227 research outputs found
Riesgo de quiebra mediante análisis discriminante
El objetivo principal de este trabajo es construir un modelo de predicción de quiebra específico para empresas pertenecientes al sector de la alimentación mediante el análisis discriminante. La predicción de quiebra también se ha realizado con otros modelos, como son el análisis financiero y el modelo de Altman, con el fin de poder ser comparados, en cuanto a tiempo, costes y grado de fiabilidad.
El análisis discriminante trata de identificar si una empresa pertenece a un determinado
grupo (activas o quebradas) a partir de una serie de variables con mayor capacidad
discriminante, y permite crear funciones clasificadoras para asignar nuevas empresas en uno de
los grupos.
Para la construcción del modelo, se ha utilizado como herramienta el programa IBM SPSS
statistics, que permite identificar esas variables con capacidad discriminante y estimar las
funciones de clasificaciónUniversidad de Sevilla. Grado en Finanzas y Contabilida
Recommended from our members
EVALUATION OF RECOMMENDED MODULAR EMAIL BUILDING APPROACHES
Customer relationship management acts as the backbone of marketing. For any company marketing is the most important sector to promote a company and attract customers. Email marketing is one of the most effective ways of digital marketing. However, the cost of design and development is time consuming and redundant. Marketers and project managers are frequently unassertive about how to solve these issues. Although there are blogs, articles and services available for marketing email development, the lack of research in the effectiveness of email building architecture bolsters the need for this study. The project presents an architecture that modularizes the way email architecture is built. The architecture is demonstrated using HTML, CSS and JavaScript. Further the project explains how the same architecture can be implemented using the salesforce marketing cloud. With the help of a case study the project establishes the importance of modularizing email development which supports proposed architecture. The result of the case study proves that modularizing email creation as proposed reduces time required for email development on a large scale. Suggested areas for further study include testing in large scale organizational settings and doing a quantitative analysis. Another area of improvement is porting this architecture to other customer relationship platforms
Characterizing Optical Loss in Orientation Patterned III-V Materials Using Laser Calorimetry
This research examines the optical loss in orientation patterned III-V materials. Laser calorimetry technique was assembled to measure the absorption loss in GaAs, GaP and Fe2+ZnSe samples. Three different methods are explained and utilized to calculate the absorptance value from the calorimetry data. Absorption coefficient values were found for three different samples of GaAs ranging from 0.025+-0.009 cm-1 to 0.80+-0.08 cm-1, all within the sphere of published values for GaAs. A Complete Angle Scatter Instrument (CASI) was used to determine scatter at incident angles ranging from 0 to 55.5 degrees from two OPGaAs samples using an 8.16 micrometer, p-polarized incident laser light. Diffraction peaks were observed in the samples with high impurities, with domains in the material acting as diffraction gratings. FTIR measurements were conducted using a wire grid polarizer on the CASI samples to investigate transmission signal variations with change in incident polarization. Both patterned GaAs samples exhibited some polarization effect from the grated material. The amount of transmission detected changed by as much as 20% for both samples as they were rotated to change incident polarization
AODVSEC: A Novel Approach to Secure Ad Hoc on-Demand Distance Vector (AODV) Routing Protocol from Insider Attacks in MANETs
Mobile Ad hoc Network (MANET) is a collection of mobile nodes that can
communicate with each other using multihop wireless links without requiring any
fixed based-station infrastructure and centralized management. Each node in the
network acts as both a host and a router. In such scenario, designing of an
efficient, reliable and secure routing protocol has been a major challenging
issue over the last many years. Numerous schemes have been proposed for secure
routing protocols and most of the research work has so far focused on providing
security for routing using cryptography. In this paper, we propose a novel
approach to secure Ad hoc On-demand Distance Vector (AODV) routing protocol
from the insider attacks launched through active forging of its Route Reply
(RREP) control message. AODV routing protocol does not have any security
provision that makes it less reliable in publicly open ad hoc network. To deal
with the concerned security attacks, we have proposed AODV Security Extension
(AODVSEC) which enhances the scope of AODV for the security provision. We have
compared AODVSEC with AODV and Secure AODV (SAODV) in normal situation as well
as in presence of the three concerned attacks viz. Resource Consumption (RC)
attack, Route Disturb (RD) attack, Route Invasion (RI) attack and Blackhole
(BH) attack. To evaluate the performances, we have considered Packet Delivery
Fraction (PDF), Average End-to-End Delay (AED), Average Throughput (AT),
Normalized Routing Load (NRL) and Average Jitter and Accumulated Average
Processing Time.Comment: 20 Pages, 24 Figure
We should look to the Golden State for electoral innovations to increase political representation
Since 2010, the California State Assembly has seen white representation fall and an increase in the number of African American, Asian American and Latino legislators. Sara Sadhwani writes that much of this change may be down to the Golden State's adoption of the top-two primary system in 2012, which allows candidates to compete in an open primary with the top two vote winners advancing to the general election, regardless of their party
A Study on the Association of Entrepreneurship Ecosystem with Financial Inclusion
Purpose: The purpose of this study is to examine the association of entrepreneurship ecosystem with financial inclusion, and to explore the potential ways in which the ecosystem can be leveraged to improve access to financial services for marginalized communities.
Theoretical framework: The study utilizes the ecosystem approach to entrepreneurship, which emphasizes the interdependence and interplay of various stakeholders in the entrepreneurial process. The study also draws on the concept of financial inclusion, which refers to the provision of affordable and accessible financial services to all individuals and businesses.
Design/methodology/approach: The study employs a mixed-methods approach, including a literature review, case studies, and surveys, to collect data from a variety of stakeholders in the entrepreneurship ecosystem.
Findings: The findings suggest that the entrepreneurship ecosystem plays a critical role in promoting financial inclusion. The ecosystem can be leveraged to increase access to financial services for marginalized communities through the development of innovative financial products and services, the creation of mentorship and networking opportunities, and the promotion of policies that encourage financial inclusion.
Research, practical and social implications: The study contributes to the understanding of the relationship between entrepreneurship and financial inclusion, and has implications for policymakers and practitioners seeking to promote financial inclusion through entrepreneurship. The findings can also inform the design and implementation of programs and policies aimed at promoting entrepreneurship and financial inclusion in marginalized communities.
Originality/value: The study is among the first to examine the association of entrepreneurship ecosystem with financial inclusion and to explore the potential ways in which the ecosystem can be leveraged to improve access to financial services for marginalized communities
FCC Five Year Deorbit Compliance Tools for Standard Low Earth Orbiting SmallSats Employing Passive Re-Entry Techniques
On September 29, 2022, the Federal Communications Committee (FCC) adopted a regulation to address the growing issue of orbital debris, requiring spacecraft in orbits of 2,000 km or less to deorbit as soon as possible, but within no more than five years after the end of the mission. These regulations will be enforced starting in 2024 and will apply to network providers both licensed in the United States and foreign-licensed seeking U.S. market access.
Given the updated legislation, various communications providers may find that their traditional system architectures are not compliant with the five-year rule. In this work, the authors assess the outputs of Orbital Debris Assessment Reports (ODARs) operators have submitted to the FCC and then utilize NASA’s Debris Assessment Software (DAS) and Ansys’s Systems Toolkit (STK) to determine deorbit lifetime for standard bus sizes.
From the data analysis, the relationship between different parameters (such as apogee, area-to-mass ratio, and mission end year) and their respective deorbit time is mapped to create a predictive, accessible reference intended to provide both commercial satellite providers and academic small satellite operators with an efficient method to initially gauge whether the design of their systems will comply with the updated legislations
- …