Search results for: cash transfers
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 364

Search results for: cash transfers

214 Perception of Consumer Behavior on Mobile Banking Offered by the National and Multinational Banks in UAE with Special Reference to Emirates NBD and Citibank

Authors: Aarohi Surya

Abstract:

The number of mobile banking users continues to climb across the world due to its increasing popularity, and UAE is no exception. This type of banking is part of the core strategy of most of the financial institutions that allows its customers to conduct a range of financial transactions through mobile apps to cash in the high demand from the bankers. This study aims at evaluating service quality of online banking in Dubai, one of the swiftly growing cities of Middle East. The paper mainly compares online banking services of Multinational bank and National Bank with special reference to Citibank and Emirates NBD. A structured questionnaire survey is conducted among various target groups. The research has been focused on mainly 4 significant areas of online banking, i.e. Privacy, Responsiveness, Reliability, and Efficiency of customer data. Information was analyzed statistically on SPSS to investigate the service quality of e-banking.

Keywords: customer satisfaction, service quality, responsiveness, online banking

Procedia PDF Downloads 239
213 Opportunities of Diversification Strategy Investment among the Top Ten Cryptocurrencies in Crypto Industry

Authors: Surayyo Shaamirova, Anwar Hasan Abdullah Othman

Abstract:

This study investigates the co-integration association between the top 10 cryptocurrencies, namely Bitcoin, Ethereum, Ripple, Bitcoin Cash, EOS, Cardano, Litecoin, Stellar, IOTA, and NEO. The study applies Johansen Juselius co-integration test to examine the long-run co-integration and utilize the Engle and Granger casualty test to examine the short-run relationship. The findings of the study show that there is a strong co-integration relationship among the cryptocurrencies; however, in the short run, there is no causal relationship among the crypto currencies. These results, therefore, suggest that there are portfolio diversification opportunities in the cryptocurrencies industry when it comes to long run investment decisions, on the other hand, the cryptocurrencies industry shows the characteristics of efficiency in the short-run. This is an indication of a non-speculation investment in the cryptocurrencies industry in the short term investment.

Keywords: cryptocurrencies, Johansen-Juselius co-integration test, Engle and Granger casualty test, portfolio diversification

Procedia PDF Downloads 111
212 Investigating the Effect of Different Design Factors on the Required Length of the Ambient Air Vaporizer

Authors: F. S. Alavi

Abstract:

In this study, MATLAB engineering software was used in order to model an industrial Ambient Air Vaporizer (AAV), considering combined convection and conduction heat transfers from the fins and the tube. The developed theoretical model was then used to investigate the effects of various design factors such as gas flow rate, ambient air temperature, fin thickness and etc. on total vaporizer ‘s length required. Cryogenic liquid nitrogen was selected as an input fluid, in all cases. According to the results, increasing the inlet fluid flow rate has direct linear effect on the total required length of vaporizer. Vaporizer’s required length decreases by increasing the size of fin radius or size of fin thickness. The dependency of vaporizer’s length on fin thickness’ size reduces at higher values of thickness and gradually converge to zero. For low flow rates, internal convection heat transfer coefficient depends directly on gas flow rate but it becomes constant, independent on flow rate after a specific value. As the ambient air temperature increases, the external heat transfer coefficient also increases and the total required length of vaporizer decreases.

Keywords: heat exchanger, modeling, heat transfer, design

Procedia PDF Downloads 84
211 Learning through Gaming with Mobile Devices

Authors: Luis Rodrigo Valencia Pérez, Juan Manuel Peña Aguilar, Adelina Morita Alexander, Alberto Lamadrid Alvarez, Héctor Fernando Valencia Pérez

Abstract:

Financial education is among the areas of opportunity in the Spanish-speaking from an early age to high school, through mobile devices such as cell phones and tablets using ludic and fun applications like interactive games, children can learn money management and investment through time, thereby fostering the habit of saving and/or sound management of cash and family business resources, having interaction with an uncontrolled environment such as the involvement of other players in the external decisions of the environment in which the game is play. The application proposed in Phase 1 (design and development) was designed in multi-user environments, under methodologies of hybrid programming for any platform on the market and designed under CMMI standards that allow for quality production over time, following up on these improvements counting with continuous user feedback and usage statistics.

