Hasil untuk "Information theory"
Menampilkan 20 dari ~5411658 hasil · dari CrossRef, DOAJ, arXiv
Qianwen Liu, Lokhman Hakim Osman, Zhongxing Lian et al.
This study investigates the perception-to-purchase journey by examining how consumer artificial intelligence (AI) literacy influences the effectiveness of AI-generated sponsored vlogs (AISVs), an emerging digital marketing format. Using survey data from 413 consumers and structural equation modeling, we develop and test the AI Literacy Perception–Decision Model (AILPDM). Results show that AI literacy affects information adoption through three pathways: emotional value, information usefulness, and source credibility. Separate SEM analyses further suggest that the direct effect of AI literacy on purchase intention was observed in experiential service AISVs, whereas in tangible product AISVs the effect operated mainly through information adoption. The AILPDM framework advances marketing theory by tracing a decision pathway from AI literacy, through perceived value and information adoption, to purchase intention, thereby demonstrating how technological competence evolves from a cost barrier into a cognitive resource that shifts source credibility evaluation from peripheral to central processing. For practitioners, the findings suggest differentiated strategies: Marketers of experiential services should emphasize anthropomorphic elements, whereas marketers of tangible products should prioritize technological transparency to foster consumer trust.
Jotiar H. Mohammed Kochar, Nizar M. Ali. ALSulaifani
The current research aims to explore the impact of participative leadership represented by (decision-making participation, delegation of authority, human relations, and justice and equality) in human resource sustainability, defined by (human resource well-being, human resource development, human resource retention, and work-life Equilibrium). At the same time, testing the mediating role of the organizational Equilibrium variable represented by (contributions and inducements) in the influential relationship between the two variables. The study community comprised all employees working in private hospitals in the governorate, totaling approximately 650 individuals across 15 hospitals. Data were collected from a random sample of 306 medical staff members working in private hospitals in Duhok Governorate, Kurdistan Region, Iraq, using a questionnaire. The research employs a descriptive-analytical approach, and the results, analyzed using SPSS V.25, indicate a significant direct effect of both participative leadership and organizational Equilibrium on human resource sustainability. Furthermore, the findings confirm the potential of organizational Equilibrium as a partial mediator in the relationship between participative leadership and human resource sustainability. The study recommends that private hospital management enhance human resource sustainability by promoting participative leadership practices and leveraging the dimensions of organizational Equilibrium to achieve this goal..
Krasavina Yulia, Ponomarenko Ekaterina, Shishkina Anastasia et al.
The digital divide is a concept that has been explained as deficiencies in accessing and mastering new technologies caused by economic, social, or personal reasons. Overcoming the digital divide is a crucial social issue that implies focused research on digital literacy in the most vulnerable groups. Objectives. This study is aimed at assessing operational digital literacy in deaf and hard-of-hearing (DHH) university students and revealing potential grounds for hearing disability digital divide. Methods. The selection of study participants involved purposive sampling. Qualitative data on learning experiences in digital media were collected through verbal protocol sessions, diary entries, and semi-structured interviews with DHH university students. Grounded theory (open and axial coding) was used to analyse the data collected during interviews and verbal protocol sessions. Data collected from diary entries were analysed with Voyant Tools. Results. The main findings were categorised into: the use of the Internet and mobile applications, the digital divide, the use of text editors and spreadsheet programs, document creation and editing, and Internet search. The digital divide phenomenon in DHH students was described through the causal paradigm model. Conclusions. The study clarifies the difficulties that DHH participants faced in every stage of completing experimental tasks in the digital environment and provides arguments for proving that the grounds for the hearing disability digital divide are rooted in the lack of reading, writing, and written communication skills and not technical skills. The study also revealed the students' 'survival' strategies to overcome difficulties with poor reading skills and perceiving auditory information.
Veneranda Rutainurwa, Beny Mwenda, Baraka Israel
The spectacular advancement in information and communication technology (ICT) has shaped the way firms conduct their business, interact and communicate with customers and suppliers along their supply chains (SC). Yet, there exists limited knowledge of how investing in ICT can be leveraged to help firms streamline SC integration and achieve sustainable financial performance (FPF). Drawing on dynamic capability theory, this research delineates the dimensions of internal SC integration (ISI) and external SC integration (ESI) as potential mediators of the relationship between ICT capabilities and a firm’s FPF. A simple random sampling approach and cross-sectional questionnaire survey were used for data collection from 274 manufacturing SMEs in the Mbeya region, Tanzania. Subsequently, the collected data was analysed using Hayes PROCESS macro model 4 to test the study hypotheses. Empirical results indicate an insignificant direct effect of ICT capabilities on a firm’s FPF. However, ICT capabilities significantly and positively affect both ISI and ESI, which in turn play critical mediating roles, positively impacting the firm’s FPF. Essentially, the findings imply that the pathway from ICT capabilities to FPF predominantly transpires through enhanced ISI and ESI. As such, the study underscores the importance for SME managers to invest in ICT capabilities and harness such capabilities to strengthen ISI and ESI as the strategic intermediaries that translate ICT investments into tangible financial outcomes. The study contributes to the existing few empirical studies that establish the potential mediating effect of SC integration in the link between ICT capabilities and a firm’s FPF.
