首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 922 毫秒
1.
This note statistically investigates the relationship between social security expenditure indexes and labor productivity during 1980- 2009 in Japan based on the Solow type of production function. In the case of real social security expenditure per labor and per total working hours, labor productivity decreases with respect to real social security. On the other hand, in the case of real social security expenditure per private capital stock, labor productivity increases with respect to real social security. However, the partial regression coefficients of these three indexes are not significant statistically. Therefore, we could not derive a clear relationship between the social security indexes and labor productivity.  相似文献   

2.
叶雷 《中关村》2011,(9):84-85
凡事预则立,不预则废。无论你承认不承认,你都已经被卷入了经济的漩涡之中,如何在这个漩涡之中“立”而不“废”呢,这就需要对经济走势或日经济周期的把握了。《我在高盛的经济预测法》,就是一本谈论预测经济走势的书。作者约瑟夫·H·埃利斯,是高盛集团的合伙人,一位有着35年行业分析背景并连续18年被著名杂志《机构投资者》评为华尔街第一零售业分析师的天才。  相似文献   

3.
This study investigates the determinant role of the cross-border movement of skilled labor in the expansion of service trade between the US, and both developed and developing countries. For this purpose, we employ the key concepts of network theory as an analytical framework and conduct panel data analysis and graphical modeling analysis for 31 countries from 1999 to 2008. In this decade, offshore outsourcing in the service trade took off worldwide. We use data for each country’s service exports to the US, number of H-1B visas issued, GNI per-capita, network readiness index, and an English dummy for the official language. We illustrate the trajectory and interactions between these factors. These analyses yield three observations. First, service trade with the US is more intensive among higher income countries. Second, the number of H-1B visas issued has a positive effect on service exports to the US. Third, individuals in lower income countries tend to desire H-1B visas and create intensive skilled labor networks with the US, the path through which developing countries such as India expanded their service exports to the US.  相似文献   

4.
Security of Big Data is a huge concern. In a broad sense, Big Data contains two types of data: structured and unstructured. Providing security to unstructured data is more difficult than providing security to structured data. In this paper, we have developed an approach to provide adequate security to unstructured data by considering types of data and their sensitivity levels. We have reviewed the different analytics methods of Big Data to build nodes of different types of data. Each type of data has been classified to provide adequate security and enhance the overhead of the security system. To provide security to a data node, and a security suite has been designed by incorporating different security algorithms. Those security algorithms collectively form a security suite which has been interfaced with the data node. Information on data sensitivity has been collected through a survey. We have shown through several experiments on multiple computer systems with varied configurations that data classification with respect to sensitivity levels enhances the performance of the system. The experimental results show how and in what amount the designed security suite reduces overhead and increases security simultaneously.  相似文献   

5.
The Japanese mobile phone market is 55.8% of the total market in the telecommunications industry. This paper is a conjoint analysis on Japanese consumer preferences for Japanese mobile phones. The analysis in this paper is presented after a questionnaire survey was given to 3,412 Japanese mobile phone users over 15 years old. The results of this analysis show that a decline in the price of mobile phone sets, an increase in transmission speed, the application of family discounts, and the continuation of contracts with the same telecommunication companies, all raise demand for mobile networks. In addition, the author found that user groups of NTT DOCOMO, au (KDDI), Softbank, and MVNO have different utility functions. According to the estimation of Mean Willingness to Pay (MWTP) in this paper, suppliers of mobile phone networks may be able to optimize and maximize demand by adjusting attributions and their levels.  相似文献   

6.
In this paper, we discuss the substitution effects between mobile games and console games. We estimate such effects by a fixed-effect regression with instrumental variables using panel data of about 100,000 observations. The results showed that the substitution effects of playing smart devices on 3DS, Wii, and PSP were recognizable, but did not have significant effects on PS3, and the substitution effects on PSP were very small. Therefore, mobile games had a substitution effect on casual console games, or on console games in which the play situation resembled mobile games. In addition, the substitution effects were at most about 0.1. The substitution effects were small. Our results indicate that mobile games represent the pioneers in the new market of gaming at least during our observation period. But new games and traditional games will coexist for a while.  相似文献   

7.
Cloud Computing is defined as computer usage delivered as a service over the Internet. This cloud computing is classified as public computing, private computing, or hybrid computing. Public cloud computing is open to any customer who pays service charges. On the contrary, private cloud computing is used by a member of a company who has constructed a cloud computing system over a restricted domain on that company's information infrastructure. Hybrid cloud computing is a mix of both the public and private. Which type of cloud computing is popular in Japan? To answer this question I mailed questionnaires to 2,284 enterprises listed on the Tokyo Stock Exchange Market in 2012 and 2013. I analyzed the relationship between these answers and financial indexes using a multinomial logistic regression model. I concluded that the total assets was the most effective factor in the decision to introduce the public cloud, and the accumulated profit was one of the most effective factors in the decision to introduce the hybrid cloud. These findings are not consistent with orthodox price theory.  相似文献   

