scholarly journals Estimating deflation representing people spreading in stream data and estimating a specific position

Author(s):  
Takuma Toyoshima ◽  
Masaki Endo ◽  
Takuo Kikuchi ◽  
Shigeyoshi Ohno ◽  
Hiroshi Ishikawa
Author(s):  
Shigeyoshi Ohno ◽  
Takuo Kikuchi ◽  
Masaki Endo ◽  
Takuma Toyoshima ◽  
Hiroshi Ishikawa

Author(s):  
Svetlana Avdasheva ◽  
Tatiana Radchenko

Within the group of BRICS, China, Russia, and South Africa use conduct remedies more often than developed jurisdictions. Remedies are applied under merger approval or as an outcome of investigation of anticompetitive conducts. Effects of conduct remedies on companies’ decisions and market performance still need explanation. This chapter explains the use of conduct remedies, with special emphasis on Russia, by the specific position of BRICS in international division of labor, which allows the large companies, and first of all domestic ones, to discriminate customers in BRICS home markets, vis-à-vis international customers. Together with positive effects on domestic customers, competition economics predicts the possibility of negative effects of remedies on the managerial decisions within the target company. Under some circumstances, remedies may even weaken competition in the global product markets.


2018 ◽  
Vol 62 (1) ◽  
pp. 111-121
Author(s):  
Raúl Hileno ◽  
Antonio García-de-Alcaraz ◽  
Bernat Buscà ◽  
Cristòfol Salas ◽  
Oleguer Camerino

Abstract In volleyball, attack coverage is one of the play actions most neglected in coaching and research. The purpose of this study was to find out which attack coverage systems are used by high-level men’s teams in different game situations and the characteristics of the most effective systems. We analysed 15 matches from the 2010 Men’s Pan-American Volleyball Cup, with a total of 1,415 coverage actions. Chi-square tests for independence, adjusted residuals analysis and calculations of standardised mean difference were performed. The results show that high-level men’s volleyball uses many coverage systems other than the traditional 3-2-0 and 2-3-0. At this level of play, the most frequent systems were 1-3-1 and 1-2-2, which occurred significantly often at the culmination of a third-tempo attack at the wing. The most effective systems consisted of three coverage lines, with fewer than five players covering the spiker and at least one player in the first coverage line, in both the attack and counterattack phases. Given the large number of coverage systems identified in different game situations, we recommend flexible, loosely structured training in these systems, based on a set of guiding principles that all players on a team must internalise for the specific position they are playing. Regarding the systems’ efficacy, the main watchword is that on each coverage line there should always be at least one player, but the first line should not be exposed.


2021 ◽  
Vol 11 (12) ◽  
pp. 5523
Author(s):  
Qian Ye ◽  
Minyan Lu

The main purpose of our provenance research for DSP (distributed stream processing) systems is to analyze abnormal results. Provenance for these systems is not nontrivial because of the ephemerality of stream data and instant data processing mode in modern DSP systems. Challenges include but are not limited to an optimization solution for avoiding excessive runtime overhead, reducing provenance-related data storage, and providing it in an easy-to-use fashion. Without any prior knowledge about which kinds of data may finally lead to the abnormal, we have to track all transformations in detail, which potentially causes hard system burden. This paper proposes s2p (Stream Process Provenance), which mainly consists of online provenance and offline provenance, to provide fine- and coarse-grained provenance in different precision. We base our design of s2p on the fact that, for a mature online DSP system, the abnormal results are rare, and the results that require a detailed analysis are even rarer. We also consider state transition in our provenance explanation. We implement s2p on Apache Flink named as s2p-flink and conduct three experiments to evaluate its scalability, efficiency, and overhead from end-to-end cost, throughput, and space overhead. Our evaluation shows that s2p-flink incurs a 13% to 32% cost overhead, 11% to 24% decline in throughput, and few additional space costs in the online provenance phase. Experiments also demonstrates the s2p-flink can scale well. A case study is presented to demonstrate the feasibility of the whole s2p solution.


2021 ◽  
Vol 213 ◽  
pp. 106653
Author(s):  
Heonho Kim ◽  
Unil Yun ◽  
Yoonji Baek ◽  
Hyunsoo Kim ◽  
Hyoju Nam ◽  
...  
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document