期刊文献+
共找到25篇文章
< 1 2 >
每页显示 20 50 100
The Use of Children's Literature With University English as a Foreign Language Learners in Taiwan
1
作者 Cheng-Fang Huang 《Sino-US English Teaching》 2015年第4期250-256,共7页
This paper reports findings from a longitudinal qualitative study that investigated the use of children's literature for Taiwan Residents University English as a Foreign Language (EFL) students' reading. During th... This paper reports findings from a longitudinal qualitative study that investigated the use of children's literature for Taiwan Residents University English as a Foreign Language (EFL) students' reading. During the course of their sophomore year, 17 students participated and each student held two to seven individual reading sessions, to which they brought a self-selected children's picture storybook or children's novel they had finished reading on their own and orally read it to the researcher. Their oral reading and the discussion of each book with the researcher were audio recorded. To gain insight into the reading progress, these oral data were categorized and analyzed in terms of mispronunciation patterns, misunderstanding of vocabulary, misinterpretation of sentence or passage, and researcher's guidance. General findings of the 17 participants were presented in three categories: (1) vocabulary acquisition, (2) common comprehension problems, and (3) common pronunciation problems. Further analysis of two motivated students who read five to seven books revealed that (1) these two EFL learners gradually developed conscious awareness of their own pronunciation and comprehension errors and (2) they progressively acquired better competence to apply the pronunciation tips and reading comprehension techniques provided by the researcher during previous sessions. These findings and corresponding implications are discussed and further research suggestions are made. 展开更多
关键词 English as a Foreign Language (EFL) learners reading progress children's literature miscue analysis
下载PDF
Coupling Analysis of Multiple Machine Learning Models for Human Activity Recognition 被引量:1
2
作者 Yi-Chun Lai Shu-Yin Chiang +1 位作者 Yao-Chiang Kan Hsueh-Chun Lin 《Computers, Materials & Continua》 SCIE EI 2024年第6期3783-3803,共21页
Artificial intelligence(AI)technology has become integral in the realm of medicine and healthcare,particularly in human activity recognition(HAR)applications such as fitness and rehabilitation tracking.This study intr... Artificial intelligence(AI)technology has become integral in the realm of medicine and healthcare,particularly in human activity recognition(HAR)applications such as fitness and rehabilitation tracking.This study introduces a robust coupling analysis framework that integrates four AI-enabled models,combining both machine learning(ML)and deep learning(DL)approaches to evaluate their effectiveness in HAR.The analytical dataset comprises 561 features sourced from the UCI-HAR database,forming the foundation for training the models.Additionally,the MHEALTH database is employed to replicate the modeling process for comparative purposes,while inclusion of the WISDM database,renowned for its challenging features,supports the framework’s resilience and adaptability.The ML-based models employ the methodologies including adaptive neuro-fuzzy inference system(ANFIS),support vector machine(SVM),and random forest(RF),for data training.In contrast,a DL-based model utilizes one-dimensional convolution neural network(1dCNN)to automate feature extraction.Furthermore,the recursive feature elimination(RFE)algorithm,which drives an ML-based estimator to eliminate low-participation features,helps identify the optimal features for enhancing model performance.The best accuracies of the ANFIS,SVM,RF,and 1dCNN models with meticulous featuring process achieve around 90%,96%,91%,and 93%,respectively.Comparative analysis using the MHEALTH dataset showcases the 1dCNN model’s remarkable perfect accuracy(100%),while the RF,SVM,and ANFIS models equipped with selected features achieve accuracies of 99.8%,99.7%,and 96.5%,respectively.Finally,when applied to the WISDM dataset,the DL-based and ML-based models attain accuracies of 91.4%and 87.3%,respectively,aligning with prior research findings.In conclusion,the proposed framework yields HAR models with commendable performance metrics,exhibiting its suitability for integration into the healthcare services system through AI-driven applications. 展开更多
