74 research outputs found

    [Editorial] Accounting scholarship and management by numbers

    Get PDF
    There is a plethora of indices ranking universities, departments, and individual researchers based on a variety of indices. These invariably include a measurement of research, usually based on a combination of quantity and quality of journal publications. Informal discussions with accounting researchers invariably turns to the question of journal rankings and performance management indicators. Why is this so

    Fair Value Measurement Under Level 2 Inputs: Do Market and Transaction Multiples Catch Firm-Specific Risk Factors?

    Get PDF
    This paper focuses on fair value measurement under the IFRS 13 assumptions and the reliability of the market and transaction multiples evaluations (\u201cLevel 2\u201d methods). We test the reliability of multiples evaluation approaches in different economic sectors, by comparing the fair value of 1678 companies estimated by multiples with the effective market capitalization over 15 years. Multiples\u2019 fair value does not provide a reliable measure of a company\u2019s value, with a gap that varies depending upon portfolios and time. In the case of observable Level 2 fair value indicators for a market, such as market multiples, the company\u2019s fair value is not consistent with the real market value. Thus, whenever Level 2 indicators are not observable, the method is increasing volatility and intrinsic evaluation risk

    Spontaneous purinergic neurotransmission in the mouse urinary bladder

    Get PDF
    Spontaneous purinergic neurotransmission was characterized in the mouse urinary bladder, a model for the pathological or ageing human bladder. Intracellular electrophysiological recording from smooth muscle cells of the detrusor muscle revealed spontaneous depolarizations, distinguishable from spontaneous action potentials (sAPs) by their amplitude (< 40 mV) and insensitivity to the L-type Ca(2+) channel blocker nifedipine (1 μm) (100 ± 29%). Spontaneous depolarizations were abolished by the P2X(1) receptor antagonist NF449 (10 μm) (frequency 8.5 ± 8.5% of controls), insensitive to the muscarinic acetylcholine receptor antagonist atropine (1 μm) (103.4 ± 3.0%), and became more frequent in latrotoxin (LTX; 1 nm) (438 ± 95%), suggesting that they are spontaneous excitatory junction potentials (sEJPs). Such sEJPs were correlated, in amplitude and timing, with focal Ca(2+) transients in smooth muscle cells (measured using confocal microscopy), suggesting a common origin: ATP binding to P2X(1) receptors. sAPs were abolished by NF449, insensitive to atropine (126 ± 39%) and increased in frequency by LTX (930 ± 450%) suggesting a neurogenic, purinergic origin, in common with sEJPs. By comparing the kinetics of sAPs and sEJPs, we demonstrated that sAPs occur when sufficient cation influx through P2X(1) receptors triggers L-type Ca(2+) channels; the first peak of the differentiated rising phase of depolarizations – attributed to the influx of cations through the P2X(1) receptor – is of larger amplitude for sAPs (2248 mV s(−1)) than sEJPs (439 mV s(−1)). Surprisingly, sAPs in the mouse urinary bladder, unlike those from other species, are triggered by stochastic ATP release from parasympathetic nerve terminals rather than being myogenic

    Fingerprint Verification Based On Image

    No full text
    this paper the problem of fingerprint verification via the Internet is investigated. Specifically, the method that is used for the above purpose is based on a traditional finger scanning technique, involving the analysis of small unique marks of the finger image known as minutiae. Minutiae points are the ridge endings or bifurcations branches of the finger image. The relative position of these minutiae is used for comparison, and according to empirical studies, two individuals will not have eight or more common minutiae. [1,2]. A typical live-scan fingerprint will contain 30-40 minutiae. Other systems analyze tiny sweat pores on the finger that, in the same way as minutiae, are uniquely positioned. Furthermore, such methods may be subject to attacks by hackers when biometric features are transferred via Internet [3
    • …
    corecore