528 research outputs found

    Does a Stewardship Code Improve the Firm Valuation and ESG Factors in India?

    Get PDF
    This is the first study from an emerging market to examine the effect of stewardship codes on the relationship between institutional investors\u27 (IIs) ownership and firm valuation, along with environmental, social, and governance (ESG) factors3.. Using all S&P BSE listed non-financial firms data from financial years 2014-2015 to 2022-23, the results reveal a negative relationship between future firm value and II\u27s ownership. Notably, stewardship code adoption does not affect Independent institutional investors\u27 (IIIs)/ mutual fund (MF) ownership relationships with future firm valuation; however, Other institutional investors\u27 (OIIs) negative relationship gets more profound. Difference in Difference (DID) analysis results confirm that the stewardship code positively affects IIs\u27 and firm valuation relationship concerning firms with low promoter ownership than firms with high (more than 50%) ownership. However, the effect of the stewardship code changes throughout the different levels of Tobin Q. We find that an increasing IIs ownership enhances the likelihood of a positive change in ESG and its factors in which the environmental (E) factor contributes substantially . Further, a positive change in the governance score is associated with other institutional investors\u27 (OIIs) ownership. Adopting the stewardship code strengthens the association between MF ownership and ESG factors

    CYBER PORNOGRAPHY ADDICTION AMONGST MEDICAL STUDENTS OF WESTERN RURAL MAHARASHTRA

    Get PDF
    Introduction: Cyberpornography is an act of using cyberspace to create, display, distribute, impart or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography on one hand, has opened up the new terrain of \u27safe sex\u27, and a positive space for sexual non-conformists. At the same time, it has negatively impacted many offline relations, and a new space for sexual predation and exploitation. Objective: To find out the prevalence, type and form of risk towards cyber pornography addiction amongst the students. Methods & Materials: A prospective cross sectional study was conducted after obtaining an ethical approval from the institute and an informed consent from volunteers fulfilling the eligibility criteria. The Internet sex screening test (ISST) questionnaire with score sheet was used and was collected by complete anonymity and confidentiality. 300 medical students were considered for the study and data collected was analysed by Microsoft-office excel. Results: 57.15% of the volunteer are in low-risk group whereas 30% are vulnerable and 12.85% are in highest-risk group. For boys, 65% are vulnerable whereas 21% in low-risk and the remaining 14% are in highest-risk group. For girls, 73% are in a low-risk, 19% are vulnerable and 8% are in highest-risk group. Conclusion: It is concluded that the majority of boys come under vulnerable category whereas the girls comes in low-risk group showing male preponderance towards addiction. The study reveals that, questions coming under the subgroup of online sexual behaviour-isolated have been answered the maximum number of times, by both the sexes. Whereas, the questions coming under the subgroup of online sexual spending has been answered the least by both the sexes. KEYWORDS: Cyberpornography; Addiction; Sexual behaviour; ISST Questionnaire

    Nilpotency and Capability in multiplicative Lie algebras

    Full text link
    This paper aims to introduce the concept of nilpotency and capability in multiplicative Lie algebras. Also, we see the existence of covers of a multiplicative Lie algebra and thoroughly examine their relationships with capable and perfect multiplicative Lie algebras

    Analysis and Comparison of various Methods for Text Detection from Images using MSER Algorithm

    Get PDF
    In this paper analysis and comparison of various methods for text detection is carried by using canny edge detection algorithm and MSER based method along with the image enhancement which results in the improved performance in terms of text detection. In addition, we improve current MSERs by developing a contrast enhancement mechanism that enhances region stability of text patterns to remove the blurring caused during the capture of image Lucy Richardson de blurring Algorithm is used

    CYBER PORNOGRAPHY ADDICTION AMONGST MEDICAL STUDENTS OF WESTERN RURAL MAHARASHTRA

    Get PDF
    Introduction: Cyberpornography is an act of using cyberspace to create, display, distribute, impart or publish pornography or obscene materials, especially materials depicting children engaged in sexual acts with adults. Cyberpornography on one hand, has opened up the new terrain of 'safe sex', and a positive space for sexual non-conformists. At the same time, it has negatively impacted many offline relations, and a new space for sexual predation and exploitation. Objective: To find out the prevalence, type and form of risk towards cyber pornography addiction amongst the students. Methods & Materials: A prospective cross sectional study was conducted after obtaining an ethical approval from the institute and an informed consent from volunteers fulfilling the eligibility criteria. The Internet sex screening test (ISST) questionnaire with score sheet was used and was collected by complete anonymity and confidentiality. 300 medical students were considered for the study and data collected was analysed by Microsoft-office excel. Results: 57.15% of the volunteer are in low-risk group whereas 30% are vulnerable and 12.85% are in highest-risk group. For boys, 65% are vulnerable whereas 21% in low-risk and the remaining 14% are in highest-risk group. For girls, 73% are in a low-risk, 19% are vulnerable and 8% are in highest-risk group. Conclusion: It is concluded that the majority of boys come under vulnerable category whereas the girls comes in low-risk group showing male preponderance towards addiction. The study reveals that, questions coming under the subgroup of online sexual behaviour-isolated have been answered the maximum number of times, by both the sexes. Whereas, the questions coming under the subgroup of online sexual spending has been answered the least by both the sexes. KEYWORDS: Cyberpornography; Addiction; Sexual behaviour; ISST Questionnaire

    MPPT Technique for Partially Shade Photovoltaic Module: Graph Laplacian Approach

    Get PDF
    One of the topology that comes under distributed control rchitecture in pho-tovoltaic application is di erential power processing. This topology is basically a minimal power processing technique as the di erential convertors used here pro-vide mismatch current to the series connected PV module string. Series connected PV module su ers from mismatch problem due to di erent level of insolation,shading, or manufacturing variation of di erent sub-module as the current in se-ries connection is same thus the eciency of the PV system is compromised even when a single sub-module is amaged or solar irradiation is not uniform. This dis-tributed architecture uses bidirectional buck-boost convertor to enable the powerow from one module to another in either direction depending on the opening and closing of Mosfet switch which drive the convertor in buck or boost mode. The control algorithm used to achieve true MPPT is an iterative process which uses local voltage measured and neighbor to neighbor communication to update the algorithm and thus ecient tracking. This architecture overcomes the problem of the conventional power electronics solution for series connected PV module with mismatch, where there is a compromise between system eciency and total power production. Since the di erential convertor deals only with the mismatched power which is just a small fraction of total power and all convertors having same e-ciency the overall eciency can be improved signi cantly. If there is no mismatch between the modules then ideally no power loss will occur in DPP convertor and the eciency of system is limited by central invertor. This algorithm uses graph Laplacian approach where Laplacian matrix is used to obtain information from neighboring PV module. This approach reduces the number of iterations at each step thus improving the tracking speed with no added hardware making it more suitable for long series string PV module. Algorithm along with simulation and its properties are presented in this paper
    corecore