关键词 Human activity recognition artificial intelligence support vector machine random forest adaptive neuro-fuzzy inference system convolution neural network recursive feature elimination
下载PDF
Low-Brightness Object Recognition Based on Deep Learning
3
作者 Shu-Yin Chiang Ting-Yu Lin 《Computers, Materials & Continua》 SCIE EI 2024年第5期1757-1773,共17页
This research focuses on addressing the challenges associated with image detection in low-light environments,particularly by applying artificial intelligence techniques to machine vision and object recognition systems... This research focuses on addressing the challenges associated with image detection in low-light environments,particularly by applying artificial intelligence techniques to machine vision and object recognition systems.The primary goal is to tackle issues related to recognizing objects with low brightness levels.In this study,the Intel RealSense Lidar Camera L515 is used to simultaneously capture color information and 16-bit depth information images.The detection scenarios are categorized into normal brightness and low brightness situations.When the system determines a normal brightness environment,normal brightness images are recognized using deep learning methods.In low-brightness situations,three methods are proposed for recognition.The first method is the SegmentationwithDepth image(SD)methodwhich involves segmenting the depth image,creating amask from the segmented depth image,mapping the obtained mask onto the true color(RGB)image to obtain a backgroundreduced RGB image,and recognizing the segmented image.The second method is theHDVmethod(hue,depth,value)which combines RGB images converted to HSV images(hue,saturation,value)with depth images D to form HDV images for recognition.The third method is the HSD(hue,saturation,depth)method which similarly combines RGB images converted to HSV images with depth images D to form HSD images for recognition.In experimental results,in normal brightness environments,the average recognition rate obtained using image recognition methods is 91%.For low-brightness environments,using the SD method with original images for training and segmented images for recognition achieves an average recognition rate of over 82%.TheHDVmethod achieves an average recognition rate of over 70%,while the HSD method achieves an average recognition rate of over 84%.The HSD method allows for a quick and convenient low-light object recognition system.This research outcome can be applied to nighttime surveillance systems or nighttime road safety systems. 展开更多
关键词 Low-brightness depth image image segmentation image recognition HDV HSD
下载PDF
Identifying Brand Consistency by Product Differentiation Using CNN
4
作者 Hung-Hsiang Wang Chih-Ping Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第7期685-709,共25页
This paper presents a new method of using a convolutional neural network(CNN)in machine learning to identify brand consistency by product appearance variation.In Experiment 1,we collected fifty mouse devices from the ... This paper presents a new method of using a convolutional neural network(CNN)in machine learning to identify brand consistency by product appearance variation.In Experiment 1,we collected fifty mouse devices from the past thirty-five years from a renowned company to build a dataset consisting of product pictures with pre-defined design features of their appearance and functions.Results show that it is a challenge to distinguish periods for the subtle evolution of themouse devices with such traditionalmethods as time series analysis and principal component analysis(PCA).In Experiment 2,we applied deep learning to predict the extent to which the product appearance variation ofmouse devices of various brands.The investigation collected 6,042 images ofmouse devices and divided theminto the Early Stage and the Late Stage.Results show the highest accuracy of 81.4%with the CNNmodel,and the evaluation score of brand style consistency is 0.36,implying that the brand consistency score converted by the CNN accuracy rate is not always perfect in the real world.The relationship between product appearance variation,brand style consistency,and evaluation score is beneficial for predicting new product styles and future product style roadmaps.In addition,the CNN heat maps highlight the critical areas of design features of different styles,providing alternative clues related to the blurred boundary.The study provides insights into practical problems for designers,manufacturers,and marketers in product design.It not only contributes to the scientific understanding of design development,but also provides industry professionals with practical tools and methods to improve the design process and maintain brand consistency.Designers can use these techniques to find features that influence brand style.Then,capture these features as innovative design elements and maintain core brand values. 展开更多
