We study a two-country two-factor model with free entry and monopolistic competition. There are two industries employing immobile labor as fixed input and mobile capital as marginal input. Firms cannot move across countries, but only move across industries within a country. The two industries can differ in three aspects: factor intensities, transport costs and demand elasticities. The two countries are identical except for size. The production specialization and trade pattern are the results of the interaction of two effects: the market access effect and the wage differential effect.
We attempt to analyze a one-dimensional space-inhomogeneous quantum walk (QW) with one defect at the origin, which has two different quantum coins in positive and negative parts. We call the QW ``the two-phase QW with one defect'', which we treated concerning localization theorems. The two-phase QW with one defect has been expected to be a mathematical model of topological insulator which is an intense issue both theoretically and experimentally. In this paper, we derive the weak limit theorem describing the ballistic spreading, and as a result, we obtain the mathematical expression of the whole picture of the asymptotic behavior. Our approach is based mainly on the generating function of the weight of the passages. We emphasize that the time-averaged limit measure is symmetric for the origin, however, the weak limit measure is asymmetric, which implies that the weak limit theorem represents the asymmetry of the probability distribution.
The password-protected secret sharing (PPSS, for short) and its security notion, called in this paper the PPSS-security, were proposed by Bagherzandi, Jarecki, Saxena and Lu. However, another security notion for PPSS schemes, the pparam-security was proposed by Hasegawa, Isobe, Iwazaki, Koizumi and Shizuya, because they pointed out an attack which can break the original protocol proposed by Bagherzandi et al. Hasegawa et al. also showed how to enhance the protocol, and proved that the enhanced one is pparam-secure. In this paper, we prove that the enhanced one is PPSS-secure as well.
This paper focuses on the Accusative with to-infinitive Constructions in English that denote causative meaning, exemplified by She persuaded me to go to the hospital. Based on the five diagnostics, the syntactic structures of such constructions are clarified, and on the basis of two semantic perspectives, the semantic structures of the causative verbs occurring therein are defined. Finally, the issue of how the syntactic structures are derived from the semantic structures is addressed by way of the Lexical Conceptual Structures and the Qualia Structures of four types of causative to-infinitive verbs.
Open Information Extraction is a relation-independent extraction paradigm that extracts assertions from massive and heterogeneous corpora such as the Web. Light relation extractors focus on efficiency by restricting analysis to some shallow linguistic tools such as part-of-speech tagging. Although these methods are fast and scalable, they are unable to deal with complex sentences (such as complicated and long distance relations) due to using only shallow syntactic features. This paper presents two novel hybrid methods, TextRunner-DepOE (TR-DOE) and ReVerb-DepOE (RV-DOE) which combine high-performance subset of shallow Open IE systems with the strengths of a deep Open IE system. We detect the best trade-off between precision and recall by tuning two combination parameters: sentence length and confidence measure. Since the focus is on using time efficiently, we used a fast and robust deep extractor. Experiments indicate that the proposed hybrid methods obtain significantly higher performance than their constituent systems. The best result was for TR-DOE which had an F-measure almost twice that of TextRunner.
We take an elementary approach to derive a generalization of Knuth's formula using Lassalle's explicit formula. In particular, we give a formula for the Kostka numbers of a shape μ├ n and weight (m,1n-m) for m=3,4.
This paper summarizes an explorative study of the novel design and security that contribute to consumers' adoption of an integrated, single platform payment system encompassing card, Internet and mobile technologies in the ASEAN. The attempt to survey these areas in an integrated fashion is a novel approach that differs from existing studies that mainly focus on adoption factors of these technologies in isolation as well as focuses on the novel design and the security elements. The empirical results from the quantitative analysis suggest that design, security, perceived usefulness as well as perceived ease of use are significant factors that contribute to consumers' intention to utilize a single platform payment System. Organizations will be able to utilize the study information for developing products and services that meet the consumers' single platform E-payment system while also fulfil their objective of corporate social responsibility.
Natural language demonstrates discontinuous relationships between related words. Neurophysiology has reported that two types of brain electrical activities are related to discontinuous dependency. Sustained anterior negative potentials (SAN) are considered to be short-term memory storage for dislocated words. A late positivity (P600) appears concurrently with SAN decay, and is interpreted as the integration cost of a discontinuous word with a related word. Discontinuous verbal processing through SAN and P600 is considered to be unfavorable because of redundant neural resource consumption. However, SAN and P600 may reflect a global prediction-based strategy, which rather actively consumes memory resources to comprehend an overall meaning. We thus prepared four types of sentences (noun 1/adverb/noun 2/verb), which were modulated by grammatical information (case marker) and word order factors, and recorded brain potentials from Japanese participants performing a sentence comprehension task. Consistently with our prediction, P600 appeared and SAN disappeared upon the presentation of second nouns, but only in the canonical order including first subject words without a case marker. Hence, discontinuous verbal processing and its neural correlates should be re-considered in the context of interactions between local memory costs and global prediction strategies.
The adjacency matrix of the lexicographic product of graphs is decomposed into a sum of monotone independent random variables in a certain product state. The adjacency matrix of the strong product of graphs admits an expression in terms of commutative independent random variables in a product state. Their spectral distributions are obtained by using the monotone, classical and Mellin convolutions of probability distributions.
August 28, 2017 There had been a service stop from Aug 28‚ 2017‚ 1:50 to Aug 28‚ 2017‚ 10:08(JST) (Aug 27‚ 2017‚ 16:50 to Aug 28‚ 2017‚ 1:08(UTC)) . The service has been back to normal.We apologize for any inconvenience this may cause you.
July 31, 2017 Due to the end of the Yahoo!JAPAN OpenID service, My J-STAGE will end the support of the following sign-in services with OpenID on August 26, 2017: -Sign-in with Yahoo!JAPAN ID -Sign-in with livedoor ID * After that, please sign-in with My J-STAGE ID.
July 03, 2017 There had been a service stop from Jul 2‚ 2017‚ 8:06 to Jul 2‚ 2017‚ 19:12(JST) (Jul 1‚ 2017‚ 23:06 to Jul 2‚ 2017‚ 10:12(UTC)) . The service has been back to normal.We apologize for any inconvenience this may cause you.
May 18, 2016 We have released “J-STAGE BETA site”.
May 01, 2015 Please note the "spoofing mail" that pretends to be J-STAGE.