This paper seeks to address how political risk influences behaviour, in particular rent seeking behaviour. Such risk is important in many industries, which posts challenges both for policy makers and economic agents. This paper studies how political uncertainty affects rent seeking, and what level of political uncertainty is optimal for...
Many futures contracts for food commodities have been introduced; however, most of them have been withdrawn from the market due to poor liquidity. In this paper, various known success factors for futures contracts with regards to a proposed futures contract for salmon are discussed. Based on the various criteria from...
Topology optimization (TO) is a mathematical method to find the optimal size, shape and connectivity of a domain under specified conditions, and has had many applications in engineering design. However, challenges remain in realizing TO as an effective design tool for many design situations. Uncertainty is ubiquitous in nature and...
The movements of a population of adult sockeye salmon
(Oncorhynchus nerka) were followed in a small tributary of Brooks
Lake, Alaska until spawning was nearly complete in 1963. The objectives
of the study were to describe the movements of sockeye
salmon on the spawning ground of an entire small stream,...
The wetting of a surface by a liquid is a crucial part of many natural and industrial processes. Despite numerous existing studies, some elements of wetting-dewetting such as contact angle variation are still poorly understood. Knowledge of contact angle behavior during the flow is necessary for modeling fluid displacements in...
Biomass burning impacts vegetation dynamics, biogeochemical cycling, atmospheric chemistry, and climate, with sometimes deleterious socio-economic impacts. Under future climate projections it is often expected that the risk of wildfires will increase. Our ability to predict the magnitude and geographic pattern of future fire impacts rests on our ability to model...
Secure Computation is a powerful tool that enables a set of parties to jointly compute any function over their private inputs, without a trusted third party. Private Set Intersection is a specific case of two-party Secure Computation, where Alice (with private set X) and Bob (with private set Y) specifically...