798 research outputs found

    Speculating Backwards : How is Speculative Design Transferred into East Asia?

    Full text link
    Speculative design has been well-known since the publication of the book Speculative Everything (MIT) in 2013, advocating design as a medium for promoting people's social dreams. This paper intends to take ‘speculative design’ as the research object with China as an example to explore the possibility of the cultural dream. Speculative design advocates the use of fictional and technological speculation for thought experiments. The ‘future cone’ from the field of future studies is an important basis supporting the timeline of speculative design. Speculative design is often closely linked with science and technology. However, this paper takes culture as its focal point, trying to develop a new dimension of speculative design and broaden the context of speculative design for social dreams. From the future cone often used in the design process, it extends backwards to the past. This is highly consistent with the idea of ‘recognising the past and knowing the present’ in terms of Chinese thought and culture from ancient China. Possible world theory and the Chinese approach to the speculation method are generalised. In addition, this paper categorises the creation-time logic of the time span and subdivides it into insinuation and reconstruction of ancient scenes, etc. This speculating backwards method takes the past cone as the main direction, exploring its unknown possibility and making reasonable speculations using speculative design. In terms of the medium application of a cultural carrier, it also expands the ways of cultural transmission.Session I : Design History and Design Educatio

    Laparoscopic management of a giant adrenal cyst

    Get PDF
    AbstractAdrenal cysts, a rare entity, are usually nonfunctional and asymptomatic. Here, we report a 32-year-old woman who presented with mild breathlessness and vague abdominal fullness and discomfort that had lasted 6 months. Chest radiography showed elevation of the left side of the diaphragm. Abdominal sonography showed an anechoic lesion of >15cm, without a septum, that was situated over the left abdominal area. Abdominal computed tomography (CT) showed a 20cm suprarenal cyst located between the pancreas, spleen, and left kidney, causing anterior displacement of the pancreas and inferior displacement of the left kidney. Magnetic resonance imaging confirmed the CT and sonographic findings, and revealed that the cystic mass was originating from the left adrenal gland. Fluid analysis of the cystic lesion showed no evidence of infection or malignancy. A laparoscopic adrenalectomy was performed. Histopathologically, the adrenal tissue showed no evidence of adenoma or malignancy, and the cystic component showed a flattened endothelial lining with fibrotic tissue, consistent with an endothelial cyst. The postoperative course was uneventful and the patient had no evidence of recurrence during a 6-year follow-up. We discuss the diagnosis and management of adrenal cysts

    Risk Analysis of Cargos Damages for Aquatic Products of Refrigerated Containers: Shipping Operators’ Perspective in Taiwan

    Get PDF
    As the development of refrigerated container, transportation of aquatic products is growing rapidly in recent years. It is very important to avoid cargos damages for aquatic products of refrigerated containers, while the shipping operators are running this scope of business. Hence, the risk issue of adopting various improvement strategies would be important for the container shipping operators. In the light of this, the main purpose of this paper is to analyze the risks of cargos damages for aquatic products of refrigerated containers based on the container shipping operators’ perspective in Taiwan. We use four risk assessment procedures - risk identification, risk analysis and evaluation, risk strategies, and risk treatment - as the research method in this paper. The risk factors are generated from literature review and experts interviewing. Then, three dimensions with nineteen risk factors are preliminary identified. We used these risk factors to proceed with the empirical study via questionnaires. Three points of empirical results are presented. At first, the top factor of perceived risk as well as of risk severity is ‘container data setting errors.’ Secondly, the top factor of risk frequency is ‘lack of the goods’ pre-cooling themselves.’ Thirdly, three risk factors are classified into the low-risk area, whereas sixteen risk factors are placed on the medium-risk area. There is no risk factor fix on the high-risk area. Furthermore, three risk strategies - risk prevention, risk reduction, and risk transfer - are suggested to adopt by different risk factors

    Lightly Weighted Automatic Audio Parameter Extraction for the Quality Assessment of Consensus Auditory-Perceptual Evaluation of Voice

