67 research outputs found

    Counterfactual Structure and Learning from Experience in Negotiations

    Get PDF
    Reflecting on the past is often a critical ingredient for successful learning. The current research investigated how counterfactual thinking, reflecting on how prior experiences might have been different, motivates effective learning from these previous experiences. Specifically, we explored how the structure of counterfactual reflection – their additive (‘‘If only I had”) versus subtractive (‘‘If only I had not”) nature – influences performance in dyadic-level strategic interactions. Building on the functionalist account of counterfactuals, we found across two experiments that generating additive counterfactuals about a previous negotiation produced an advantage for negotiators over their previous performance compared to subtractive counterfactuals, both in terms of obtaining value for oneself and conceiving creative agreements. Additive counterfactuals enabled negotiators to more effectively extract lessons from past experiences to improve their current negotiation performance

    Security authentication with a three-dimensional optical phase code using random forest classifier

    Get PDF
    An object with a unique three-dimensional (3D) optical phase mask attached is analyzed for security and authentication. These 3D optical phase masks are more difficult to duplicate or to have a mathematical formulation compared with 2D masks and thus have improved security capabilities. A quick response code was modulated using a random 3D optical phase mask generating a 3D optical phase code (OPC). Due to the scattering of light through the 3D OPC, a unique speckle pattern based on the materials and structure in the 3D optical phase mask is generated and recorded on a CCD device. Feature extraction is performed by calculating the mean, variance, skewness, kurtosis, and entropy for each recorded speckle pattern. The random forest classifier is used for authentication. Optical experiments demonstrate the feasibility of the authentication scheme

    Implications of Counterfactual Structure for Creative Generation and Analytical Problem Solving

    Get PDF
    In the present research, the authors hypothesized that additive counterfactual thinking mind-sets, activated by adding new antecedent elements to reconstruct reality, promote an expansive processing style that broadens conceptual attention and facilitates performance on creative generation tasks, whereas subtractive counterfactual thinking mind-sets, activated by removing antecedent elements to reconstruct reality, promote a relational processing style that enhances tendencies to consider relationships and associations and facilitates performance on analytical problem-solving tasks. A reanalysis of a published data set suggested that the counterfactual mind-set primes previously used in the literature tend to evoke subtractive counterfactuals. Studies 1 and 2 then demonstrated that subtractive counterfactual mind-sets enhanced performance on analytical problem-solving tasks relative to additive counterfactual mind-sets, whereas Studies 3 and 4 found that additive counterfactual mind-sets enhanced performance on creative generation tasks relative to subtractive counterfactual mind-sets

    Multidimensional Optical Sensing and Imaging Systems (MOSIS): From Macro to Micro Scales

    Get PDF
    Multidimensional optical imaging systems for information processing and visualization technologies have numerous applications in fields such as manufacturing, medical sciences, entertainment, robotics, surveillance, and defense. Among different three-dimensional (3-D) imaging methods, integral imaging is a promising multiperspective sensing and display technique. Compared with other 3-D imaging techniques, integral imaging can capture a scene using an incoherent light source and generate real 3-D images for observation without any special viewing devices. This review paper describes passive multidimensional imaging systems combined with different integral imaging configurations. One example is the integral-imaging-based multidimensional optical sensing and imaging systems (MOSIS), which can be used for 3-D visualization, seeing through obscurations, material inspection, and object recognition from microscales to long range imaging. This system utilizes many degrees of freedom such as time and space multiplexing, depth information, polarimetric, temporal, photon flux and multispectral information based on integral imaging to record and reconstruct the multidimensionally integrated scene. Image fusion may be used to integrate the multidimensional images obtained by polarimetric sensors, multispectral cameras, and various multiplexing techniques. The multidimensional images contain substantially more information compared with two-dimensional (2-D) images or conventional 3-D images. In addition, we present recent progress and applications of 3-D integral imaging including human gesture recognition in the time domain, depth estimation, mid-wave-infrared photon counting, 3-D polarimetric imaging for object shape and material identification, dynamic integral imaging implemented with liquid-crystal devices, and 3-D endoscopy for healthcare applications.B. Javidi wishes to acknowledge support by the National Science Foundation (NSF) under Grant NSF/IIS-1422179, and DARPA and US Army under contract number W911NF-13-1-0485. The work of P. Latorre Carmona, A. MartĂ­nez-Uso, J. M. Sotoca and F. Pla was supported by the Spanish Ministry of Economy under the project ESP2013-48458-C4-3-P, and by MICINN under the project MTM2013-48371-C2-2-PDGI, by Generalitat Valenciana under the project PROMETEO-II/2014/062, and by Universitat Jaume I through project P11B2014-09. The work of M. MartĂ­nez-Corral and G. Saavedra was supported by the Spanish Ministry of Economy and Competitiveness under the grant DPI2015-66458-C2-1R, and by the Generalitat Valenciana, Spain under the project PROMETEOII/2014/072

    Language structure in the n-object naming game

    Full text link
    We examine a naming game with two agents trying to establish a common vocabulary for n objects. Such efforts lead to the emergence of language that allows for an efficient communication and exhibits some degree of homonymy and synonymy. Although homonymy reduces the communication efficiency, it seems to be a dynamical trap that persists for a long, and perhaps indefinite, time. On the other hand, synonymy does not reduce the efficiency of communication, but appears to be only a transient feature of the language. Thus, in our model the role of synonymy decreases and in the long-time limit it becomes negligible. A similar rareness of synonymy is observed in present natural languages. The role of noise, that distorts the communicated words, is also examined. Although, in general, the noise reduces the communication efficiency, it also regroups the words so that they are more evenly distributed within the available "verbal" space.Comment: minor change