Qicheng Zeng, Zhaojun Nan, Sheng Zhou
Coded computing is recognized as a promising solution to address the privacy leakage problem and the straggling effect in distributed computing. This technique leverages coding theory to recover computation tasks using results from a subset of workers. In this paper, we propose the adaptive privacy-preserving coded computing (APCC) strategy, designed to be applicable to various types of computation tasks, including polynomial and non-polynomial functions, and to adaptively provide accurate or approximated results. We prove the optimality of APCC in terms of encoding rate, defined as the ratio between the computation loads of tasks before and after encoding, based on the optimal recovery threshold of Lagrange Coded Computing. We demonstrate that APCC guarantees information-theoretical data privacy preservation. Mitigation of the straggling effect in APCC is achieved through hierarchical task partitioning and task cancellation, which further reduces computation delays by enabling straggling workers to return partial results of assigned tasks, compared to conventional coded computing strategies. The hierarchical task partitioning problems are formulated as mixed-integer nonlinear programming (MINLP) problems with the objective of minimizing task completion delay. We propose a low-complexity maximum value descent (MVD) algorithm to optimally solve these problems. The simulation results show that APCC can reduce the task completion delay by a range of <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>20.3</mn><mo>%</mo></mrow></semantics></math></inline-formula> to <inline-formula><math xmlns="http://www.w3.org/1998/Math/MathML" display="inline"><semantics><mrow><mn>47.5</mn><mo>%</mo></mrow></semantics></math></inline-formula> when compared to other state-of-the-art benchmarks.
Peide Liu, Muhammad Azeem, Mehwish Sarfraz et al.
As a useful tool for managing ambiguous and inconsistent data, the Single Value Neutrosophic Set (SVNSs) is an extension of both Fuzzy Sets (FSs) and Intuitionistic Fuzzy Sets (IFSs). In the field of information theory, metrics like similarity, entropy, and distance are important. Although a number of entropy measures for SVNSs have been put forth and used in real-world situations, both academic research and real-world applications have pointed out certain drawbacks. Additionally, the Similarity Measures (SMs) is a useful instrument for determining how similar any two fuzzy values are to one another. The distance between the values allows the current SMs to evaluate the similarity. However, due to a few characteristics and intricate value operations, there are irrational and nonsensical cases. To deal with these preposterous cases, this paper proposed a parametric similarity measure in view of three parameters m1,m2,m3 in which decision makers can obtain the appropriate SMs by changing parameters with different decision styles. Furthermore, we analyze some existing SMs from a mathematical perspective and demonstrate the success of the proposed SMs using mathematical models. Ultimately, we apply the suggested SMs to resolve the Multi-Attribute Decision-Making (MADM) problems. We learn from the correlation and analysis that the suggested SM outperforms certain other SMs that are based on the SVNSs.
Sophie Taylor, Praneeth Kumar Vippathalla, Justin P. Coon
Information theoretic leakage metrics quantify the amount of information about a private random variable $X$ that is leaked through a correlated revealed variable $Y$. They can be used to evaluate the privacy of a system in which an adversary, from whom we want to keep $X$ private, is given access to $Y$. Global information theoretic leakage metrics quantify the overall amount of information leaked upon observing $Y$, whilst their pointwise counterparts define leakage as a function of the particular realisation $Y=y$ that the adversary sees, and thus can be viewed as random variables. We consider an adversary who observes a large number of independent identically distributed realisations of $Y$. We formalise the essential asymptotic behaviour of an information theoretic leakage metric, considering in turn what this means for pointwise and global metrics. With the resulting requirements in mind, we take an axiomatic approach to defining a set of pointwise leakage metrics, as well as a set of global leakage metrics that are constructed from them. The global set encompasses many known measures including mutual information, Sibson mutual information, Arimoto mutual information, maximal leakage, min entropy leakage, $f$-divergence metrics, and g-leakage. We prove that both sets follow the desired asymptotic behaviour. Finally, we derive composition theorems which quantify the rate of privacy degradation as an adversary is given access to a large number of independent observations of $Y$. It is found that, for both pointwise and global metrics, privacy degrades exponentially with increasing observations for the adversary, at a rate governed by the minimum Chernoff information between distinct conditional channel distributions. This extends the work of Wu et al. (2024), who have previously found this to be true for certain known metrics, including some that fall into our more general set.
