1,225 research outputs found

    Quantum Discord for Generalized Bloch Sphere States

    Full text link
    In this study for particular states of bipartite quantum system in 2n?2m dimensional Hilbert space state, similar to m or n-qubit density matrices represented in Bloch sphere we call them generalized Bloch sphere states(GBSS), we give an efficient optimization procedure so that analytic evaluation of quantum discord can be performed. Using this optimization procedure, we find an exact analytical formula for the optimum positive operator valued measure (POVM) that maximize the measure of the classical correlation for these states. The presented optimization procedure also is used to show that for any concave entropy function the same POVMs are sufficient for quantum discord of mentioned states. Furthermore, We show that such optimization procedure can be used to calculate the geometric measure of quantum discord (GMQD) and then an explicit formula for GMQD is given. Finally, a complete geometric view is presented for quantum discord of GBSS. Keywords: Quantum Discord, Generalized Bloch Sphere States, Dirac matrices, Bipartite Quantum System. PACs Index: 03.67.-a, 03.65.Ta, 03.65.UdComment: 26 pages. arXiv admin note: text overlap with arXiv:1107.5174 by other author

    Information technology and performance management for build-to-order supply chains

    Get PDF
    En las siguientes líneas se plantea un artículo de reflexión que tiene en cuenta parte del marco teórico que sustenta la investigación titulada “Prácticas pedagógicas que promueven la competencia argumentativa escrita (CAE) en niños campesinos de los grados 4° y 5° del Centro Educativo Municipal La Caldera, Sede Principal de Pasto”, desarrollada en el año 2012. En él se contemplan los aportes de las ciencias del lenguaje y la comunicación, la teoría de la argumentación, la didáctica de la lengua escrita y los géneros discursivos, que dan cuenta de la necesidad de desarrollar la capacidad crítica en los estudiantes a través de la argumentación, lo cual implica transformar las prácticas pedagógicas para que se alejen de la transmisión de conocimientos y den paso a la comunicación, para que la palabra escrita sea apropiada de manera significativa

    PERTANGGUNGJAWABAN NOTARIS ATAS KETIDAKHADIRANNYA DALAM PENANDATANGANAN AKTA PERJANJIAN KREDIT

    Get PDF
     Penelitian yang digunakan adalah penelitian hukum normatif yaitu dilakukan terhadap peraturan perundang-undangan yang berlaku dalam hal ini adalah Undang-Undang No. 7 Tahun 1992 Jo Undang-Undang No. 10 tahun 1998 tentang Perbankan dan Undang-Undang No. 30 Tahun 2004 Jo Undang-Undang No. 2 Tahun 2014 Tentang Jabatan Notaris. Sifat penelitian ini adalah preskriptif analitis dimana penelitian ini berupaya untuk membandingkan beberapa pendapat/argumentasi hukum dari para ahli berdasarkan ketentuan peraturan perundang-undangan yang berlaku di bidang perbankan dan jabatan NotarisPerjanjian kredit dapat dilakukan dengan menggunakan akta di bawah tangan maupun dengan menggunakan akta otentik Notaris.Salah satu syarat yang harus dipenuhi oleh Notaris dalam pembuatan akta perjanjian kredit secara otentik sesuai ketentuan UUJN adalah Notaris wajib menyaksikan secara langsung penandatanganan akta perjanjian kredit tersebut oleh para pihak.Permasalahan yang dibahas dalam penelitian ini adalah bagaimana kewenangan dan kewajiban Notaris sebagai pejabat umum dalam pelaksanaan pembuatan akta perjanjian kredit, bagaimana akibat hukum terhadap akta perjanjian kredit yang tidak dihadiri oleh Notaris dalam penandatanganan akta.Hasil pembahasan dari permasalahan yang timbul dalam penelitian ini adalah kewenangan dan kewajiban Notaris sebagai pejabat umum dalam pelaksanaan pembuatan akta perjanjian kredit didasarkan ketentuan Pasal 1868 KUH Perdata.Akibat hukum dari penandatanganan akta otentik perjanjian kredit yang dibuat oleh Notaris yang tidak dihadiri/disaksikan oleh Notaris adalah akta otentik tersebut menjadi terdegradasi sebagai akta di bawah tangan yang tidak lagi memiliki kekuatan pembuktian yang sempurna bagi para pihak apabila terjadi sengketa di pengadilan di kemudian hari.Kata Kunci : Pertanggungjawaban Notaris, Ketidakhadiran Penandatanganan Akta, Perjanjian Kredit

