generalized system
Recently Published Documents


TOTAL DOCUMENTS

246
(FIVE YEARS 62)

H-INDEX

14
(FIVE YEARS 1)

2021 ◽  
Author(s):  
Sèna Kimm GNANGNON

Abstract This article has investigated the effect of structural economic vulnerability on the utilization of non-reciprocal trade preferences (NRTPs) offered by the 'Quadrilaterals' and whether development aid flows alter this effect. It considers two major blocks of NRTPs, namely the Generalized System of Preferences (GSP) programs and 'other trade preferences programs'. The analysis uses a panel dataset of 84 beneficiary countries of both NRTPs and development aid, over the period of 2002-2019. Results reveal that a rise in the level of structural economic vulnerability reduces the utilization rates of both GSP programs and other trade preference programs. At the same time, when the level of structural economic vulnerability falls, countries tend to use both blocks of NRTPs in a complementarity way. While development aid inflows foster the utilization of the two blocks of NRTPs, the increase of these resource inflows in the context of greater structural economic vulnerability leads beneficiary countries to strengthen the utilization of other trade preferences programs at the expense of the utilization of GSP programs. The implications of these results are discussed in the conclusion section of the article.


2021 ◽  
Author(s):  
Szilárd Gy. Révész

In this paper we work out a Riemann–von Mangoldt type formula for the summatory function := , where is an arithmetical semigroup (a Beurling generalized system of integers) and is the corresponding von Mangoldt function attaining with a prime element and zero otherwise. On the way towards this formula, we prove explicit estimates on the Beurling zeta function , belonging to , to the number of zeroes of in various regions, in particular within the critical strip where the analytic continuation exists, and to the magnitude of the logarithmic derivative of , under the sole additional assumption that Knopfmacher’s Axiom A is satisfied. We also construct a technically useful broken line contour to which the technic of integral transformation can be well applied. The whole work serves as a first step towards a further study of the distribution of zeros of the Beurling zeta function, providing appropriate zero density and zero clustering estimates, to be presented in the continuation of this paper.


Symmetry ◽  
2021 ◽  
Vol 13 (10) ◽  
pp. 1801
Author(s):  
Lu-Chuan Ceng ◽  
Yi-Xuan Fu ◽  
Jie Yin ◽  
Liang He ◽  
Long He ◽  
...  

In real reflexive Banach spaces, let the GSTDHVI, SHVI, DVIP, VIT, and KKM represent a generalized system of time-dependent hemivariational inequalities, a system of hemivariational inequalities, a derived vector inclusion problem, Volterra integral term, and Knaster–Kuratowski–Mazurkiewicz, respectively, where the GSTDHVI consists of two parts which are of symmetric structure mutually. By virtue of the surjectivity theorem for pseudo-monotonicity mappings and the Banach contraction mapping principle, instead of the KKM theorems exploited by other authors in recent literature for a SHVI, we consider and study a GSTDHVI with VITs. Under quite mild assumptions, it is shown that there exists only a solution to the investigated problem via demonstrating that a DVIP with VIT is solvable.


Author(s):  
Guili Tao ◽  
Wenqiang Liu ◽  
Xuemei Wang ◽  
Jianfei Zhang ◽  
Haiying Yu
Keyword(s):  

Author(s):  
Sungju Moon ◽  
Jong-Jin Baik

AbstractThe feasibility of using a (3N)-dimensional generalization of the Lorenz system in testing a traditional implementation of the ensemble Kalman filter is explored through numerical experiments. The generalization extends the Lorenz system, known as the Lorenz ’63 model, into a (3N)-dimensional nonlinear system for any positive integer N. Because the extension involves inclusion of additional wavenumber modes, raising the dimension allows the system to resolve smaller-scale motions, a unique characteristic of the present generalization that can be relevant to real modeling scenarios. Model imperfections are simulated by assuming a high-dimensional generalized Lorenz system as the true system and a generalized system of dimension less than or equal to the dimension of the true system as the model system. Different scenarios relevant to data assimilation practices are simulated by varying the dimensional-differences between the model and true systems, ensemble size, and observation frequency and accuracy. It is suggested that the present generalization of the Lorenz system is an interesting and flexible tool for evaluating the effectiveness of data assimilation methods and a meaningful addition to the portfolio of testbed systems that includes the Lorenz ’63 and ’96 models, especially considering its relationship with the Lorenz ’63 model. The results presented in this study can serve as useful benchmarks for testing other data assimilation methods besides the ensemble Kalman filter.