Uesli Alushi, Tomás Ramos, Juan José García-Ripoll et al.
Quadratic light-matter interactions are nonlinear couplings such that quantum emitters interact with photonic or phononic modes exclusively via the exchange of excitation pairs. Implementable with atomic and solid-state systems, these couplings lead to a plethora of phenomena that have been characterized in the context of cavity QED, where quantum emitters interact with localized bosonic modes. Here, we explore quadratic interactions in a waveguide QED setting, where quantum emitters interact with propagating fields confined in a one-dimensional environment. We develop a general scattering theory under the Markov approximation and discuss paradigmatic examples for spontaneous emission and scattering of biphoton states. Our analytical and semianalytical results unveil fundamental differences with respect to conventional waveguide QED systems, such as the spontaneous emission frequency-entangled photon pairs or the full transparency of the emitter to single-photon inputs. This unlocks new opportunities in quantum information processing with propagating photons. As a striking example, we show that a single quadratically coupled emitter can implement a two-photon logic gate with unit fidelity, circumventing a no-go theorem derived for conventional waveguide-QED interactions.
Anna S. Kolosova, Anna S. Kameneva, Georgii G. Chukov et al.
The major algorithms and methods of machine learning are considered. A possibility of machine learning and neural network using for electronic equipment quality prediction is assessed. The paper provides examples of the successful application of these algorithms to improve such quality of electronic components indicators as reliability, resistance to external influencing factors, etc. Before testing electronic components on resistance to external influencing factors it is necessary to identify samples of electronic components by fluoroscopy in order to identify possible heterogeneity in the structure of samples belonging to the same batch. A solution of the electronic components batches uniformity problem using computer vision and clustering algorithms is proposed.
Sarah A. Obead, Hsuan-Yin Lin, Eirik Rosnes
We study the problem of pliable private information retrieval with side information (PPIR-SI) for the single server case. In PPIR, the messages are partitioned into nonoverlapping classes and stored in a number of noncolluding databases. The user wishes to retrieve any one message from a desired class while revealing no information about the desired class identity to the databases. In PPIR-SI, the user has prior access to some side information in the form of messages from different classes and wishes to retrieve any one new message from a desired class, i.e., the message is not included in the side information set, while revealing no information about the desired class to the databases. We characterize the capacity of (linear) single-server PPIR-SI for the case where the user's side information is unidentified, i.e., the user is oblivious of the identities of its side information messages and the database structure. We term this case PPIR-USI. Surprisingly, we show that having side information, in PPIR-USI, is disadvantageous, in terms of the download rate, compared to PPIR.
Hasan MM, Al Amin M, Moon ZK et al.
Md Mahedi Hasan,1 Md Al Amin,2,3 Zarin Khan Moon,4 Farhana Afrin2 1Faculty of Business Studies, Jashore University Science and Technology, Jashore, 7408, Bangladesh; 2Department of Marketing, Bangabandhu Sheikh Mujibur Rahman Science & Technology University, Gopalganj, Bangladesh; 3School of Business and Management, Queen Mary University of London, England, UK; 4Department of Accounting and Information Systems, Jashore University Science and Technology, Jashore, 7408, BangladeshCorrespondence: Md Al Amin, Department of Marketing, Bangabandhu Sheikh Mujibur Rahman Science & Technology University, Gopalganj, 8100, Bangladesh, Email alamin.bsmrstu21@gmail.comPurpose: Green banking, an ethical banking concept, concentrates on environmental protection and encourages social and environmental sustainability, perceived cognitive efforts, and subjective norms ensuring ecologically responsive banking services. Consequently, although there have been considerable green banking attempts in Bangladesh, it is yet unknown how environmental sustainability, perceived cognitive effort, and subjective norms affect usage behavior. The present research aims to uncover this gap, extending the Theory of Reasoned Action (TRA) to examine the determinants of the bankers’ green banking usage behavior during COVID-19.Methods: Data were collected from 366 bankers in Bangladesh using a purposive sampling technique and analyzed with structural equation modeling (SEM) using SMART PLS 3 software.Findings: The study found management support (0.291, t-statistics = 1.978, p 0.000), environmental sustainability (β = 0.278, t-statistics = 2.752, p < 0.001), perceived cognitive efforts (β = 0.401, t-statistics = 3.549, p < 0.000), and subjective norms (β = 0.309, t-statistics = 4.352, p < 0.000) influence bankers’ attitudes. Whereas environmental sustainability (β = 0.503, t-statistics = 3.726, p < 0.001), perceived cognitive efforts (β = 0.103, t-statistics = 2.020, p < 0.002), subjective norms (β = 0.281, t-statistics = 4.607, p < 0.000), and attitudes (= 0.602, t-statistics = 5.523, p 0.015) influence bankers’ green banking usage behavior. Finally, the mediating role of management supports, environmental sustainability, cognitive efforts and subjective norms on green banking usage behavior through attitudes was significant.Contribution/Conclusion: The study contributed to existing literature validating the proposed holistic framework applying TRA and three contemporary dimensions explaining bankers’ behavior toward green banking practice. Finally, the implementers should focus on green banking practices as green banking is one of the key strategies to protect the environment, assure social justice, and create economic success.Keywords: environmental sustainability, management supports, perceived cognitive efforts, green finance, sustainable banking
