This quasi-experimental study examined whether TED (Technology, Entertainment, Design) talks could improve the listening skills of Iranian EFL learners. The study also explored whether the different media of instruction could have differing impacts on the students’ learning. Sixty intermediate level male learners aged between 18 and 20 in three intact classes (n1=n2=n3=20) were the participants selected through convenience sampling. The groups were randomly assigned to two experimental groups and one control group after ensuring that they were at the same level of language proficiency. One of the experimental groups watched TED talks via mobile devices, another group watched them through laptops, and the control group practiced listening through DVDs and CDs of the course textbook (American File 2) for ten sessions. It is worth mentioning that the mobile group watched the videos outside of the class, whereas the laptop and control groups practiced listening in the class. Every session, the participants answered some comprehension questions to enable the researchers to measure their development. The repeated measures ANOVA showed the improvement of the listening skills of all participants in the three groups during the treatment. The results of the one-way ANOVA and post hoc comparison revealed statistically significant differences between the mobile group watching the TED talks and the control group, but no differences were found between the mobile group and the laptop group or between the control and the laptop groups. The researchers inferred that the observed difference was due to using TED talks via mobile devices in the study. They could also conclude that TED talks are useful sources of practicing listening skills. The study shows the efficacy of self-directed learning via mobile devices and has implications for teachers and practitioners who are seeking ways to extend language learning beyond the confinements of the classroom.
{"title":"Exploring Iranian EFL Learners’ Listening Skills via TED Talks: Does Medium Make a Difference?","authors":"Mojgan Rashtchi, Mohammad Tollabi Mazraehno","doi":"10.17323/jle.2019.9691","DOIUrl":"https://doi.org/10.17323/jle.2019.9691","url":null,"abstract":"This quasi-experimental study examined whether TED (Technology, Entertainment, Design) talks could improve the listening skills of Iranian EFL learners. The study also explored whether the different media of instruction could have differing impacts on the students’ learning. Sixty intermediate level male learners aged between 18 and 20 in three intact classes (n1=n2=n3=20) were the participants selected through convenience sampling. The groups were randomly assigned to two experimental groups and one control group after ensuring that they were at the same level of language proficiency. One of the experimental groups watched TED talks via mobile devices, another group watched them through laptops, and the control group practiced listening through DVDs and CDs of the course textbook (American File 2) for ten sessions. It is worth mentioning that the mobile group watched the videos outside of the class, whereas the laptop and control groups practiced listening in the class. Every session, the participants answered some comprehension questions to enable the researchers to measure their development. The repeated measures ANOVA showed the improvement of the listening skills of all participants in the three groups during the treatment. The results of the one-way ANOVA and post hoc comparison revealed statistically significant differences between the mobile group watching the TED talks and the control group, but no differences were found between the mobile group and the laptop group or between the control and the laptop groups. The researchers inferred that the observed difference was due to using TED talks via mobile devices in the study. They could also conclude that TED talks are useful sources of practicing listening skills. The study shows the efficacy of self-directed learning via mobile devices and has implications for teachers and practitioners who are seeking ways to extend language learning beyond the confinements of the classroom.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"141 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126014797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The inherent assumption with most Monte Carlo techniques is that one may ignore autocorrelations, but doing so compromises the quality of the prediction from the data. Simulations that do not take account of autocorrelation will not properly model reality, as there is significant autocorrelation in many asset returns, for example in T-Bills and hedge fund strategies that involve illiquid, long-term holdings, which do not satisfy the “random walk” assumption with a “white noise” spectrum. A detailed mathematical method is proposed for simulating market returns by generating random time series that satisfy the statistics of any serial autocorrelation, as well as the actual (possibly non-Gaussian) joint probability distributions.