8.
In this article, the authors investigate the attributes of victims in information security incident damages for the purpose of reducing the damages. The Information-Technology Promotion Agency, Japan, in 2010, conducted an Internet survey targeted to Japanese Internet home users entitled, “Survey of awareness toward information security incidents” that is used in this article. Using micro data collected from this survey, they employed multinomial logit regression analysis to show factors affecting the user’s experience of the incidents of damage through particular incidents. They concluded that the overconfidence regarding information security knowledge increased the probability for phishing and spoofing.  相似文献   

9.
江川 《中关村》2012,(9):77-77
北京市海淀区紫竹院街道以加强和创新社会管理为抓手,致力于构建具有时代特征、海淀特色、紫竹院特点的社会建设体系,充分利用物联网、云计算、移动互联等先进的信息技术,建设了“知竹online”网上社区服务站(www.zzy15.com),并于2012年7月10日正式上线运行。这意味着紫竹院街道智慧社区建设水平得到大幅提升,  相似文献   

10.
Taxis are considered one of the most convenient means of transportation, especially when people have to travel off-route, where public transportation is not a feasible option, and also when they need to reach a destination according to what is most convenient for them. However, many issues exist about taxi services, such as the problems of passengers who are unable to get taxi service at the location of their choice, or problems concerning when they need the taxi service to arrive. These problems may be due to the unavailability of the taxi at that particular location or due to the taxi driver not wanting to provide service. A taxi driver may not want to provide service to a potential passenger, because they may have preferences on the direction and areas they want to go or because of the different types of service zoning. Understanding the behaviors of taxi drivers and the characteristics of the trip/travel might be helpful to solving such issues. In this study, we conducted an analysis from a questionnaire survey and large-scale taxi probe data to understand taxi service behavior, travel characteristics, and to discover taxi service zoning characteristics. As a result, four types of taxi service zones including isolated zones, interactive zones, special service zones, and target zones were encountered. Travel characteristics were calculated and analyzed at different criteria, such as weekdays, weekends, and various time windows in a single day. The result of these characteristics was explained according to their similarities and dissimilarities in each type of zone. The discovery of the different zones and their respective definitions might be a good initiative for further development of a policy for taxi drivers to provide better service for passengers.  相似文献   

11.
Since the late 1990s, ICT has rebuilt organizational networks by connecting value chains and providing communication networks. This made certain types of services tradable, including information services. This change raised the public concern in terms of the effect on employment and innovation capacity in developed economies. The fragmentation of the production network of information services has been led by US firms, but is spreading to East Asia, typically in outsourcing from Japan to China, India and the ASEAN countries. This study empirically assesses the effect of offshore outsourcing on employment in Japan, specifying trading partners. The results show that information services outsourcing affects employment in the manufacturing sector in Japan, but the effect is different depending on trading partners. This study discusses the implications from the viewpoint of industry policy, relating the results to outsourced business processes.  相似文献   

12.
程桔华 《中关村》2011,(6):78-80
在金融与安全产业、移动互联网产业方面,大唐电信将在现有基础上,取得行业领先地位,并在细分领域成为主流供应商;在物联网和三网融合产业方面,大唐电信的业务将遍地开花,用"大终端+大服务"的整体解决方案全面迎接智慧城市、智能商业中心等各种大规模行业应用时代的到来。  相似文献   

13.
Recently, smart glasses have been applied in the field of maintenance, with which a worker goes well during work by contacting a support operator from a remote location. The worker, however, cannot go well if the support operator is not there. To solve the issues, this paper discusses how a work system should be developed by integrating smart glasses with a question-answering module. We design the work knowledge acquired from skilled people and manuals as a workflow for when type of question, rule base for how, goal tree for why, domain ontologies, and its RDF data for what. Workers can receive answers from the question-answering module incorporated with multiple knowledge bases for four types of question. The authors conducted a demonstration experiment and found that workers could perform the work more autonomously by importing the system.  相似文献   

14.
The objective of this paper is to find a new method to estimate real social networks based on observed data collected by questionnaire surveys. Studies on social networks have been increasing in order to analyze social phenomena from a micro viewpoint. Most social phenomena can be explained by micro-level interactions among people. Spread of rumor and pandemics are typical example of micro interaction? However, there has not been much work on an analysis of real social networks based on observed data. This study tries to establish a methodology that exploits a genetic algorithm to rebuild a social network based on the data observed indirectly from real social networks. This paper introduces our proposed method, which allows us to rebuild a social network to some extent from degree distributions of a target real social network.  相似文献   

15.