关键词 Machine learning product differentiation brand consistency principal component analysis convolutional neural network computer mouse
下载PDF
Corporate Social Responsibility and Shipping Supply Chain Risks
5
作者 Wen-Chi Lo 《Economics World》 2024年第3期145-155,共11页
This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 202... This study aims to investigate whether Corporate Social Responsibility(CSR)activities reduce supply chain disruptions by examining the impact of the Suez Canal obstruction on the Ever Given container ship in March 2021.This study conclude that the more responsible companies have higher returns and are less affected by this event than the less responsible companies;the less responsible companies have lower returns.The companies with better CSR have a lower impact on their supply chains when faced with disruptions in the supply chain. 展开更多
关键词 Suez Canal obstruction corporate social responsibility supply chain risks event study Ever Given container ships
下载PDF
Developing a Risk Assessment Model for Typhoon-triggered Debris Flows 被引量:2
6
作者 Jieh-Jiuh WANG Hoe I.LING 《Journal of Mountain Science》 SCIE CSCD 2011年第1期10-23,共14页
A methodology is developed for interactive risk assessment of physical infrastructure and spatially distributed response systems subjected to debris flows.The proposed framework is composed of three components,namely ... A methodology is developed for interactive risk assessment of physical infrastructure and spatially distributed response systems subjected to debris flows.The proposed framework is composed of three components,namely geotechnical engineering,geographical information systems and disaster management.With the integration of slope stability analysis,hazard scenario and susceptibility,geological conditions are considered as temporary static data,while meteorological conditions are treated as dynamic data with a focus on typhoons.In this research,the relevant parameters required for database building are defined,and the procedures for building the geological database and meteorological data sets are explained.Based on the concepts and data sets,Nantou and Hualien in Taiwan are used as the areas for case studies. 展开更多
关键词 Debris flow disaster HAZARD RISK VULNERABILITY Slope stability
下载PDF
A Unified Framework of the Cloud Computing Service Model 被引量:2
7
作者 Wen-Lung Shiau Chao-Ming Hsiao 《Journal of Electronic Science and Technology》 CAS 2013年第2期150-160,共11页
After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtuali... After a comprehensive literature review and analysis, a unified cloud computing framework is proposed, which comprises MapReduce, a vertual machine, Hadoop distributed file system (HDFS), Hbase, Hadoop, and virtualization. This study also compares Microsoft, Trend Micro, and the proposed unified cloud computing architecture to show that the proposed unified framework of the cloud computing service model is comprehensive and appropriate for the current complexities of businesses. The findings of this study can contribute to the knowledge for academics and practitioners to understand, assess, and analyze a cloud computing service application. 展开更多
关键词 Cloud computing service model conceptual framework EVOLUTION information system.
下载PDF
Analysis and Simulation of a High Performance Quasi Resonant PWM Inverter for Solar Power Generation 被引量:1
8
作者 Yun-Parn Lee Yu-Huang Lin Yu-Lun Lin 《Journal of Electronic Science and Technology》 CAS CSCD 2016年第1期68-72,共5页
A quasi resonant pulse width modulation(PWM) inverter is used in a solar power system to convert the solar panel and battery charger's direct current(DC) output to alternating current(AC).Although much has been... A quasi resonant pulse width modulation(PWM) inverter is used in a solar power system to convert the solar panel and battery charger's direct current(DC) output to alternating current(AC).Although much has been published about DC to AC PWM inverters,none of the previous work has shown modeling and simulation results for DC to AC inverters.In this study,we suggest a new topology for a quasi resonant PWM inverter.Experimental results are also presented. 展开更多