{"title":"Autocorrelate Your Assets or, It's Not All White Noise: A Practical Means for Generating Autocorrelated Time Series Data in Monte Carlo Simulations","authors":"R. Stock","doi":"10.2139/ssrn.3499099","DOIUrl":"https://doi.org/10.2139/ssrn.3499099","url":null,"abstract":"The inherent assumption with most Monte Carlo techniques is that one may ignore autocorrelations, but doing so compromises the quality of the prediction from the data. Simulations that do not take account of autocorrelation will not properly model reality, as there is significant autocorrelation in many asset returns, for example in T-Bills and hedge fund strategies that involve illiquid, long-term holdings, which do not satisfy the “random walk” assumption with a “white noise” spectrum. A detailed mathematical method is proposed for simulating market returns by generating random time series that satisfy the statistics of any serial autocorrelation, as well as the actual (possibly non-Gaussian) joint probability distributions.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944961","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.
{"title":"Histogram of Neighborhood Tripartite Authentication With Fingerprint-Based Biometrics for IoT Services","authors":"Iot Services, S. Kanchana","doi":"10.2139/ssrn.3467434","DOIUrl":"https://doi.org/10.2139/ssrn.3467434","url":null,"abstract":"Internet of Things (IoT) and services is an interesting topic with a wide range of potential applications like smart home systems, health care, telemedicine, and intelligent transportation. Traditionally, key agreement schemes have been evaluated to access IoT services which are highly susceptible to security. Recently, Biometric-based authentication is also used to access IoT services and devices. They are involving a larger amount of memory with increased running time and found to be computationally infeasible. To provide robust authentication for IoT services, Histogram of Neighborhood Tripartite Authentication with Fingerprint Biometrics (HNTA-FB) for IoT services is proposed in this paper. This proposed HNTA-FB method uses binary patterns and a histogram of features to extract the region of interest. To reduce the memory requirements while providing access to IoT services, Histogram of Neighborhood Binary Pattern Pre-processing (HNBPP) model is proposed. The discriminative power of Neighbourhood Binary Pattern Registration (NBPR) is integrated with the normalized sparse representation based on the histogram. Additionally, this work presents a new Tripartite User Authentication model for fingerprint biometric template matching process. When compared with different state-of-the-art methods, the proposed method depicts significantly improved performance in terms of matching accuracy, computational overhead and execution speed and is highly effective in delivering smart home services.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114205768","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
What is the incremental information in imagery? This paper introduces the concept of visual attention and proposes a new methodology to identify the impact of images and of their information content on nancial decision making. We introduce two sets of criteria for analyzing the e ects of images - visual clarity and information reinforcement, which together inform individual investors. Our exible methodology can be seamlessly integrated with modern information processing techniques, from simple keyword matching to advanced semantic analysis or topic modeling. Using images as data and applying the methodology to a hand-collected data set of equity crowdfunding campaigns, we show that the existence of perceptible images is signi cantly associated with greater investment, and that visual clarity measures are found to incrementally a ect investor decision making after controlling for textual sentiment and nancial information. Speci cally, more vibrant images with more focal points are associated with higher funding. Additionally, information reinforcement is found to be a key determinant of (limited) visual attention. Data collected in a human participant sample supported these ndings. Finally, the methodology we develop in this paper provides a new framework within which to discuss (limited) attention, information, news, and investor reactions in today's digital and visual age.
