Despite blockchain’s potential to transform corporations by providing new ways of organizing business processes and handling information,extant research pays inadequate attention to how and under what conditions bloc...Despite blockchain’s potential to transform corporations by providing new ways of organizing business processes and handling information,extant research pays inadequate attention to how and under what conditions blockchain technology provides additional financial value for shareholders.Drawing on the efficient market hypothesis and signaling theory,we examined the relationship between firms’blockchain use,development announcements,and stock market reactions.We used the event study methodology to analyze a sample of blockchain projects initiated by US firms between 2016 and 2019.The sample contains 114 firm-event observations.The findings show that the average abnormal return over a 2 days event period(including the day of the announcement and the day after the announcement)was positive.This positive stock market reaction is even more substantial when firms announce blockchain projects that focus on saving cost or time.Our findings also indicate that blockchain announcements tend to elicit more positive market reactions from smaller firms.We analyzed 249 firm-event observations containing firms from around the world and conclude that blockchain technology has a non-significant long-term impact on operating performance.The contingency approach adopted in our research provides advice for selecting the right mix of blockchain investment initiatives that is most suitable for a given organizational context.展开更多
Because of the ubiquity of information and communication technology (ICT) and ICT-based information systems, ICT workers in business organisations have power, both intentional and unintentional, over people's qual...Because of the ubiquity of information and communication technology (ICT) and ICT-based information systems, ICT workers in business organisations have power, both intentional and unintentional, over people's quality of life. On this point, all of them, not only ICT professionals but also non-professionals or end-users, need to accept responsibility to the public and to have professional spirit in order to make and keep the information society and e-business environment safe and reliable. However, an individual ICT worker is not necessarily a strong existence; he or she is in a complex situation filled with stress and pressure and his or her decisions are sometimes affected by it. Therefore, social and organisational measures to prompt ICT workers to behave in professional spirit are necessary to be taken.展开更多
The paper expounds the extensive ecological process of knowledge creation in the strategic change from traditional enterprises to innovative enterprises from the perspective of integrating innovation,analyzes the syst...The paper expounds the extensive ecological process of knowledge creation in the strategic change from traditional enterprises to innovative enterprises from the perspective of integrating innovation,analyzes the systematic integration process of the three links including knowledge preparation,knowledge production and knowledge diffusion in the two different change paths of integrated innovation and digestive absorption innovation,and establishes the knowledge ecology models in different paths.展开更多
BaY2F8 crystals had a relatively low symmetry, and its XRD data showed that those strong diffractions occured in a narrow angle range, so it was difficult to orientate the single crystals of BaYEFs. In this paper, bas...BaY2F8 crystals had a relatively low symmetry, and its XRD data showed that those strong diffractions occured in a narrow angle range, so it was difficult to orientate the single crystals of BaYEFs. In this paper, based on the structure characteristics and XRD data, the crystal habit of BaY2F8 was analyzed. The strong bond in crystal structure of BaYEF8 was Y-FE-Y, which stretched to the shape of chain along the direction of [001]. And this was an advantaged direction for the crystal growth. The steady shapes of BaY2F8 were composed of rhombic prism { 130} and {021 }. The crystal showed an axial habit in the direction of [001]. The analysis of the crystal slice obtained by temperature gradient technique verified the above conclusion. The BaY2F8 crystal was grown by compulsive methods such as Czochralski method.展开更多
Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability ...Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability scanners,are available in the market which helps detect and manage vulnerabilities in a computer,application,or a network.Hence,the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management.The current work serves a dual purpose,first,to identify the key factors which affect the vulnerability discovery process in a network.The second,is to rank the popular vulnerability scanners based on the identified attributes.This will aid the firm in determining the best scanner for them considering multiple aspects.The multi-criterion decision making based ranking approach has been discussed using the Intuitionistic Fuzzy set(IFS)and Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)to rank the various scanners.Using IFS TOPSIS,the opinion of a whole group could be simultaneously considered in the vulnerability scanner selection.In this study,five popular vulnerability scanners,namely,Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose have been considered.The inputs of industry specialists i.e.,people who deal in software security and vulnerability management process have been taken for the ranking process.Using the proposed methodology,a hierarchical classification of the various vulnerability scanners could be achieved.The clear enumeration of the steps allows for easy adaptability of the model to varied situations.This study will help product developers become aware of the needs of the market and design better scanners.And from the user’s point of view,it will help the system administrators in deciding which scanner to deploy depending on the company’s needs and preferences.The current work is the first to use a Multi Criterion Group Decision Making technique in vulnerability scanner selection.展开更多