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and development of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], the digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [PĂ©rez-CabrĂ©], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented at the nano- or micro-scale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication.Centro de Investigaciones ÓpticasConsejo Nacional de Investigaciones CientĂ­ficas y TĂ©cnica

    The Embodiment of Success and Failure as Forward versus Backward Movements

    Get PDF
    People often speak of success (e.g., “advance”) and failure (e.g., “setback”) as if they were forward versus backward movements through space. Two experiments sought to examine whether grounded associations of this type influence motor behavior. In Experiment 1, participants categorized success versus failure words by moving a joystick forward or backward. Failure categorizations were faster when moving backward, whereas success categorizations were faster when moving forward. Experiment 2 removed the requirement to categorize stimuli and used a word rehearsal task instead. Even without Experiment 1’s response procedures, a similar cross-over interaction was obtained (e.g., failure memorizations sped backward movements relative to forward ones). The findings are novel yet consistent with theories of embodied cognition and self-regulation

    Nanobiopolymer for Direct Targeting and Inhibition of EGFR Expression in Triple Negative Breast Cancer

    Get PDF
    Treatment options for triple negative breast cancer (TNBC) are generally limited to cytotoxic chemotherapy. Recently, anti-epidermal growth factor receptor (EGFR) therapy has been introduced for TNBC patients. We engineered a novel nanobioconjugate based on a poly(ÎČ-L-malic acid) (PMLA) nanoplatform for TNBC treatment. The nanobioconjugate carries anti-tumor nucleosome-specific monoclonal antibody (mAb) 2C5 to target breast cancer cells, anti-mouse transferrin receptor (TfR) antibody for drug delivery through the host endothelial system, and Morpholino antisense oligonucleotide (AON) to inhibit EGFR synthesis. The nanobioconjugates variants were: (1) P (BioPolymer) with AON, 2C5 and anti-TfR for tumor endothelial and cancer cell targeting, and EGFR suppression (P/AON/2C5/TfR), and (2) P with AON and 2C5 (P/AON/2C5). Controls included (3) P with 2C5 but without AON (P/2C5), (4) PBS, and (5) P with PEG and leucine ester (LOEt) for endosomal escape (P/mPEG/LOEt). Drugs were injected intravenously to MDA-MB-468 TNBC bearing mice. Tissue accumulation of injected nanobioconjugates labeled with Alexa Fluor 680 was examined by Xenogen IVIS 200 (live imaging) and confocal microscopy of tissue sections. Levels of EGFR, phosphorylated and total Akt in tumor samples were detected by western blotting

    Seeing versus Doing: How Businesses Manage Tensions in Pursuit of Sustainability

    Get PDF
    Management of organizational tensions can facilitate the simultaneous advancement of economic, social, and environmental priorities. The approach is based on managers identifying and managing tensions between the three priorities, by employing one of the three strategic responses. Although recent work has provided a theoretical basis for such tension acknowledgment and management, there is a dearth of empirical studies. We interviewed 32 corporate sustainability managers across 25 forestry and wood-products organizations in Australia. Study participants were divided into two groups: (1) those considered effective at corporate sustainability and (2) a status-quo group. Contrary to current theory, our findings showed that acknowledgment of organizational tensions was widespread in the Australian forestry and wood-products industry and not limited to those managers who are effective at managing corporate sustainability. What differed was the degree to which managers did something about the perceived tensions—with the effective group more consistently acting to manage and resolve paradoxical scenarios. Our findings suggest that existing theoretical constructs of tension management may not adequately capture the individual-level complexity involved with managing tensions in practice

    Roadmap on optical security

    Get PDF
    Information security and authentication are important challenges facing our society. Recent attacks by hackers on the databases of large commercial and financial companies have demonstrated that more research and developments of advanced approaches are necessary to deny unauthorized access to critical data. Free space optical technology has been investigated by many researchers in information security, encryption, and authentication. The main motivation for using optics and photonics for information security is that optical waveforms possess many complex degrees of freedom such as amplitude, phase, polarization, large bandwidth, nonlinear transformations, quantum properties of photons, and multiplexing that can be combined in many ways to make the information encryption more secure and more difficult to attack. This roadmap article presents an overview of the potential, recent advances, and the challenges of optical security and encryption using free space optics. The roadmap on optical security is comprised of six categories that together include 16 short sections written by authors who have made relevant contributions in this field. The first category of this roadmap describes novel encryption approaches, including secure optical sensing which summarizes double random phase encryption applications and flaws [Yamaguchi], digital holographic encryption in free space optical technique which describes encryption using multidimensional digital holography [Nomura], simultaneous encryption of multiple signals [Pérez-Cabré], asymmetric methods based on information truncation [Nishchal], and dynamic encryption of video sequences [Torroba]. Asymmetric and one-way cryptosystems are analyzed by Peng. The second category is on compression for encryption. In their respective contributions, Alfalou and Stern propose similar goals involving compressed data and compressive sensing encryption. The very important area of cryptanalysis is the topic of the third category with two sections: Sheridan reviews phase retrieval algorithms to perform different attacks, whereas Situ discusses nonlinear optical encryption techniques and the development of a rigorous optical information security theory. The fourth category with two contributions reports how encryption could be implemented in the nano- or microscale. Naruse discusses the use of nanostructures in security applications and Carnicer proposes encoding information in a tightly focused beam. In the fifth category, encryption based on ghost imaging using single-pixel detectors is also considered. In particular, the authors [Chen, Tajahuerce] emphasize the need for more specialized hardware and image processing algorithms. Finally, in the sixth category, Mosk and Javidi analyze in their corresponding papers how quantum imaging can benefit optical encryption systems. Sources that use few photons make encryption systems much more difficult to attack, providing a secure method for authentication
    • 

    corecore