1,268 research outputs found

    Marriage Fraud

    Get PDF
    This Article examines the astonishing array of doctrines used to determine what constitutes marriage fraud. It begins by locating the traditional nineteenth-century annulment-by-fraud doctrine within the realm of contract fraud, observing that in the family law context fraudulent marriages were voidable solely at the option of the injured party. The Article then explains how, in the twentieth century, a massive expansion of public benefits tied to marriage prompted new marriage fraud doctrines to develop in various areas of the law, shifting the concept of the injured party from the defrauded spouse to the public at large. It proposes a framework for understanding these new doctrines by demonstrating that courts apply different tests for finding fraud depending on the value of the benefit sought compared to the cost to the individual of using marriage to obtain it. Furthermore, the Article argues that marriage is an ineffective means for distributing public benefits that serve specific objectives; in other words, marriage is being asked to do too much work. As a possible response to this problem, the Article concludes that lawmakers could disaggregate the components of marriage to which they attach public benefits. This would improve the efficacy of public benefits distribution without entirely dismantling the institution of marriage or jeopardizing the stability that it may provide to societ

    The significance of property type strategy of malaysian real estate investment trust

    Get PDF
    The performance of Malaysian Real Estate Investment Trust (M-REIT) companies is linked to the property type strategy adopted by each individual company. M-REIT was established a decade ago, yet the outcome in performance difference between the property type strategies of focused and diversified M-REIT is still largely unexplored, thus presenting investment information gap for M-REIT managers and investors. The main aim of this study is to identify the property type strategy adopted by M-REIT companies and the performance difference between focused and diversified M-REIT in a mixed asset portfolio. Investment data from 2010 to 2016 of fourteen M-REIT companies were examined. Multiple regression analysis (MRA) was employed to investigate the significant relationship between the financial performance of focused and diversified M-REIT and REIT determinants. The property type strategy was categorized according to the market value of underlying property in the M-REIT property portfolio. The performance of focused and diversified M-REIT was assessed by employing risk-adjusted performance analysis, portfolio diversification analysis, correlation analysis, efficient frontier analysis, and portfolio optimization analysis. The results indicate there were ten focused M-REIT and four diversified M-REIT companies. The findings on riskadjusted performance analysis revealed the superior performance of the diversified M-REIT over the focused M-REIT. However, the diversification analysis showed that both focused and diversified M-REIT offered diversification benefit in a mixedasset portfolio, with the latter contributed higher returns in the mixed asset portfolio than their focused M-REIT counterparts. The results of MRA indicate that for the focused M-REIT, total return and net asset value (NAV) were significantly related to property market value, while total return was significantly related to total property net income. Conversely, for the diversified M-REIT, total return showed no significant relationship with all the determinant factors. However, NAV for diversified M-REIT exhibited a significant relationship with dividend yield and annual risk. Overall, these findings suggest that property type strategy impacts MREIT performance, while property market value and property net income only exhibit a significant relationship with the financial performance of focused M-REIT

    Security Defense of Large Scale Networks Under False Data Injection Attacks: An Attack Detection Scheduling Approach

    Full text link
    In large scale networks, communication links between nodes are easily injected with false data by adversaries, so this paper proposes a novel security defense strategy to ensure the security of the network from the perspective of attack detection scheduling. Compared with existing attack detection methods, the attack detection scheduling strategy in this paper only needs to detect half of the neighbor node information to ensure the security of the node local state estimation. We first formulate the problem of selecting the sensor to be detected as a combinatorial optimization problem, which is Nondeterminism Polynomial hard (NP-hard). To solve the above problem, we convert the objective function into a submodular function. Then, we propose an attack detection scheduling algorithm based on sequential submodular maximization, which incorporates expert problem to better cope with dynamic attack strategies. The proposed algorithm can run in polynomial time with a theoretical lower bound on the optimization rate. In addition, the proposed algorithm can guarantee the security of the whole network under two kinds of insecurity conditions from the perspective of the augmented estimation error. Finally, a numerical simulation of the industrial continuous stirred tank reactor verifies the effectiveness of the developed approach

    Seeking for reliable double-hybrid density functionals without fitting parameters: The PBE0-2 functional

    Full text link
    Without the use of any empirical fitting to experimental or high-level ab initio data, we present a double-hybrid density functional approximation for the exchange-correlation energy, combining the exact Hartree-Fock exchange and second-order Moller-Plesset (MP2) correlation with the Perdew-Burke-Ernzerhof (PBE) functional. This functional, denoted as PBE0-2, is shown to be accurate for a wide range of applications, when compared with other functionals and the ab initio MP2 method. The qualitative failures of conventional density functional approximations, such as self-interaction error and noncovalent interaction error, are significantly reduced by PBE0-2.Comment: accepted for publication in Chem. Phys. Lett., 5 pages, 5 figures, 1 table, supplementary material not include

    Characterization of the Complete Mitochondrial Genomes of Cnaphalocrocis medinalis and Chilo suppressalis (Lepidoptera: Pyralidae)