Keywords: mobile educational games, ludic games, children, multiuser, design and software development

Procedia PDF Downloads 347
210 An Improved Method on Static Binary Analysis to Enhance the Context-Sensitive CFI

Authors: Qintao Shen, Lei Luo, Jun Ma, Jie Yu, Qingbo Wu, Yongqi Ma, Zhengji Liu

Abstract:

Control Flow Integrity (CFI) is one of the most promising technique to defend Code-Reuse Attacks (CRAs). Traditional CFI Systems and recent Context-Sensitive CFI use coarse control flow graphs (CFGs) to analyze whether the control flow hijack occurs, left vast space for attackers at indirect call-sites. Coarse CFGs make it difficult to decide which target to execute at indirect control-flow transfers, and weaken the existing CFI systems actually. It is an unsolved problem to extract CFGs precisely and perfectly from binaries now. In this paper, we present an algorithm to get a more precise CFG from binaries. Parameters are analyzed at indirect call-sites and functions firstly. By comparing counts of parameters prepared before call-sites and consumed by functions, targets of indirect calls are reduced. Then the control flow would be more constrained at indirect call-sites in runtime. Combined with CCFI, we implement our policy. Experimental results on some popular programs show that our approach is efficient. Further analysis show that it can mitigate COOP and other advanced attacks.

Keywords: contex-sensitive, CFI, binary analysis, code reuse attack

Procedia PDF Downloads 286
209 Numerical Investigation of Hygrothermal Behavior on Porous Building Materials

Authors: Faiza Mnasri, Kamilia Abahri, Mohammed El Ganaoui, Slimane Gabsi

Abstract:

Most of the building materials are considered porous, and composed of solid matrix and pores. In the pores, the moisture can be existed in two phases: liquid and vapor. Thus, the mass balance equation is comprised of various moisture driving potentials that translate the movement of the different existing phases occupying pores and the hygroscopic behavior of a porous construction material. This study suggests to resolve a hygrothermal mathematical model of heat and mass transfers in different porous building materials by a numerical investigation. Thereby, the evolution of temperature and moisture content fields has been processed. So, numerous series of hygrothermal calculation on several cases of wall are exposed. Firstly, a case of monolayer wall of massive wood has been treated. In this part, we have compared the numerical solution of the model on one and two dimensions and the effect of dimensional space has been evaluated. In the second case, three building materials (concrete, wood fiberboard and wooden insulation) are tested separately with the same boundary conditions and their hygrothermal behavior are compared. The evaluation of the exchange of heat and air at the interface between the wall and the interior ambiance is carried.

Keywords: building materials, heat transfer, moisture diffusion, numerical solution

Procedia PDF Downloads 254
208 Published Financial Statement as a Correlate of Investment Decision among Commercial Bank Stakeholders in Nigeria

Authors: C. F. Popoola, K. Akinsanya, S. B. Babarinde, D. A. Farinde

Abstract:

This study investigated published financial statement as correlate of investment decision among commercial bank stakeholders in Nigeria. A correlation research design was used in the study. 180 users of published financial statement were purposively sampled from Lagos and Ibadan. Data generated were analyzed using Pearson correlation and regression. The findings of the study revealed that, balance sheet is negatively related with investment decision (r=-.483; p < .01) while income statement (r= .249; p < .001), notes on the account (r= .230; p < .001), cash flow statement (r= .202; p < .001), value added statement (r= .328; p < .001) and five-year financial summary (r= .191 ;p < .01) are positively related with investment decision. Findings also revealed that components of published financial statement significantly predicted good investment decision (R2= .983; F(5,175)=284.5; p < .05) for commercial bank stakeholders. Therefore, it was suggested that Nigeria banks and professional bodies should instigate programs that will increase the knowledge of stakeholders on published financial statement.

