1,226 research outputs found

    Security Analysts and Market Reaction:Caveat for Monitoring

    Get PDF
    Security analysts, analyst forecast and market reaction are anecdotal in restructuring transactions, sometime conflicting and some other time imperative to the process of transaction. This article attempts to highlight a consistent association between analyst, market reaction and corporate restructuring. A close intermediation between those themes is analysed in this article, implying the relationship is contiguous. However issues of delayed price adjustment, conglomerate stock break-ups and negative earnings surprises are not discussed in this paper, though such factors are ingeniously important and crucial to the process of corporate restructuring.Security Analysts, Forecasting and Agency Cost

    Neural Networks: Is it hermeneutic?

    Get PDF
    This paper proposes a synoptic methodology to evaluate the determinants of audit fees by utilising Neural Networks. First, a brief discussion is presented to highlight the significant application of Neural Network in the areas of financial management; second the framework of proposed methodology has been outlined to examine the implication of audit fees on target sample. The underlying rational of this paper is to establish NNs as a diagnostic tool to assess the effect of audit fees on firms, which indeed warrants further empirical investigation. The importance of NNs emerges from the fact that if external and internal audit fees can be disseminated by employing this methodology which is perceived more significantly robust than other econometric models, then accounting standards can be improved.Neural Networks and Audit Fee

    Genetic Algorithms: Genesis of Stock Evaluation

    Get PDF
    The uncertainty of predicting stock prices emanates pre-eminent concerns around the functionality of the stock market. The possibility of utilising Genetic Algorithms to forecast the momentum of stock price has been previously explored by many optimisation models that have subsequently addressed much of the scepticism. In this paper the author proposes a methodology based on Genetic Algorithms and individual data maximum likelihood estimation using logit model arguing that forecasting discrepancy can be rationalised by combined approximation of both the approaches. Thus this paper offers a methodological overture to further investigate the anomalies surrounding stock market. In the main, this paper attempts to provide a temporal dimension of the methods transposed on recurrent series of data over a fixed window conjecturereGenetic Algorithms, Individual Maximum Likelihood Estimation, Stock Price

    Estimation of biomass density and carbon storage in the forests of Andhra Pradesh, India, with emphasis on their deforestation and degradation conditions

    Get PDF
    The current study evaluates the growing stock, biomass and carbon content of Andhra Pradesh state’s forest (India) along with its current status of forest degradation and loss. For this purpose, the study used the growing stock data collected by state forest department in 2010 for the calculation of biomass and carbon storage using the standard conversion and expansion factors given by IPCC. The analysis shows low biomass and carbon values for the state’s forest in comparison to the mean values recorded in different studies made for Andhra Pradesh. It is also observed to be lower when compared with the average carbon and biomass for Indian forests. Overall, the analysis showed degradation and loss of forest in the state, coupled with reduction in biomass and carbon sink

    Dynamics of circular arrangements of vorticity in two dimensions

    Get PDF
    The merger of two like-signed vortices is a well-studied problem, but in a turbulent flow, we may often have more than two like-signed vortices interacting. We study the merger of three or more identical co-rotating vortices initially arranged on the vertices of a regular polygon. At low to moderate Reynolds numbers, we find an additional stage in the merger process, absent in the merger of two vortices, where an annular vortical structure is formed and is long-lived. Vortex merger is slowed down significantly due to this. Such annular vortices are known at far higher Reynolds numbers in studies of tropical cyclones, which have been noticed to a break down into individual vortices. In the pre-annular stage, vortical structures in a viscous flow are found here to tilt and realign in a manner similar to the inviscid case, but the pronounced filaments visible in the latter are practically absent in the former. Interestingly at higher Reynolds numbers, the merger of an odd number of vortices is found to proceed very differently from that of an even number. The former process is rapid and chaotic whereas the latter proceeds more slowly via pairing events. The annular vortex takes the form of a generalised Lamb-Oseen vortex (GLO), and diffuses inwards until it forms a standard Lamb-Oseen vortex. For lower Reynolds number, the numerical (fully nonlinear) evolution of the GLO vortex follows exactly the analytical evolution until merger. At higher Reynolds numbers, the annulus goes through instabilities whose nonlinear stages show a pronounced difference between even and odd mode disturbances. It is hoped that the present findings, that multiple vortex merger is qualitatively different from the merger of two vortices, will motivate studies on how multiple vortex interactions affect the inverse cascade in two-dimensional turbulence.Comment: Abstract truncated. Paper to appear in Physical Review

    Flooding attacks to internet threat monitors (ITM): Modeling and counter measures using botnet and honeypots

    Full text link
    The Internet Threat Monitoring (ITM),is a globally scoped Internet monitoring system whose goal is to measure, detect, characterize, and track threats such as distribute denial of service(DDoS) attacks and worms. To block the monitoring system in the internet the attackers are targeted the ITM system. In this paper we address flooding attack against ITM system in which the attacker attempt to exhaust the network and ITM's resources, such as network bandwidth, computing power, or operating system data structures by sending the malicious traffic. We propose an information-theoretic frame work that models the flooding attacks using Botnet on ITM. Based on this model we generalize the flooding attacks and propose an effective attack detection using Honeypots
    • …
    corecore