关键词 Photovoltaic system PSPICE simulation quasi resonant PWM inverter
下载PDF
Processing Chinese hand-radicals activates the medial frontal gyrus A functional MRI investigation
9
作者 Qing-Lin Wu Yu-Chen Chan +3 位作者 Joseph P.Lavallee Hsueh-Chin Chen Kuo-En Chang Yao-Ting Sung 《Neural Regeneration Research》 SCIE CAS CSCD 2013年第20期1837-1843,共7页
Embodied semantics theory asserts that the meaning of action-related words is neurally represented through networks that overlap with or are identical to networks involved in sensory-motor processing. While some studi... Embodied semantics theory asserts that the meaning of action-related words is neurally represented through networks that overlap with or are identical to networks involved in sensory-motor processing. While some studies supporting this theory have focused on Chinese characters, less attention has been paid to their semantic radicals. Indeed, there is still disagreement about whether these radicals are processed independently. The present study investigated whether radicals are processed separately and, if so, whether this processing occurs in sensory-motor regions. Materials consisted of 72 high-frequency Chinese characters, with 18 in each of four categories: hand-action verbs with and without hand-radicals, and verbs not related to hand actions, with and without hand-radicals. Twenty-eight participants underwent functional MRI scans while reading the characters. Compared to characters without hand-radicals, reading characters with hand-radicals activated the right medial frontal gyrus. Verbs involving hand-action activated the left inferior parietal lobule, possibly reflecting integration of information in the radical with the semantic meaning of the verb. The findings may be consistent with embodied semantics theory and suggest that neural representation of radicals is indispensable in processing Chinese characters. 展开更多
关键词 neural regeneration NEUROIMAGING functional MRI hand-radical radical representation Chinese character recognition embodied semantics semantic function Chinese learning grants-supported paper NEUROREGENERATION
下载PDF
An Evolution, Present, and Future Changes of Cloud Computing Services
10
作者 Wen-Lung Shiau 《Journal of Electronic Science and Technology》 CAS CSCD 2015年第1期54-59,共6页
This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Mi... This study presents a clear evolution of computing and its key applications. Cloud computing services evolved from distributed, grid, and utility computing. Critical companies such as Salesforce,Amazon, Google, and Microsoft play important roles in cloud computing. Dramatic changes in the technology environment have created new challenges for current information technologies. This study discusses four significant challenges for cloud computing services,including the next-generation Internet, data synchronization, cloud security, and competitive advantages.And then it also discusses how managers can learn about the future of cloud computing services. 展开更多
关键词 Cloud computing service competitive advantage next generation of Internet road map
下载PDF
Design of Power Switching and Distribution Circuits for Solar Power Generation
11
作者 Yun-Parn Lee En-Chi Liu 《Journal of Electronic Science and Technology》 CAS 2013年第3期281-285,共5页
Abstract--With the development of clean energy, switching and distribution issues in a photovoltaic system are getting much attention in recent years. This paper designs a DC to AC inverter and power switching and dis... Abstract--With the development of clean energy, switching and distribution issues in a photovoltaic system are getting much attention in recent years. This paper designs a DC to AC inverter and power switching and distribution system between a solar power system and the municipal system by using the Darlington amplifier structure with the photosensitive resistor and accompanying relays, and details the system circuits. The proposed system can achieve a stable output of IIOV AC, as well as self-generating driving voltage and switching between the municipal electrical system and the solar power system. The mathematic analysis and actually test results demonstrate that the proposed method is an easy, inexpensive, and low cost way to build a solar power switching and distribution system. 展开更多
关键词 Index Terms--Darlington amplifier energyefficiency photosensitive resistor photovoltaic power.