    Evaluasi Kinerja Pemasok dengan Metode Analytichierarchy Process

    Full text link
    . This study aims to determine the performance assessment criteria forsuppliers with better criteria based on previous research and the study ofliterature, also measure the performance of suppliers using the criteria. Theresearch data is the data performance per supplier during the period January toAugust 2013. The sampling method used is a saturated sampling where the entirepopulation is taken as a sample with a population of 9 people and 3 people for asample of experts. The analytical method used in this study is the AnalyticalHierarchy Process (AHP). The results showed that the criteria can be used in thecompany and of the simulation shown significant results from suppliers that serveas sample simulations. The criteria are include quality and durability testing,delivery, price, responsiveness, financial stability and business, informationdevelopment process, technical ability and a good & stable background. Afterdone supplier performance assessment using criteria that already selectedresulting effective measurement, example using 3 company supplier which isgenerating a decision for best supplier selection that can cooperate with companypositively. Assessment can be done for improving supplier performance withpurpose improving performance based on worse criteria that supplier has

    Sustainable food security futures: Perspectives on food waste and information across the food supply chain

    Get PDF
    YesThe purpose of this paper is to signpost the genesis of food security and associated factors such that organisations, enterprises, policy makers and interested stakeholders can seek to explore and understand this important societal issue. The challenges that food security poses are eclectic in nature and cut through country, society, organisation and individual boundaries. Only through identifying these factors – hence identifying underlying factors of food waste and usage of information within food supply chains to untangle them – can we adopt enterprise interventions in order to initiate and mitigate food security risk. As a viewpoint piece, there is no empirical work to report in this paper. An exploratory review of the literature has allowed for the extraction of food security concerns that need the attention of stakeholders across the enterprise to ensure robust food supply chains can be are created, maintained and sustained through a better understanding and usage of information, knowledge and data This paper articulates six constructs that underpin the challenges of establishing food security. It is suggested that information relating to factors may support decision-makers within communities, organisations and enterprises to better understand these factors that then contribute towards enhanced food security. Relevant strategies or policies can then emerge and be developed such that strategic as well as operational interventions can be prioritised across national, regional or industry level. Underpinning the above, the waste within and across the food supply chain contributes to the six factors, also highlighting where additional focus may need to be applied to sustain food supply chains. This paper is a position paper that does not offer factual insight but rather highlights a direction of thought that others can consider exploring as part of wider research agendas in the topical area where enterprise, organisational, and information-based contributions may support the development of strategy-led food security policy. This paper provides reassuring insights that will help decision and policy makers assemble their thoughts when it comes to prioritising their communications and interventions amongst organisational/enterprise-level stakeholder groups involved in food security and food supply chain contexts. This paper has highlighted the need for more research around the human and organisational factors that are identified as both underpinning the need for food security and, as drivers of waste throughout the food supply chain. Indeed, there is further work needed to highlight the inter-relationships that exist and, which then feed into resulting interventions. To raise the importance of food security amongst differing stakeholder community groups at the organisational and enterprise level