The main purpose of this paper is to do a comparative analysis of prediction models using various machine learning techniques. The models will be used to predict whether a movie will be a hit or flop before it is actually released. The techniques used for comparisons are decision tree, random forest (RF), support vector machine, logistics regression, adaptive tree boosting, and artificial neural network algorithms. The major predictors used in the models are the ratings of the lead actor, IMDb ranking of a movie, music rank of the movie, and total number of screens planned for the release of a movie. The results of most models indicated a reasonable accuracy, ranging from 80 to 90%. However, models based on two techniques, RF and logistic regression, achieved an accuracy of 92%. From the results, the most important predictors of a movie’s success are music rating, followed by its IMDb rating and total screens used for release.

  相似文献   

16.
Declining birth and mortality rates are leading to population aging throughout the OECD countries. This paper examines one possible consequence for national productivity – we ask: Are older workers able to take advantage of new technologies as effectively as their younger counterparts? Using Japanese data for 1973-2000, we find that if we ignore job tenure, workers beyond the age of 50 do not seem as able to benefit from total factor productivity growth as their younger colleagues. However, Japanese workers past age 50 move to lesser paying positions more frequently than is common elsewhere, and we believe that the complete answer to our question depends upon whether an inability to keep up with new technologies induces late-in-career job changes or whether the changes follow, in practice, from other factors.  相似文献   

17.
This article proposes a new approach to personal authentication by exploring the features of a person’s face and voice. Microsoft’s Kinect sensor is used for facial and voice recognition. Parts of the face including the eyes, nose, and mouth, etc., are analyzed as position vectors. For voice recognition, a Kinect microphone array is adopted to record personal voices. Mel-frequency cepstrum coefficients, logarithmic power, and related values involved in the analysis of personal voice are also estimated from the voices. Neural networks,support vector machines and principal components analysis are employed and compared for personal authentication. To achieve accurate results, 20 examinees were selected for face and voice data used for training the authentication models. The experimental results show that the best accuracy is achieved when the model is trained by a support vector machine using both facial and voice features.  相似文献   

18.
This article focuses on a new approach for personal identification by exploring the features of pedestrian behavior. The recent progress of a motion capture sensor system enables personal identification using human behavioral data observed from the sensor. Kinect is a motion sensing input device developed by Microsoft for Xbox 360 and Xbox One. Personal identification using the Microsoft Kinect sensor (hereafter referred to as Kinect) is presented in this study. Kinect is used to estimate body sizes and the walking behaviors of pedestrians. Body sizes such as height and width, and walking behavior such as joint angles and stride lengths, for example, are used as explanatory variables for personal identification. An algorithm for the personal identification of pedestrians is defined by a traditional neural network and by a support vector machine. In the numerical experiments, pictures of body sizes and the walking behaviors are captured from fifteen examinees through Kinect. The walking direction of pedestrians was specified as 0°, 90°, 180°, and 225°, and then the accuracies were compared. The results indicate that identification accuracy was best when the walking direction was 180°. In addition, the accuracy of the vector machine was better than that of the neural network.  相似文献   

19.
This study examines the influence of the valence of online customer reviews on sales outcomes based on prospect theory. Numerous studies have revealed the importance of customer reviews in online marketing. However, only few studies have explored the impact of online customer reviews on sales outcomes in the dynamic process. Prior studies in behavioral economics literature have indicated that people differently value gains and losses and that losses have more emotional impact than an equivalent amount of gains. This study verifies whether prospect theory applies to the relation between online customer reviews and sales outcomes. Relevant data were collected from Amazon.co.jp, and three statistical models were employed to investigate the relation between the two factors. Major findings confirm that negative customer reviews considerably impact online sales than positive reviews. Furthermore, the findings indicate that the marginal effects of positive and negative reviews decrease with the increase in their volume. The results of this study will enable marketers to compare the relative sales effects of different types of customer reviews and improve the effectiveness of customer service management.  相似文献   

20.
In the discussion of corporate governance from the standpoint of economists, it is common for economists to pay more attention to the stockholders of a corporation (as stakeholders) than to the creditors. However, the behaviors of depositors as creditors should not be neglected in the management of banking institutions. The purpose of this paper is to analyze statistically the decision factors of depositors in opening an account at a particular bank with respect to corporate governance variables. My result shows that depositors with risk aversion consider banks well managed based on the following: a lower rate of external auditors, a longer time of service by the bank’s president, and the existence of a simultaneous promotion system of the bank’s president and chairperson.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号