2,096 research outputs found

    Inductive Game Theory: A Basic Scenario

    Get PDF
    The aim of this paper is to present the new theory called “inductive game theory”. A paper, published by one of the present authors with A. Matsui, discussed some part of inductive game theory in a specific game. Here, we will give a more developed discourse of the theory. The paper is written to show one entire picture of the theory: From individual raw experiences, short-term memories to long-term memories, inductive derivation of individual views, classification of such views, decision making or modification of behavior based on a view, and repercussion from the modified play in the objective game. We focus on some clear-cut cases, forgetting a lot of possible variants, but will still give a lot of results. In order to show one possible discourse as a whole, we will ask the question of how Nash equilibrium is emerging from the viewpoint of inductive game theory, and will give one answer.

    Modeling international diffusion: Inferential benefits and methodological challenges, with an application to international tax competition

    Get PDF
    Although scholars recognize that time-series-cross-section data typically correlate across both time and space, they tend to model temporal dependence directly, often by lags of dependent variables, but to address spatial interdependence solely as a nuisance to be “corrected” by FGLS or to which to be “robust” in standard-error estimation (by PCSE). We explore the inferential benefits and methodological challenges of directly modeling international diffusion, one form of spatial dependence. To this end, we first identify two substantive classes of modern comparative-and-international-political-economy (C&IPE) theoretical models—(context-conditional) open-economy comparative political-economy (CPE) models and international political-economy (IPE) models, which imply diffusion (along with predecessors, closed-economy CPE and orthogonal open-economy CPE)—and then we evaluate the relative performance of three estimators—non-spatial OLS, spatial OLS, and spatial 2SLS—for analyzing empirical models corresponding to these two modern alternative theoretical visions from spatially interdependent data. Finally, we offer a substantive application of the spatial 2SLS approach in what we call a spatial error-correction model of international tax competition. -- Obwohl Wissenschaftler wissen, dass Zeitreihenquerschnittsdaten sowohl ĂŒber die Zeit als auch ĂŒber den Raum korreliert sind, neigen sie dazu, die zeitliche AbhĂ€ngigkeit direkt zu modellieren, z. B. durch ZeitabstĂ€nde der abhĂ€ngigen Variablen. Die rĂ€umliche AbhĂ€ngigkeit jedoch wird als ein Ärgernis angesehen, welches durch FGLS ‚korrigiert’ wird oder ‚robust’ gemacht wird in Standard- Abweichungs-SchĂ€tzungen (durch PCSE). Wir untersuchen methodologische Herausforderungen und die Nutzen fĂŒr Schlussfolgerungen aus einer direkten Modellierung internationaler Diffusion als einer Form der rĂ€umlichen AbhĂ€ngigkeit. Zu diesem Zweck identifizieren wir zuerst zwei inhaltliche Hauptklassen theoretischer Modelle der modernen ‚Vergleichenden und Internationalen Politischen Ökonomie“, nĂ€mlich Modelle der (kontextbezogenen) Vergleichenden Politischen Ökonomie Offener Volkwirtschaften und Modelle der Internationalen Politischen Ökonomie. Diese bilden Diffusion ab, ebenso wie die VorlĂ€ufermodelle der Vergleichenden Politischen Ökonomie geschlossener Volkswirtschaften und gegensĂ€tzlich offener Volkswirtschaften. Zweitens bewerten wir die relative Performanz von drei SchĂ€tzern – nicht-rĂ€umliche OLS, rĂ€umliche OLS und rĂ€umliche 2SLS. Schließlich wenden wir den Ansatz des rĂ€umlichen 2SLS in einem von uns so genannten ‚Spatial Error Correction’-Modell des internationalen Steuerwettbewerbs an.International Tax Competition,Panel Models,Policy Diffusion,Political Economy,Spatial Interdependence

    Relationship between Parents and Peer Influencences on Qualities of Adolescent Friendship