    Simulation of Models and BER Performances of DWT-OFDM versus FFT-OFDM

    Get PDF
    Simulation approaches using MATLAB for wavelet based OFDM, particularly in DWT-OFDM as alternative substitutions for Fourier based OFDM are demonstrated. Conventional OFDM systems use IFFT and FFT algorithms at the transmitter and receiver respectively to multiplex the signals and transmit them simultaneously over a number of subcarriers. The system employs guard intervals or cyclic prefixes (CP) so that the delay spread of the channel becomes longer than the channel impulse response. The system must make sure that the cyclic prefix is a small fraction of the per carrier symbol duration. The purpose of employing the CP is to minimize inter-symbol interference (ISI). However a CP reduces the power efficiency and data throughput. The CP also has the disadvantage of reducing the spectral containment of the channels. Due to these issues, an alternative method is to use the wavelet transform to replace the IFFT and FFT blocks. The wavelet transform is referred as Discrete Wavelet Transform OFDM (DWT-OFDM). By using the transform, the spectral containment of the channels is better since they are not using CP. The wavelet based OFDM (DWT-OFDM) is assumed to have ortho-normal bases properties and satisfy the perfect reconstruction property. We use different wavelet families and compare with conventional FFT-OFDM system. BER performances of both OFDM systems are also obtained. It is found that the DWT-OFDM platform is superior as compared to others as it has less error rate, especially using bior5.5 or rbior3.3 wavelet family

    User Adoption of a CRM-based Information System Within a Financial Services Organization: An Empirical Analysis

    Get PDF
    Financial Services firms require processes and systems which can support and maintain customer-related information for the purposes of core business-focussed activity. Specifically within the investment banking sector, the importance and criticality of such customer information underpins the firm’s ability to transact sales, trading and other advisory-based services in an efficient and relevant manner. The design and development of Customer Relationship Management (CRM) systems to address the given external vs. internal customer information touchpoints, therefore provides a vital link between financial services professionals, client data and business processes. In doing so, the input of CRM user requirements is a key step in deriving benefit from such a technology solution. This paper henceforth identifies and details user requirements and experiences of such an information system within a case study company and highlights pertinent issues for the adoption of such systems within the given sector

    Oriented crossover in genetic algorithms for computer networks optimization

    Get PDF
    Optimization using genetic algorithms (GA) is a well-known strategy in several scientific disciplines. The crossover is an essential operator of the genetic algorithm. It has been an active area of research to develop sustainable forms for this operand. In this work, a new crossover operand is proposed. This operand depends on giving an elicited description for the chromosome with a new structure for alleles of the parents. It is suggested that each allele has two attitudes, one attitude differs contrastingly with the other, and both of them complement the allele. Thus, in case where one attitude is good, the other should be bad. This is suitable for many systems which contain admired parameters and unadmired parameters. The proposed crossover would improve the desired attitudes and dampen the undesired attitudes. The proposed crossover can be achieved in two stages: The first stage is a mating method for both attitudes in one parent to improving one attitude at the expense of the other. The second stage comes after the first improvement stage for mating between different parents. Hence, two concurrent steps for improvement would be applied. Simulation experiments for the system show improvement in the fitness function. The proposed crossover could be helpful in different fields, especially to optimize routing algorithms and network protocols, an application that has been tested as a case study in this work

    Hybrid mamdani fuzzy rules and convolutional neural networks for analysis and identification of animal images

    Get PDF
    Accurate, fast, and automatic detection and classification of animal images is challenging, but it is much needed for many real-life applications. This paper presents a hybrid model of Mamdani Type-2 fuzzy rules and convolutional neural networks (CNNs) applied to identify and distinguish various animals using different datasets consisting of about 27,307 images. The proposed system utilizes fuzzy rules to detect the image and then apply the CNN model for the object’s predicate category. The CNN model was trained and tested based on more than 21,846 pictures of animals. The experiments’ results of the proposed method offered high speed and efficiency, which could be a prominent aspect in designing image-processing systems based on Type 2 fuzzy rules characterization for identifying fixed and moving images. The proposed fuzzy method obtained an accuracy rate for identifying and recognizing moving objects of 98% and a mean square error of 0.1183464 less than other studies. It also achieved a very high rate of correctly predicting malicious objects equal to recall = 0.98121 and a precision rate of 1. The test’s accuracy was evaluated using the F1 Score, which obtained a high percentage of 0.99052
    corecore