Pamella Mercy Papilaya, Prelly Marsell J. Tuapattinaya
In learning conservation biology with online learning communities, lecturers usually guide their students through a discussion-based learning process. In theory, mixed learning can increase interaction in the learning environment. Effective learning is promoted through flexibility, enabling the use of various student learning styles. This study aimed to 1) describe students' creative thinking skills about local wisdom on small islands in Maluku; 2) know the differences in creative thinking skills of experimental class students (using problem-based learning and conventional classes on small islands in Maluku; and 3) knowing differences in students' creative thinking skills on the topic of different local wisdom in small islands in Maluku. This research used the development of 4D Model teaching materials, field lectures, and online-based discussions. The data were analyzed descriptively, and the level of development of the 4D model combined with the student's PBL was evaluated using the normalized N-Gain g, while the quantitative data were analyzed through the ANCOVA test. The research findings reveal that competitive and facilitator styles significantly mediated the relationship between technology user acceptance and mixed learning on students' creative thinking skills. One of the weaknesses found in this study was the geographical differences between the islands. The internet facilities owned by students were not evenly distributed, and the needs of media were various. Blended learning was somewhat challenging to be applied in optimal learning. Scaffolding was given to students to concentrate more on education and independent activities. According to students, problem-based learning, creative thinking, finding information, and writing reports were problem-solving features that contributed the most to student learning.
Sean M. Eddington, Caitlyn Jarvis
Online communities of practice are a useful professional development space, where members can exchange information, aggregate expertise, and find support. These communities have grown in popularity within higher education—especially on social networking sites like Twitter. Although popular within academe, less is known about how specific online communities of practice respond and adapt during times of crisis (e.g., building capacity for resilience). We examined 22,078 tweets from #AcademicTwitter during the first two months of the Covid-19 pandemic, which impacted higher education institutions greatly, to explore how #AcademicTwitter enacted resilience during this time. Using text mining and semantic network analysis, we highlight three specific communicative processes that constitute resilience through a form of resilience labor that we conceptualize as “resilience craft.” Our findings provide theoretical significance by showing how resilience craft can extend theorizing around both communities of practice and the communicative theory of resilience through a new form of resilience labor. We offer pragmatic implications given our findings that address how universities and colleges can act resiliently in the face of uncertainty.
Sanghamitra Dutta, Praveen Venkatesh, Pulkit Grover
When a machine-learning algorithm makes biased decisions, it can be helpful to understand the sources of disparity to explain why the bias exists. Towards this, we examine the problem of quantifying the contribution of each individual feature to the observed disparity. If we have access to the decision-making model, one potential approach (inspired from intervention-based approaches in explainability literature) is to vary each individual feature (while keeping the others fixed) and use the resulting change in disparity to quantify its contribution. However, we may not have access to the model or be able to test/audit its outputs for individually varying features. Furthermore, the decision may not always be a deterministic function of the input features (e.g., with human-in-the-loop). For these situations, we might need to explain contributions using purely distributional (i.e., observational) techniques, rather than interventional. We ask the question: what is the "potential" contribution of each individual feature to the observed disparity in the decisions when the exact decision-making mechanism is not accessible? We first provide canonical examples (thought experiments) that help illustrate the difference between distributional and interventional approaches to explaining contributions, and when either is better suited. When unable to intervene on the inputs, we quantify the "redundant" statistical dependency about the protected attribute that is present in both the final decision and an individual feature, by leveraging a body of work in information theory called Partial Information Decomposition. We also perform a simple case study to show how this technique could be applied to quantify contributions.
Halaman 11 dari 270583