655 resultados para recursive detrending


Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this article, a social theory framework is developed to explain the common themes of recursive and adaptive practice underpinning the existing strategic management literature. In practice, there is a coexistent tension between recursive and adaptive forms of strategic action that spans multiple levels from macro-institutional and competitive contexts to within-firm levels of analysis to individual cognition. This tension may be better understood by examining how management practices are used to put strategy into practice. Such practices span multiple levels of context and are adaptable to their circumstances of use, serving to highlight both general characteristics and localized idiosyncrasies of strategy as practice. The article develops the concept of management practices-in-use into a research agenda and nine broad research questions that may be used to investigate empirically strategy as practice.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Purpose – Threats of extreme events, such as terrorist attacks or infrastructure breakdown, are potentially highly disruptive events for all types of organizations. This paper seeks to take a political perspective to power in strategic decision making and how this influences planning for extreme events. Design/methodology/approach – A sample of 160 informants drawn from 135 organizations, which are part of the critical national infrastructure in the UK, forms the empirical basis of the paper. Most of these organizations had publicly placed business continuity and preparedness as a strategic priority. The paper adopts a qualitative approach, coding data from focus groups. Findings – In nearly all cases there is a pre-existing dominant coalition which keeps business continuity decisions off the strategic agenda. The only exceptions to this are a handful of organizations which provide continuous production, such as some utilities, where disruption to business as usual can be readily quantified. The data reveal structural and decisional elements of the exercise of power. Structurally, the dominant coalition centralizes control by ensuring that only a few functional interests participate in decision making. Research limitations/implications – Decisional elements of power emphasize the dominance of calculative rationality where decisions are primarily made on information and arguments which can be quantified. Finally, the paper notes the recursive aspect of power relations whereby agency and structure are mutually constitutive over time. Organizational structures of control are maintained, despite the involvement of managers charged with organizational preparedness and resilience, who remain outside the dominant coalition. Originality/value – The paper constitutes a first attempt to show how planning for emergencies fits within the strategy-making process and how politically controlled this process is.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We analyse the performance persistence of Islamic and Socially Responsible Investment (SRI) mutual funds. We adopt a multi-stage strategy in which, in the first stage, partial frontiers’ approaches are considered to measure the performance of the different funds in the sample. In the second stage, the results yielded by the partial frontiers are plugged into different investment strategies based on a recursive estimation methodology whose persistence performance is evaluated in the third stage of the analysis. Results indicate that, for both types of funds, performance persistence actually exists, but only for the worst and, most notably, best funds. This result is robust not only across methods (and different choices of tuning parameters within each method) but also across both SRI and Islamic funds—although in the case of the latter persistence was stronger for the best funds. The persistence of SRI and Islamic funds represents an important result for investors and the market, since it provides information on both which funds to invest in and which funds to avoid. Last but not least, the use of the aforementioned techniques in the context of mutual funds could also be of interest for the non-conclusive literature.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Using the integrable nonlinear Schrodinger equation (NLSE) as a channel model, we describe the application of nonlinear spectral management for effective mitigation of all nonlinear distortions induced by the fiber Kerr effect. Our approach is a modification and substantial development of the so-called eigenvalue communication idea first presented in A. Hasegawa, T. Nyu, J. Lightwave Technol. 11, 395 (1993). The key feature of the nonlinear Fourier transform (inverse scattering transform) method is that for the NLSE, any input signal can be decomposed into the so-called scattering data (nonlinear spectrum), which evolve in a trivial manner, similar to the evolution of Fourier components in linear equations. We consider here a practically important weakly nonlinear transmission regime and propose a general method of the effective encoding/modulation of the nonlinear spectrum: The machinery of our approach is based on the recursive Fourier-type integration of the input profile and, thus, can be considered for electronic or all-optical implementations. We also present a novel concept of nonlinear spectral pre-compensation, or in other terms, an effective nonlinear spectral pre-equalization. The proposed general technique is then illustrated through particular analytical results available for the transmission of a segment of the orthogonal frequency division multiplexing (OFDM) formatted pattern, and through WDM input based on Gaussian pulses. Finally, the robustness of the method against the amplifier spontaneous emission is demonstrated, and the general numerical complexity of the nonlinear spectrum usage is discussed. © 2013 Optical Society of America.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In 1965 Levenshtein introduced the deletion correcting codes and found an asymptotically optimal family of 1-deletion correcting codes. During the years there has been a little or no research on t-deletion correcting codes for larger values of t. In this paper, we consider the problem of finding the maximal cardinality L2(n;t) of a binary t-deletion correcting code of length n. We construct an infinite family of binary t-deletion correcting codes. By computer search, we construct t-deletion codes for t = 2;3;4;5 with lengths n ≤ 30. Some of these codes improve on earlier results by Hirschberg-Fereira and Swart-Fereira. Finally, we prove a recursive upper bound on L2(n;t) which is asymptotically worse than the best known bounds, but gives better estimates for small values of n.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

