1 |
Decoy pricingEvgenyeva, Ekaterina January 2019 (has links)
Evgenyeva, E. Decoy pricing. Master thesis. Brno: Mendel University, 2019. This diploma thesis deals with the cognitive bias Decoy pricing, which is currently the subject of interest for companies working in retail. The tenets of the decoy effect on consumer behavior are analyzed in detail in the literature review, the findings of research and experiments are also taken into account in this part. The analytical part of the thesis is focused on exploring the connection of respondents choice with respect to generation, gender, product group and other variables. After determining the general conclusions resulting from the questionnaire survey and the compiled Logit models, attention is paid to the generation Z. The eye-tracking experiment extends the boundaries and possibilities of the research, showing values that cannot normally be found. Heat maps are compiled, the area of interest and the stimulus analyzed. The results of the experiment are appended by in-depth interviews with respondents, which are full of unexpected findings and discoveries. The final part compares the results with the information and experiments described in the literary overview of this thesis. Based on the results of experiments and findings, there are made recommendations for companies that decide to use the pricing strategy of Decoy pricing on the Czech market.
|
2 |
Quantum Cryptography: From Theory to PracticeMa, Xiongfeng 26 February 2009 (has links)
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptography was proven in the last decade. Many security analyses are based on the assumption that QKD system components are idealized. In practice, inevitable device imperfections may compromise security unless these imperfections are well investigated.
A highly attenuated laser pulse which gives a weak coherent state is widely used in QKD experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we will prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we will apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Furthermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. Note that our work, decoy state protocol, has attracted a lot of scientific and media interest. The decoy state QKD becomes a standard technique for prepare-and-measure QKD schemes.
Aside from single-photon-based QKD schemes, there is another type of scheme based on entangled photon sources. A PDC source is commonly used as an entangled photon source. We propose a model and post-processing scheme for the entanglement-based QKD with a PDC source. Although the model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. By simulating a real PDC experiment, we show that the entanglement-based QKD can achieve longer maximal secure distance than the single-photon-based QKD schemes.
We propose a time-shift attack that exploits the efficiency mismatch of two single photon detectors in a QKD system. This eavesdropping strategy can be realized by current technology. We will also discuss counter measures against the attack and study the security of a QKD system with efficiency mismatch detectors.
|
3 |
Quantum Cryptography: From Theory to PracticeMa, Xiongfeng 26 February 2009 (has links)
Quantum cryptography or quantum key distribution (QKD) applies fundamental laws of quantum physics to guarantee secure communication. The security of quantum cryptography was proven in the last decade. Many security analyses are based on the assumption that QKD system components are idealized. In practice, inevitable device imperfections may compromise security unless these imperfections are well investigated.
A highly attenuated laser pulse which gives a weak coherent state is widely used in QKD experiments. A weak coherent state has multi-photon components, which opens up a security loophole to the sophisticated eavesdropper. With a small adjustment of the hardware, we will prove that the decoy state method can close this loophole and substantially improve the QKD performance. We also propose a few practical decoy state protocols, study statistical fluctuations and perform experimental demonstrations. Moreover, we will apply the methods from entanglement distillation protocols based on two-way classical communication to improve the decoy state QKD performance. Furthermore, we study the decoy state methods for other single photon sources, such as triggering parametric down-conversion (PDC) source. Note that our work, decoy state protocol, has attracted a lot of scientific and media interest. The decoy state QKD becomes a standard technique for prepare-and-measure QKD schemes.
Aside from single-photon-based QKD schemes, there is another type of scheme based on entangled photon sources. A PDC source is commonly used as an entangled photon source. We propose a model and post-processing scheme for the entanglement-based QKD with a PDC source. Although the model is proposed to study the entanglement-based QKD, we emphasize that our generic model may also be useful for other non-QKD experiments involving a PDC source. By simulating a real PDC experiment, we show that the entanglement-based QKD can achieve longer maximal secure distance than the single-photon-based QKD schemes.
We propose a time-shift attack that exploits the efficiency mismatch of two single photon detectors in a QKD system. This eavesdropping strategy can be realized by current technology. We will also discuss counter measures against the attack and study the security of a QKD system with efficiency mismatch detectors.
|
4 |
Establishing a Biomarker of Cellular Aging for Mesenchymal Stem Cells and Investigating Their Regenerative PotentialJanuary 2019 (has links)
archives@tulane.edu / 1 / Sean Madsen
|
5 |
Factors of Determining Compromise Effect¡GA Preliminary Study of the Trade-off between Unemployment and InflationChen, Chih-ting 07 July 2012 (has links)
This paper contains two parts. First, we study the decoy effect (especially for the compromise decoy effect) by the experiments where the subjects face the trade-off of inflation and unemployment. As earlier studies show that the compromise decoy is not good as dominated decoy, we try to explore factors of determining compromise effect. Second, we investigate the factors affecting the subjects¡¦ preference over unemployment and inflation.
In Part 1, we explore how to enhance the compromise decoy effect by changing the relative location among target, compromise, and decoy. It emerges that the distance between target and decoy, the distance between target and competitor, and the existence of the dominated decoy all affect the size of the compromise decoy effect.