It is generally believed that Edgar Allan Poe’s detective stories feature the ratiocination of C.Auguste Dupin,a detective Poe has created.However,this paper aims to demonstrate that there is actually an undercurrent...It is generally believed that Edgar Allan Poe’s detective stories feature the ratiocination of C.Auguste Dupin,a detective Poe has created.However,this paper aims to demonstrate that there is actually an undercurrent of irrationality in Poe’s detective stories.First of all,ratiocination,by definition,refers to inference,or deductive rules.It is also a type of the Enlightenment thinking that is closely related to reason or rationality.In detective fiction,it is the detective’s ability to analyze the clues and reason out the truth.It is true that Dupin’s ratiocination predominates in Poe’s detective stories.However,a closer look will reveal that Dupin’s ratiocinative processes in these stories are in fact blended with his speculation or imagination,namely,elements of irrationality.That is,beneath Dupin’s seemly seamless ratiocinative model is indeed an undercurrent of irrationality.To find out the origin of this undercurrent,we have to research the historical background of Poe’s detective stories.In the era of Poe’s detective stories,the Enlightenment is the dominant thinking,while there is also a resistant force developing at the same time,Gothicism.The Enlightenment puts a premium on reason;in contrast,Gothicism is often equated with irrationality,whose manifestations include horror or imagination.Poe,who is deemed as the“romantic ironist”,is a writer who is uniquely capable of making two statements with opposite meanings simultaneously.So as he indicates that ratiocination will lead to the truth in his detective stories,he may as well implies that imagination or speculation will also fulfill the same purpose.In addition,Poe excels in absorbing contraries;thus,he infuses both rationality and irrationality into his detective stories.For Poe,the latter has to be subdued by the former.As a consequence,the former plays a pivotal role in Poe’s detective stories,while the latter ends up as an undercurrent.展开更多
This paper submits that the advantages gained by introducing a single currency at the domestic level, applies equally to the economy at the global level. The advantages gained are (1) a reduction of the inflation ra...This paper submits that the advantages gained by introducing a single currency at the domestic level, applies equally to the economy at the global level. The advantages gained are (1) a reduction of the inflation rate to one common rate (if required) amongst all states, (2) a possible reduced interest rate, (3) an expansion in investment, (4) an increase in development and trade due to the removal of uncertainty, (5) the reduction in transaction costs, and (6) the reduction in the cost of capital (Moshirian, 2004, p. 306). A single global currency has immediate implications in accounting for inflation as it presents an opportunity for the permanent removal of problems associated with accounting for inflation. This paper addresses the phenomenon of inflation and how accounting measurement and valuation associated with inflation is removed by the introduction of a single global currency.展开更多
This paper evaluates the efficiency of using a downward breaststroke kick in a sample of eight elite swimmers.Using a downward breaststroke kick increases the one stroke velocity and max speed but also increases produ...This paper evaluates the efficiency of using a downward breaststroke kick in a sample of eight elite swimmers.Using a downward breaststroke kick increases the one stroke velocity and max speed but also increases production of lactate acid.Utilizing the downward breaststroke kick we find the 100-meter and 100-yard breaststroke times decrease from 1:05.10s to 1:01.97s and find the downward breaststroke kick increases muscle activity of the quadriceps,biceps,and calves.The increases in performance were observed from measuring the world class swimmers are highly correlated to duration of the kick aerodynamic buoyant force in breaststroke.展开更多
How does stablecoin design affect market behavior during turbulent periods?Stable-coins attempt to maintain a“stable”peg to the US dollar,but do so with widely varying structural designs.The spectacular collapse of ...How does stablecoin design affect market behavior during turbulent periods?Stable-coins attempt to maintain a“stable”peg to the US dollar,but do so with widely varying structural designs.The spectacular collapse of the TerraUSD(UST)stablecoin and the linked Terra(LUNA)token in May 2022 precipitated a series of reactions across major stablecoins,with some experiencing a fall in value and others gaining value.Using a Baba,Engle,Kraft and Kroner(1990)(BEKK)model,we examine the reaction to this exogenous shock and find significant contagion effects from the UST collapse,likely partially due to herding behavior among traders.We test the varying reactions among stablecoins and find that stablecoin design differences affect the direction,magnitude,and duration of the response to shocks.We discuss the implications for stablecoin developers,exchanges,traders,and regulators.展开更多
In the face of global climate change,the urgent shift towards renewable energy sources such as solar power is vital for reducing greenhouse gas emissions and fostering a sustainable future,presenting a universal chall...In the face of global climate change,the urgent shift towards renewable energy sources such as solar power is vital for reducing greenhouse gas emissions and fostering a sustainable future,presenting a universal challenge and opportunity for energy policy worldwide.India’s adoption of rooftop solar photovoltaic is pivotal due to its vast solar potential,which aligns with national goals to increase renewable energy capacity,reduce carbon emissions,and achieve energy security.Kerala’s geographical location offers abundant solar potential,making it a prime candidate for the adoption of rooftop solar photovoltaic systems.Coupled with the state’s strong commitment to renewable energy initiatives such as the ambitious“SOURA”(solar subsidy program by the Kerala State Electricity Board)project and various incentives for solar adoption,Kerala stands at the forefront of India’s transition towards sustainable energy solutions.Understanding the barriers to rooftop solar photovoltaic adoption in Kerala is crucial for tailoring ef-fective policies and strategies that address specific hindrances from economic constraints to informational gaps.This study employs a qualitative research method to identify the barriers to rooftop solar photovoltaic adoption among households in Kerala.Through face-to-face interviews with a purposively selected sample of 52 households,the research aims to gain in-depth insights into the multifaceted challenges hindering the widespread adoption of solar energy in residential settings.The findings reveal several key barriers:financial barriers,informational barriers,technical barriers,regulatory barriers,social barriers,and psychological barriers.Sentiment analysis indicates that while there is a predominantly positive attitude towards solar photovoltaic adoption,there are sig-nificant concerns that still need to be addressed.Addressing these barriers with targeted policy interventions and public awareness campaigns could significantly enhance the adoption of rooftop solar photovoltaic systems in Kerala.展开更多
