3,165 research outputs found

    Challenging Religious Authority: the Emergence of Salafi Ustadhs in Indonesia

    Full text link
    With Muslims as majority population, religious authority plays important roles in Indonesia. This paper tries to show the map of religious authority in Indonesia both in history and the recent development. The paper shows that, in the past, religious authority in Indonesia were possesed by the kyai and other traditional religious leaders. However, there is an emergence of the new religious elites in Indonesia, the muballigh, the dai and the last is the salafi ustadhs. In addition, this paper also discusses the contestation between the established power of religious authority and the the newly emerged salafi ustadh. Feeling threatened by the changging trend and the influence of the salaf, there are various responses from the existing authorities. The responses vary from discussion to violence. One example is the mubahathah held between Persis and Salafi. Through the event, both parties tried to contest and challenge each other's authority. Using religious arguments and using some religious symbols, both parties actually try to maintain their religious authority

    Data-Discriminants of Likelihood Equations

    Full text link
    Maximum likelihood estimation (MLE) is a fundamental computational problem in statistics. The problem is to maximize the likelihood function with respect to given data on a statistical model. An algebraic approach to this problem is to solve a very structured parameterized polynomial system called likelihood equations. For general choices of data, the number of complex solutions to the likelihood equations is finite and called the ML-degree of the model. The only solutions to the likelihood equations that are statistically meaningful are the real/positive solutions. However, the number of real/positive solutions is not characterized by the ML-degree. We use discriminants to classify data according to the number of real/positive solutions of the likelihood equations. We call these discriminants data-discriminants (DD). We develop a probabilistic algorithm for computing DDs. Experimental results show that, for the benchmarks we have tried, the probabilistic algorithm is more efficient than the standard elimination algorithm. Based on the computational results, we discuss the real root classification problem for the 3 by 3 symmetric matrix~model.Comment: 2 table

    Challenges That Hinder Parturients to Deliver in Health Facilities: a Qualitative Analysis in Two Districts of Indonesia

    Full text link
    Background: There are many challenges women face to be able to give birth in health facilities in many parts of Indonesia. This study explores the roles and observations of close-to-community maternal health providers and other community members on potential barriers faced by women to deliver in health facilities in two districts within The Archipelago. Methods: Employing an explorative qualitative approach, 110 semi-structured interviews and 7 focus group discussions were conducted in 8 villages in Southwest Sumba, in the East Nusa Tenggara province, and in 8 villages in Cianjur, in the West Java province. The participants included village midwives, Posyandu volunteer (village health volunteers), traditional birth attendants (TBAs), mothers, men, village heads and district health officials. Results: The main findings were mostly similar in the two study areas. However, there were some key differences. Preference for TBA care, traditional beliefs, a lack of responsiveness of health providers to local traditions, distance, cost of travel and indirect costs of accompanying family members were all barriers to patients attending health facilities for the birth of their child. TBAs were the preferred health providers in most cases due to their close proximity at the time of childbirth and their adherence to traditional practices during pregnancy and delivery. Conclusions: Improving collaborations between midwives and TBAs, collaboration, and responsiveness to traditional practices within health facilities and effective health promotion campaigns about the benefits of giving birth in health facilities may increase the use of health facilities in both study areas.&nbsp

    Penerapanimetodeicapitaliassetipricingimodeli(capm) Sebagai Dasar Pengambilan Keputusan Investasi Saham (Studi Pada Perusahaan Yang Terdaftar Di Indeks Idx30 Periode Juli 2012-juni 2015)

    Full text link
    This research aims to classify efficient shares and inefficient shares using CAPM method so investors are able to make a precise investment decision. CAPM method is used to assess the relation between risk and expected return of investment. The type of research is descriptive research with quantitative approach. The research population consists of 30 companies which had been listed on IDX30 in 2012-2015 and 15 companies among them are the research sample. The result showed that the majority of shares results a positive return for the research period and there are only 3 shares result a negative return. A stock with the lowest beta has the lowest expected return as well and a stock with the highest beta has the highest expected return too. That is proving that there is a positive and linear relationship between systematic risk and expected return. Besides, there are 9 efficient shares and 6 inefficient shares based on CAPM method. Efficient shares are undervalued shares (cheap) that have bigger individual return than its expected return [Ri>E(Ri)], while inefficient shares are shares with smaller individual return than its expected return [Ri<E(Ri)] and classified as overvalued shares (expensive)

    Karak syndrome: a novel degenerative disorder of the basal ganglia and cerebellum

    Get PDF
    Two brothers are reported with early onset progressive cerebellar ataxia, dystonia, spasticity, and intellectual decline. ‱ Neuroradiology showed cerebellar atrophy and features compatible with iron deposition in the putamen (including the “eye of the tiger sign”) and substantia nigra. ‱ Diagnosis was compatible with pantothenate kinase associated neuropathy resulting from pantothenate kinase 2 mutation (PKAN due to PANK2) but linkage to PNAK2 was eliminated suggesting Karak syndrome to be a novel disorder. ‱ The “eye of the tiger” sign has previously only been reported to occur in PKAN due to PKAN