{"title":"The Informational Role of Imagery in Financial Decision Making: A New Approach","authors":"Susan Gans, Tavy Ronen, T. Wang, Mi Zhou","doi":"10.2139/ssrn.3446180","DOIUrl":"https://doi.org/10.2139/ssrn.3446180","url":null,"abstract":"What is the incremental information in imagery? This paper introduces the concept of<br>visual attention and proposes a new methodology to identify the impact of images and of<br>their information content on nancial decision making. We introduce two sets of criteria<br>for analyzing the e ects of images - visual clarity and information reinforcement, which together<br>inform individual investors. Our <br>exible methodology can be seamlessly integrated<br>with modern information processing techniques, from simple keyword matching to advanced<br>semantic analysis or topic modeling. Using images as data and applying the methodology to<br>a hand-collected data set of equity crowdfunding campaigns, we show that the existence of<br>perceptible images is signi cantly associated with greater investment, and that visual clarity<br>measures are found to incrementally a ect investor decision making after controlling for textual<br>sentiment and nancial information. Speci cally, more vibrant images with more focal<br>points are associated with higher funding. Additionally, information reinforcement is found<br>to be a key determinant of (limited) visual attention. Data collected in a human participant<br>sample supported these ndings. Finally, the methodology we develop in this paper provides<br>a new framework within which to discuss (limited) attention, information, news, and investor<br>reactions in today's digital and visual age.<br>","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127902271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The boon of connectivity using mobile phones is rather a bane in most family situations. The cases related to early dependence/addiction of mobile phones with the counselors and clinicians are rising alarmingly. Giving mobile phones to children is an easy way for engaging in various applications or other visual material which stimulates and involves the tender but vulnerable minds. Managing children with delayed milestones with regard to speaking, mobility, overall body control and social participation, is very challenging for the parents, furthermore for dual working parents. The study was done to assess the damage on children up to the age of 14 years by seeking inputs from clinical psychologists, school counselors and parents of children with developmental delay (N=120) over the period of 1 month. Case reports with the clinical psychologists were analysed. Inputs of school counselors/teacher report were studied. The parents were interviewed using semi structured interview schedule. The findings showed that most of these children had more than one developmental issues. Autism cases are on the rise, including secondary symptoms in some cases. Almost all parents reporting to clinicians admitted to using mobile phones to manage these children. Instead of one to one quality time for pro-active and purposive interactions which require dedication and focused time, mobile phones were making them indulge into poor and passive learning. The intervention suggestions included weeding out the mobile phone, practicing behavioral therapies involving active learning by simple instructions, expecting responses from children and using positive reinforcement. Use of music, dance, and storytelling, narrations on a concept or theme were expected to bring positive results. Polite public policy to keep out mobile phones can bring accepted change in working with children.
{"title":"The Mischief of Mobile Phones as Caregivers or Babysitters for Children with Collaborative Developmental Delays","authors":"R. Chawla","doi":"10.2139/ssrn.3459573","DOIUrl":"https://doi.org/10.2139/ssrn.3459573","url":null,"abstract":"The boon of connectivity using mobile phones is rather a bane in most family situations. The cases related to early dependence/addiction of mobile phones with the counselors and clinicians are rising alarmingly. Giving mobile phones to children is an easy way for engaging in various applications or other visual material which stimulates and involves the tender but vulnerable minds. Managing children with delayed milestones with regard to speaking, mobility, overall body control and social participation, is very challenging for the parents, furthermore for dual working parents. The study was done to assess the damage on children up to the age of 14 years by seeking inputs from clinical psychologists, school counselors and parents of children with developmental delay (N=120) over the period of 1 month. Case reports with the clinical psychologists were analysed. Inputs of school counselors/teacher report were studied. The parents were interviewed using semi structured interview schedule. The findings showed that most of these children had more than one developmental issues. Autism cases are on the rise, including secondary symptoms in some cases. Almost all parents reporting to clinicians admitted to using mobile phones to manage these children. Instead of one to one quality time for pro-active and purposive interactions which require dedication and focused time, mobile phones were making them indulge into poor and passive learning. The intervention suggestions included weeding out the mobile phone, practicing behavioral therapies involving active learning by simple instructions, expecting responses from children and using positive reinforcement. Use of music, dance, and storytelling, narrations on a concept or theme were expected to bring positive results. Polite public policy to keep out mobile phones can bring accepted change in working with children.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115485244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2019-08-19DOI: 10.1007/978-3-030-23943-5_6
J. Chaudhry, U. Qidwai, Mahdi H. Miraz
{"title":"Securing Big Data from Eavesdropping Attacks in SCADA/ICS Network Data Streams through Impulsive Statistical Fingerprinting","authors":"J. Chaudhry, U. Qidwai, Mahdi H. Miraz","doi":"10.1007/978-3-030-23943-5_6","DOIUrl":"https://doi.org/10.1007/978-3-030-23943-5_6","url":null,"abstract":"","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127635252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Russian Abstract: В статье определены основные направления и концептуальные подходы в сфере правового обеспечения принципов сетевого нейтралитета индустриально развитыми государствами мира в современных условиях цифровизации экономики, развития экономики в свободном доступе, а также инновационных киберинформационных технологий в сфере телекоммуникаций, прежде всего применяемых в глобальной сети Интернет, осуществляемые в целях обеспечения прав человека на Интернет, в том числе при использовании интернета вещей, а также устранения наиболее значимых юридических барьеров на пути конкуренции и инноваций при соблюдении ряда условий, перечень которых формулируется в заключительной части данного исследования.