This paper empirically examined the impact of fiscal policy on inflation in Nigeria.Time series data on inflation,government revenue,government expenditure,and gross domestic product were sourced from the Central Bank...This paper empirically examined the impact of fiscal policy on inflation in Nigeria.Time series data on inflation,government revenue,government expenditure,and gross domestic product were sourced from the Central Bank of Nigeria(CBN).The aforementioned secondary data cover the period from 1981 to 2021.The Augmented Dickey Fuller(ADF)unit root test and Johansen co-integration test were used to testing for data stationarity and the existence or otherwise of co-integrating equations respectively.Thereafter,data were analyzed using Ordinary Least Square and Parsimonious Error Correction techniques.Findings from the study show that government expenditure and revenue both have a positive relationship with the rate of inflation,though the latter is not statistically significant.Also,there is a positive but insignificant relationship between inflation and gross domestic product.In line with the above findings,we,therefore,recommend that the Nigerian government at all levels(local,state,and federal)should be tactful in the use of fiscal policy tools to avoid triggering inflationary pressure and its negative multiplier effects on the welfare of its citizenry.展开更多
This paper aims to examine how Macherey is dialogically engaged with post-Marxism in formulating his reading strategy. First Macherey thinks that the author must have left something unsaid in his text. The unsaid or t...This paper aims to examine how Macherey is dialogically engaged with post-Marxism in formulating his reading strategy. First Macherey thinks that the author must have left something unsaid in his text. The unsaid or the narrative rupture is responsible for the multiplicity of the voices in the text, enabling the text to exist. Most of all, Macherey argues that a text, embedded in History, is where the author represents ideology inaccurately. And it is from this inaccuracy where the narrative rupture emerges. At this point, Macherey is dialogically correlated with several major post-Marxists, such as Althusser, Eagleton, and Jameson. First, all three of them give their own definitions to ideology, and they all define the relationship between the text, ideology, and History in a similar fashion. For Althusser, ideology is men's imaginary relation to History and is insufficiently reflected in the text, which perfectly corresponds to Macherey's claim. For Eagleton, a text absorbs ideology and puts it into contradiction, establishing its relationship with History. As Eagleton himself has stated, his so-called "ideological contradiction" is tantamount to Macherey's so-called "narrative rupture." In Jameson's opinion, ideology is designed to repress social contradictions, and a text, a symbolic act, is supposed to offer imaginary solutions to them. Above all, they end up as the latent meanings of a text. As for History, it is the inaccessible Real. In speaking of "the latent meanings of a text," Jameson literally echoes Machery's said/unsaid model. Thus, we can confirm how Macherey is dialogically engaged with post-Marxism.展开更多
This paper aims to parallelize the theorizations of Pierre Macherey and Gilles Deleuze.First,the author,according to Macherey,must have left something unsaid in his text.The unsaid or the narrative rupture is responsi...This paper aims to parallelize the theorizations of Pierre Macherey and Gilles Deleuze.First,the author,according to Macherey,must have left something unsaid in his text.The unsaid or the narrative rupture is responsible for the multiplicity of the voices in the text,enabling the text to exist.Above all,Macherey argues that the unsaid or the narrative rupture emerges from how the author chooses to represent ideology.That is,Macherey’s so-called unsaid or narrative rupture is actually what the author could have said;it is in fact a potentiality embedded in the text.On the other hand,when postulating his virtual(ity)/actual(ity)couplet,Deleuze asserts that the virtual(ity)is actually a potentiality that can be tapped.To be more precise,the virtual(ity)has its own reality,and once actualized,it will be transformed into something entirely new and different.Here,the dialogical space between Macherey and Deleuze is plain to see:Macherey’s so-called unsaid or narrative rupture is literally Deleuze’s so-called virtuality.When the unsaid is said,a virtuality is actualized.And a potentiality is thus tapped.By such a reading strategy,we readers are presented with an enactment of an alternative case scenario of the text,namely,how the text could have been made over.In the end,an example of this reading strategy is provided:Macherey argues that Marquis de Sade’s desire-ruled society is more oppressive.What de Sade has left unsaid is the problematic relationship between desire and oppression.And it is exactly the potentiality in his works.展开更多
Internet of things (IoT) has been significantly raised owing to thedevelopment of broadband access network, machine learning (ML), big dataanalytics (BDA), cloud computing (CC), and so on. The development of IoTtechno...Internet of things (IoT) has been significantly raised owing to thedevelopment of broadband access network, machine learning (ML), big dataanalytics (BDA), cloud computing (CC), and so on. The development of IoTtechnologies has resulted in a massive quantity of data due to the existenceof several people linking through distinct physical components, indicatingthe status of the CC environment. In the IoT, load scheduling is realistictechnique in distinct data center to guarantee the network suitability by fallingthe computer hardware and software catastrophe and with right utilize ofresource. The ideal load balancer improves many factors of Quality of Service(QoS) like resource performance, scalability, response time, error tolerance,and efficiency. The scholar is assumed as load scheduling a vital problem inIoT environment. There are many techniques accessible to load scheduling inIoT environments. With this motivation, this paper presents an improved deerhunting optimization algorithm with Type II fuzzy logic (IDHOA-T2F) modelfor load scheduling in IoT environment. The goal of the IDHOA-T2F is todiminish the energy utilization of integrated circuit of IoT node and enhancethe load scheduling in IoT environments. The IDHOA technique is derivedby integrating the concepts of Nelder Mead (NM) with the DHOA. Theproposed model also synthesized the T2L based on fuzzy logic (FL) systemsto counterbalance the load distribution. The proposed model finds usefulto improve the efficiency of IoT system. For validating the enhanced loadscheduling performance of the IDHOA-T2F technique, a series of simulationstake place to highlight the improved performance. The experimental outcomesdemonstrate the capable outcome of the IDHOA-T2F technique over therecent techniques.展开更多
