6,423 research outputs found
Recommended from our members
Control of the house mouse (Mus musculus L.) in the Netherlands
Rodent control in the Netherlands is carried out by local authorities, extermination companies or the owners of infested premises. The control of the house mouse, especially in food-handling establishments, is a problem that has existed for some years. Testing in the laboratory indicates a warfarin resistance although the application of new rodenticides like bromadiolone, calciferol and difenacoum has given good results. A "manual" for the control of suspected warfarin resistant house mice is given
Vector valued logarithmic residues and the extraction of elementary factors
An analysis is presented of the circumstances under which, by the extraction of elementary factors, an analytic Banach algebra valued function can be transformed into one taking invertible values only. Elementary factors are generalizations of the simple scalar expressions λ – α, the building blocks of scalar polynomials. In the Banach algebra situation they have the form e – p + (λ – α)p with p an idempotent. The analysis elucidates old results (such as on Fredholm operator valued functions) and yields new insights which are brought to bear on the study of vector-valued logarithmic residues. These are contour integrals of logarithmic derivatives of analytic Banach algebra valued functions. Examples illustrate the subject matter and show that new ground is covered. Also a long standing open problem is discussed from a fresh angle.analytic vector-valued function;annihilating family of idempotents;elementary factor;generalizations of analytic functions;idempotent;integer combination of idempotents;logarithmic residue;plain function;resolving family of traces;topological algebras
Asymptotic adaptive bipartite entanglement distillation protocol
We present a new asymptotic bipartite entanglement distillation protocol that
outperforms all existing asymptotic schemes. This protocol is based on the
breeding protocol with the incorporation of two-way classical communication.
Like breeding, the protocol starts with an infinite number of copies of a
Bell-diagonal mixed state. Breeding can be carried out as successive stages of
partial information extraction, yielding the same result: one bit of
information is gained at the cost (measurement) of one pure Bell state pair
(ebit). The basic principle of our protocol is at every stage to replace
measurements on ebits by measurements on a finite number of copies, whenever
there are two equiprobable outcomes. In that case, the entropy of the global
state is reduced by more than one bit. Therefore, every such replacement
results in an improvement of the protocol. We explain how our protocol is
organized as to have as many replacements as possible. The yield is then
calculated for Werner states.Comment: 11 pages, 5 figures, RevTeX
Hashing protocol for distilling multipartite CSS states
We present a hashing protocol for distilling multipartite CSS states by means
of local Clifford operations, Pauli measurements and classical communication.
It is shown that this hashing protocol outperforms previous versions by
exploiting information theory to a full extent an not only applying CNOTs as
local Clifford operations. Using the information-theoretical notion of a
strongly typical set, we calculate the asymptotic yield of the protocol as the
solution of a linear programming problem.Comment: 13 pages, 3 figures, RevTeX
Exploring requisites and antecedents of continuous innovation.
When innovating, an organization needs to be capable of (1) exploring problem definition spaces and (2) exploiting them. The processes in which both activities unfold, display paradoxical characteristics which can be addressed by adopting ambidextrous organizational forms. Analyzing underlying value dynamics indicate that such forms will only be sustainable to the extent that cross-fertilization between both types of activity is achieved. These findings underscore the relevancy of interface management practices directed towards enacting synergies.
Correlation and current anomalies in helical quantum dots
We theoretically investigate the ground-state properties of a quantum dot
defined on the surface of a strong three-dimensional time-reversal invariant
topological insulator. Confinement is realized by ferromagnetic barriers and
Coulomb interaction is treated numerically for up to seven electrons in the
dot. Experimentally relevant intermediate interaction strengths are considered.
The topological nature of the dot has interesting consequences: i) spin
polarization increases and the ground state exhibits quantum phase transitions
at specific angular momenta as a function of interaction strength ii) the onset
of Wigner correlations takes place mainly in one spin channel, iii) the ground
state is characterized by a persistent current which changes sign as a function
of the radius of the dot.Comment: 5 pages, 4 figure
Moral Anxiety, Mortal Terror: Considering Spielberg, Post-9/11
In the wake of 9/11, a defining moment in the young 21st century, Spielberg’s thematic concerns undergo a marked evolution. As film historian Joseph McBride noted, “(n)o other American artist confronted the key events of the first decade of the century with such sustained and ambitious treatment” (450). Together, Spielberg’s War of the Worlds (2005), Munich (2005), and Minority Report (2002) create an informal trilogy, each exploring a different facet of American shock and anxiety in the War on Terror era
Stabilizer state breeding
We present a breeding protocol that distills pure copies of any stabilizer
state from noisy copies and a pool of predistilled pure copies of the same
state, by means of local Clifford operations, Pauli measurements and classical
communication.Comment: RevTeX4, 9 pages, 1 figur
Quantitative Validation: An Overview and Framework for PD Backtesting and Benchmarking.
The aim of credit risk models is to identify and quantify future outcomes of a set of risk measurements. In other words, the model's purpose is to provide as good an approximation as possible of what constitutes the true underlying risk relationship between a set of inputs and a target variable. These parameters are used for regulatory capital calculations to determine the capital needed that serves a buffer to protect depositors in adverse economic conditions. In order to manage model risk, financial institutions need to set up validation processes so as to monitor the quality of the models on an ongoing basis. Validation is important to inform all stakeholders (e.g. board of directors, senior management, regulators, investors, borrowers, …) and as such allow them to make better decisions. Validation can be considered from both a quantitative and qualitative point of view. Backtesting and benchmarking are key quantitative validation tools. In backtesting, the predicted risk measurements (PD, LGD, CCF) will be contrasted with observed measurements using a workbench of available test statistics to evaluate the calibration, discrimination and stability of the model. A timely detection of reduced performance is crucial since it directly impacts profitability and risk management strategies. The aim of benchmarking is to compare internal risk measurements with external risk measurements so to allow to better gauge the quality of the internal rating system. This paper will focus on the quantitative PD validation process within a Basel II context. We will set forth a traffic light indicator approach that employs all relevant statistical tests to quantitatively validate the used PD model, and document this complete approach with a reallife case-study.Framework; Benchmarking; Credit; Credit scoring; Control;
- …