369 research outputs found

    The Influence of Technological Improvement in the Development of Ready-to-Wear from 1850 to 1920s: The Implications for the Future of the Apparel Industry

    Get PDF
    The purpose of this study is to research the influence of technological improvement in the clothing industry after sewing machine was invented in 1846, in order to apply the interpretation of this research to the direction for future apparel manufacturing system. The qualitative research method was used to find the answers for following questions: What did clothing industry do with sewing machine invention in their manufacturing system? Will new technology change the shape of both fashion industry and our culture as it happened in the past? And it should be the same frame or it should the different approach? Although the purpose of this research was finding the answers for questions and predicting where current fashion industry will go further with which types of new technology and strategy, this study also have led researcher to look at another direction for the future of apparel industry

    Beauty and Legacy of War

    Get PDF
    In this creative design research, the origin of slashing as a design detail that trended during the Renaissance period was investigated and interpreted to explore this design process. The main characteristic that I intended to deliver was a contemporary look that also conveys a strong concept of the bitter legacy of the era because, during the Renaissance, slashing was in fashion as an unintentional development after returning from the battlefield. I used an abundant slash decoration, along with a silver crinkle surface texture, glittering silver powdered surface, and silver and black transparent surface to express the spirit of the Renaissance fashion, which was considered an impressive display of luxury. Furthermore, a great amount of slashing over the jacket’s bodice was created in a traditional way, but the horizontal slashes with ribbon interlacing over the sleeves and skirts was intended to convey a contemporary look

    Technology-based Practical Blockchain System Audit Maturity Model

    Get PDF
    Information system auditing can reveal the quality of such systems, and standard audit items are crucial elements of system and audit quality. Blockchain technology is currently being applied to various areas including the financial, manufacturing, healthcare, distribution, and public sectors, and an increasing number of systems that apply such technologies are also being developed.The current audit model is insufficient for application in the field, and the auditing of systems applying new technologies, such as blockchain, has not been given sufficient attention. Furthermore, it is difficult to evaluate the relative levels of audited systems using audit results. Existing studies have only examined the auditing of systems that apply blockchain. Although the Korea Association of Information Systems Audit has suggested a checklist for systems applying blockchain, it has yet to be adopted. To address this problem, 50 existing audit result reports and technical data were collected, from which sixteen factors of four audit quality properties consisting of blockchain system, technology compliance, software quality, and document were derived. Furthermore, an audit maturity model was presented after evaluating the priorities of the 16 derived factors. The results of the evaluation of the priorities of audit items indicated that auditors give a higher importance to technology-based than document-based audits of information systems. This study contributes to the literature by deriving field-oriented audit items including blockchain technology, thus enabling practical audits to be conducted in a short time. Further, this study enables the maturity of systems to be compared based on audit results by presenting audit maturity

    Kako su aktivnosti na Twitteru povezane s ponašanjem najpoznatijih kriptovaluta? Dokazi iz analize društvenih mreža i analize sentimenta

    Get PDF
    Cryptocurrencies have embraced Twitter as a major channel of communication. Employing social network analysis and sentiment analysis, this study investigates the Twitter-mediated communication behaviors among cryptocurrencies. This study determines whether a significant association exists between cryptocurrencies\u27 Twitter networks and their credit scores. Data were drawn from the Twitter pages of several top cryptocurrencies. The results indicate that reply–mention networks had the densest structure, that the following–follower network structure was correlated with the reply–mention structure, and that the reply–mention and co–tweet networks were positively correlated. The results also indicate that cryptocurrencies\u27 active networking strategies affected their credit scores and more importantly, that cryptocurrencies frequently linked with fellow currencies tended to have high credit scores.Kriptovalute su prigrlile Twitter kao glavni kanal komunikacije kojim prenose novosti i grade odnose s (potencijalnim) ulagačima i kupcima. Služeći se analizom društvenih mreža i analizom sentimenta, rad istražuje Twitterom posredovano komunikacijsko ponašanje kriptovaluta proučavanjem učestalosti tvitova te njihovih struktura: following-follower, reply-mention i co-tweet. Ocjene tržišta često znatno utječu i na proizvođače (tj. programere) i na potrošače (tj. vlasnike kriptovaluta). Stoga ovo istraživanje utvrđuje postoji li povezanost između Twitterovih mreža kriptovaluta i njihovih kreditnih ocjena. Podaci su prikupljeni na Twitterovim stranicama niza najpoznatijih kriptovaluta. Rezultati pokazuju da su reply-mention mreže imale najgušću strukturu, da je mrežna struktura following-follower povezana sa strukturom reply-mention i da su reply-mention i co-tweet mreže pozitivno povezane. Rezultati također upućuju na to da su aktivne mrežne strategije kriptovaluta utjecale na njihove kreditne ocjene i, što je još važnije, da kriptovalute koje se češće povezuju sa srodnim valutama obično imaju visoke kreditne ocjene

    The Effect Of Abnormal Pay Dispersion On Earnings Management

    Get PDF
    This study examines the effect of the abnormal pay dispersion on earnings management. Prior studies find that pay dispersion among top executives affect firm performance and executive turnover. We expect that abnormal pay dispersion among top executives affects financial reporting practice as well as firm performance and turnover and provide evidence of positive association between abnormal pay dispersion and earnings management. This result suggests that executives are more likely to be engaged in earnings management to increase their compensation when they feel unfairness from the relative level of compensation. This finding helps financial statement users interpret firm performance and anticipate future outcomes by implying that additional managerial incentives for financial reporting are derived from internal pay dispersion. Our finding that abnormal pay dispersion leads to higher agency costs should also be of interest to shareholders

