10,012 research outputs found

    Linux Access Point and IPSec Bridge

    Get PDF
    [[abstract]]The main idea of this paper is to present an upper-layer security solution to solve security problems of the wireless network. The IEEE 802.11 standard defines the Wired Equivalent Privacy (WEP) Protocol. The goal of WEP is to provide data privacy to the wireless network. It is generally believed that the current wireless access points have a big security problem with WEP protocol. To solve this problem, a combination of Linux-based access point and IPSec bridge has been brought up to secure the wireless network.[[notice]]補正完畢[[journaltype]]國

    How Do Motivations for Commitment in Online Brand Communities Evolve? The Distinction Between Knowledge- and Entertainment-Seeking Motivations

    Get PDF
    The current study used the concept of motivational hierarchy to investigate how commitment is developed in online brand communities. By examining the online brand communities of two functional (Canon and Nikon) and two symbolic brands (Coca-Cola and Starbucks), the study focused on two pragmatic motives, knowledge- and entertainment-seeking motives, that served as the members’ initial drives to participate in online brand communities. The findings suggested that different initial motives followed different hierarchical routes to form commitment. Specifically, members with knowledge-seeking motives to participate in online brand communities became committed via two routes: with or without symbolic motives. On the other hand, entertainment-seeking members became committed only via the route through symbolic motives. Pragmatic and symbolic motives were connected by satisfaction, which could be seen as a proxy whether or not the pragmatic and symbolic motives were fulfilled

    Hodge-theoretic mirror symmetry for toric stacks

    Get PDF
    Using the mirror theorem [CCIT15], we give a Landau-Ginzburg mirror description for the big equivariant quantum cohomology of toric Deligne-Mumford stacks. More precisely, we prove that the big equivariant quantum D-module of a toric Deligne-Mumford stack is isomorphic to the Saito structure associated to the mirror Landau-Ginzburg potential. We give a GKZ-style presentation of the quantum D-module, and a combinatorial description of quantum cohomology as a quantum Stanley-Reisner ring. We establish the convergence of the mirror isomorphism and of quantum cohomology in the big and equivariant setting

    Drivers of Online Brand Community Value Creation: The Role of Psychological Empowerment

    Get PDF
    There is an upsurge of consumer empowerment driven by the rise of the Internet and online communities. However, the effect of psychological empowerment that may be experienced in contributing knowledge and experiences in the process of participation in online brand community has seldom been investigated. This study aims to examine the role of psychological empowerment in online brand community and its impact on value co-creation behaviors. By using PLS-SEM, the result indicate that perceived responsiveness, validation, status seeking, perceived network size, and information quality, facilitates the establishment of psychological empowerment, which in turn promotes consumers’ value co-creation behaviors. Implications for researchers and practitioners are discussed

    THE SELF-EXPRESSIVENESS OF FOOTPRINTS: UNDERSTANDING THE DRIVERS OF CHECK-IN

    Get PDF
    Drawing from the Dramaturgical theory (Goffman, 1959), present study contributes to propose a conceptual model that illuminate the underlying psychological mechanism which faciliate individual’s check-in behavior. Goffman (1959) posits that “impression management” impacts the self presentation of individuals, indicating that individuals adopt deliberate decisions to reveal particular aspects of the self. Past studies emphasize on the privacy issue that impacts location sharing (Barkhuus et al., 2008), while present study highlights that socially driven factors portrays a more comprehensive story that disclose the antecedenting drivers of check-in.This contributes in providing a framework to the previous sporadic studies concerning social motives in check-in literatures. Specifically, the findings support the view that individual’s public self-consciousness and peer influence, compelled by desirable self-presentation leads to involvment in check-in. This finding extends past researches in identifying two dimensions that drive check-in involvement. Furthermore, the results of this study confirm that driven by psychological proximity, a positive relationship is created between check-in involvement and place attachment, which in turn faciliates continual check-in behavioral intentions and the advocation of check-in

    Impact of Uniaxial Pressure on Structural and Magnetic Phase Transitions in Electron-Doped Iron Pnictides

    Full text link
    We use neutron resonance spin echo and Larmor diffraction to study the effect of uniaxial pressure on the tetragonal-to-orthorhombic structural (TsT_s) and antiferromagnetic (AF) phase transitions in iron pnictides BaFe2x_{2-x}Nix_{x}As2_{2} (x=0,0.03,0.12x=0,0.03,0.12), SrFe1.97_{1.97}Ni0.03_{0.03}As2_2, and BaFe2_2(As0.7_{0.7}P0.3_{0.3})2_2. In antiferromagnetically ordered BaFe2x_{2-x}Nix_{x}As2_{2} and SrFe1.97_{1.97}Ni0.03_{0.03}As2_2 with TNT_N and TsT_s (TNTsT_N\leq T_s), a uniaxial pressure necessary to detwin the sample also increases TNT_N, smears out the structural transition, and induces an orthorhombic lattice distortion at all temperatures. By comparing temperature and doping dependence of the pressure induced lattice parameter changes with the elastoresistance and nematic susceptibility obtained from transport and ultrasonic measurements, we conclude that the in-plane resistivity anisotropy found in the paramagnetic state of electron underdoped iron pnictides depends sensitively on the nature of the magnetic phase transition and a strong coupling between the uniaxial pressure induced lattice distortion and electronic nematic susceptibility.Comment: 18 pages, 15 figure

    Analysis of chaotic motion and its shape dependence in a generalized piecewise linear map

    Full text link
    We analyse the chaotic motion and its shape dependence in a piecewise linear map using Fujisaka's characteristic function method. The map is a generalization of the one introduced by R. Artuso. Exact expressions for diffusion coefficient are obtained giving previously obtained results as special cases. Fluctuation spectrum relating to probability density function is obtained in a parametric form. We also give limiting forms of the above quantities. Dependence of diffusion coefficient and probability density function on the shape of the map is examined.Comment: 4 pages,4 figure

    Neural net diagnostics for VLSI test

    Get PDF
    This paper discusses the application of neural network pattern analysis algorithms to the IC fault diagnosis problem. A fault diagnostic is a decision rule combining what is known about an ideal circuit test response with information about how it is distorted by fabrication variations and measurement noise. The rule is used to detect fault existence in fabricated circuits using real test equipment. Traditional statistical techniques may be used to achieve this goal, but they can employ unrealistic a priori assumptions about measurement data. Our approach to this problem employs an adaptive pattern analysis technique based on feedforward neural networks. During training, a feedforward network automatically captures unknown sample distributions. This is important because distributions arising from the nonlinear effects of process variation can be more complex than is typically assumed. A feedforward network is also able to extract measurement features which contribute significantly to making a correct decision. Traditional feature extraction techniques employ matrix manipulations which can be particularly costly for large measurement vectors. In this paper we discuss a software system which we are developing that uses this approach. We also provide a simple example illustrating the use of the technique for fault detection in an operational amplifier
    corecore