2021 ◽  
Author(s):  
Sèna Kimm GNANGNON

Abstract This article aims to contribute to the nascent literature on the effect of non-reciprocal trade preferences (NRTPs) on industrialization in beneficiary countries. In so doing, it complements the few existing works on the effect of NRTPs on export product diversification by investigating the effect of NRTPs (both the Generalized System of Preferences- GSP programs- and other non-reciprocal trade preferences) offered by the QUAD countries on the level of economic complexity in beneficiary countries. The analysis has relied on 110 beneficiary countries of these NRTPs over the period 2002–2018, and made primarily use of the two-step system Generalized Methods of Moments estimator. The findings are quite interesting. First, beneficiary countries tend to use GSP programs (rather than other trade preferences) to achieve greater economic complexity, and the positive effect of the utilization of GSP programs on economic complexity is higher for high income beneficiary countries than relatively less advanced beneficiary countries. Second, both GSP programs and other non-reciprocal trade preferences are strongly complementary in promoting economic complexity in beneficiary countries, in particular if their usage reach high levels. Third, the utilization of NRTPs enhances economic complexity in countries that receive high foreign direct investment flows. Finally, development aid flows are strongly complementary with the utilization of NRTPs in fostering economic complexity in beneficiary countries, especially for high amounts of development aid. This suggests the need for preference-granting countries (that are also suppliers of development aid) to offer both generous NRTPs and higher development aid flows if those NRTPs are to be effective in expanding the manufacturing base in the beneficiary countries.Jel Classification: F13; F14; O14.


Plants ◽  
2021 ◽  
Vol 10 (8) ◽  
pp. 1564
Author(s):  
Annemarie Heiduk ◽  
Ulrich Meve ◽  
Frank Menzel ◽  
Jean-Paul Haenni ◽  
Michael von Tschirnhaus ◽  
...  

Elaborated kettle trap flowers to temporarily detain pollinators evolved independently in several angiosperm lineages. Intensive research on species of Aristolochia and Ceropegia recently illuminated how these specialized trap flowers attract particular pollinators through chemical deception. Morphologically similar trap flowers evolved in Riocreuxia; however, no data about floral rewards, pollinators, and chemical ecology were available for this plant group. Here we provide data on pollination ecology and floral chemistry of R. torulosa. Specifically, we determined flower visitors and pollinators, assessed pollen transfer efficiency, and analysed floral scent chemistry. R. torulosa flowers are myiophilous and predominantly pollinated by Nematocera. Pollinating Diptera included, in order of decreasing abundance, male and female Sciaridae, Ceratopogonidae, Scatopsidae, Chloropidae, and Phoridae. Approximately 16% of pollen removed from flowers was successfully exported to conspecific stigmas. The flowers emitted mainly ubiquitous terpenoids, most abundantly linalool, furanoid (Z)-linalool oxide, and (E)-β-ocimene—compounds typical of rewarding flowers and fruits. R. torulosa can be considered to use generalized food (and possibly also brood-site) deception to lure small nematocerous Diptera into their flowers. These results suggest that R. torulosa has a less specific pollination system than previously reported for other kettle trap flowers but is nevertheless specialized at the level of Diptera suborder Nematocera.


Author(s):  
Prof. Shubhangi Suryawanshi

Emergency healthcare services are the most time crucial services in which people operate, as the survival of the patient depends on how the service is operated. As discussed in the previous paper, the weakest link of the healthcare emergency service is the initiation of the emergency services. We had discussed main methodologies in previous paper and a basic generalized system architecture. This paper discusses the core architecture of the sever and with the help of a sequence diagram we will depict how the server will process requests.


2021 ◽  
Vol 25 (2) ◽  
pp. 5-10
Author(s):  
Grzegorz Maślak ◽  
Przemysław Orłowski

MPC Driven control systems very often are requiring the introduction of a mechanism predicting the state of the object unavailable for measurements. Depending on the case, a different number of state variables will be unobtainable. Widely used systems to obtain essential data of the condition of an object are Luenberger state observer and different types of Kalman filters. The authors propose a new method of Luenberger observer synthesis based on Luenberger gain optimization using performance index corresponding to generalized system performance. The developed method allows us to obtain better-performing observer from the point of view of the adopted criterion, compared to similar estimators derived from the Sylvester equation and classic Kalman filters, even despite the occurrence of disturbances. The developed method will be presented on an example of an active suspension system with MPC.


Author(s):  
Saidu Isah Abubakar ◽  
Sadiq Shehu

This paper reports new techniques that exploit the security of the prime power moduli [Formula: see text] using continued fraction method. Our study shows that the key equation [Formula: see text] can be exploited using [Formula: see text] as good approximation of [Formula: see text]. This enables us to get [Formula: see text] from the convergents of the continued fractions expansion of [Formula: see text] where the bound of the private exponent is [Formula: see text] which leads to the polynomial time factorization of the moduli [Formula: see text]. We further report the polynomial time attacks that can break the security of the generalized prime power moduli [Formula: see text] using generalized system of equation of the form [Formula: see text] and [Formula: see text] by applying simultaneous Diophantine approximations and LLL algorithm techniques where [Formula: see text] and [Formula: see text].


Sign in / Sign up

Export Citation Format

Share Document