This paper deals with personal data use by firms in the e-business environment from the viewpoint of business administration and information ethics. Whereas the tremendous development of information and communication ...This paper deals with personal data use by firms in the e-business environment from the viewpoint of business administration and information ethics. Whereas the tremendous development of information and communication technology (ICT) has made it easier for firms to acquire, store, share, and utilise personal data on their customers, firms that use personal data are exposed to risks related to privacy issues. Since individuals fear the invasion of their privacy, the failure of a firm to appear or remain trustworthy would make it difficult for it to maintain accurate, up-to-date databases and to construct desirable business processes, which would affect the bottom line. Therefore, modern firms should do what they can to ensure that their customers trust them. For them, one promising way to remain trustworthy is to behave as a moral agent. Although it is difficult for any firm to meet the conditions necessary to be a moral agent, competence in behaving as a moral agent is a hard-to-imitate capability af firms for which personal data use is vital for enjoying the benefits of business relationships in the e-business environment.展开更多
A major concern is to locate manufacturing plants and/or distribution centers to serve the needs of consumers widely and rapidly with reasonably distributive cost and flexible delivery time. The purpose of this resear...A major concern is to locate manufacturing plants and/or distribution centers to serve the needs of consumers widely and rapidly with reasonably distributive cost and flexible delivery time. The purpose of this research is to help enhance a decision support for three distribution center locations with different ranges of area in order that the distributors are able to serve appropriately the retailers in twelve large cities or capitals of the nine countries in Asia-Pacific region. The researcher applies the theory of supply chain and logistics management systems with Excel, Visual Basic and Genetic Algorithms programs to find the research results. The research results revealed that the interfaces of Excel, Visual Basic, and Genetic Algorithms programs helped decision support in distribution range selection for 3 distribution center locations. Each of which had different ranges of area for distribution with a rapidly, flexibly distributed time. However, variables resulting in a decision-making should be adjusted under certain circumstances for more reliable, specific needs.展开更多
Using cross section data of 3 years 2000,2007,and 2014 for non-financial listed firms in China,this study quantitatively analyzes the relationship between government-affiliated corporate executives and corporate perfo...Using cross section data of 3 years 2000,2007,and 2014 for non-financial listed firms in China,this study quantitatively analyzes the relationship between government-affiliated corporate executives and corporate performance.We classify the sample firms into two groups,based on whether their chief executive officers(CEOs)and independent directors are prior government officials or not.Then,we empirically examine the difference in corporate performance between the two groups.We find that the appointment of CEOs and directors of listed companies in China is significantly affected by government shareholders.The results also suggest that prior to 2000 government-affiliated CEOs impaired corporate performance.But with the establishment of State-owned Assets Supervision and Administration Committee and the completion of the Split-Share Structure Reform in 2006,government as a shareholder began to give priority to corporate value maximization,and government-affiliated CEOs began to help improve corporate performance.However,due to the slowdown of economic growth after 2012,problems such as inefficiency and corruption brought by government-affiliated executives manifested again,and therefore,corporate performance deteriorated.Meanwhile,government-affiliated independent directors have limited influence on these factors.展开更多
This paper studies the connection between the stock market and real output in China and compares it with benchmark countries,employing a novel vector autoregression with asymmetric leads(VARwAL)model.It makes two cont...This paper studies the connection between the stock market and real output in China and compares it with benchmark countries,employing a novel vector autoregression with asymmetric leads(VARwAL)model.It makes two contributions.First,it finds that the time profile of the Chinese stock market's response to real output shocks suggests no evidence of a distorted relationship due to manipulation of Chinese real output data or domination of the Chinese stock market by individual investors.Rather,the Chinese stock market is relatively more responsive to real output,in line with the larger share of manufacturing in the Chinese economy.Electricity output and industrial profits,two different,less-manipulable time series,yield similar results.Second,it presents the first use of VARwAL impulse responses to detect stock market bubbles:VARwAL captures the 2015 bubble in China successfully.Over the full sample period,China's stock market appears to have been less prone to bubbles than the US stock market.展开更多
文摘Despite blockchain’s potential to transform corporations by providing new ways of organizing business processes and handling information,extant research pays inadequate attention to how and under what conditions blockchain technology provides additional financial value for shareholders.Drawing on the efficient market hypothesis and signaling theory,we examined the relationship between firms’blockchain use,development announcements,and stock market reactions.We used the event study methodology to analyze a sample of blockchain projects initiated by US firms between 2016 and 2019.The sample contains 114 firm-event observations.The findings show that the average abnormal return over a 2 days event period(including the day of the announcement and the day after the announcement)was positive.This positive stock market reaction is even more substantial when firms announce blockchain projects that focus on saving cost or time.Our findings also indicate that blockchain announcements tend to elicit more positive market reactions from smaller firms.We analyzed 249 firm-event observations containing firms from around the world and conclude that blockchain technology has a non-significant long-term impact on operating performance.The contingency approach adopted in our research provides advice for selecting the right mix of blockchain investment initiatives that is most suitable for a given organizational context.
