The Effect of a Preceding Cue on the Conflict Solving Mechanism

Author(s):  
Liat Goldfarb ◽  
Avishai Henik

In everyday life cues and signs are used in order to improve our performance and to modify and control our behavior. This study examines whether cues can improve the performance of the mental mechanism in charge of solving conflicts when the nature of the irrelevant task remains constant. In two experiments participants performed the Stroop task in which they were asked to name the color of a stimulus while ignoring its meaning. Half the trials were preceded by a conflict-cue containing information about an upcoming conflict. In addition, conflict trial proportions were manipulated. We found that only when the probability of conflict is low can cues alter the conflict solving mechanism. These findings are discussed in the context of the nature of the control mechanism and its tendency to minimize the cost of mental resources.

Author(s):  
Mahmud A. Shareef ◽  
Vinod Kumar ◽  
Uma Kumar

There are many collection and application sources of identity theft. The Internet is one of the vulnerable medias for identity theft and is used, especially, as an application source of identity theft. This current chapter has twofold objectives. As the first objective, it develops a conceptual framework to prevent/control identity theft of E-Commerce (EC) in conjunction with different sources if identity theft. From this framework and shedding light on the recent literature of sources of identity theft, the authors identify global laws, controls placed on organizations, publications to develop awareness, technical management, managerial policy, risk management tools, data management, and control over employees are the potential measuring items to prevent identity theft in EC. All EC organizations are struggling to control identity theft. This chapter argues that control mechanism of identity theft has both positive and negative impact on EC. This chapter sets its second objective to explore the integrative effect of overall identity theft control mechanism on consumer trust, the cost of products/services, and operational performance, all of which in turn contribute to a purchase intention using E-Commerce (EC). A case study in banking sector through a qualitative approach was conducted to verify the proposed relations, constructs, and measuring items.


2016 ◽  
pp. 988-1021
Author(s):  
Mahmud A. Shareef ◽  
Vinod Kumar ◽  
Uma Kumar

There are many collection and application sources of identity theft. The Internet is one of the vulnerable medias for identity theft and is used, especially, as an application source of identity theft. This current chapter has twofold objectives. As the first objective, it develops a conceptual framework to prevent/control identity theft of E-Commerce (EC) in conjunction with different sources if identity theft. From this framework and shedding light on the recent literature of sources of identity theft, the authors identify global laws, controls placed on organizations, publications to develop awareness, technical management, managerial policy, risk management tools, data management, and control over employees are the potential measuring items to prevent identity theft in EC. All EC organizations are struggling to control identity theft. This chapter argues that control mechanism of identity theft has both positive and negative impact on EC. This chapter sets its second objective to explore the integrative effect of overall identity theft control mechanism on consumer trust, the cost of products/services, and operational performance, all of which in turn contribute to a purchase intention using E-Commerce (EC). A case study in banking sector through a qualitative approach was conducted to verify the proposed relations, constructs, and measuring items.


Sensors ◽  
2021 ◽  
Vol 21 (10) ◽  
pp. 3515
Author(s):  
Sung-Ho Sim ◽  
Yoon-Su Jeong

As the development of IoT technologies has progressed rapidly recently, most IoT data are focused on monitoring and control to process IoT data, but the cost of collecting and linking various IoT data increases, requiring the ability to proactively integrate and analyze collected IoT data so that cloud servers (data centers) can process smartly. In this paper, we propose a blockchain-based IoT big data integrity verification technique to ensure the safety of the Third Party Auditor (TPA), which has a role in auditing the integrity of AIoT data. The proposed technique aims to minimize IoT information loss by multiple blockchain groupings of information and signature keys from IoT devices. The proposed technique allows IoT information to be effectively guaranteed the integrity of AIoT data by linking hash values designated as arbitrary, constant-size blocks with previous blocks in hierarchical chains. The proposed technique performs synchronization using location information between the central server and IoT devices to manage the cost of the integrity of IoT information at low cost. In order to easily control a large number of locations of IoT devices, we perform cross-distributed and blockchain linkage processing under constant rules to improve the load and throughput generated by IoT devices.