下载PDF
Non-Contact Physiological Measurement System for Wearing Masks During the Epidemic
12
作者 Shu-Yin Chiang Dong-Ye Wu 《Computers, Materials & Continua》 SCIE EI 2023年第5期2509-2526,共18页
Physiological signals indicate a person’s physical and mental state at any given time.Accordingly,many studies extract physiological signals from the human body with non-contact methods,and most of them require facia... Physiological signals indicate a person’s physical and mental state at any given time.Accordingly,many studies extract physiological signals from the human body with non-contact methods,and most of them require facial feature points.However,under COVID-19,wearing a mask has become a must in many places,so how non-contact physiological information measurements can still be performed correctly even when a mask covers the facial information has become a focus of research.In this study,RGB and thermal infrared cameras were used to execute non-contact physiological information measurement systems for heart rate,blood pressure,respiratory rate,and forehead temperature for peoplewearing masks due to the pandemic.Using the green(G)minus red(R)signal in the RGB image,the region of interest(ROI)is established in the forehead and nose bridge regions.The photoplethysmography(PPG)waveforms of the two regions are obtained after the acquired PPG signal is subjected to the optical flow method,baseline drift calibration,normalization,and bandpass filtering.The relevant parameters in Deep Neural Networks(DNN)for the regression model can correctly predict the heartbeat and blood pressure.In addition,the temperature change in the ROI of the mask after thermal image processing and filtering can be used to correctly determine the number of breaths.Meanwhile,the thermal image can be used to read the temperature average of the ROI of the forehead,and the forehead temperature can be obtained smoothly.The experimental results show that the above-mentioned physiological signals of a subject can be obtained in 6-s images with the error for both heart rate and blood pressure within 2%∼3%and the error of forehead temperature within±0.5°C. 展开更多
关键词 PPG DNN heart rate blood pressure prediction face mask
下载PDF
A Wrapping Encryption Based on Double Randomness Mechanism
13
作者 Yi-Li Huang Fang-Yie Leu +2 位作者 Ruey-Kai Sheu Jung-Chun Liu Chi-Jan Huang 《Computers, Materials & Continua》 SCIE EI 2023年第10期1143-1164,共22页
Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite commun... Currently,data security mainly relies on password(PW)or system channel key(SKCH)to encrypt data before they are sent,no matter whether in broadband networks,the 5th generation(5G)mobile communications,satellite communications,and so on.In these environments,a fixed password or channel key(e.g.,PW/SKCH)is often adopted to encrypt different data,resulting in security risks since thisPW/SKCH may be solved after hackers collect a huge amount of encrypted data.Actually,the most popularly used security mechanism Advanced Encryption Standard(AES)has its own problems,e.g.,several rounds have been solved.On the other hand,if data protected by the same PW/SKCH at different time points can derive different data encryption parameters,the system’s security level will be then greatly enhanced.Therefore,in this study,a security scheme,named Wrapping Encryption Based on Double Randomness Mechanism(WEBDR),is proposed by integrating a password key(or a system channel key)and an Initialization Vector(IV)to generate an Initial Encryption Key(IEK).Also,an Accumulated Shifting Substitution(ASS)function and a three-dimensional encryption method are adopted to produce a set of keys.Two randomness encryption mechanisms are developed.The first generates system sub-keys and calculates the length of the first pseudo-random numbers by employing IEK for providing subsequent encryption/decryption.The second produces a random encryption key and a sequence of internal feedback codes and computes the length of the second pseudo-random numbers for encrypting delivered messages.A wrapped mechanism is further utilized to pack a ciphertext file so that a wrapped ciphertext file,rather than the ciphertext,will be produced and then transmitted to its destination.The findings are as follows.Our theoretic analyses and simulations demonstrate that the security of the WEBDR in cloud communication has achieved its practical security.Also,AES requires 176 times exclusive OR(XOR)operations for both encryption and decryption,while the WEBDR consumes only 3 operations.That is why the WEBDR is 6.7∼7.09 times faster than the AES,thus more suitable for replacing the AES to protect data transmitted between a cloud system and its users. 展开更多
关键词 Initial encryption key accumulated shifting substitution three-dimensional operation wrapped ciphertext file
