Measurement of Discrimination Ability in Taste Tests: An Empirical Investigation

1987 ◽  
Vol 24 (2) ◽  
pp. 154-163 ◽  
Author(s):  
Bruce Buchanan ◽  
Moshe Givon ◽  
Arieh Goldman

For purposes of product testing, several tasks have been used to measure subjects’ discrimination ability (i.e., their ability to distinguish between two slightly different product formulations). Three of the more common tasks are repeat paired comparisons, triangle tests, and preference rankings. In this empirical study, the properties of these three tasks are compared. The repeat paired comparison test is found to be the most sensitive discrimination task, in that subjects demonstrate the greatest ability in distinguishing between formulations, and preference ranking is the least sensitive. The finding that discrimination ability measured by triangle tests is significantly correlated with that measured by paired comparisons lends support to the validity of consistent preference discrimination testing.

1967 ◽  
Vol 4 (2) ◽  
pp. 199-201 ◽  
Author(s):  
Stanford H. Odesky

The number of “no preference” responses in a paired comparison test can definitely be influenced by the wording of the question. More important, allocation of such responses among the total test score can have serious effects. This article suggests a method for handling the neutral vote.


2021 ◽  
Vol 26 (3) ◽  
Author(s):  
Bodin Chinthanet ◽  
Raula Gaikovina Kula ◽  
Shane McIntosh ◽  
Takashi Ishio ◽  
Akinori Ihara ◽  
...  

AbstractSecurity vulnerability in third-party dependencies is a growing concern not only for developers of the affected software, but for the risks it poses to an entire software ecosystem, e.g., Heartbleed vulnerability. Recent studies show that developers are slow to respond to the threat of vulnerability, sometimes taking four to eleven months to act. To ensure quick adoption and propagation of a release that contains the fix (fixing release), we conduct an empirical investigation to identify lags that may occur between the vulnerable release and its fixing release (package-side fixing release). Through a preliminary study of 231 package-side fixing release of npm projects on GitHub, we observe that a fixing release is rarely released on its own, with up to 85.72% of the bundled commits being unrelated to a fix. We then compare the package-side fixing release with changes on a client-side (client-side fixing release). Through an empirical study of the adoption and propagation tendencies of 1,290 package-side fixing releases that impact throughout a network of 1,553,325 releases of npm packages, we find that stale clients require additional migration effort, even if the package-side fixing release was quick (i.e., package-side fixing releasetypeSpatch). Furthermore, we show the influence of factors such as the branch that the package-side fixing release lands on and the severity of vulnerability on its propagation. In addition to these lags we identify and characterize, this paper lays the groundwork for future research on how to mitigate propagation lags in an ecosystem.


2021 ◽  
Vol 22 (22) ◽  
pp. 103-185
Author(s):  
林建中 林建中 ◽  
李揚 李揚

內幕交易罪的處理,在證券法的發展歷史中,一直具有理論與實務上之重要意義。此一問題,在中國大陸相對初生但生猛且量體巨大的市場環境中如何被面對,從理論與比較法觀點,均具備特殊的研究價值。立法層面上,中國大陸法對於內幕交易的實體法構成,經二十多年的持續發展,已呈現出一定的複雜與完整面貌。然就執行層面視之,法院對於條文的理解與具體適用仍存在諸多爭議之處,同時,相關實證統計等資料的缺乏,也成為執行層面上對內幕交易罪研究的主要障礙之一。基於上述認識,本文立足於內幕交易刑事處罰執行層面的觀察,試圖呈現相關法律設計在中國大陸的司法實踐現狀。並通過1997年立法以來法院判決的實證研究,本文除一般性地檢驗內幕交易的執法情況外,同時針對法院在解釋犯罪構成上所呈現的爭議,進行進一步的評估。文中依照觀察面向的差異,特別鎖定三個重要的子議題:內幕信息的類型及其認定、被告「知悉」的司法判準、刑事處罰的比例性在內幕交易罪中的運用與體現。以上述實證研究結果為基礎,本文擬對於中國大陸內幕交易罪之司法執行效力提出評估,同時也補充性地可提供臺灣一定之參考。Insider trading has long been recognized as one of the key elements in modern securities law. As a massive but relatively young market, how China handles this issue is a topic rich in comparative value. On its face, the law and regulations prohibiting insider trading in securities transactions have already in place for more than two decades. However, their actual implementation, as well as how courts interpret the elements of insider trading offense in cases, are still obscure to outside observers. The lack of in-depth empirical investigation in its enforcement further creates an extra layer of complexity to the relevant research. Due to the problems mentioned above, this paper conducts an empirical study of the insider trading criminal cases, ranging from 1997 to 2019, to examine how insider trading cases are enforced in China. By observing the actual cases and their attributes, this paper presents a comprehensive picture of who commits insider trading law in China and how courts decide these cases. Three sub-set issues of the implementation are under special scrutiny:types of information and defendants; standard of proving defendant's scienter; and the relationship between sanction and illegal gain. Based on the results of this study, we evaluate the effectiveness of the enforcement on insider trading law in China in its first two decades of existence.