2019 ◽  
Vol 21 (2) ◽  
pp. 154-160
Author(s):  
Gianluca Villa ◽  
Rosa Giua ◽  
Timothy Amass ◽  
Lorenzo Tofani ◽  
Cosimo Chelazzi ◽  
...  

Background: In a previous trial, in-line filtration significantly prevented postoperative phlebitis associated with short peripheral venous cannulation. This study aims to describe the cost-effectiveness of in-line filtration in reducing phlebitis and examine patients’ perception of in-hospital vascular access management with and without in-line filtration. Methods: We analysed costs associated with in-line filtration: these data were prospectively recorded during the previous trial. Furthermore, we performed a follow-up for all the 268 patients enrolled in this trial. Among these, 213 patients responded and completed 6 months after hospital discharge questionnaires evaluating the perception of and satisfaction with the management of their vascular access. Results: In-line filtration group required 95.60€ more than the no-filtration group (a mean of € 0.71/patient). In terms of satisfaction with the perioperative management of their short peripheral venous cannulation, 110 (82%) and 103 (76.9%) patients, respectively, for in-line filtration and control group, completed this survey. Within in-line filtration group, 97.3% of patients were satisfied/strongly satisfied; if compared with previous experiences on short peripheral venous cannulation, 11% of them recognised in-line filtration as a relevant causative factor in determining their satisfaction. Among patients within the control group, 93.2% were satisfied/strongly satisfied, although up to 30% of them had experienced postoperative phlebitis. At the qualitative interview, they recognised no difference than previous experiences on short peripheral venous cannulation, and mentioned postoperative phlebitis as a common event that ‘normally occurs’ during a hospital stay. Conclusion: In-line filtration is cost-effective in preventing postoperative phlebitis, and it seems to contribute to increasing patient satisfaction and reducing short peripheral venous cannulation–related discomfort


2020 ◽  
Vol 4 (1) ◽  
pp. 187-203
Author(s):  
Carrie P. Mastley

AbstractThis pilot study presents a collection-centered quantitative analysis of Black history resources available at the Billups-Garth Archive in Columbus, Mississippi. The Archive’s inventory lists for its record series and control files for its manuscript collections were assessed in order to determine the percentage of extant Black history resources in relation to the collection’s total holdings. Relevant collections were then evaluated to determine their mediums, subjects, and provenance. The results showed a dearth of collections related to Black history and indicated that very few were created by the Black community. Results also showed that most relevant resources were made up of textual documents as well as documents relating to everyday life and education. Overall, this study demonstrates how collection analyses may be undertaken to identify collection biases and collection deficiencies, especially deficiencies in representing the histories of marginalized communities.


Author(s):  
V.L. Zakovorotny ◽  
V.E. Gvindzhiliya

High precision metal-cutting machines ensure that the programmed machine actuator trajectories correspond to the real ones. For lathes these are the trajectories of the longitudinal and transverse calipers of the system, as well as the spindle. The purpose of processing is to produce parts of a given quality while minimizing the manufacturing costs. The condition of the dynamic cutting system, determined by the trajectories of forces and deformations, affects the quality indicators of parts and the cutting efficiency, which depends on the intensity of tool wear. The properties of the system change depending on the phase trajectory of the power of irreversible transformations of the energy supplied to the cutting zone by the work performed. Their changes related with the evolution of the parameters of the dynamic link formed by cutting are manifested in the development of tool wear and changes in the quality of the part. Thus, the power of irreversible energy transformations is one of the internal factors causing changes in the output characteristics of processing and the state of the process. In this regard, when processing on machine tools, there is a problem of synergistic coordination of external control (for example, the CNC program) with internal one, the source of which is the irreversible transformation of the energy supplied to the cutting zone. The article considers the problem of synergetic coordination of external and internal controls during cutting process, the solution of which will allow increasing the efficiency of processing on CNC machines. A mathematical model of a controlled dynamic cutting system and control algorithms are proposed to improve the efficiency of processing parts of a given quality while minimizing the intensity of tool wear. Testing of the developed algorithms has shown that their use reduces the cost of manufacturing parts by 1.2.


