888 research outputs found

    Dividend Policy as Mediation of the Influence of Management Ownership and Institutional Ownership on Company’s Financial Performance

    Full text link
    The purposes of this research are: (1) to examine if management ownership influences significantly positive on dividend policy (2) to examine if institutional ownership influences significantly positive on dividend policy, and (3) to examine if dividend policy influences significantly positive on company’s financial performance. This is an explanatory research since it aims to explain the influence among variables after testing research hypotheses based on the underlying theory. The data of this research are financial reports of go public manufacture companies which have been audited at Indonesian Stock Exchange (IDX) from 2003 – 2012. This is a census research that is by using all population, 36 manufacture companies. Since this is a census research by using pooling data technique for 10 years so there were 360 observation data. This research used path analysis technique to test hypotheses. The research finding shows that management ownership doesn’t influence significantly positive on dividend policy, institutional ownership doesn’t influence significantly positive on dividend policy, dividend policy doesn’t influence significantly positive on company’s financial performance,

    Multi-Choice Minority Game

    Full text link
    The generalization of the problem of adaptive competition, known as the minority game, to the case of KK possible choices for each player is addressed, and applied to a system of interacting perceptrons with input and output units of the type of KK-states Potts-spins. An optimal solution of this minority game as well as the dynamic evolution of the adaptive strategies of the players are solved analytically for a general KK and compared with numerical simulations.Comment: 5 pages, 2 figures, reorganized and clarifie

    The dynamics of proving uncolourability of large random graphs I. Symmetric Colouring Heuristic

    Full text link
    We study the dynamics of a backtracking procedure capable of proving uncolourability of graphs, and calculate its average running time T for sparse random graphs, as a function of the average degree c and the number of vertices N. The analysis is carried out by mapping the history of the search process onto an out-of-equilibrium (multi-dimensional) surface growth problem. The growth exponent of the average running time is quantitatively predicted, in agreement with simulations.Comment: 5 figure

    Multigraded Castelnuovo-Mumford Regularity

    Full text link
    We develop a multigraded variant of Castelnuovo-Mumford regularity. Motivated by toric geometry, we work with modules over a polynomial ring graded by a finitely generated abelian group. As in the standard graded case, our definition of multigraded regularity involves the vanishing of graded components of local cohomology. We establish the key properties of regularity: its connection with the minimal generators of a module and its behavior in exact sequences. For an ideal sheaf on a simplicial toric variety X, we prove that its multigraded regularity bounds the equations that cut out the associated subvariety. We also provide a criterion for testing if an ample line bundle on X gives a projectively normal embedding.Comment: 30 pages, 5 figure

    Multi-Player and Multi-Choice Quantum Game

    Full text link
    We investigate a multi-player and multi-choice quantum game. We start from two-player and two-choice game and the result is better than its classical version. Then we extend it to N-player and N-choice cases. In the quantum domain, we provide a strategy with which players can always avoid the worst outcome. Also, by changing the value of the parameter of the initial state, the probabilities for players to obtain the best payoff will be much higher that in its classical version.Comment: 4 pages, 1 figur

    Secure and linear cryptosystems using error-correcting codes

    Full text link
    A public-key cryptosystem, digital signature and authentication procedures based on a Gallager-type parity-check error-correcting code are presented. The complexity of the encryption and the decryption processes scale linearly with the size of the plaintext Alice sends to Bob. The public-key is pre-corrupted by Bob, whereas a private-noise added by Alice to a given fraction of the ciphertext of each encrypted plaintext serves to increase the secure channel and is the cornerstone for digital signatures and authentication. Various scenarios are discussed including the possible actions of the opponent Oscar as an eavesdropper or as a disruptor

    Geometric motivic Poincar\'e series of quasi-ordinary singularities

    Get PDF
    The geometric motivic Poincar\'e series of a germ (S,0)(S,0) of complex algebraic variety takes into account the classes in the Grothendieck ring of the jets of arcs through (S,0)(S,0). Denef and Loeser proved that this series has a rational form. We give an explicit description of this invariant when (S,0)(S,0) is an irreducible germ of quasi-ordinary hypersurface singularity in terms of the Newton polyhedra of the logarithmic jacobian ideals. These ideals are determined by the characteristic monomials of a quasi-ordinary branch parametrizing (S,0)(S,0)

    On special quadratic birational transformations of a projective space into a hypersurface

    Full text link
    We study transformations as in the title with emphasis on those having smooth connected base locus, called "special". In particular, we classify all special quadratic birational maps into a quadric hypersurface whose inverse is given by quadratic forms by showing that there are only four examples having general hyperplane sections of Severi varieties as base loci.Comment: Accepted for publication in Rendiconti del Circolo Matematico di Palerm

    Algebraic Comparison of Partial Lists in Bioinformatics

    Get PDF
    The outcome of a functional genomics pipeline is usually a partial list of genomic features, ranked by their relevance in modelling biological phenotype in terms of a classification or regression model. Due to resampling protocols or just within a meta-analysis comparison, instead of one list it is often the case that sets of alternative feature lists (possibly of different lengths) are obtained. Here we introduce a method, based on the algebraic theory of symmetric groups, for studying the variability between lists ("list stability") in the case of lists of unequal length. We provide algorithms evaluating stability for lists embedded in the full feature set or just limited to the features occurring in the partial lists. The method is demonstrated first on synthetic data in a gene filtering task and then for finding gene profiles on a recent prostate cancer dataset

    A critical evaluation of network and pathway based classifiers for outcome prediction in breast cancer

    Get PDF
    Recently, several classifiers that combine primary tumor data, like gene expression data, and secondary data sources, such as protein-protein interaction networks, have been proposed for predicting outcome in breast cancer. In these approaches, new composite features are typically constructed by aggregating the expression levels of several genes. The secondary data sources are employed to guide this aggregation. Although many studies claim that these approaches improve classification performance over single gene classifiers, the gain in performance is difficult to assess. This stems mainly from the fact that different breast cancer data sets and validation procedures are employed to assess the performance. Here we address these issues by employing a large cohort of six breast cancer data sets as benchmark set and by performing an unbiased evaluation of the classification accuracies of the different approaches. Contrary to previous claims, we find that composite feature classifiers do not outperform simple single gene classifiers. We investigate the effect of (1) the number of selected features; (2) the specific gene set from which features are selected; (3) the size of the training set and (4) the heterogeneity of the data set on the performance of composite feature and single gene classifiers. Strikingly, we find that randomization of secondary data sources, which destroys all biological information in these sources, does not result in a deterioration in performance of composite feature classifiers. Finally, we show that when a proper correction for gene set size is performed, the stability of single gene sets is similar to the stability of composite feature sets. Based on these results there is currently no reason to prefer prognostic classifiers based on composite features over single gene classifiers for predicting outcome in breast cancer
    corecore