    Get PDF
    The study investigated the relationship between parents and peer influences on the qualities of adolescent friendship.  Relevant literature in the field of adolescent friendship qualities and parental interaction were investigated.  The problem of the study is the increasing incidences of emotional, imbalance among young people that manifest in maladaptive behaviours.  In investigating this problem, two research hypothesis were developed.  The design for the study was the survey research design. The population comprised of 867 senior secondary school students selected from five schools in Ethiope East Local Government Area of Delta State.  The simple random sampling technique was used select 100, 20 from each schol for the study. The instrument for the study was title Qualities of Adolescent Friendship as Correlates of Coping with Stress.  The instrument had a reliability of 0.84 using the piercing moment correlation coefficient.  Regression and t-test were used to analyse both research questions and research hypothesis. The findings indicated that  there was no statistical significance between parents interaction and parents/children interaction.  The conclusion therefore for the population studies was that there may be other factors that influence qualities of adolescent friendship

    Performance evaluation of HIP-based network security solutions

    Get PDF
    Abstract. Host Identity Protocol (HIP) is a networking technology that systematically separates the identifier and locator roles of IP addresses and introduces a Host Identity (HI) name space based on a public key security infrastructure. This modification offers a series of benefits such as mobility, multi-homing, end-to-end security, signaling, control/data plane separation, firewall security, e.t.c. Although HIP has not yet been sufficiently applied in mainstream communication networks, industry experts foresee its potential as an integral part of next generation networks. HIP can be used in various HIP-aware applications as well as in traditional IP-address-based applications and networking technologies, taking middle boxes into account. One of such applications is in Virtual Private LAN Service (VPLS), VPLS is a widely used method of providing Ethernet-based Virtual Private Network that supports the connection of geographically separated sites into a single bridged domain over an IP/MPLS network. The popularity of VPLS among commercial and defense organizations underscores the need for robust security features to protect both data and control information. After investigating the different approaches to HIP, a real world testbed is implemented. Two experiment scenarios were evaluated, one is performed on two open source Linux-based HIP implementations (HIPL and OpenHIP) and the other on two sets of enterprise equipment from two different companies (Tempered Networks and Byres Security). To account for a heterogeneous mix of network types, the Open source HIP implementations were evaluated on different network environments, namely Local Area Network (LAN), Wireless LAN (WLAN), and Wide Area Network (WAN). Each scenario is tested and evaluated for performance in terms of throughput, latency, and jitter. The measurement results confirmed the assumption that no single solution is optimal in all considered aspects and scenarios. For instance, in the open source implementations, the performance penalty of security on TCP throughput for WLAN scenario is less in HIPL than in OpenHIP, while