In Part 2, we explore the relation of subjects¡¦ preference over inflation and unemployment and their personal characteristics, such as location of hometown, the attitude toward risk, political participation, ideology, household income, knowledge of related terminology, whether to take related course or not, and friends¡¦ and relatives¡¦ unemployment status, and so on. Though the direction of effects is in line with our conjecture, the level of significance is not high enough.
|
6 |
Experimental Realization of Decoy State Polarization Encoding Measurement-device-independent Quantum Key DistributionLiao, Zhongfa 04 December 2013 (has links)
Quantum key distribution (QKD) allows two remote parties to generate secret keys for cryptographic purposes. Its security has been proven with some assumptions. However, practical realizations may not comply with all the assumptions, leading to various attacks. Founded on the observation that almost all attacks are on the detection part, measurement-device-independent QKD (MDI-QKD) was proposed to remove all such attacks. This thesis presents an implementation of the protocol. In our implementation, key bit information was encoded in the polarization states of weak coherent pulses at 1542 nm wavelength in optical fibers, and decoy state techniques were employed. We ensured stable polarization preparation and alignment and developed a QKD system over 10 km of standard Telecom fibers at 500 KHz repetition rate. Our work demonstrates the practicality of MDI-QKD protocol of removing all attacks, existing and yet to be discovered, on the detection part of a QKD system.
|
7 |
Experimental Realization of Decoy State Polarization Encoding Measurement-device-independent Quantum Key DistributionLiao, Zhongfa 04 December 2013 (has links)
Quantum key distribution (QKD) allows two remote parties to generate secret keys for cryptographic purposes. Its security has been proven with some assumptions. However, practical realizations may not comply with all the assumptions, leading to various attacks. Founded on the observation that almost all attacks are on the detection part, measurement-device-independent QKD (MDI-QKD) was proposed to remove all such attacks. This thesis presents an implementation of the protocol. In our implementation, key bit information was encoded in the polarization states of weak coherent pulses at 1542 nm wavelength in optical fibers, and decoy state techniques were employed. We ensured stable polarization preparation and alignment and developed a QKD system over 10 km of standard Telecom fibers at 500 KHz repetition rate. Our work demonstrates the practicality of MDI-QKD protocol of removing all attacks, existing and yet to be discovered, on the detection part of a QKD system.
|
8 |
Mechanism of Action of ERBB Decoy Cancer Therapeutic Peptide SAH5Makhani, Kiran, Makhani, Kiran January 2017 (has links)
Breast cancer is the most prevalent type of cancer and second leading cause of death in women. Among others, the triple negative breast cancer (TNBC) is the most invasive as it has the highest recurrence and death rates with no targeted therapeutic available thus far. Epidermal Growth Factor Receptor (EGFR) is one of the important targets as more than fifty percent of the TNBC overexpress it but all the therapies designed against it have failed to show significant results. The juxtamembrane domain of EGFR has been explored comparatively recently and has been used to design a decoy peptide with the anticipation to affect the EGFR downstream functions. Previous research has shown it to cause cell death in cancer cells. This study is aimed towards deciphering the mechanism of action of the stapled form of this decoy peptide-SAH5. It presents evidence that the peptide leads to an immediate intracellular calcium release from the Inositol 1,4,5 triphosphate on the endoplasmic reticulum, an inhibition of which can rescue SAH5 induced cell death. The study also demonstrate that the peptide is able to increase the production of Reactive Oxygen Species (ROS) in mitochondria, part of which is triggered by the peptide-induced calcium release.
|
9 |
How Pricing Strategies For E-Commerce Are Affected By Website Usability / Hur prissättningsstrategier inom e-handel påverkas av hemsidans användbarhetNyström, Filip, Lundberg, Filip, Johansson, Arvid, Rättgård, Einar, Grinneby, Sven, Ekberg, Lukas, Södereng, Lisa January 2023 (has links)
The growth of e-commerce, accelerated by the covid-19 pandemic, have fundamentally changed how companies commercialize their products. To remain competitive, many retail companies must transition parts of, or their entire, selling process to the internet. This poses the challenge of creating a website which satisfies as many of the needs of the consumer as possible, whilst still being accessible and easy to use. The usability of a website, which essentially is the perceived quality of a user experience, affects both to what extent customers experience satisfaction and to what extent they perform purchases.The purpose of this study was both to examine the relationship between selling strategies, such as the decoy effect and the compromise effect, and perceived usability of an e-commercewebsite, as well as determining how effective said selling strategies are for increasing purchase amount.By creating a high usability e-commerce website for phone cases and related products and then performing user tests in which 42 individuals were asked to perform purchase scenarios in which they were or were not exposed to selling strategies, the correlation between the perceived usability and the effectiveness of selling strategies were investigated. The 42 user tests showed no correlation between the effectiveness of the selling strategies and the perceived usability of the website. An increase in the perceived usability did however correlate to an increase in average purchase amount, and the selling strategies did increase the average purchase amount when applied. The lack of correlation between perceived usability and the effectiveness of selling strategies were inconsistent with the initial hypothesis. The discussion of this paper addresses potential explanations to the result. Several parts of the study can be altered to eliminate or mitigate identified error sources in the method. The extent to which these error sources affected the results of this study is not conclusively established, but several future improvements can be made to continue this academic inquiry, which is considered both relevant and of increasing importance.
|
10 |
Decoy Effects in a Consumer Search TaskHartzler, Beth Marie 04 April 2012 (has links)
No description available.
|
Page generated in 0.0485 seconds