    Area-Optimized Fully-Flexible BCH Decoder for Multiple GF Dimensions

    Get PDF
    Recently, there are increasing demands for fully flexible Bose Chaudhuri Hocquenghem (BCH) decoders, which can support different dimensions of Galois fields (GF) operations. As the previous BCH decoders are mainly targeting the fixed GF operations, the conventional techniques are no longer suitable for multiple GF dimensions. For the area-optimized flexible BCH decoders, in this paper, we present several optimization schemes for reducing hardware costs of multi-dimensional GF operations. In the proposed optimizations, we first reformulate the matrix operations in syndrome calculation and Chien search for sharing more common sub-expressions between GF operations having different dimensions. The cell based multi-m GF multiplier is newly introduced for the area-efficient flexible key-equation solver. As case studies, we design several prototype flexible BCH decoders for digital video broadcasting systems and NAND flash memory controllers managing different page sizes. The implementation results show that the proposed fully-flexible BCH decoder architecture remarkably enhances the area-efficiency compared with the conventional solutions.112Ysciescopu

    The Scope and Presupposition of the Additive Particle -to

    Get PDF
    This paper investigates the scopal behavior of the Korean additive particle -to; specifically how the presupposition due to the additive particle interacts scopally with another quantificational element in the sentence, and how changes in word order due to scrambling affect the presupposition. In the course of this investigation, I identify three factors that affect the scope pattern of the -to phrase: scrambling, the kind of function in the preceding context, and the nature of the focused phrase, which leads to an ordering restriction between a referential expression and a functional expression. The analysis is composed of three elements, each of which is independently motivated. First, I argue, following Kripke (1990) and Heim (1992) among others, that the anaphoric approach to the additive particle is superior to the existential approach. Secondly, I claim that syntactic binding is not the only mechanism for variable binding. I show that semantic binding is also available, which is operative when we are dealing with functional dependencies. Finally, I propose two principles of economy that regulate reconstruction and type raising. Both operations are allowed only when they are motivated. The motivation of reconstruction is a change in truth-conditions. If reconstruction only affects presupposition, it is not licensed. Similarly, type raising is possible when it is motivated by the lexical entry of the additive particle, namely to avoid a type-mismatch

    The syntax and semantics of focus particles

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Linguistics and Philosophy, 2004.Includes bibliographical references (p. 202-210).(cont.) (iii) covert operations such as reconstruction and type raising are constrained by an economy principle so that they are disallowed when not motivated.This dissertation investigates the syntax and semantics of two focus particles in Korean with special reference to their scopal behavior. The two particles under consideration are the exclusive particle man and the additive particle to. The main empirical concern of this work is to show that despite apparent syntactic similarities between focused phrases (i.e. phrases containing focus particles) and standard QPs, the former exhibits more diverse scopal behavior than the latter. The claims that are made in the course of the discussion of the scope patterns constitute the theoretical contribution of this work. The scope of the particle man 'only' varies with the morphological marking of the man-phrase, which is puzzling under the assumption that the particle is a scope-bearing element. I argue that despite appearances, the particle is not a scope-bearing element, but an agreement morpheme, and that the quantificational meaning comes from a null head ONLY. I also claim that the position of the ONLY head can be deduced from the order of nominal affixes, thanks to the strong correlation between morphology and syntax. This new correlation between nominal affixes and the scope of focus particles supports Baker's Mirror Principle in a new area outside the verbal domain. The scopal behavior of to-phrases is also distinct from that of QPs. Three factors are identified that affect the scope of to-phrases: scrambling, the kind of function in the preceding context, and the nature of the focused phrase. I claim that (i) the anaphoric view of additive particles is superior to the existential view, (ii) both syntactic and semantic mechanisms are available for variable binding, thus the presence of a bound variable in a dislocated position does not imply syntactic reconstruction, andby Youngjoo Lee.Ph.D

    Selective deep convolutional neural network for low cost distorted image classification

    Get PDF
    Neural networks trained using images with a certain type of distortion should be better at classifying test images with the same type of distortion than generally-trained neural networks, given other factors being equal. Based on this observation, an ensemble of convolutional neural networks (CNNs) trained with different types and degrees of distortions is used. However, instead of simply classifying test images of unknown distortion types with the entire ensemble of CNNs, an extra tiny CNN is specifically trained to distinguish between the different types and degrees of distortions. Then, only the dedicated CNN for that specific type and degree of distortion, as determined by the tiny CNN, is activated and used to classify a possibly distorted test image. This proposed architecture, referred to as a \textit{selective deep convolutional neural network (DCNN)}, is implemented and found to result in high accuracy with low hardware costs. Detailed simulations with realistic image distortion scenarios using three popular datasets show that memory, MAC operations, and energy savings of up to 93.68%, 93.61%, and 91.92%, respectively, can be achieved with almost no reduction in image classification accuracy. The proposed selective DCNN scores up to 2.18x higher than the state-of-the-art DCNN model when evaluated using NetScore, a comprehensive metric that considers both CNN performance and hardware cost. In addition, it is shown that even higher hardware cost reduction can be achieved when selective DCNN is combined with previously proposed model compression techniques. Finally, experiments conducted with extended types and degrees of image distortion show that selective DCNN is highly scalable.11Ysciescopu
    corecore