5,956 research outputs found
External and internal influences on R&D alliance formation: evidence from German SMEs
Relying on relational capital theory and transaction cost economics (TCE), this study identifies factors that impede or promote alliance formation in small to medium-sized enterprises (SMEs). Environmental uncertainty and knowledge intensity impede firms’ R&D alliance formation; the focal firm’s overall trust in partners enhances alliance formation. Trust interacts positively with environmental uncertainty and knowledge intensity to affect alliance formation in SMEs. The findings reflect data from a longitudinal sample of 854 German SMEs, captured over eight years from 1999 to 2007
Neutrino Anomalies in an Extended Zee Model
We discuss an extended model which naturally leads to mass
scales and mixing angles relevant for understanding both the solar and
atmospheric neutrino anomalies. No right-handed neutrinos are introduced in the
model.The model uses a softly broken symmetry. Neutrino
masses arise only at the loop level. The one-loop neutrino masses which arise
as in the Zee model solve the atmospheric neutrino anomaly while breaking of
generates at two-loop order a mass splitting needed for
the vacuum solution of the solar neutrino problem. A somewhat different model
is possible which accommodates the large-angle MSW resolution of the solar
neutrino problem.Comment: 11 pages including 2 figures; a reference added and text changed
accordingl
Lepton flavour violation in The Little Higgs model
Little Higgs models with T-parity have a new source of lepton flavour
violation. In this paper we consider the anomalous magnetic moment of the muon
\gmtwo and the lepton flavour violating decays \mutoeg and \tautomug in Little
Higgs model with T-parity \cite{Goyal:2006vq}. Our results shows that present
experimental constraints of \mutoeg is much more useful to constrain the new
sources of flavour violation which are present in T-parity models.Comment: LaTeX file with 13 eps figures (included
Recommended from our members
Scale Inside-Out: Rapid Mitigation of Cloud DDoS Attacks
The distributed denial of service (DDoS) attacks in cloud computing requires quick absorption of attack data. DDoS attack mitigation is usually achieved by dynamically scaling the cloud resources so as to quickly identify the onslaught features to combat the attack. The resource scaling comes with an additional cost which may prove to be a huge disruptive cost in the cases of longer, sophisticated, and repetitive attacks. In this work, we address an important problem, whether the resource scaling during attack, always result in rapid DDoS mitigation? For this purpose, we conduct real-time DDoS attack experiments to study the attack absorption and attack mitigation for various target services in the presence of dynamic cloud resource scaling. We found that the activities such as attack absorption which provide timely attack data input to attack analytics, are adversely compromised by the heavy resource usage generated by the attack. We show that the operating system level local resource contention, if reduced during attacks, can expedite the overall attack mitigation. The attack mitigation would otherwise not be completed by the dynamic scaling of resources alone. We conceived a novel relation which terms “Resource Utilization Factor” for each incoming request as the major component in forming the resource contention. To overcome these issues, we propose a new “Scale Inside-out” approach which during attacks, reduces the “Resource Utilization Factor” to a minimal value for quick absorption of the attack. The proposed approach sacrifices victim service resources and provides those resources to mitigation service in addition to other co-located services to ensure resource availability during the attack. Experimental evaluation shows up to 95 percent reduction in total attack downtime of the victim service in addition to considerable improvement in attack detection time, service reporting time, and downtime of co-located services
Recommended from our members
DDoS victim service containment to minimize the internal collateral damages in cloud computing
Recent Distributed Denial of Service (DDoS) attacks on cloud services demonstrate new attack effects, including collateral and economic losses. In this work, we show that DDoS mitigation methods may not provide the expected timely mitigation due to the heavy resource outage created by the attacks. We observe an important Operating System (OS) level internal collateral damage, in which the other critical services are also affected. We formulate the DDoS mitigation problem as an OS level resource management problem. We argue that providing extra resources to the victim's server is only helpful if we can ensure the availability of other services. To achieve these goals, we propose a novel resource containment approach to enforce the victim's resource limits. Our real-time experimental evaluations show that the proposed approach results in reduction in the attack reporting time and victim service downtime by providing isolated and timely resources to ensure availability of other critical services
Long-term optical variability of PKS 2155-304
Aims: The optical variability of the blazar PKS 2155-304 is investigated to
characterise the red noise behaviour at largely different time scales from 20
days to O(>10 yrs). Methods: The long-term optical light curve of PKS 2155-304
is assembled from archival data as well as from so-far unpublished observations
mostly carried out with the ROTSE-III and the ASAS robotic telescopes. A
forward folding technique is used to determine the best-fit parameters for a
model of a power law with a break in the power spectral density function (PSD).