2000 ◽  
Vol 1730 (1) ◽  
pp. 139-149 ◽  
Author(s):  
William G. Buttlar ◽  
Diyar Bozkurt ◽  
Barry J. Dempsey

The Illinois Department of Transportation (IDOT) spends $2 million annually on reflective crack control treatments; however, the cost-effectiveness of these treatments had not been reliably determined. A recent study evaluated the cost-effectiveness of IDOT reflective crack control System A, which consists of a nonwoven polypropylene paving fabric, placed either in strips longitudinally over lane-widening joints or over the entire pavement (area treatment). The study was limited to projects constructed originally as rigid pavements and subsequently rehabilitated with one or more bituminous overlays. Performance of 52 projects across Illinois was assessed through crack mapping and from distress and serviceability data in IDOT’s condition rating survey database. Comparisons of measured reflective cracking in treated and control sections revealed that System A retarded longitudinal reflective widening crack development, but it did not significantly retard transverse reflective cracking, which agrees with earlier studies. However, both strip and area applications of these fabric treatments appeared to improve overall pavement serviceability, and they were estimated to increase rehabilitation life spans by 1.1 and 3.6 years, respectively. Reduction in life-cycle costs was estimated to be 4.4 and 6.2 percent when placed in medium and large quantities, respectively, and to be at a break-even level for small quantities. However, life-cycle benefits were found to be statistically insignificant. Limited permeability testing of field cores taken on severely distressed transverse joints suggested that waterproofing benefits could exist even after crack reflection. This was consistent with the observation that, although serviceability was generally improved with area treatment, crack reflection was not retarded relative to untreated areas.


2019 ◽  
Vol 12 (1) ◽  
Author(s):  
Jorge A. H. Arroz ◽  
Baltazar Candrinho ◽  
Chandana Mendis ◽  
Melanie Lopez ◽  
Maria do Rosário O. Martins

Abstract Objective The aim is to compare the cost-effectiveness of two long-lasting insecticidal nets (LLINs) delivery models (standard vs. new) in universal coverage (UC) campaigns in rural Mozambique. Results The total financial cost of delivering LLINs was US$ 231,237.30 and US$ 174,790.14 in the intervention (302,648 LLINs were delivered) and control districts (219,613 LLINs were delivered), respectively. The average cost-effectiveness ratio (ACER) per LLIN delivered and ACER per household (HH) achieving UC was lower in the intervention districts. The incremental cost-effectiveness ratio (ICER) per LLIN and ICER per HH reaching UC were US$ 0.68 and US$ 2.24, respectively. Both incremental net benefit (for delivered LLIN and for HHs reaching UC) were positive (intervention deemed cost-effective). Overall, the newer delivery model was the more cost-effective intervention. However, the long-term sustainability of either delivery models is far from guaranteed in Mozambique’s current economic context.


2017 ◽  
Vol 17 (4) ◽  
pp. 111-126
Author(s):  
Anastasia Lakhtikova

A product of their time and of the internalized Soviet ideology that to a great extent shaped women's gendered self-fashioning as women and mothers, Soviet manuscript cookbooks became popular among Soviet women in the late 1960s. Based on the semiotic reading of two personal manuscript cookbooks in the author's family, this article explores what these cookbooks, in combination with the author's family history, tell about how Soviet women used and reshaped the gender roles available to them in late Soviet everyday life. The author also asks questions about the cost of emancipation in a society that could not truly support such progress socially or economically.


Sign in / Sign up

Export Citation Format

Share Document