Author(s):  
Erik Kamsties ◽  
Antje von Knethen ◽  
Jan Philipps

A well-known side-effect of applying requirements specification languages is that the formalization of informal requirements leads to the detection of defects such as omissions, conflicts, and ambiguities. However, there is little quantitative data available on this effect. This chapter presents an empirical study of requirements specification languages, in which two research questions are addressed: Which types of defects are detected by a requirements engineer during formalization? Which types of defects go undetected and what happens to those types in a formal specification? The results suggest looking explicitly for ambiguities during formalization, because they are less frequently detected than other types of defects. If they are detected, they require immediate clarification by the requirements author. The majority of ambiguities tend to become disambiguated unconsciously, that is, the correct interpretation was chosen, but without recurring to the requirements author. This is a serious problem, because implicit assumptions are known to be dangerous.


2019 ◽  
Vol 6 (1) ◽  
pp. 205316801983208 ◽  
Author(s):  
Cesar Zucco ◽  
Mariana Batista ◽  
Timothy J. Power

How do political actors value different portfolios? We propose a new approach to measuring portfolio salience by analysing paired comparisons using the Bradley–Terry model. Paired-comparison data are easy to collect using surveys that are user-friendly, rapid, and inexpensive. We implement the approach with serving legislators in Brazil, a particularly difficult case to assess portfolio salience due to the large number of cabinet positions. Our estimates of portfolio values are robust to variations in implementation of the method. Legislators and academics have broadly similar views of the relative worth of cabinet posts. Respondent valuations of portfolios deviate considerably from what would be predicted by objective measures such as budget, policy influence, and opportunities for patronage. Substantively, we show that portfolio salience varies greatly and affects the calculation of formateur advantage and coalescence/proportionality rule measures.


1965 ◽  
Vol 2 (4) ◽  
pp. 406-412 ◽  
Author(s):  
Ralph L. Day

Product tests can yield meaningful information about consumer preferences only when carefully planned and analyzed. This article presents an approach to preference analysis which seeks to reduce some of the difficulties in interpreting the results of product tests. The preference distribution concept is utilized as the organizing framework for a systematic pattern of paired comparison tests using product samples containing different levels of a particular attribute. The usefulness of the method is illustrated by a study of preferences for chocolate ice cream.


1972 ◽  
Vol 35 (2) ◽  
pp. 635-645 ◽  
Author(s):  
Joan Gay Snodgrass ◽  
Ruth Kass

Decision times, consistency measures, and their relationships were used to study stimulus-stimulus and subject-stimulus distance for two types of responses—single stimulus and paired comparisons, and two types of tasks—preference and judged complexity. Two assumptions based on Coombs' (1964) theory of data—that decision time is inversely related to distance and that both stimulus and ideal points have variability—led to the following predictions: (1) stimulus ordering from paired comparison judgments will be predictable from the ordering of decision times in single stimulus judgments; (2) more intransitive triads will occur in paired comparison preference judgments than paired comparison complexity judgments; and (3) complexity judgments will exhibit greater concordance than preference judgments. All three predictions were supported by data. Of three latency transformations investigated, standardized reciprocal times showed the highest correlation with difference in ranks in the paired comparison task.


1987 ◽  
Vol 64 (2) ◽  
pp. 492-494 ◽  
Author(s):  
Lisa L. Strong ◽  
Martin S. Fiebert

Based on Maslow's motivational theory, a self-report inventory utilizing a modified paired-comparison format was developed to assess need potencies within individuals. This method permits both multiple comparisons of items from each need level with each other and an assessment of the intensity levels of each item. 59 individuals participated in the study. The construct validity of the inventory was evaluated by examining the consistency of items designed to measure the same need. Correlations ranged between .52 and .65. The mean potencies of each need level were determined; an analysis of variance showed differences to be significant in the predicted direction.


1966 ◽  
Vol 18 (2) ◽  
pp. 435-439 ◽  
Author(s):  
F. Robert Treichler ◽  
Barbara Hann ◽  
Susan L. Donaldson

Five rhesus monkeys were tested under two methods of meassuring reinforcer preference, one a paired-comparison and the other an operant-rate technique. Most animals failed to learn the discriminations necessary for paired-comparisons but showed significant and reliable differences in preference for the commodities evaluated by the operant-rate technique. It was concluded that either method, when appropriately designed, may yield useful results.


Sign in / Sign up

Export Citation Format

Share Document