English Abstract: The article defines the main directions and conceptual approaches in the field of legal support of the network neutrality principles provided by the industrially developed countries of the world in the modern conditions of economy digitalization, the development of the free access to the economy, as well as innovative cyber-transformational technologies in the field of telecommunications, primarily used in the global Internet, carried out in order to ensure human rights to the Internet, including the use of Internet of things, as well as the elimination of the most significant legal barriers to competition and innovation under a number of conditions, the list of which is formulated in the final part of this study.
俄罗斯抽象:文章基本方向和法律领域的概念性做法确保网络中立原则工业发达国家现代经济条件цифровизац自由进入发达经济体以及创新киберинформацион电信技术,首先应用在全球互联网上开展促进人权在内的互联网使用物联网,以及通过遵守本研究最后一部分所列的一系列条件来消除竞争和创新中最重要的法律障碍。抽象:English文章defines The main方向and conceptual approaches in The field of legal support of The network neutrality principles provided by The industrially developed国家of The world in The modern条件of经济digitalization The development of The free access to The经济,as well as创新cyber postal transformational technologies in The field of, primarily used in The global Internet carried out in order to秤(human rights to The Internet在互联网上使用它,就像在最伟大的协作和创新下使用最强大的武器一样,在这个工作室的最后部分是模具。
{"title":"Совершенствование правового обеспечения сетевого нейтралитета в современных условиях цифровой экономики (Improvement of Legal Support of Net Neutrality in Current Conditions of Digital Economy)","authors":"T. Zulfugarzade","doi":"10.2139/ssrn.3432612","DOIUrl":"https://doi.org/10.2139/ssrn.3432612","url":null,"abstract":"<b>Russian Abstract:</b> В статье определены основные направления и концептуальные подходы в сфере правового обеспечения принципов сетевого нейтралитета индустриально развитыми государствами мира в современных условиях цифровизации экономики, развития экономики в свободном доступе, а также инновационных киберинформационных технологий в сфере телекоммуникаций, прежде всего применяемых в глобальной сети Интернет, осуществляемые в целях обеспечения прав человека на Интернет, в том числе при использовании интернета вещей, а также устранения наиболее значимых юридических барьеров на пути конкуренции и инноваций при соблюдении ряда условий, перечень которых формулируется в заключительной части данного исследования.<br><br><b>English Abstract:</b> The article defines the main directions and conceptual approaches in the field of legal support of the network neutrality principles provided by the industrially developed countries of the world in the modern conditions of economy digitalization, the development of the free access to the economy, as well as innovative cyber-transformational technologies in the field of telecommunications, primarily used in the global Internet, carried out in order to ensure human rights to the Internet, including the use of Internet of things, as well as the elimination of the most significant legal barriers to competition and innovation under a number of conditions, the list of which is formulated in the final part of this study.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116030253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
N. Walravens, Mathias Van Compernolle, L. De Marez, P. Ballon, Pieter Colpaert
As part of the rhetoric surrounding the Smart City concept, cities are increasingly facing challenges related to data (management, governance, processing, storage, publishing etc.). The Smart Flanders program was initiated by the Flemish Government (Belgium) at the start of 2017 to research and support cities in this field. The goal of the program is to support the 13 so-called center cities in the Region (by and large the biggest cities) and a representation of the Flemish Community in the Brussels Region with defining and implementing a common open data policy. As part of the program, a “maturity check” was performed, evaluating the cities on a number of quantitative and qualitative parameters. This exercise laid to bare a number of challenges in the field of open data and led to a checklist that cities can employ to begin tackling them.