for WAN scenario the reverse is the case. A similar outcome is observed for the UDP throughput. However, on latency, HIPL showed lower latency for all three network test scenarios. For the legacy equipment experiment, the penalty of security on TCP throughput is about 19% compared with the non-secure scenario while latency is increased by about 87%. This work therefore provides viable information for researchers and decision makers on the optimal solution to securing their VPNs based on the application scenarios and the potential performance penalties that come with each approach.HIP-pohjaisten tietoliikenneverkkojen turvallisuusratkaisujen suorituskyvyn arviointi. TiivistelmĂ€. Koneen identiteettiprotokolla (HIP, Host Identity Protocol) on tietoliikenneverkkoteknologia, joka kĂ€yttÀÀ erillistĂ€ kerrosta kuljetusprotokollan ja Internet-protokollan (IP) vĂ€lissĂ€ TCP/IP-protokollapinossa. HIP erottaa systemaattisesti IP-osoitteen verkko- ja laite-osat, sekĂ€ kĂ€yttÀÀ koneen identiteetti (HI) -osaa perustuen julkisen avainnuksen turvallisuusrakenteeseen. TĂ€mĂ€n hyötyjĂ€ ovat esimerkiksi mobiliteetti, moniliittyminen, pÀÀstĂ€ pÀÀhĂ€n (end-to-end) turvallisuus, kontrolli-informaation ja datan erottelu, kohtaaminen, osoitteenmuutos sekĂ€ palomuurin turvallisuus. Teollisuudessa HIP-protokolla nĂ€hdÀÀn osana seuraavan sukupolven tietoliikenneverkkoja, vaikka se ei vielĂ€ olekaan yleistynyt laajaan kaupalliseen kĂ€yttöön. HIP–protokollaa voidaan kĂ€yttÀÀ paitsi erilaisissa HIP-tietoisissa, myös perinteisissĂ€ IP-osoitteeseen perustuvissa sovelluksissa ja verkkoteknologioissa. ErĂ€s tĂ€llainen sovellus on virtuaalinen LAN-erillisverkko (VPLS), joka on laajasti kĂ€ytössĂ€ oleva menetelmĂ€ Ethernet-pohjaisen, erillisten yksikköjen ja yhden sillan vĂ€listĂ€ yhteyttĂ€ tukevan, virtuaalisen erillisverkon luomiseen IP/MPLS-verkon yli. VPLS:n yleisyys sekĂ€ kaupallisissa- ettĂ€ puolustusorganisaatioissa korostaa vastustuskykyisten turvallisuusominaisuuksien tarpeellisuutta tiedon ja kontrolliinformaation suojauksessa. TĂ€ssĂ€ työssĂ€ tutkitaan aluksi HIP-protokollan erilaisia lĂ€hestymistapoja. Teoreettisen tarkastelun jĂ€lkeen kĂ€ytĂ€nnön testejĂ€ suoritetaan itse rakennetulla testipenkillĂ€. Tarkasteltavat skenaariot ovat verrata Linux-pohjaisia avoimen lĂ€hdekoodin HIP-implementaatioita (HIPL ja OpenHIP) sekĂ€ verrata kahden eri valmistajan laitteita (Tempered Networks ja Byres Security). HIP-implementaatiot arvioidaan eri verkkoympĂ€ristöissĂ€, jota ovat LAN, WLAN sekĂ€ WAN. Kaikki testatut tapaukset arvioidaan tiedonsiirtonopeuden, sen vaihtelun (jitter) sekĂ€ latenssin perusteella. Mittaustulokset osoittavat, ettĂ€ sama ratkaisu ei ole optimaalinen kaikissa tarkastelluissa tapauksissa. Esimerkiksi WLAN-verkkoa kĂ€ytettĂ€essĂ€ turvallisuuden aiheuttama hĂ€viö tiedonsiirtonopeudessa on HIPL:n tapauksessa OpenHIP:iĂ€ pirnempi, kun taas WAN-verkon tapauksessa tilanne on toisinpĂ€in. Samanlaista kĂ€yttĂ€ytymistĂ€ havaitaan myös UDP-tiedonsiirtonopeudessa. HIPL antaa kuitenkin pienimmĂ€n latenssin kaikissa testiskenaarioissa. Eri valmistajien laitteita vertailtaessa huomataan, ettĂ€ TCP-tiedonsiirtonopeus huononee 19 ja latenssi 87 prosenttia verrattuna tapaukseen, jossa turvallisuusratkaisua ei kĂ€ytetĂ€. NĂ€in ollen tĂ€mĂ€n työn tuottama tĂ€rkeĂ€ tieto voi auttaa alan toimijoita optimaalisen verkkoturvallisuusratkaisun löytĂ€misessĂ€ VPN-pohjaisiin sovelluksiin

    Evidence for Natural Reproduction by Stocked Walleyes in the Saginaw River Tributary System, Michigan