The best-fit parameters are estimated using a maximum-likelihood method with
simulated light curves in conjunction with the Lomb Scargle Periodogram (LSP)
and the first-order Structure Function (SF). In addition, a new approach based
upon the so-called Multiple Fragments Variance Function (MFVF) is introduced
and compared to the other methods. Simulated light curves have been used to
confirm the reliability of these methods as well as to estimate the
uncertainties of the best-fit parameters. Results: The light curve is
consistent with the assumed broken power-law PSD. All three methods agree
within the estimated uncertainties with the MFVF providing the most accurate
results. The red-noise behaviour of the PSD in frequency f follows a power law
with f^-{\beta}, {\beta}=1.8 +0.1/-0.2 and a break towards f^0 at frequencies
lower than f_min=(2.7 +2.2/-1.6 yrs)^-1.Comment: 10 pages, 8 figures, the ROTSE-light curve can be downloaded from
http://vizier.cfa.harvard.edu/viz-bin/VizieR?-source=J/A+A/531/A12
Multi-objective Dual-Sale Channel Supply Chain Network Design Based on NSGA-II
[[abstract]]In this study, we propose a two-echelon multi-objective dual-sale channel supply chain network (DCSCN) model. The goal is to determine (i) the set of installed DCs, (ii) the set of customers the DC should work with, how much inventory each DC should order and (iv) the distribution routes for physical retailers or online e-tailers (all starting and ending at the same DC). Our model overcomes the drawback by simultaneously tackling location and routing decisions. In addition to the typical costs associated with facility location and the inventory-related costs, we explicitly consider the pivotal routing costs between the DCs and their assigned customers. Therefore, a multiple objectives location-routing model involves two conflicting objectives is initially proposed so as to permit a comprehensive trade-off evaluation. To solve this multiple objectives programming problem, this study integrates genetic algorithms, clustering analysis, Non-dominated Sorting Genetic Algorithm II (NSGA-II). NSGA-II searches for the Pareto set. Several experiments are simulated to demonstrate the possibility and efficacy of the proposed approach.[[notice]]補正完畢[[incitationindex]]EI[[booktype]]紙
Pengaruh Penambahan Berbagai Jenis Starter Pada Proses Pengomposan Eceng Gondok
Research about ???The Effect of Addition of Various Types of Starter Against The Water Hyacinth Plant Eichornia crassipes (Mart.) Solms.??? This study aims to determine the effect of types starter in the composting process water hyacinth plants and to assess changes in pH, temperature, volume shrinkage, rate of decomposition, the color of compost and C:N ratio during the composting process water hyacinth plant. The first treatment that is P0 (water hyacinth plant a total of (3 kg) without the addition of starter) treatment both ie P1 (water hyacinth plant (3 kg) + 10% vermicompost) treatment third is P2 (water hyacinth plant (3 kg) + 10% cow manure) and the treatment of the four P3 (water hyacinth plant (3kg) + 5% vermicompost + 5% cow manure). Those parameters observed were pH, temperature, volume shrinkage, rate of decomposition, the color of compost and C/N ratio. The results showed starter administration significantly affected the rate of decomposition in treatment P1 (0,08 kg/10 days ), P2 (0.04 kg /10 days) and P3 (0.1 kg/10 days). The color change occurs in all treatments where early brownish color changed to brown -black at the end of the composting process. Treatment of P1 provides the most excellent effect for the parameters pH (6.73), temperature (33,3oC), volume shrinkage (7,3cm3), weight (0,5kg), and parameter C / N ratio (23%).\ud
\ud
Key words : Bio-activator, Vermicompost, Decomposition, Hyacint
Revising Neutrino Oscillation Parameter Space With Direct Flavor-Changing Interactions
We formulate direct, neutrino flavor-changing interactions in a framework
that fits smoothly with the parameterization of two-and three-state mixing of
massive neutrino states. We show that even small direct interaction strengths
could have important consequences for the interpretation of currently running
and proposed oscillation experiments. The oscillation amplitude and the borders
of the allowed regions in two-and three-flavor mixing parameter space can be
sensitieve to the presence of direct interactions when the transition
probability is small. We use extensively the high sensitivity of the NOMAD
experiment to illustrate potentially large effects from small, direct flavor
violation. In the purely leptonic sector, we find that the clean muon neutrino
and electron neutrino beams from a muon collider could provide the sharpest
tests of direct flavor violation.Comment: 16 pages, 10 figure
Prioritization of candidate genes in "QTL-hotspot" region for drought tolerance in chickpea (Cicer arietinum L.)
A combination of two approaches, namely QTL analysis and gene enrichment analysis were used to identify candidate genes in the "QTL-hotspot" region for drought tolerance present on the Ca4 pseudomolecule in chickpea. In the first approach, a high-density bin map was developed using 53,223 single nucleotide polymorphisms (SNPs) identified in the recombinant inbred line (RIL) population of ICC 4958 (drought tolerant) and ICC 1882 (drought sensitive) cross. QTL analysis using recombination bins as markers along with the phenotyping data for 17 drought tolerance related traits obtained over 1-5 seasons and 1-5 locations split the "QTL-hotspot" region into two subregions namely "QTL-hotspot_a" (15 genes) and "QTL-hotspot_b" (11 genes). In the second approach, gene enrichment analysis using significant marker trait associations based on SNPs from the Ca4 pseudomolecule with the above mentioned phenotyping data, and the candidate genes from the refined "QTL-hotspot" region showed enrichment for 23 genes. Twelve genes were found common in both approaches. Functional validation using quantitative real-time PCR (qRT-PCR) indicated four promising candidate genes having functional implications on the effect of "QTL-hotspot" for drought tolerance in chickpea.Sandip M Kale, Deepa Jaganathan, Pradeep Ruperao, Charles Chen, Ramu Punna, Himabindu Kudapa, Mahendar Thudi, Manish Roorkiwal, Mohan AVSK Katta, Dadakhalandar Doddamani, Vanika Garg, P B Kavi Kishor, Pooran M Gaur, Henry T Nguyen, Jacqueline Batley, David Edwards, Tim Sutton and Rajeev K Varshne
- …
