7,278 research outputs found

    A Strategic Model for Investment in Korean Shipping Under the New Liberalisation Treaty

    Get PDF
    Merged with duplicate record 10026.1/1892 on 27.02.2017 by CS (TIS)Following trade liberalisation, shipping has been further affected by the world economic environment. Despite arguments as to whether the nature of the shipping industry is a liberalised one or not, it is now clearly seen as the case by the shipping industry itself. The primary goal of this thesis is to examine the attitudes within Korean shipping circles. An empirical study was carried out to evaluate how shipping is being influenced by liberalisation under the new rules, established by the World Trade Organisation and the Organisation for Economic Co-operation and Development. The null hypothesis was that there would be no substantial changes in Korean Shipping following liberalisation. The null hypothesis was rejected, which means that it was recognised by Korean shipping practitioners that there were significant changes after liberalisation. A further study was undertaken to test for relationships between the perspectives of four groups~ financial managers of shipping companies, bankers, government policy makers and sales managers from shipbuilding companies. It transpired that there was unity in their perceptions of shipping investment. A hypothesised seven-factor strategic model of the shipping industry was initially proposed and re-interpreted following the empirical results. To cope with the new competitive market, strategic options are likely to include tax and registry considerations. Finally, following the financial crisis in Korea last year, which occurred before this research was completed, interviews and a survey were conducted, based on a random selection of previous respondents. This was to establish whether their views had changed. The results revealed that they were now very hesitant to make any new investment decisions given the present situation. However, respondents are sure that there will be no further measures to impede the current liberalisation moves in Korea. Rather they regard this financial crisis as a mechanism to accelerate liberalisation, following the International Monetary Fund's options to dismantle the Korean protectionist barriers

    Quartet consistency count method for reconstructing phylogenetic trees

    Full text link
    Among the distance based algorithms in phylogenetic tree reconstruction, the neighbor-joining algorithm has been a widely used and effective method. We propose a new algorithm which counts the number of consistent quartets for cherry picking with tie breaking. We show that the success rate of the new algorithm is almost equal to that of neighbor-joining. This gives an explanation of the qualitative nature of neighbor-joining and that of dissimilarity maps from DNA sequence data. Moreover, the new algorithm always reconstructs correct trees from quartet consistent dissimilarity maps.Comment: 11 pages, 5 figure

    On extensions of representations for compact Lie groups

    Get PDF
    Let HH be a closed normal subgroup of a compact Lie group GG such that G/HG/H is connected. This paper provides a necessary and sufficient condition for every complex representation of HH to be extendible to GG, and also for every complex GG-vector bundle over the homogeneous space G/HG/H to be trivial. In particular, we show that the condition holds when the fundamental group of G/HG/H is torsion free.Comment: 10 pages, AMS-LaTeX v1.

    A Design of MAC Model Based on the Separation of Duties and Data Coloring: DSDC-MAC

    Get PDF
    Among the access control methods for database security, there is Mandatory Access Control (MAC) model in which the security level is set to both the subject and the object to enhance the security control. Legacy MAC models have focused only on one thing, either confidentiality or integrity. Thus, it can cause collisions between security policies in supporting confidentiality and integrity simultaneously. In addition, they do not provide a granular security class policy of subjects and objects in terms of subjects\u27 roles or tasks. In this paper, we present the security policy of Bell_LaPadula Model (BLP) model and Biba model as one complemented policy. In addition, Duties Separation and Data Coloring (DSDC)-MAC model applying new data coloring security method is proposed to enable granular access control from the viewpoint of Segregation of Duty (SoD). The case study demonstrated that the proposed modeling work maintains the practicality through the design of Human Resources management System. The proposed model in this study is suitable for organizations like military forces or intelligence agencies where confidential information should be carefully handled. Furthermore, this model is expected to protect systems against malicious insiders and improve the confidentiality and integrity of data

    Classification of Equivariant Complex Vector Bundles over a Circle

    Full text link
    In this paper we characterize the fiber representations of equivariant complex vector bundles over a circle and classify these bundles. We also treat the triviality of equivariant complex vector bundles over a circle by investigating the extensions of representations. As a corollary of our results, we calculate the reduced equivariant K-group of a circle for any compact Lie group.Comment: 15 pages, AMS-LaTeX v1.

    Classification of equivariant real vector bundles over a circle

    Full text link
    This is a continuation of the authors' previous work [math.AT/9910001] on classification of equivariant complex vector bundles over a circle. In this paper we classify equivariant real vector bundles over a circle with a compact Lie group action, by characterizing the fiber representations of them, and by using the result of the complex case. We also treat the triviality of them. The basic phenomenon is similar to the complex case but more complicated here.Comment: 16 pages, AMS-LaTeX v1.
    corecore