{"title":"Open Data and the Core Competences of Government: Lessons from Flanders, Belgium","authors":"N. Walravens, Mathias Van Compernolle, L. De Marez, P. Ballon, Pieter Colpaert","doi":"10.2139/ssrn.3422151","DOIUrl":"https://doi.org/10.2139/ssrn.3422151","url":null,"abstract":"As part of the rhetoric surrounding the Smart City concept, cities are increasingly facing challenges related to data (management, governance, processing, storage, publishing etc.). The Smart Flanders program was initiated by the Flemish Government (Belgium) at the start of 2017 to research and support cities in this field. The goal of the program is to support the 13 so-called center cities in the Region (by and large the biggest cities) and a representation of the Flemish Community in the Brussels Region with defining and implementing a common open data policy. As part of the program, a “maturity check” was performed, evaluating the cities on a number of quantitative and qualitative parameters. This exercise laid to bare a number of challenges in the field of open data and led to a checklist that cities can employ to begin tackling them.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128668880","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Abderahman Rejeb, John G. Keogh, Horst Treiblmaier
Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products and merchandise while they are moving through the value chain network. The application of the Internet of Things (IoT) can help companies to observe, track, and monitor products, activities, and processes within their respective value chain networks. Other applications of IoT include product monitoring to optimize operations in warehousing‚ manufacturing, and transportation. In combination with IoT, Blockchain technology can enable a broad range of different application scenarios to enhance value chain transparency and to increase B2B trust. When combined, IoT and Blockchain technology have the potential to increase the effectiveness and efficiency of modern supply chains. The contribution of this paper is twofold. First, we illustrate how the deployment of Blockchain technology in combination with IoT infrastructure can streamline and benefit modern supply chains and enhance value chain networks. Second, we derive six research propositions outlining how Blockchain technology can impact key features of the IoT (i.e., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects.
{"title":"Leveraging the Internet of Things and Blockchain Technology in Supply Chain Management","authors":"Abderahman Rejeb, John G. Keogh, Horst Treiblmaier","doi":"10.3390/FI11070161","DOIUrl":"https://doi.org/10.3390/FI11070161","url":null,"abstract":"Modern supply chains have evolved into highly complex value networks and turned into a vital source of competitive advantage. However, it has become increasingly challenging to verify the source of raw materials and maintain visibility of products and merchandise while they are moving through the value chain network. The application of the Internet of Things (IoT) can help companies to observe, track, and monitor products, activities, and processes within their respective value chain networks. Other applications of IoT include product monitoring to optimize operations in warehousing‚ manufacturing, and transportation. In combination with IoT, Blockchain technology can enable a broad range of different application scenarios to enhance value chain transparency and to increase B2B trust. When combined, IoT and Blockchain technology have the potential to increase the effectiveness and efficiency of modern supply chains. The contribution of this paper is twofold. First, we illustrate how the deployment of Blockchain technology in combination with IoT infrastructure can streamline and benefit modern supply chains and enhance value chain networks. Second, we derive six research propositions outlining how Blockchain technology can impact key features of the IoT (i.e., scalability, security, immutability and auditing, information flows, traceability and interoperability, quality) and thus lay the foundation for future research projects.","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122563279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We develop a dynamic model of interbank borrowing and lending activities in which banks are organized into clusters, and adjust their monetary reserve levels to meet prescribed capital requirements...
{"title":"A Dynamic Network Model of Interbank Lending — Systemic Risk and Liquidity Provisioning","authors":"A. Capponi, Xuefen Sun, D. Yao","doi":"10.2139/ssrn.3028417","DOIUrl":"https://doi.org/10.2139/ssrn.3028417","url":null,"abstract":"We develop a dynamic model of interbank borrowing and lending activities in which banks are organized into clusters, and adjust their monetary reserve levels to meet prescribed capital requirements...","PeriodicalId":406666,"journal":{"name":"Applied Computing eJournal","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133403913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}