下载PDF
Evaluation of the Anti-Inflammatory Activities of 5,8,11-<i>cis</i>-Eicosatrienoic Acid
14
作者 Lun-Chung Hsu Zhi-Hong Wen +3 位作者 Han-Min Chen Han-Tzo Lin Chi-Ming Chiu Hui-Chung Wu 《Food and Nutrition Sciences》 2013年第9期113-119,共7页
The main eicosanoids inflammatory mediators, prostaglandins and leukotrienes, are both generated from arachidonic acid (AA;20:4 n-6). AA is a member of polyunsaturated fatty acids (PUFAs). Numerous studies have demons... The main eicosanoids inflammatory mediators, prostaglandins and leukotrienes, are both generated from arachidonic acid (AA;20:4 n-6). AA is a member of polyunsaturated fatty acids (PUFAs). Numerous studies have demonstrated that various contents of PUFAs can modulate the inflammatory responses. However, fewer studies have examined n-9PUFAs and their effects on the inflammatory responses. In the present study, the role of 5,8,11-cis-eicosatrienoic acid (ETrA;20:3 n-9, also called Mead acid) in the inflammatory responses has been investigated. The anti-inflammatory activities of ETrA were examined using an in vitro macrophage system and the inhibitory effect was confirmed by western blot analysis for iNOS and COX-2 expressions. The interactions between ETrA and COX-2 protein were simulated to produce a computer modeling protein-ligand complexes and the results suggest a possible mechanism for the effects of ETrA. In this study, we described a significant inhibition of the inflammatory activities initiated by ETrA. Since ETrA is a substance presented in the tissues of young animals, we therefore anticipate that ETrA can be utilized as a natural therapeutic supplement to inhibit inflammatory activities. 展开更多
关键词 5 8 11-cis-Eicosatrienoic ACID ANTI-INFLAMMATORY Activities COX-2 INOS PUFAS
下载PDF
Experienced College Instructors' Personal Epistemology in Teaching Social Studies and Their Perception of Using Technology
15
作者 Li-chu Sung 《Journal of Philosophy Study》 2011年第5期360-377,共18页
Experience includes explicit and tacit knowledge. Explicit knowledge is from a person's "espoused theory" which is what a person believes and claims to follow. Tacit knowledge is from a person's "theory-in-use" ... Experience includes explicit and tacit knowledge. Explicit knowledge is from a person's "espoused theory" which is what a person believes and claims to follow. Tacit knowledge is from a person's "theory-in-use" which lies behind a person's action or behavior. The knowledge of teaching demonstrated in the classroom can be referred to as tacit knowledge or theory-in-use which is often the theory behind the practice of experienced teachers. Freema Elbaz (1983) points out that the "experience" is referred to as "practical knowledge", which "provides the basis for a conceptualization which sees the teacher as possessing valuable resources" (6) and allows teachers to explicitly indicate and tacitly demonstrate their experience in teaching. The purpose of the study is to investigate how experienced college instructors apply their good teaching qualities to teaching social studies. The participants are three experienced college instructors teaching social studies. A concept map and a final reflection are used to elicit experienced instructors' personal epistemology in teaching social studies and their perception of technology use in the classroom. Each participant was asked to generate nine good teaching qualities and draw their concept map based on the nine qualities. Their concept maps reflected their theory-in-use and showed the relationship among their teaching qualities by displaying them together in a graphic form and how each teaching quality is connected to another. Participants' technology use was also explored to get their perception of the role of technology and their actual use of it in teaching. Then they were asked to validate their concept map data and reflect on their classroom teaching and use of technology. The findings show the three instructors taught under different schema and decided what their means and ends should be and how technology can help facilitate teaching and learning. However, most of them seemed to treat the content (e.g., democracy education) as their ends and thus used pedagogy (e.g., technology) as the means to reach the ends. Their technology use also reflected their perception of technology in teaching and revealed their limited understanding of technology integration, which leads to potential problems. 展开更多
关键词 technology integration explicit and tacit knowledge espoused theory theory-in-use critical thinking
下载PDF
Rebuilding the Ancestral Temple and Hosting Daluo Heaven and Earth Prayer and Enlightenment Ceremony
16
作者 Wu Hui-Chiao 《Cultural and Religious Studies》 2020年第7期386-402,共17页