基金This research is supported by the MEXT Research Project "Global Business and IT Management: Global eSCM" at the Research Institute of Commerce, Meiji University.
文摘Because of the ubiquity of information and communication technology (ICT) and ICT-based information systems, ICT workers in business organisations have power, both intentional and unintentional, over people's quality of life. On this point, all of them, not only ICT professionals but also non-professionals or end-users, need to accept responsibility to the public and to have professional spirit in order to make and keep the information society and e-business environment safe and reliable. However, an individual ICT worker is not necessarily a strong existence; he or she is in a complex situation filled with stress and pressure and his or her decisions are sometimes affected by it. Therefore, social and organisational measures to prompt ICT workers to behave in professional spirit are necessary to be taken.
基金the staged achievement of the humanistic and social science youth fund program of the Ministry of Education(11YJC630143)
文摘The paper expounds the extensive ecological process of knowledge creation in the strategic change from traditional enterprises to innovative enterprises from the perspective of integrating innovation,analyzes the systematic integration process of the three links including knowledge preparation,knowledge production and knowledge diffusion in the two different change paths of integrated innovation and digestive absorption innovation,and establishes the knowledge ecology models in different paths.
基金the Natural Science Foundation of Tianjin, China (07JCZDJC00600, 07JCYBJC06000)
文摘BaY2F8 crystals had a relatively low symmetry, and its XRD data showed that those strong diffractions occured in a narrow angle range, so it was difficult to orientate the single crystals of BaYEFs. In this paper, based on the structure characteristics and XRD data, the crystal habit of BaY2F8 was analyzed. The strong bond in crystal structure of BaYEF8 was Y-FE-Y, which stretched to the shape of chain along the direction of [001]. And this was an advantaged direction for the crystal growth. The steady shapes of BaY2F8 were composed of rhombic prism { 130} and {021 }. The crystal showed an axial habit in the direction of [001]. The analysis of the crystal slice obtained by temperature gradient technique verified the above conclusion. The BaY2F8 crystal was grown by compulsive methods such as Czochralski method.
文摘Software developers endeavor to build their products with the least number of bugs.Despite this,many vulnerabilities are detected in software that threatens its integrity.Various automated software i.e.,vulnerability scanners,are available in the market which helps detect and manage vulnerabilities in a computer,application,or a network.Hence,the choice of an appropriate vulnerability scanner is crucial to ensure efficient vulnerability management.The current work serves a dual purpose,first,to identify the key factors which affect the vulnerability discovery process in a network.The second,is to rank the popular vulnerability scanners based on the identified attributes.This will aid the firm in determining the best scanner for them considering multiple aspects.The multi-criterion decision making based ranking approach has been discussed using the Intuitionistic Fuzzy set(IFS)and Technique for Order of Preference by Similarity to Ideal Solution(TOPSIS)to rank the various scanners.Using IFS TOPSIS,the opinion of a whole group could be simultaneously considered in the vulnerability scanner selection.In this study,five popular vulnerability scanners,namely,Nessus,Fsecure Radar,Greenbone,Qualys,and Nexpose have been considered.The inputs of industry specialists i.e.,people who deal in software security and vulnerability management process have been taken for the ranking process.Using the proposed methodology,a hierarchical classification of the various vulnerability scanners could be achieved.The clear enumeration of the steps allows for easy adaptability of the model to varied situations.This study will help product developers become aware of the needs of the market and design better scanners.And from the user’s point of view,it will help the system administrators in deciding which scanner to deploy depending on the company’s needs and preferences.The current work is the first to use a Multi Criterion Group Decision Making technique in vulnerability scanner selection.
