supply chain and operations. Organizations often employ projects as a form to implement strategic digital initiatives and explorations of digital processes. Digital transformation projects have unique characteristics that require changes in project management approaches. This paper adopts the socio-technical system theory to examine the social and technical aspects of project management in digital transformation and identify gaps for future research. Since this is a research-in-progress paper, selected gaps are discussed

    When does One Weight Threats more? An Integration of Regulatory Focus Theory and Protection Motivation Theory

    Get PDF
    Protection motivation theory has been adopted to understand the driver of information security behaviors broadly. Based on theoretical arguments and empirical results, security behaviors are driven by individuals’ appraisal toward threats and coping. However, while most study focus on the impacts of independent variables on dependent variables, previous studies largely ignore a fact that, under certain conditions, individuals tend to weight the importance of threat (or coping) appraisal more. Given that the goal of security behavior is to protection information and individuals may be oriented to the goal differently, we argue that the magnitude of the impacts of threat and coping appraisal may be contingent on individuals’ goal orientation. Specifically, this study attempts to integrate protection motivation theory with regulatory focus theory and explore whether (1) threat appraisal is more critical when prevention focus in high and (2) coping appraisal generates more impact when promotion focus is high. By integrating protection motivation theory with regulatory focus theory and revealing the moderating roles of regulatory focus on protection motivations, we expect to contribute to protection motivation theory by showing the effects of threat and coping appraisal may be contingent on certain conditions

    How to Better Reduce Confirmation Bias? The Fit Between Types of Counter-Argument and Tasks

    Get PDF
    Confirmation bias is a driver of problematic decision making. People search information supporting current beliefs and ignore real critical evidence. Counter-argument i.e. providing evidences opposite to preferred beliefs was shown to have an effect on reducing confirmation bias. This study advances past studies by separating counter-arguments into two types and examining their effects in different stock investment contexts. We attempt to show that different types of counter-arguments are needed under different decisional contexts

    Connected strangers : manipulating social perceptions to study trust

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2010.Cataloged from PDF version of thesis.Includes bibliographical references.Economic views of trust, grounded in repeated game theory and behavioral economics experiments, largely ignore social factors such as personal relationships between subjects. In this study, we designed a new experimental procedure, the "Social Lending Game", in which aspects of trust are measured as a function of differing social contexts. The procedure harnesses real-world social relationships while keeping subjects' identities confidential. We developed relationship mining methods that categorize social connections into trustful ties, distrustful ties, and neutral ties. Subjects in the Social Lending Game were led to believe they were paired up with a stranger with real social connections to them. The perceived social connections were systematically manipulated to different types and strengths of social ties to measure the effect of social perception on trusting behavior. Surprisingly, we found that people trust strangers as much as they trust a friend's friend. In contrast, people distrust strangers when they are told that there exists no social connection to the strangers. These methods and results point to a number of future research topics that leverage social networks to reinvestigate utility theory, trust-based decisions and risk-taking behaviors in social contexts.by Sheng-Ying Pao.S.M

    THE ANTECEDENTS OF AN INDIVIDUAL\u27S COMMITMENTS TOWARD CONTINUOUSLY USING SOCIAL NETWORK SITE

    Get PDF
    The Social network sites (SNS) has been rapid diffusion around the world. With the increasing importance of SNS, continuance intention also becomes a popular issue in the SNS context. SNS providers have to maintain better relationships with users and make individuals continue to use their sites. Based on this phenomenon, the objective of this study is to gain a better understanding of the continuance intention of SNS through examining the effects of commitments. Specifically, followed Meyer and Allen’s three-component model of commitment, we develop a theoretical model to understand the factors that influence normative, affective and continued commitment and investigate the effects of commitments on continuance intention in the SNS context. Through a survey-based empirical investigation, we anticipate the results to enhance our existing knowledge on continuance intention in the SNS context

    In silico identification and comparative analysis of differentially expressed genes in human and mouse tissues

    Get PDF
    BACKGROUND: Screening for differentially expressed genes on the genomic scale and comparative analysis of the expression profiles of orthologous genes between species to study gene function and regulation are becoming increasingly feasible. Expressed sequence tags (ESTs) are an excellent source of data for such studies using bioinformatic approaches because of the rich libraries and tremendous amount of data now available in the public domain. However, any large-scale EST-based bioinformatics analysis must deal with the heterogeneous, and often ambiguous, tissue and organ terms used to describe EST libraries. RESULTS: To deal with the issue of tissue source, in this work, we carefully screened and organized more than 8 million human and mouse ESTs into 157 human and 108 mouse tissue/organ categories, to which we applied an established statistic test using different thresholds of the p value to identify genes differentially expressed in different tissues. Further analysis of the tissue distribution and level of expression of human and mouse orthologous genes showed that tissue-specific orthologs tended to have more similar expression patterns than those lacking significant tissue specificity. On the other hand, a number of orthologs were found to have significant disparity in their expression profiles, hinting at novel functions, divergent regulation, or new ortholog relationships. CONCLUSION: Comprehensive statistics on the tissue-specific expression of human and mouse genes were obtained in this very large-scale, EST-based analysis. These statistical results have been organized into a database, freely accessible at our website , for easy searching of human and mouse tissue-specific genes and for investigating gene expression profiles in the context of comparative genomics. Comparative analysis showed that, although highly tissue-specific genes tend to exhibit similar expression profiles in human and mouse, there are significant exceptions, indicating that orthologous genes, while sharing basic genomic properties, could result in distinct phenotypes

    Memory Efficient Corner Detection for Event-driven Dynamic Vision Sensors

    Full text link
    Event cameras offer low-latency and data compression for visual applications, through event-driven operation, that can be exploited for edge processing in tiny autonomous agents. Robust, accurate and low latency extraction of highly informative features such as corners is key for most visual processing. While several corner detection algorithms have been proposed, state-of-the-art performance is achieved by luvHarris. However, this algorithm requires a high number of memory accesses per event, making it less-than ideal for low-latency, low-energy implementation in tiny edge processors. In this paper, we propose a new event-driven corner detection implementation tailored for edge computing devices, which requires much lower memory access than luvHarris while also improving accuracy. Our method trades computation for memory access, which is more expensive for large memories. For a DAVIS346 camera, our method requires ~3.8X less memory, ~36.6X less memory accesses with only ~2.3X more computes

    The Role of Formal and Social Control in Information Security Behaviors

    Get PDF
    The purpose of this study is to explore the effect of formal and social control on in-role and extra-role security behaviors. Following past studies, we reexamine the effect of formal control on behaviors. Based on social control theory, we further hypothesize the effect of social control on security behaviors. Data collected from 259 members of IS departments confirmed our hypotheses that both formal control and social control generate effects on both in-role and extrarole security behaviors. Implications for academia and practitioners are also provided
    • …
    corecore