704,516 research outputs found

    On the algebraic structure of rational discrete dynamical systems

    Get PDF
    We show how singularities shape the evolution of rational discrete dynamical systems. The stabilisation of the form of the iterates suggests a description providing among other things generalised Hirota form, exact evaluation of the algebraic entropy as well as remarkable polynomial factorisation properties. We illustrate the phenomenon explicitly with examples covering a wide range of models

    Internet of things: Vision, applications and research challenges

    Get PDF
    The term “Internet-of-Things” is used as an umbrella keyword for covering various aspects related to the extension of the Internet and the Web into the physical realm, by means of the widespread deployment of spatially distributed devices with embedded identification, sensing and/or actuation capabilities. Internet-of-Things envisions a future in which digital and physical entities can be linked, by means of appropriate information and communication technologies, to enable a whole new class of applications and services. In this article, we present a survey of technologies, applications and research challenges for Internet-of-Things

    Analysis on Security Vulnerabilities of the Modern Internet of Things (IOT) Systems

    Get PDF
    The IoT, or Internet of Things, has quickly grown in popularity as a means to collect data in real-time from any and all linked devices. These networked physical objects can exchange data with one another via their respective sensor technologies and have their own unique identifiers. Insightful data analytics applied to the obtained information also presents a substantial possibility for many organisations. Embedded devices, authentication, and trust management are all areas where the Internet of Things has shown a significant security hole. This study delves into the problems with the Internet of Things (IoT), covering topics such as its privacy and security, its vulnerability, its analytics at the moment, the impending ownership threat, trust management, IoT models, its roadmap, and its security issues. It then offers solutions to these problems

    State Visits and International Trade

    Get PDF
    Politicians travel extensively abroad, for various reasons. One purpose of external visits is to improve bilateral economic relations. In this paper, I examine the effect of state visits on international trade. I use a large data set covering the travel activities of the heads of state of France, Germany and the United States between 1948 and 2003. My results indicate that state and official visits are indeed positively correlated with exports. A typical visit is associated with higher bilateral exports by about 8 to 10 percent, holding other things constant.head, president, government, politics, gravity

    State visits and international trade

    Get PDF
    Politicians travel extensively abroad, for various reasons. One purpose of external visits is to improve bilateral economic relations. In this paper, I examine the effect of state visits on international trade. I use a large data set covering the travel activities of the heads of state of France, Germany and the United States between 1948 and 2003. My results indicate that state and official visits are indeed positively correlated with exports. A typical visit is associated with higher bilateral exports by about 8 to 10 per cent, holding other things constant. --head,president,government,politics,gravity

    NSSDC Conference on Mass Storage Systems and Technologies for Space and Earth Science Applications, volume 1

    Get PDF
    Papers and viewgraphs from the conference are presented. This conference served as a broad forum for the discussion of a number of important issues in the field of mass storage systems. Topics include magnetic disk and tape technologies, optical disks and tape, software storage and file management systems, and experiences with the use of a large, distributed storage system. The technical presentations describe, among other things, integrated mass storage systems that are expected to be available commercially. Also included is a series of presentations from Federal Government organizations and research institutions covering their mass storage requirements for the 1990's

    Are foreign owned firms more productive? Evidence from Swedish firm data

    Get PDF
    This paper analyzes the difference between foreign and domestic ownership of firms with respect to productivity. The analysis is performed using a panel of firm data from Statis- tics Sweden, covering the entire manufacturing sector in the 1990:s. First we show that, other things equal, foreign-owned firms have higher labor productivity as well as total factor productivity than domestic firms. We also find that Swedish multinational firms are as productive as foreign-owned firms. Then we show that the rate of growth in productivity is higher in foreign-owned firms. We find no evidence for reverse causality.Foreign ownership; productivity

    Essential concepts of digital topology (digital kk-covering spaces and pseudo kk-covering spaces)

    Full text link
    The present paper focuses on the notions of covering spaces, pseudo-covering spaces, and their equivalences. We discuss something incorrectly mentioned in Boxer's papers and correct them. Indeed, Sections 4-6 (or 4-6) of \cite{B3} are redundant because they have some incorrect assertions on (k1,k2)(k_1,k_2)-covering spaces or pseudo- (k1,k2)(k_1,k_2)-covering spaces due to his misunderstanding on Han's papers \cite{H14,H16}. In addition, many things in \cite{B3} are duplicated with some results in \cite{H18}. In addition, since the papers \cite{P1,P2} also have some defects, we correct and improve them.Comment: This paper refers to some essential notions of digital topology related to a digital covering space and a pseudo-covering space in a digital topological setting. arXiv admin note: substantial text overlap with arXiv:2309.02960; text overlap with arXiv:2309.0143
    • 

    corecore