基金This paper is adapted from my Ph.D.dissertation,“Say the unsaid,repair the fractures-On the narrative ruptures in Edgar Allan Poe’s detective stories”.Here,in addition to thanking the anonymous reviewer for his or her opinions on this paper,I would like to express my deepest appreciation for my Ph.D.dissertation advisors,Professor Frank W.Stevenson,and Professor Eva Yin-I Chen.And I must also be thankful to Professor Chin-Yuan Hu,Professor Yi Ping Liang,and Professor Brian D.Phillips,all three of whom participated in my oral defenses and proofread my Ph.D.dissertation.
文摘It is generally believed that Edgar Allan Poe’s detective stories feature the ratiocination of C.Auguste Dupin,a detective Poe has created.However,this paper aims to demonstrate that there is actually an undercurrent of irrationality in Poe’s detective stories.First of all,ratiocination,by definition,refers to inference,or deductive rules.It is also a type of the Enlightenment thinking that is closely related to reason or rationality.In detective fiction,it is the detective’s ability to analyze the clues and reason out the truth.It is true that Dupin’s ratiocination predominates in Poe’s detective stories.However,a closer look will reveal that Dupin’s ratiocinative processes in these stories are in fact blended with his speculation or imagination,namely,elements of irrationality.That is,beneath Dupin’s seemly seamless ratiocinative model is indeed an undercurrent of irrationality.To find out the origin of this undercurrent,we have to research the historical background of Poe’s detective stories.In the era of Poe’s detective stories,the Enlightenment is the dominant thinking,while there is also a resistant force developing at the same time,Gothicism.The Enlightenment puts a premium on reason;in contrast,Gothicism is often equated with irrationality,whose manifestations include horror or imagination.Poe,who is deemed as the“romantic ironist”,is a writer who is uniquely capable of making two statements with opposite meanings simultaneously.So as he indicates that ratiocination will lead to the truth in his detective stories,he may as well implies that imagination or speculation will also fulfill the same purpose.In addition,Poe excels in absorbing contraries;thus,he infuses both rationality and irrationality into his detective stories.For Poe,the latter has to be subdued by the former.As a consequence,the former plays a pivotal role in Poe’s detective stories,while the latter ends up as an undercurrent.
文摘This paper submits that the advantages gained by introducing a single currency at the domestic level, applies equally to the economy at the global level. The advantages gained are (1) a reduction of the inflation rate to one common rate (if required) amongst all states, (2) a possible reduced interest rate, (3) an expansion in investment, (4) an increase in development and trade due to the removal of uncertainty, (5) the reduction in transaction costs, and (6) the reduction in the cost of capital (Moshirian, 2004, p. 306). A single global currency has immediate implications in accounting for inflation as it presents an opportunity for the permanent removal of problems associated with accounting for inflation. This paper addresses the phenomenon of inflation and how accounting measurement and valuation associated with inflation is removed by the introduction of a single global currency.
文摘This paper evaluates the efficiency of using a downward breaststroke kick in a sample of eight elite swimmers.Using a downward breaststroke kick increases the one stroke velocity and max speed but also increases production of lactate acid.Utilizing the downward breaststroke kick we find the 100-meter and 100-yard breaststroke times decrease from 1:05.10s to 1:01.97s and find the downward breaststroke kick increases muscle activity of the quadriceps,biceps,and calves.The increases in performance were observed from measuring the world class swimmers are highly correlated to duration of the kick aerodynamic buoyant force in breaststroke.
基金funding agencies in the public,commercial,or not-for-profit sectors.Luca Galati was founded by the Rozetta Institute(formerly CMCRC-SIRCA),55 Harrington St,The Rocks,Sydney,NSW 2000,Australia.
文摘How does stablecoin design affect market behavior during turbulent periods?Stable-coins attempt to maintain a“stable”peg to the US dollar,but do so with widely varying structural designs.The spectacular collapse of the TerraUSD(UST)stablecoin and the linked Terra(LUNA)token in May 2022 precipitated a series of reactions across major stablecoins,with some experiencing a fall in value and others gaining value.Using a Baba,Engle,Kraft and Kroner(1990)(BEKK)model,we examine the reaction to this exogenous shock and find significant contagion effects from the UST collapse,likely partially due to herding behavior among traders.We test the varying reactions among stablecoins and find that stablecoin design differences affect the direction,magnitude,and duration of the response to shocks.We discuss the implications for stablecoin developers,exchanges,traders,and regulators.