If a regenerative process is represented as semi-regenerative, we derive formulae enabling us to calculate basic characteristics associated with the first occurrence time starting from corresponding characteristics for the semi-regenerative process. Recursive equations, integral equations, and Monte-Carlo algorithms are proposed for practical solving of the problem.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Linguistic theory, cognitive, information, and mathematical modeling are all useful while we attempt to achieve a better understanding of the Language Faculty (LF). This cross-disciplinary approach will eventually lead to the identification of the key principles applicable in the systems of Natural Language Processing. The present work concentrates on the syntax-semantics interface. We start from recursive definitions and application of optimization principles, and gradually develop a formal model of syntactic operations. The result – a Fibonacci- like syntactic tree – is in fact an argument-based variant of the natural language syntax. This representation (argument-centered model, ACM) is derived by a recursive calculus that generates a mode which connects arguments and expresses relations between them. The reiterative operation assigns primary role to entities as the key components of syntactic structure. We provide experimental evidence in support of the argument-based model. We also show that mental computation of syntax is influenced by the inter-conceptual relations between the images of entities in a semantic space.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 35J05, 35C15, 44P05

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Pavel Azalov - Recursion is a powerful technique for producing simple algorithms. It is a main topics in almost every introductory programming course. However, educators often refer to difficulties in learning recursion, and suggest methods for teaching recursion. This paper offers a possible solutions to the problem by (1) expressing the recursive definitions through base operations, which have been predefined as a set of base functions and (2) practising recursion by solving sequences of problems. The base operations are specific for each sequence of problems, resulting in a smooth transitions from recursive definitions to recursive functions. Base functions hide the particularities of the concrete programming language and allows the students to focus solely on the formulation of recursive definitions.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

2000 Mathematics Subject Classification: 05E05, 14N10, 57R45.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides the most fully comprehensive evidence to date on whether or not monetary aggregates are valuable for forecasting US inflation in the early to mid 2000s. We explore a wide range of different definitions of money, including different methods of aggregation and different collections of included monetary assets. In our forecasting experiment we use two nonlinear techniques, namely, recurrent neural networks and kernel recursive least squares regressiontechniques that are new to macroeconomics. Recurrent neural networks operate with potentially unbounded input memory, while the kernel regression technique is a finite memory predictor. The two methodologies compete to find the best fitting US inflation forecasting models and are then compared to forecasts from a nave random walk model. The best models were nonlinear autoregressive models based on kernel methods. Our findings do not provide much support for the usefulness of monetary aggregates in forecasting inflation. Beyond its economic findings, our study is in the tradition of physicists' long-standing interest in the interconnections among statistical mechanics, neural networks, and related nonparametric statistical methods, and suggests potential avenues of extension for such studies. © 2010 Elsevier B.V. All rights reserved.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

