21 research outputs found

    Valuing companies listed on the Macedonian Stock Exchange on the basis of the profitability of the investment

    Get PDF
    The investment strategy to be used by an investor will depend on the form of the price efficiency of the capital market. The reaching of an appropriate business decision about the investment of available financial means is not always easy. Therefore, it is necessary to perform a good analysis of the profitability and the logicality of the investment of available finances. The analysis based on the financial reports data which are publicly available enables the determining of certain indicators which can be used to value the companies, on the basis of which a rational decision can be reached in the case there is desire to invest in those companies. Except in real investments, nowadays investors more and more prefer to invest in securities, shares or bonds. Investments in the form of shares are more attractive for those investors who take higher risk, but at the same time expect a higher revenue

    Social-Economic Advantages Of Weighted C-Centers And M-Centers In North Macedonia

    Get PDF
    Graph theory has many applications, because with the help of graphs we can model various complex problems, such as the placement of roads and intersections, the placement of electricity networks, computer networks, the placement of facilities of public importance, etc. Starting from the chaos that appears in the Capital, especially in front of the University Clinic or facilities of public importance, we decided to give a mathematical solution to these problems. In the paper, in addition to the theoretical elaboration on the concepts of graph theory, Floyd's Algorithm for minimum distances, concepts for weighted c-centers and m-centers, we will build the graph of the most important roads in North Macedonia, where as vertices we will use cities and crossroads in North Macedonia, then we will find c-centers and m-centers without and with weight in North Macedonia, and we will give some reasoning on the socio-economic advantages of these centers

    Use composite commutation functions in determining the Diffie-Hellman keys

    Get PDF
    The Diffie-Hellman protocol was proposed by Whitfield Diffie and Martin Hellman. Diffie and Hellman wanted a mathematical function where encryption and decryption would not be important, ie ďż˝(ďż˝(ďż˝))=ďż˝(ďż˝(ďż˝)). Such functions exist, but most are two-way, ie finding inverse functions is easy work eg. such a function is ďż˝ (ďż˝) = 2ďż˝. A practical example of these functions is the electrical switch. However, these functions are not usable in cryptography. Important are the concrete forms of so-called one-way functions. These problem functions appear to find their inverse functions, which are found through complex procedures. So for a given ďż˝ we can easily compute ďż˝(ďż˝), but for given ďż˝(ďż˝) it is difficult to measure ďż˝, but if the secret value is known, then both the direct value and the inverse value are easily counted. Modular arithmetic means the presence of a large number of such one-time functions. So we will explore in this section for finding such functions

    Application of Dijkstra Alegorithm to Define the Lower Price in the Distribution Network of Suppling

    Get PDF
    In this paper-work beside the review of theories of graphs , Dijkstra alegorithm for finding the shortest way , here we can present the application of Dijkstra alegorithm how to find the lowest price of the supplying for a costumer in the network distributions, presented with an example. Considering that from manufacturer to the last costumer the price variates, we ask: from whom distributions we can supply the same product and pay the lower price but the quality will be same

    Efficiency of calculating GCD through computer with help of modified Euclidean algorithm

    Get PDF
    Euclid’s algorithm remains to be the most efficient method for finding greatest common divisor of two full numbers. By using the meaning of congruences this research paper will make a modification in the note of the Euclid’s algorithm. Here are discussed both classic and modified methods, by putting appropriate codes and observe the duration of the calculation through the computer

    Hadamard\u27s Coding Matrix and Some Decoding Methods

    Get PDF
    In this paper, we will show a way to form Hadamard\u27s code order n=2^p (where p is a positive integer) with the help of Rademacher functions, through which matrix elements are generated whose binary numbers {0,1} , while its columns are Hadamard\u27s encodings and are called Hadamard\u27s coding matrix. Two illustrative examples will be taken to illustrate this way of forming the coding matrix. Then, in a graphical manner and by means of Hadamard\u27s form codes, the message sequence encoding as the order coding matrix will be shown. It will also give Hadamard two methods of decoding messages, which are based on the so-called Haming distance. Haming\u27s distance between two vectors u and v was denoted by d(u,v) and represents the number of places in which they differ. In the end, three conclusions will be given, where a comparison will be made of encoding and decoding messages through Haming\u27s coding matrices and distances

    Social-economic advantages of c-centres and m-centres with weight in Kosovo

    Get PDF
    This Graph theory has an enormous number of applications because through them, we may model different complex problems such as road and crossroad placement, electricity network and computer network placement, objects with public preeminence, etc. Deriving from the chaos that appears in the capital city, particularly in front of Clinic University or preeminent public objects, we decided to give a mathematical solution to these problems. Oftentimes we encounter on the problem for finding the most suitable place for building an object that may serve for different social reasons in peripheral areas. This paper gives a special significance to object placement for social-economic reasons in Kosovo and aims to give a solution for this problem. Additional to the theoretical elaboration on the graph concepts theory, Floyd’s algorithm for minimum distances, and concepts for c and m centers with weight we will model the graph of the most important roads in Kosovo, whereas vertices we have used cities and crossroads of Kosovo. Therefore, we will find c and m centers with and without weight in Kosovo, and we will give some reasons for their social-economic advantages Keywords: Graph algorithm, c-center, m-center, Kosovo, economic advantages DOI: 10.7176/ISDE/12-5-04 Publication date:November 30th 202

    Analyzing the linearity of some operators

    Get PDF
    Linear operators occupy an important place in functional analysis and linear algebra, which are among the most important and substantive disciplines of mathematics, whose methods and results have created an indispensable apparatus for the development of numerical mathematics, theory of approximations, equations differential and especially mathematical physics and applied mathematics. Also, linear operators are a central object of study in vector space theory. A linear operator is a function which satisfies the conditions of additivity and homogeneity. Not every function is linear operators. We will try to explore some functions which are also linear operators

    Upper Nilradical In Terms Of A Left Ideal In X The Ring Of Real Matrix

    Get PDF
               Based on the idea of Andrunakievic and Rjabuhin for linking Jacobson's radical to a right-wing ideal [3], we interfered with the theory of the upper nilradical, examining them concerning a unilateral ideal of an associative ring. We'll be here briefly as soon as possible

    Using congruence in encoding musical partituras

    Get PDF
    Along with theoretical review of partituras and encryption systems, we have tried to conduct encryption of sheets by encoding all of its elements such as: encoding musical notes, encoding values of notes and intermissions, encoding accords, encoding tonalities and encoding rhythm whereby the original musical piece is transformed into an irregular and meaningless sheet. Information technology today has allowed for easier copying of authorial pieces; therefore, it is necessary to know encryption which allows protection of pieces from any misuse. Cryptology including knowledge of congruence deals with resolution of these insecurities. The significance of this paper lies in intertwining knowledge from music, math and computer sciences thus rendering our paper into an inter-disciplinary paper and we believe this will increase curiosity and the interest as well. In order to make our work more concrete, we have included encoding and decoding of a well-known melody from Shkodra“A’SAMAN TRËNDAFILI ÇELËS”, whereby as encryption key we used a two-tact fragment from the song “O VENDI IM”
    corecore