文摘In the face of global climate change,the urgent shift towards renewable energy sources such as solar power is vital for reducing greenhouse gas emissions and fostering a sustainable future,presenting a universal challenge and opportunity for energy policy worldwide.India’s adoption of rooftop solar photovoltaic is pivotal due to its vast solar potential,which aligns with national goals to increase renewable energy capacity,reduce carbon emissions,and achieve energy security.Kerala’s geographical location offers abundant solar potential,making it a prime candidate for the adoption of rooftop solar photovoltaic systems.Coupled with the state’s strong commitment to renewable energy initiatives such as the ambitious“SOURA”(solar subsidy program by the Kerala State Electricity Board)project and various incentives for solar adoption,Kerala stands at the forefront of India’s transition towards sustainable energy solutions.Understanding the barriers to rooftop solar photovoltaic adoption in Kerala is crucial for tailoring ef-fective policies and strategies that address specific hindrances from economic constraints to informational gaps.This study employs a qualitative research method to identify the barriers to rooftop solar photovoltaic adoption among households in Kerala.Through face-to-face interviews with a purposively selected sample of 52 households,the research aims to gain in-depth insights into the multifaceted challenges hindering the widespread adoption of solar energy in residential settings.The findings reveal several key barriers:financial barriers,informational barriers,technical barriers,regulatory barriers,social barriers,and psychological barriers.Sentiment analysis indicates that while there is a predominantly positive attitude towards solar photovoltaic adoption,there are sig-nificant concerns that still need to be addressed.Addressing these barriers with targeted policy interventions and public awareness campaigns could significantly enhance the adoption of rooftop solar photovoltaic systems in Kerala.
文摘This paper empirically examined the impact of fiscal policy on inflation in Nigeria.Time series data on inflation,government revenue,government expenditure,and gross domestic product were sourced from the Central Bank of Nigeria(CBN).The aforementioned secondary data cover the period from 1981 to 2021.The Augmented Dickey Fuller(ADF)unit root test and Johansen co-integration test were used to testing for data stationarity and the existence or otherwise of co-integrating equations respectively.Thereafter,data were analyzed using Ordinary Least Square and Parsimonious Error Correction techniques.Findings from the study show that government expenditure and revenue both have a positive relationship with the rate of inflation,though the latter is not statistically significant.Also,there is a positive but insignificant relationship between inflation and gross domestic product.In line with the above findings,we,therefore,recommend that the Nigerian government at all levels(local,state,and federal)should be tactful in the use of fiscal policy tools to avoid triggering inflationary pressure and its negative multiplier effects on the welfare of its citizenry.
文摘This paper aims to examine how Macherey is dialogically engaged with post-Marxism in formulating his reading strategy. First Macherey thinks that the author must have left something unsaid in his text. The unsaid or the narrative rupture is responsible for the multiplicity of the voices in the text, enabling the text to exist. Most of all, Macherey argues that a text, embedded in History, is where the author represents ideology inaccurately. And it is from this inaccuracy where the narrative rupture emerges. At this point, Macherey is dialogically correlated with several major post-Marxists, such as Althusser, Eagleton, and Jameson. First, all three of them give their own definitions to ideology, and they all define the relationship between the text, ideology, and History in a similar fashion. For Althusser, ideology is men's imaginary relation to History and is insufficiently reflected in the text, which perfectly corresponds to Macherey's claim. For Eagleton, a text absorbs ideology and puts it into contradiction, establishing its relationship with History. As Eagleton himself has stated, his so-called "ideological contradiction" is tantamount to Macherey's so-called "narrative rupture." In Jameson's opinion, ideology is designed to repress social contradictions, and a text, a symbolic act, is supposed to offer imaginary solutions to them. Above all, they end up as the latent meanings of a text. As for History, it is the inaccessible Real. In speaking of "the latent meanings of a text," Jameson literally echoes Machery's said/unsaid model. Thus, we can confirm how Macherey is dialogically engaged with post-Marxism.
文摘This paper aims to parallelize the theorizations of Pierre Macherey and Gilles Deleuze.First,the author,according to Macherey,must have left something unsaid in his text.The unsaid or the narrative rupture is responsible for the multiplicity of the voices in the text,enabling the text to exist.Above all,Macherey argues that the unsaid or the narrative rupture emerges from how the author chooses to represent ideology.That is,Macherey’s so-called unsaid or narrative rupture is actually what the author could have said;it is in fact a potentiality embedded in the text.On the other hand,when postulating his virtual(ity)/actual(ity)couplet,Deleuze asserts that the virtual(ity)is actually a potentiality that can be tapped.To be more precise,the virtual(ity)has its own reality,and once actualized,it will be transformed into something entirely new and different.Here,the dialogical space between Macherey and Deleuze is plain to see:Macherey’s so-called unsaid or narrative rupture is literally Deleuze’s so-called virtuality.When the unsaid is said,a virtuality is actualized.And a potentiality is thus tapped.By such a reading strategy,we readers are presented with an enactment of an alternative case scenario of the text,namely,how the text could have been made over.In the end,an example of this reading strategy is provided:Macherey argues that Marquis de Sade’s desire-ruled society is more oppressive.What de Sade has left unsaid is the problematic relationship between desire and oppression.And it is exactly the potentiality in his works.
基金The authors extend their appreciation to the Deanship of Scientific Research at King Khalid University for funding this work under grant number(RGP 2/209/42)This research was funded by the Deanship of Scientific Research at Princess Nourah bint Abdulrahman University through the Fast-Track Path of Research Funding Program.