We characterize the preference domains on which the Borda count satisfies Maskin monotonicity. The basic concept is the notion of a "cyclic permutation domain" which arises by fixing one particular ordering of alternatives and including all its cyclic permutations. The cyclic permutation domains are exactly the maximal domains on which the Borda count is strategy-proof when combined with every possible tie breaking rule. It turns out that the Borda count is monotonic on a larger class of domains. We show that the maximal domains on which the Borda count satisfies Maskin monotonicity are the "cyclically nested permutation domains" which are obtained from the cyclic permutation domains in an appropriately specified recursive way. ------ *We thank József Mala for posing the question of Nash implementability on restricted domains that led to this research. We are very grateful to two anonymous referees and an associate editor for their helpful comments and suggestions. The second author gratefully acknowledges financial support from the Hungarian Academy of Sciences (MTA) through the Bolyai János research fellowship.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Even though many studies have confirmed the Feldstein-Horioka (1980) finding that savings and investment rates are highly correlated, there is no consensus on the major reason for this correlation. The purpose of this dissertation is to develop theoretical models and calibrate and simulate these to compare their implications to explain the observed time-series comovement between savings and investment in an attempt to show that this high correlation may stem from technological shocks.^ The dissertation is comprised of three studies. The first two studies construct overlapping-generations, two-economy models of saving and investment under conditions of perfect international capital mobility. The second study differs from the first by endogenizing the labor supply. Employing simulations, the models are used to generate time-series for savings and investment. These are then compared with the actual data for specific economies. The models show that productivity shocks produce a high correlation between savings and investment. Further, while the model with exogenous labor supply displays monotonic adjustment, the economy with endogenous labor supply adjusts cyclically.^ The third model, on the other hand, constructs a general equilibrium model for a small open economy. The study is based on two important elements: adjustment costs in investment and endogenous, recursive time preferences. Again, the simulation results show that the model generates, at least in a significant part of the adjustment path, a positive correlation between domestic savings and investment in response to a supply shock. ^

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The Internet has become an integral part of our nation’s critical socio-economic infrastructure. With its heightened use and growing complexity however, organizations are at greater risk of cyber crimes. To aid in the investigation of crimes committed on or via the Internet, a network forensics analysis tool pulls together needed digital evidence. It provides a platform for performing deep network analysis by capturing, recording and analyzing network events to find out the source of a security attack or other information security incidents. Existing network forensics work has been mostly focused on the Internet and fixed networks. But the exponential growth and use of wireless technologies, coupled with their unprecedented characteristics, necessitates the development of new network forensic analysis tools. This dissertation fostered the emergence of a new research field in cellular and ad-hoc network forensics. It was one of the first works to identify this problem and offer fundamental techniques and tools that laid the groundwork for future research. In particular, it introduced novel methods to record network incidents and report logged incidents. For recording incidents, location is considered essential to documenting network incidents. However, in network topology spaces, location cannot be measured due to absence of a ‘distance metric’. Therefore, a novel solution was proposed to label locations of nodes within network topology spaces, and then to authenticate the identity of nodes in ad hoc environments. For reporting logged incidents, a novel technique based on Distributed Hash Tables (DHT) was adopted. Although the direct use of DHTs for reporting logged incidents would result in an uncontrollably recursive traffic, a new mechanism was introduced that overcome this recursive process. These logging and reporting techniques aided forensics over cellular and ad-hoc networks, which in turn increased their ability to track and trace attacks to their source. These techniques were a starting point for further research and development that would result in equipping future ad hoc networks with forensic components to complement existing security mechanisms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

The purpose of this study was to critically evaluate Tom Stoppard’s application of chaos theory and quantum science in ROSENCRANTZ AND GUILDENSTERN ARE DEAD, HAPGOOD and ARCADIA; and determine the extent to which Stoppard argues for the importance of human action and choice. ^ Through critical analysis this study examined how Stoppard applies the quantum aspects of: (1) indeterminacy to human epistemology in ROSENCRANTZ AND GUILDENSTERN ARE DEAD; (2) complementarity to human identity in HAPGOOD; and (3) recursive symmetry to human history in ARCADIA. It also examined how Stoppard excavates the complexities of human action, choice and identity through the lens of chaos theory and quantum science. ^ These findings demonstrated that Tom Stoppard is not merely juxtaposing quantum science and human interactions for the sake of drama; rather, by excavating the complexities of human action, choice and identity through the lens of chaos theory and quantum science, Stoppard demonstrates the fundamental connection between individuals and the post-Newtonian universe.^