    Computing the Real Isolated Points of an Algebraic Hypersurface

    Full text link
    Let R\mathbb{R} be the field of real numbers. We consider the problem of computing the real isolated points of a real algebraic set in Rn\mathbb{R}^n given as the vanishing set of a polynomial system. This problem plays an important role for studying rigidity properties of mechanism in material designs. In this paper, we design an algorithm which solves this problem. It is based on the computations of critical points as well as roadmaps for answering connectivity queries in real algebraic sets. This leads to a probabilistic algorithm of complexity (nd)O(nlog⁥(n))(nd)^{O(n\log(n))} for computing the real isolated points of real algebraic hypersurfaces of degree dd. It allows us to solve in practice instances which are out of reach of the state-of-the-art.Comment: Conference paper ISSAC 202

    The Effectiveness Of The Auditing Standards To Detect Fraudulent Financial Reporting Activities In Financial Statement Audits In Malaysia

    Get PDF
    In identifying relevant red flags to be used to detect possible fraud in financial statements, this study adopts the International Auditing Standard AI240 and adapts the US-based Statement of Auditing Standard No 99 (SAS 99). Both SAS 99 and AI240 classify the red flags into three categories: Opportunity, Pressure, and Rationalization.  Opportunity Red Flags are found in situations that are ideal for people to commit fraud more easily due to ineffective internal controls, inadequate supervision or managers overriding internal controls.  Pressure Red Flags are circumstances in which people have a financial incentive to commit fraud such as falsely overstating sales or profits to receive their bonuses or exerting pressure on managers to reduce actual expenses to be under budgeted costs.  Rationalization Red Flags are situations where people have certain traits and abilities to commit fraud and justify it with false reasons which they believe are true. A Red Flag Questionnaire which contains 15 demographic multiple choice questions, followed by a five-point Likert scale with questions for 14 Opportunity Red Flags, 15 Pressure Red Flags and 11 Rationalization Red Flags was developed and distributed to three groups of auditors: External, internal and governmental. The study indicates the direct or inverse relationships between each demographic factor and each red flag.   These relationships were identified by using multiple regression models.   Three types of relationships are possible: direct, inverse and no relationship.   These three types of relationships are as follows: (1) the relationship between the level of fraud-detecting effectiveness of each Opportunity Red Flag and each demographic factor, (2) the relationship between the level of fraud-detecting effectiveness of each Pressure Red Flag and each demographic factor, and (3) the relationship between the level of fraud-detecting effectiveness of each Rationalization Red Flag and each demographic factor.   These relationships indicate which specific professional demographic factors are more likely associated with more effective fraud-detecting red flags.  In contrast, other relationships also indicate which specific demographic factors are more likely associated with less effective fraud-detecting red flags.   In conclusion, this research project should be conducted in other countries, so the result from one country can be compared to the results from other countries.  Some results may vary between developed countries and developing countries.  The learning curve or the period of time necessary for auditors to learn how to use red flags and then interpret the findings may also explain differences in the results between countries.   This study may enhance the auditors’ understanding of the different levels of fraud-detecting effectiveness of red flags as well as when the auditors may benefit from using them in financial statement audits

    Comparison of liberica and arabica coffee: Chlorogenic acid, caffeine, total phenolic and DPPH radical scavenging activity

    Get PDF
    Information on the composition of chlorogenic acid, caffeine and antioxidant activity of Coffea liberica is scarce, albeit the importance of this species in some parts of the world. This study assessed the composition of chlorogenic acid, total phenolic, caffeine and free radical scavenging activity in green and roasted C. liberica in comparison to C. arabica. The compositions of these compounds were also investigated in C. liberica at different roasting degree. We found a comparable amount of chlorogenic acid in green C. liberica and C. arabica. However, roasted C. arabica had a significantly higher chlorogenic acid content than roasted C. liberica (p\u3c0.05). Chlorogenic acid content significantly reduced in C. liberica after roasting when compared to green beans (p\u3c0.05). There was an insignificant difference of caffeine content between the green and roasted beans of both coffee varieties. Total phenolic content were of comparable value between C. liberica and C. arabica for both green and roasted beans. There was a trend for higher total phenolic content in roasted C. liberica when compared to green beans, although significant difference was observed only in medium-dark roast (p\u3c0.05). DPPH scavenging activity was comparable between C. arabica and C. liberica for both green and roasted beans, and was significantly reduced in C. liberica after roasting (p\u3c0.05). Both green C. arabica and C. liberica had similar DPPH scavenging activity to the standards (BHT and a-tocopherol). These data can aid in promoting the production of C. liberica alongside C. arabica that has been regarded as a premium quality coffee
    • 

    corecore