    Full text link
    The Consensus Auditory-Perceptual Evaluation of Voice is a widely employed tool in clinical voice quality assessment that is significant for streaming communication among clinical professionals and benchmarking for the determination of further treatment. Currently, because the assessment relies on experienced clinicians, it tends to be inconsistent, and thus, difficult to standardize. To address this problem, we propose to leverage lightly weighted automatic audio parameter extraction, to increase the clinical relevance, reduce the complexity, and enhance the interpretability of voice quality assessment. The proposed method utilizes age, sex, and five audio parameters: jitter, absolute jitter, shimmer, harmonic-to-noise ratio (HNR), and zero crossing. A classical machine learning approach is employed. The result reveals that our approach performs similar to state-of-the-art (SOTA) methods, and outperforms the latent representation obtained by using popular audio pre-trained models. This approach provide insights into the feasibility of different feature extraction approaches for voice evaluation. Audio parameters such as jitter and the HNR are proven to be suitable for characterizing voice quality attributes, such as roughness and strain. Conversely, pre-trained models exhibit limitations in effectively addressing noise-related scorings. This study contributes toward more comprehensive and precise voice quality evaluations, achieved by a comprehensively exploring diverse assessment methodologies.Comment: Published in IEEE 42th International Conference on Consumer Electronics (ICCE 2024

    An Empirical Study of Factors Influencing the Intention to Use SNS App─The Case of Facebook

    Get PDF
    Mobile Internet is coming. The social networking site application (SNS app) has become an important portal for users accessing social networking services. Based on the point of view of existing social network users, this study integrates the technology value-based adoption model and social influence to propose a framework to investigate factors influencing the use intention of the SNS app. A sample of 223 subjects surveyed from Facebook, it was found that user’s perceived value regarding the SNS app positively affects the use intention of the social networking app. Usefulness and Technicality provided by SNS app positively affects perceived value of the app. In addition, user perceived social influence also positively affects the use intention of the social networking app. Results not only advance knowledge related to social network research, as well as provide practical advice to social networking companies. They also suggest how to attract users to continually participate in social networks. Increase activeness and stickiness is critical for social network companies to facilitate long-term development

    Attribute-Based Encryption from Identity-Based Encryption

    Get PDF
    Ciphertext-policy attribute-based encryption (CP-ABE) is an access control mechanism where a data provider encrypts a secret message and then sends the ciphertext to the receivers according to the access policy which she/he decides. If the attributes of the receivers match the access policy, then they can decrypt the ciphertext. This paper shows a relation between ABE and identity-based encryption (IBE), and presents a bi-directional conversion between an access structure and identities. By the proposed conversion, the ABE scheme constructed from an IBE scheme will inherit the features, such as constant-size ciphertexts and anonymity, from the IBE scheme, and vice versa. It turns out that the proposed conversion also gives the first ABE achieving access structures with wildcard and constant-size ciphertexts/private keys

    The Potential Utility of Curcumin in the Treatment of HER-2-Overexpressed Breast Cancer: An In Vitro and In Vivo Comparison Study with Herceptin

    Get PDF
    HER-2 is an important oncoprotein overexpressed in about 15–25% of breast cancers. We hypothesized that the ability of curcumin to downregulate HER-2 oncoprotein and inhibit the signal transduction pathway of PI3K/Akt, MAPK, and NF-κB activation may be important in the treatment of HER-2-overexpressed breast cancer. To examine the effect of curcumin on breast cancer cells, MCF-7, MDA-MB-231, MCF-10A, BT-474, and SK-BR-3-hr (a herceptin resistant strain from SK-BR-3) cells were used for in vitro analysis. The in vivo effect of curcumin on HER-2-overexpressed breast cancer was investigated with the HER-2-overexpressed BT-474 xenograft model. Cell growth, cell cycle change, the antimobility effect, signal transduction, and xenograft volume analysis between groups treated with herceptin and/or curcumin were tested. Curcumin decreased the cell growth of various breast cancer cell lines (MCF-7, MDA-MB-231, MCF-10A, BT-474, and SK-BR-3-hr). In Western blot analysis, the phosphorylation of Akt, MAPK, and expression of NF-κB were reduced in BT-474 cells, but not in SK-BR-3-hr cells, after treatment with herceptin. When treated with curcumin, the HER-2 oncoprotein, phosphorylation of Akt, MAPK and expression of NF-κB were decreased in both BT-474 and SK-BR-3-hr cells. In the BT-474 xenograft model, though not as much as herceptin, curcumin did effectively decrease the tumor size. The combination of curcumin with herceptin was not better than herceptin alone; however, the combination of taxol and curcumin had an antitumor effect comparable with taxol and herceptin. The results suggested that curcumin has potential as a treatment for HER-2-overexpressed breast cancer
    corecore