文摘Internet of things (IoT) has been significantly raised owing to thedevelopment of broadband access network, machine learning (ML), big dataanalytics (BDA), cloud computing (CC), and so on. The development of IoTtechnologies has resulted in a massive quantity of data due to the existenceof several people linking through distinct physical components, indicatingthe status of the CC environment. In the IoT, load scheduling is realistictechnique in distinct data center to guarantee the network suitability by fallingthe computer hardware and software catastrophe and with right utilize ofresource. The ideal load balancer improves many factors of Quality of Service(QoS) like resource performance, scalability, response time, error tolerance,and efficiency. The scholar is assumed as load scheduling a vital problem inIoT environment. There are many techniques accessible to load scheduling inIoT environments. With this motivation, this paper presents an improved deerhunting optimization algorithm with Type II fuzzy logic (IDHOA-T2F) modelfor load scheduling in IoT environment. The goal of the IDHOA-T2F is todiminish the energy utilization of integrated circuit of IoT node and enhancethe load scheduling in IoT environments. The IDHOA technique is derivedby integrating the concepts of Nelder Mead (NM) with the DHOA. Theproposed model also synthesized the T2L based on fuzzy logic (FL) systemsto counterbalance the load distribution. The proposed model finds usefulto improve the efficiency of IoT system. For validating the enhanced loadscheduling performance of the IDHOA-T2F technique, a series of simulationstake place to highlight the improved performance. The experimental outcomesdemonstrate the capable outcome of the IDHOA-T2F technique over therecent techniques.
基金Supported by the MEXT Research Project "Global Business and IT Management: Global eSCM" at the Research Institute of Commerce, Meiji University.
文摘This paper deals with personal data use by firms in the e-business environment from the viewpoint of business administration and information ethics. Whereas the tremendous development of information and communication technology (ICT) has made it easier for firms to acquire, store, share, and utilise personal data on their customers, firms that use personal data are exposed to risks related to privacy issues. Since individuals fear the invasion of their privacy, the failure of a firm to appear or remain trustworthy would make it difficult for it to maintain accurate, up-to-date databases and to construct desirable business processes, which would affect the bottom line. Therefore, modern firms should do what they can to ensure that their customers trust them. For them, one promising way to remain trustworthy is to behave as a moral agent. Although it is difficult for any firm to meet the conditions necessary to be a moral agent, competence in behaving as a moral agent is a hard-to-imitate capability af firms for which personal data use is vital for enjoying the benefits of business relationships in the e-business environment.
文摘A major concern is to locate manufacturing plants and/or distribution centers to serve the needs of consumers widely and rapidly with reasonably distributive cost and flexible delivery time. The purpose of this research is to help enhance a decision support for three distribution center locations with different ranges of area in order that the distributors are able to serve appropriately the retailers in twelve large cities or capitals of the nine countries in Asia-Pacific region. The researcher applies the theory of supply chain and logistics management systems with Excel, Visual Basic and Genetic Algorithms programs to find the research results. The research results revealed that the interfaces of Excel, Visual Basic, and Genetic Algorithms programs helped decision support in distribution range selection for 3 distribution center locations. Each of which had different ranges of area for distribution with a rapidly, flexibly distributed time. However, variables resulting in a decision-making should be adjusted under certain circumstances for more reliable, specific needs.
文摘Using cross section data of 3 years 2000,2007,and 2014 for non-financial listed firms in China,this study quantitatively analyzes the relationship between government-affiliated corporate executives and corporate performance.We classify the sample firms into two groups,based on whether their chief executive officers(CEOs)and independent directors are prior government officials or not.Then,we empirically examine the difference in corporate performance between the two groups.We find that the appointment of CEOs and directors of listed companies in China is significantly affected by government shareholders.The results also suggest that prior to 2000 government-affiliated CEOs impaired corporate performance.But with the establishment of State-owned Assets Supervision and Administration Committee and the completion of the Split-Share Structure Reform in 2006,government as a shareholder began to give priority to corporate value maximization,and government-affiliated CEOs began to help improve corporate performance.However,due to the slowdown of economic growth after 2012,problems such as inefficiency and corruption brought by government-affiliated executives manifested again,and therefore,corporate performance deteriorated.Meanwhile,government-affiliated independent directors have limited influence on these factors.
基金the Cooperatio Program,Research Area Economics,at Charles University,Czechia.
文摘This paper studies the connection between the stock market and real output in China and compares it with benchmark countries,employing a novel vector autoregression with asymmetric leads(VARwAL)model.It makes two contributions.First,it finds that the time profile of the Chinese stock market's response to real output shocks suggests no evidence of a distorted relationship due to manipulation of Chinese real output data or domination of the Chinese stock market by individual investors.Rather,the Chinese stock market is relatively more responsive to real output,in line with the larger share of manufacturing in the Chinese economy.Electricity output and industrial profits,two different,less-manipulable time series,yield similar results.Second,it presents the first use of VARwAL impulse responses to detect stock market bubbles:VARwAL captures the 2015 bubble in China successfully.Over the full sample period,China's stock market appears to have been less prone to bubbles than the US stock market.