    Full text link
    A program of stocking walleyes Stizostedion vitreum into Saginaw Bay, Lake Huron, begun in the late 1970s by the Michigan Department of Natural Resources and sportsmen’s groups, resulted in large spawning runs in tributary streams in the early 1980s as water quality in the bay improved. Natural reproduction was documented by a 2‐year sampling effort for larval walleyes that revealed the presence of substantial numbers of larvae over a 15–18‐d period, with maximum densities (350‐3,500/1,000 m3) recorded on 21 April 1987 and 6 May 1988 in the Saginaw River and on 6 May 1988 on the Tittabawassee River. More larval walleyes were collected at night and near bottom (3 m) than during the day and near the surface (1 m). The Tittabawassee River, one of four major rivers that form the Saginaw, was a major source of walleye larvae collected in the Saginaw River, but some walleye larvae were also collected in the Shiawassee River. Over 500,000 walleye larvae passed by the study area on the Saginaw River in 24 h on 21 April 1987. Using discharge and average walleye density data, 1 calculated that approximately 3 million walleye larvae passed by the study area during the 20‐d period of occurrence in 1987 and approximately 28 million during a comparable period in 1988. I was able to confirm entry of some walleye larvae into Saginaw Bay with four tows at the river mouth during peak densities at the upriver study site. Adult walleye stocks are now abundant enough to produce substantial numbers of offspring, but environmental factors (flow reversals, poor water quality) or biological factors (predation, starvation) may be preventing successful recruitment to the Saginaw Bay sport fishery.Peer Reviewedhttps://deepblue.lib.umich.edu/bitstream/2027.42/141459/1/nafm0386.pd

    The effect of network transitions on spontaneous activity and sycnhrony in devloping neural networks

    Get PDF
    Connectivity patterns of developing neural circuits and the effects of its dynamics on network behavior, particularly the emergence of spontaneous activity and synchrony, are not clear. We attempt to quantify anatomical connectivity patterns of rat cortical cultures during different stages of development. By culturing the networks on dishes embedded with micro electrode arrays, we simultaneously record electrical activity from multiple regions of the developing network and monitor its electrical behavior, particularly its tendency to fire spontaneously and to synchronize under certain conditions. We investigate possible correlations between changes in the network connectivity patterns and spontaneous electrical activity and synchrony. Cocultures showed a higher degree of synchrony than primary cultures. Networks with cancer cells, besides failing to synchronize, produced seizure-like events. We expect these results to elucidate the effect of connectivity on network behavior and hence to provide insight into the effects of various disease states on network properties. Such information could be used to diagnose such states

    Mechanisms Affecting Recruitment of Yellow Perch in Lake Michigan

    Get PDF
    Report issued on: August 2001INHS Technical Report prepared for Great Lakes Fishery Trus

    Home Background, Peer Group Pressure and Truancy among Secondary School Adolescent Students in Edo State, Nigeria

    Get PDF
    This study examined the influence of home background, peer group pressure and truancy among secondary school adolescent students of Delta State. Three research questions and three hypotheses were formulated to serve as a guide to the study. Correlational survey research design was used for the study. The population of the study consists of all students in all public secondary schools in the area of the study. A sample of 266 students were used for the study using the simple random sampling technique. A 4 point likert scale questionnaire designed by the researcher was used for data collection. The questionnaire was validated by professionals in the area of research. Cronbach Alpha reliability was used to establish the reliability of the instrument with an r-value of 0.78. The statistical tools for answering the research questions and for testing the hypotheses were the Pearson r, coefficient of determination and the Analysis of Variance (ANOVA). The findings revealed that there is a significant relationship between home background and truancy among secondary school students. Also, there is a significant relationship between peer pressure and truancy among secondary school students. The study also revealed that there is no significant relationship between gender and truancy among secondary school students. Based on the findings, it was recommended among others that parents should learn to be close to their wards and as well take note of the friends that they associate with as this will help to reduce the level of peer influence on the development of truant behaviours among students, Teachers and parents should help in proper monitoring of student activities so as to help students to maximise their potentials to the fullest and to be well adjusted in all ramification of lives. Finally every parents and elder siblings should see themselves as role models that engender good behaviours to their children as the kind and form of mentoring given by parents contributes in the sharpening of adolescent attitudes and behaviours
    • 

    corecore