Kuo,Yeh-Tzu founded Taiwan’s Sung Shan Tsu Huei Temple in 1970.She organized more than 200 worshipers as a group named“Taiwan Tsu Huei Temple Queen Mother of the West Delegation to China to Worship at the Ancestral ... Kuo,Yeh-Tzu founded Taiwan’s Sung Shan Tsu Huei Temple in 1970.She organized more than 200 worshipers as a group named“Taiwan Tsu Huei Temple Queen Mother of the West Delegation to China to Worship at the Ancestral Temples”in 1990.At that time,the temple building of the Queen Mother Palace in Huishan of Gansu Province was in disrepair,and Temple Master Kuo,Yeh-Tzu made a vow to rebuild it.Rebuilding the ancestral temple began in 1992 and was completed in 1994.It was the first case of a Taiwan temple financing the rebuilding of a far-away Queen Mother Palace with its own donations.In addition,Sung Shan Tsu Huei Temple celebrated its 45th anniversary and hosted Yiwei Yuanheng Lizhen Daluo Tiandi Qingjiao(Momentous and Fortuitous Heaven and Earth Prayer Ceremony)in 2015.This is the most important and the grandest blessing ceremony of Taoism,a rare event for Taoism locally and abroad during this century.Those sacred rituals were replete with unprecedented grand wishes to propagate the belief in Queen Mother of the West.Stopping at nothing,Queen Mother’s love never ceases. 展开更多
关键词 Sung Shan Tsu Huei Temple Temple Master Kuo Yeh-Tzu Golden Mother of the Jade Pond Daluo Tiandi Qingjiao(Daluo Heaven and Earth Prayer Ceremony)
下载PDF
Remarks on the Complexity of Signed k-Domination on Graphs
17
作者 Chuan-Min Lee Cheng-Chien Lo +3 位作者 Rui-Xin Ye Xun Xu Xiao-Han Shi Jia-Ying Li 《Journal of Applied Mathematics and Physics》 2015年第1期32-37,共6页
This paper is motivated by the concept of the signed k-domination problem and dedicated to the complexity of the problem on graphs. For any fixed nonnegative integer k, we show that the signed k-domination problem is ... This paper is motivated by the concept of the signed k-domination problem and dedicated to the complexity of the problem on graphs. For any fixed nonnegative integer k, we show that the signed k-domination problem is NP-complete for doubly chordal graphs. For strongly chordal graphs and distance-hereditary graphs, we show that the signed k-domination problem can be solved in polynomial time. We also show that the problem is linear-time solvable for trees, interval graphs, and chordal comparability graphs. 展开更多
关键词 GRAPH Algorithm SIGNED K-DOMINATION STRONGLY Chordal GRAPH Tree Fixed Parameter Tractable
下载PDF
How much do social connections matter in fundraising outcomes?
18
作者 Lihuan Guo Wei Wang +1 位作者 Yenchun Jim Wu Mark Goh 《Financial Innovation》 2021年第1期1706-1728,共23页
This study examines the role of social connections and network centrality in attracting funders to crowdfunding campaigns.We classify social connections as either external(e.g.,Facebook)or internal(e.g.,investing in o... This study examines the role of social connections and network centrality in attracting funders to crowdfunding campaigns.We classify social connections as either external(e.g.,Facebook)or internal(e.g.,investing in online platforms through resource exchange).Drawing from the 108,463 crowdfunding campaigns on the online platform Kickstarter from April 21,2009,to July 24,2019,we apply external linkages and online followers to estimate the effect of external social connections.We construct a digraph network for the internal social connections and use PageRank,HITS,and centrality to obtain the weights of the nodes.Next,we compare the performance change of several prediction algorithms by feeding social connection-related variables.This study has several findings.First,for external social connections,having more online followers improves the funding success rate of a campaign.Second,for internal social connections,only authority and degree in centrality positively affect the number of funders and the campaign’s financing progress among the weights of the nodes.Third,using social connection variables improves the prediction algorithms for funding outcomes.Fourth,external social connections exert greater funding outcomes than internal social connections.Fourth,entrepreneurs should extend their external social connections to their internal social connections,and network centrality expedites project financing.Fifth,the effect of social connections on fundraising outcomes varies among the campaign categories.Fundraisers who are online influencers should leverage their online social connections,notably for the project categories that matter. 展开更多
关键词 CROWDFUNDING Social connections Social networks Kickstarter FUNDRAISING Online influence
下载PDF
Does an Auditor's Within-Industry Market Share Still Capture Auditor Industry Expertise in a Mandatory Audit Partner Rotation Regime?
