Search results for "TRUS"
showing 10 items of 1249 documents
Anatomy of Cartel Contracts
2013
We study cartel contracts using data on 18 contract clauses of 109 legal Finnish manufacturing cartels. One third of the clauses relate to raising profits; the others deal with instability through incentive compatibility, cartel organization, or external threats. Cartels use three main approaches to raise profits: Price, market allocation, and specialization. These appear to be substitutes. Choosing one has implications on how cartels deal with instability. Simplifying, we find that large cartels agree on prices, cartels in homogenous goods industries allocate markets, and small cartels avoid competition through specialization.
Comparison of Different Processing Methods to Prepare Poly(lactid acid)–Hydrotalcite Composites
2013
The effect of the compounding method on the morphology and on the properties of poly(lactic acid) (PLA)-hydrotalcite (HT) composites was studied. Moreover, the influence of two different kinds of HT - organically modified (OM-HT) and unmodified (U-HT) - and their concentration was evaluated. The composites were prepared using either a single screw extruder (SSE), a counter rotating twin-screw compounder (TSC) or a corotating twin-screw extruder (TSE). The prepared materials were characterized by scanning electron microscopy, gel permeation chromatography (GPC) analysis, mechanical and rheological measurements. The results indicated that the best morphology, i.e., particles dimension and dis…
Slacking with the Bot: Programmable Social Bot in Virtual Team Interaction
2021
Nonhuman communicators are challenging the prevailing conceptualizations of technology-mediated team communication. Slackbot is a social bot that can be configured to respond to trigger words and, thus, take part in discussions on the platform. A set of 84 bot-related communication episodes were identified from a journalistic team's Slack messages (N=45,940) and analyzed utilizing both qualitative content analysis and interaction process analysis (IPA). This integrated mixed-methods analysis revealed novel insights into the micro-level dynamics of human-machine communication in organizational teams. In response to Slackbot's greetings, acclamations, work-related messages, and relational mes…
Hypervisor-based Protection of Code
2019
The code of a compiled program is susceptible to reverse-engineering attacks on the algorithms and the business logic that are contained within the code. The main existing countermeasure to reverse-engineering is obfuscation. Generally, obfuscation methods suffer from two main deficiencies: 1) the obfuscated code is less efficient than the original and 2) with sufficient effort, the original code may be reconstructed. We propose a method that is based on cryptography and virtualization. The most valuable functions are encrypted and remain inaccessible even during their execution, thus preventing their reconstruction. A specially crafted hypervisor is responsible for decryption, execution, a…
Location of navigation menus in websites: an experimental study with Arabic users
2015
Published online: 31 October 2015 While Arabic users represent by far the fastest growing language population on the Internet, research about how the peculiarities of Arabic language may shape users’ web interactions is still scarce. The preferences of Arabic users for menu location in websites have been studied. Two competing arguments have been proposed regarding the best location of menus in websites: conventional design (navigation menu should be placed on that side where users expect it based on previous experience) and reading direction (navigation menu should be placed on that side where readers are used to start off reading, so that the navigation menu is likely to be attended first…
Identifying relevant segments of AI applications adopters : Expanding the UTAUT2’s variables
2021
Artificial intelligence (AI) is a future-defining technology, and AI applications are becoming mainstream in the developed world. Many consumers are adopting and using AI-based apps, devices, and services in their everyday lives. However, research examining consumer behavior in using AI apps is scant. We examine critical factors in AI app adoption by extending and validating a well-established unified theory of adoption and use of technology, UTAUT2. We also explore the possibility of unobserved heterogeneity in consumers’ behavior, including potentially relevant segments of AI app adopters. To augment the knowledge of end users’ engagement and relevant segments, we have added two new antec…
An Efficient Intrusion Detection System for Selective Forwarding and Clone Attackers in IPv6-based Wireless Sensor Networks under Mobility
2017
Security in mobile wireless sensor networks is a big challenge because it adds more complexity to the network in addition to the problems of mobility and the limited sensor node resources. Even with authentication and encryption mechanisms, an attacker can compromise nodes and get all the keying materials. Therefore, an intrusion detection system is necessary to detect and defend against the insider attackers. Currently, there is no intrusion detection system applied to IPv6-based mobile wireless sensor networks. This paper is mainly interested in detecting the selective forwarding and clone attacks because they are considered among the most dangerous attackers. In this work, the authors de…
A Cognitive Model of Trust for Biological and Artificial Humanoid Robots
2018
This paper presents a model of trust for biological and artificial humanoid robots and agents as antecedent condition of interaction. We discuss the cognitive engines of social perception that accounts for the units on which agents operate and the rules they follow when they bestow trust and assess trustworthiness. We propose that this structural information is the domain of the model. The model represents it in terms of modular cognitive structures connected by a parallel architecture. Finally we give a preliminary formalization of the model in the mathematical framework of the I/O automata for future computational and human-humanoid application.
Machine Learning Techniques for Intrusion Detection: A Comparative Analysis
2016
International audience; With the growth of internet world has transformed into a global market with all monetary and business exercises being carried online. Being the most imperative resource of the developing scene, it is the vulnerable object and hence needs to be secured from the users with dangerous personality set. Since the Internet does not have focal surveillance component, assailants once in a while, utilizing varied and advancing hacking topologies discover a path to bypass framework " s security and one such collection of assaults is Intrusion. An intrusion is a movement of breaking into the framework by compromising the security arrangements of the framework set up. The techniq…
Combining conjunctive rule extraction with diffusion maps for network intrusion detection
2013
Network security and intrusion detection are important in the modern world where communication happens via information networks. Traditional signature-based intrusion detection methods cannot find previously unknown attacks. On the other hand, algorithms used for anomaly detection often have black box qualities that are difficult to understand for people who are not algorithm experts. Rule extraction methods create interpretable rule sets that act as classifiers. They have mostly been combined with already labeled data sets. This paper aims to combine unsupervised anomaly detection with rule extraction techniques to create an online anomaly detection framework. Unsupervised anomaly detectio…