    Get PDF
    The complete mitochondrial genomes (mitogenomes) of Cnaphalocrocis medinalis and Chilo suppressalis (Lepidoptera: Pyralidae) were determined and analyzed. The circular genomes were 15,388 bp long for C. medinalis and 15,395 bp long for C. suppressalis. Both mitogenomes contained 37 genes, with gene order similar to that of other lepidopterans. Notably, 12 protein-coding genes (PCGs) utilized the standard ATN, but the cox1 gene used CGA as the initiation codon; the cox1, cox2, and nad4 genes in the two mitogenomes had the truncated termination codons T, T, and TA, respectively, but the nad5 gene was found to use T as the termination codon only in the C. medinalis mitogenome. Additionally, the codon distribution and Relative Synonymous Codon Usage of the 13 PCGs in the C. medinalis mitogenome were very different from those in other pyralid moth mitogenomes. Most of the tRNA genes had typical cloverleaf secondary structures. However, the dihydrouridine (DHU) arm of the trnS1(AGN) gene did not form a stable stem-loop structure. Forty-nine helices in six domains, and 33 helices in three domains were present in the secondary structures of the rrnL and rrnS genes of the two mitogenomes, respectively. There were four major intergenic spacers, except for the A+T-rich region, spanning at least 12 bp in the two mitogenomes. The A+T-rich region contained an 'ATAGT(A)'-like motif followed by a poly-T stretch in the two mitogenomes. In addition, there were a potential stem-loop structure, a duplicated 25-bp repeat element, and a microsatellite '(TA)13' observed in the A+T-rich region of the C. medinalis mitogenome. A poly-T motif, a duplicated 31-bp repeat element, and a 19-bp triplication were found in the C. suppressalis mitogenome. However, there are many differences in the A+T-rich regions between the C. suppressalis mitogenome sequence in the present study and previous reports. Finally, the phylogenetic relationships of these insects were reconstructed based on amino acid sequences of mitochondrial 13 PCGs using Bayesian inference and maximum likelihood methods. These molecular-based phylogenies support the traditional morphologically based view of relationships within the Pyralidae

    Modelling and Forecasting the Volatility of Stock Price Index : ASEAN-5 Countries

    Get PDF
    This study aims to model and forecast the stock index volatility in ASEAN-5 countries. In addition, this study investigates the asymmetric characteristics of the returns series, evaluate if the use of non-normal distribution improves the model estimation and compare the forecasting performance of the GARCH-type models with conventional models for the five countries. The volatility is estimated by employing three GARCH-type models, GARCH(1,1), EGARCH and GJR-GARCH on the daily returns data. To increase the robustness of the models, we apply three different distributions; normal, Student-t and Generalized Error Distribution. The serial correlation and heteroscedasticity hypothesis in the data series is verified by using the Ljung-Box Q-statistic and Lagrange Multiplier tests. The in-sample estimation was evaluated by three information criterion measures while the out-of-sample forecasting performance was evaluated based on three symmetric statistical loss functions and an asymmetric loss function. Consistent with previous studies on emerging markets, the empirical results for this study indicate strong evidence of asymmetry in the ASEAN-5 stock markets. The study also demonstrated that the application of non-normal distributions to the models enhanced the goodness-of-fit for the model estimation. Based on the in-sample estimation, the best fitted model for all five countries is the asymmetric models with non-normal distributions. The empirical results for the out-of-sample forecasting performance however did not demonstrate evidence of superior performance for the GARCH models in comparison to conventional models. This study found that for three of the ASEAN countries the forecasting accuracy was dominated by the conventional models. Evidently, from this study, there is no dominant model for modelling and forecasting of volatility. Hence, for robust investment decisions, portfolio management and risk management implementations, it will be prudent to evaluate the purpose of forecasting volatility and applying the best estimation model for volatility forecasting to fit this purpose

    Spreading dynamics of a 2SIH2R, rumor spreading model in the homogeneous network

    Full text link
    In the era of the rapid development of the Internet, the threshold for information spreading has become lower. Most of the time, rumors, as a special kind of information, are harmful to society. And once the rumor appears, the truth will follow. Considering that the rumor and truth compete with each other like light and darkness in reality, in this paper, we study a rumor spreading model in the homogeneous network called 2SIH2R, in which there are both spreader1(people who spread the rumor) and spreader2(people who spread the truth). In this model, we introduced discernible mechanism and confrontation mechanism to quantify the level of people's cognitive abilities and the competition between the rumor and truth. By mean-field equations, steady-state analysis and numerical simulations in a generated network which is closed and homogeneous, some significant results can be given: the higher discernible rate of the rumor, the smaller influence of the rumor; the stronger confrontation degree of the rumor, the smaller influence of the rumor; the large average degree of the network, the greater influence of the rumor but the shorter duration. The model and simulation results provide a quantitative reference for revealing and controlling the spread of the rumor

    Lonicera japonica polysaccharides attenuate ovalbumin-induced allergic rhinitis by regulation of Th17 cells in BALB/c mice

    Get PDF
    Lonicera japonica Thunb. has been widely used as food ingredients and healthy drinks in the Asian countries, which was reported to possess some good activities. However, it remains unknown in the immunomodulation of Lonicera japonica polysaccharides (LJP) on allergic rhinitis (AR). This study aimed to investigate the impact of LJP on ovalbumin-induced AR in BALB/c mice model. LJP significantly inhibited AR symptoms and eosinophil number in nasal mucosa. Besides, the increased serum levels of IgE, TNF-α, IL-1β and IL-17 were markedly decreased when AR mice were treated with LJP. The mRNA expression levels of IL-4, IL-5, IL-6, IL-17, IL-23, ROR-γt and STAT3 in OVA group were increased, and SOCS3 was reduced, while LJP inhibited the changes. The present study indicated that LJP suppressed the inflammatory response in AR sensitized by ovalbumin, showing that LJP has the potential to treat AR through the regulation of Th17 cells
    corecore