19
作者 Chi Wuchun Liao Hsiumei Xie Hong 《Journal of Modern Accounting and Auditing》 2014年第1期80-96,共17页
Prior studies commonly use an auditor's market share in an industry as a proxy for auditor industry expertise and find that audit quality is positively related to an audit partner's within-industry market share in a... Prior studies commonly use an auditor's market share in an industry as a proxy for auditor industry expertise and find that audit quality is positively related to an audit partner's within-industry market share in a voluntary audit partner rotation regime where the length of the client-partner relationship is not limited. Mandatory audit partner rotation, however, limits the length of the client-partner relationship and can artificially increase or decrease the market shares of incoming and departing partners, thus making the audit partner's within-industry market share an unreliable proxy for auditor industry expertise. Using a sample of banks in Taiwan, we find that audit quality is positively related to an audit partner's within-industry market share in the voluntary audit partner rotation regime. However, such a positive relation disappears in the mandatory audit partner rotation regime. Thus, we conclude that mandatory audit partner rotation decouples the link between an audit partner's within-industry market share and auditor industry expertise and caution researchers against using an audit partner's within-industry market share as a proxy for auditor industry expertise in a mandatory audit partner rotation regime. 展开更多
关键词 earnings quality auditor expertise mandatory partner rotation client-specific tenure industry-specificmarket share
下载PDF
A Study of Medical Insurance With Big Data in Taiwan
20
作者 Jhih-Ling Chiu Chun-Ya Chang 《Management Studies》 2018年第5期402-413,共12页
The structures of numerous industries, including the insurance industry, have been altered by the ongoing development of associated technologies. As the insurance industry undergoes this period of technology transform... The structures of numerous industries, including the insurance industry, have been altered by the ongoing development of associated technologies. As the insurance industry undergoes this period of technology transformation, it is important to recognize the key role that big data play in the industry. Most critically, the industry could not function without the utilization of big data, which explains to a large extent why every insurance company maintains its own numeric database. Relatedly, Taiwan's Bureau of National Health Insurance recently established the Information Integration Application Service Center, to which qualified companies and institutions can submit applications for permission to analyze the bureau's collected disease data according to stipulated regulations. In effect, access to the center's data provides insurance companies with a further means of improving their operational effectiveness through the analysis of big data, with targets for potential improvements including the various strategies utilized to react to changes in the environment, such as those involved in marketing, administrative management, and product pricing and services. The foundation of the present study consisted of a literature review and survey, with the key objective being to determine and discuss the effects of big data analysis on the medical insurance industry, including the changes that the utilization of big data results in for the customers of medical insurance companies. With the issues discussed above in mind, the survey was designed to determine whether medical insurance consumers know about and understand the effects of big data. The survey data indicated the following key findings: (1) The two concepts exhibit clear differences in terms of population statistic wxiables; (2) The two concepts exhibit clear differences in terms of insurance purchasing variables; and (3) The two concepts exhibit clear differences in terms of the level of understanding regarding big data. 展开更多
关键词 big data medical insurance questionnaire survey
下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部