17,283 research outputs found

    Growth process and diameter structure of Pinus tabulaeformis forest for soil and water conservation in the hilly loess region of China

    Get PDF
    Using stem analysis method, the biomass, growing process and diameter structure of 21-year shady and sunny slope Pinus tabulaeformis forest were investigated in hilly loess-gully region. Results showed that there were distinct difference in the indexes, tree height, diameter at breast height (DBH) and timber volume between shady and sunny slope forest. The biomass, growth status and its diameter structure of shady slope forest were greater than those in sunny slope forest. The fast-growing period of tree was from 9 to 13 years. After 13 years, the annual increment of shady slope forest was greater than that of the sunny slope forest (the annual increment of shady slope forest reached 0.26 m•a-1, whileit was about 0.1 m•a-1 in sunny slope forest in the 21st year).The DBH growth increment of 2 forests were reduced greatly after 13 years, but the declining degree of shady slope forest was less than the sunny slope forest. The current annual increment of shady slope forest was greater than the sunny slope forest after 17 years. There was little difference in the increment of 2 timber production before 13 years. But the increment of shady forest was greater than the sunny forest after 13 years (in the 21styear, the annual increment was 0.0023 m3 in shady slope, but in sunny slope it was only 0.0015 m3). The summit of DBH distribution curve was both partial to left, while the skewness (SK was 0.75) of shadyforest was lower than that of the sunny forest (SK was 1.03) and kurtosis (K was 1.05) of shady forest was higher than that of sunny forest (K was 0.94). The results indicated the density structure of sunny slope forest was greater than shady slope forest

    An investigation into multivariate variance ratio statistics and their application to stock market predictability

    Get PDF
    © The Author, 2017. Published by Oxford University Press. All rights reserved. We propose several multivariate variance ratio statistics for "testing" the weak form Efficient Market Hypothesis and for measuring the direction and magnitude of departures from this hypothesis. We derive the asymptotic distribution of the statistics and scalar functions thereof under the null hypothesis that returns are unpredictable after a constant mean adjustment. We propose asymptotic standard errors that are robust to departures from the "no leverage" assumption of Lo and MacKinlay (1988), but are relatively simple and in particular do not require the selection of a bandwidth parameter. We show the limiting behavior of the statistic under a multivariate fads model and under a moderately explosive bubble process: these alternative hypotheses give opposite predictions with regards to the long-run value of the statistics. We apply the methodology to weekly returns for Center for Research in Security Prices size-sorted portfolios from 1962 to 2013 in three subperiods. We find evidence of a reduction of linear predictability in the most recent period, for small and medium cap stocks, but we still reject the multivariate null hypothesis in the most recent period. The main findings are not substantially affected by allowing for a common factor time varying risk premium

    Reliable control using redundant controllers

    Get PDF
    This paper presents a methodology for the design of reliable control systems by using multiple identical controllers to a given plant. The resulting closed-loop control system is reliable in the sense that it provides guaranteed internal stability and H ∞ performance (in terms of disturbance attenuation), not only when all controllers are operational but also when some controller outages (sensor and/or actuator) occur. A numerical example is given to illustrate the proposed design procedures.published_or_final_versio

    Federated Learning with Server Learning: Enhancing Performance for Non-IID Data

    Full text link
    Federated Learning (FL) has emerged as a means of distributed learning using local data stored at clients with a coordinating server. Recent studies showed that FL can suffer from poor performance and slower convergence when training data at clients are not independent and identically distributed. Here we consider a new complementary approach to mitigating this performance degradation by allowing the server to perform auxiliary learning from a small dataset. Our analysis and experiments show that this new approach can achieve significant improvements in both model accuracy and convergence time even when the server dataset is small and its distribution differs from that of the aggregated data from all clients.Comment: 22 pages, 11 figures, 3 table

    OmwanaThrive: A Neonatal Survival App

    Get PDF
    Uganda’s infant mortality rate is alarmingly high, ranking twenty-first in the world for highest infant mortality; eighty-one babies die within their first month of life each day in Uganda. The UN reports the greatest risk factors are rural location, prematurity, and young impoverished mothers with limited educational opportunities. Thus, young women are giving birth to children before they even learn about how to take care of their newborn infant. Our solution to this problem is in the form of a mobile application called OmwanaThrive: Neonatal Survival App. The purpose of the app is to educate women about how to properly care for their children and improve health outcomes in neonates. This mobile app will include educational lessons with culturally relevant graphics and limited text, maps to affordable clinics, and an Admin Portal to recommend messages new mothers. Our platform focuses on rural mothers with low literacy rates, broadening their community of care, social capital, and access to healthcare. Our ultimate goal is to make health education accessible to Uganda women and decrease neonatal mortality

    Option-Implied Volatilities and Stock Returns: <i>Evidence from Industry-Neutral Portfolios</i>

    Get PDF
    Recent studies demonstrate the profitability of stock portfolios constructed according to implied volatility measures inferred from option prices. This article examines industry effects on such portfolios’ performance. Results show that quintile portfolios constructed using volatility skew and volatility spread are subject to substantial industry effects, which are particularly strong during market turbulence. The authors form industry-neutral portfolios and compare their performances to those of full-universe portfolios that do not consider industry exposure. Results show significant improvement when portfolio strategies are implemented in an industry-neutral manner, based on either volatility skew or volatility spread

    Strengthen user authentication on mobile devices by using user’s touch dynamics pattern

    Get PDF
    Mobile devices, particularly the touch screen mobile devices, are increasingly used to store and access private and sensitive data or services, and this has led to an increased demand for more secure and usable security services, one of which is user authentication. Currently, mobile device authentication services mainly use a knowledge-based method, e.g. a PIN-based authentication method, and, in some cases, a fingerprint-based authentication method is also supported. The knowledge-based method is vulnerable to impersonation attacks, while the fingerprint-based method can be unreliable sometimes. To overcome these limitations and to make the authentication service more secure and reliable for touch screen mobile device users, we have investigated the use of touch dynamics biometrics as a mobile device authentication solution by designing, implementing and evaluating a touch dynamics authentication method. This paper describes the design, implementation, and evaluation of this method, the acquisition of raw touch dynamics data, the use of the raw data to obtain touch dynamics features, and the training of the features to build an authentication model for user identity verification. The evaluation results show that by integrating the touch dynamics authentication method into the PIN-based authentication method, the protection levels against impersonation attacks is greatly enhanced. For example, if a PIN is compromised, the success rate of an impersonation attempt is drastically reduced from 100% (if only a 4-digit PIN is used) to 9.9% (if both the PIN and the touch dynamics are used). © 2019, The Author(s)
    • …
    corecore