Keywords: commercial banks, financial statement, income statement, investment decision, stakeholders

Procedia PDF Downloads 433
207 The Evolution of National Technological Capability Roles From the Perspective of Researcher’s Transfer: A Case Study of Artificial Intelligence

Authors: Yating Yang, Xue Zhang, Chengli Zhao

Abstract:

Technology capability refers to the comprehensive ability that influences all factors of technological development. Among them, researchers’ resources serve as the foundation and driving force for technology capability, representing a significant manifestation of a country/region's technological capability. Therefore, the cross-border transfer behavior of researchers to some extent reflects changes in technological capability between countries/regions, providing a unique research perspective for technological capability assessment. This paper proposes a technological capability assessment model based on personnel transfer networks, which consists of a researchers' transfer network model and a country/region role evolution model. It evaluates the changes in a country/region's technological capability roles from the perspective of researcher transfers and conducts an analysis using artificial intelligence as a case study based on literature data. The study reveals that the United States, China, and the European Union are core nodes, and identifies the role evolution characteristics of several major countries/regions.

Keywords: transfer network, technological capability assessment, central-peripheral structure, role evolution

Procedia PDF Downloads 48
206 Using Business Simulations and Game-Based Learning for Enterprise Resource Planning Implementation Training

Authors: Carin Chuang, Kuan-Chou Chen

Abstract:

An Enterprise Resource Planning (ERP) system is an integrated information system that supports the seamless integration of all the business processes of a company. Implementing an ERP system can increase efficiencies and decrease the costs while helping improve productivity. Many organizations including large, medium and small-sized companies have already adopted an ERP system for decades. Although ERP system can bring competitive advantages to organizations, the lack of proper training approach in ERP implementation is still a major concern. Organizations understand the importance of ERP training to adequately prepare managers and users. The low return on investment, however, for the ERP training makes the training difficult for knowledgeable workers to transfer what is learned in training to the jobs at workplace. Inadequate and inefficient ERP training limits the value realization and success of an ERP system. That is the need to call for a profound change and innovation for ERP training in both workplace at industry and the Information Systems (IS) education in academia. The innovated ERP training approach can improve the users’ knowledge in business processes and hands-on skills in mastering ERP system. It also can be instructed as educational material for IS students in universities. The purpose of the study is to examine the use of ERP simulation games via the ERPsim system to train the IS students in learning ERP implementation. The ERPsim is the business simulation game developed by ERPsim Lab at HEC Montréal, and the game is a real-life SAP (Systems Applications and Products) ERP system. The training uses the ERPsim system as the tool for the Internet-based simulation games and is designed as online student competitions during the class. The competitions involve student teams with the facilitation of instructor and put the students’ business skills to the test via intensive simulation games on a real-world SAP ERP system. The teams run the full business cycle of a manufacturing company while interacting with suppliers, vendors, and customers through sending and receiving orders, delivering products and completing the entire cash-to-cash cycle. To learn a range of business skills, student needs to adopt individual business role and make business decisions around the products and business processes. Based on the training experiences learned from rounds of business simulations, the findings show that learners have reduced risk in making mistakes that help learners build self-confidence in problem-solving. In addition, the learners’ reflections from their mistakes can speculate the root causes of the problems and further improve the efficiency of the training. ERP instructors teaching with the innovative approach report significant improvements in student evaluation, learner motivation, attendance, engagement as well as increased learner technology competency. The findings of the study can provide ERP instructors with guidelines to create an effective learning environment and can be transferred to a variety of other educational fields in which trainers are migrating towards a more active learning approach.

Keywords: business simulations, ERP implementation training, ERPsim, game-based learning, instructional strategy, training innovation

Procedia PDF Downloads 110
205 Accounting and Auditing Standards Influence on Income Smoothing Perspective in Islamic Financial Institutions

Authors: Fatma Ezzahra Kateb, Neila Boulila Taktak, Mohamed Kabir Hassan

Abstract:

We examine the impact of Islamic accounting and auditing standards issued by the Accounting and Auditing Organization for Islamic Financial Institutions (AAOIFI) on the income smoothing perspective of Islamic financial institutions located in the Middle East and North Africa region between 2013 and 2018. Based on General Least square regression for panel data, we find a significant and positive relationship between intentional income smoothing and earning persistence and cash flow predictability in all models. However, we discovered that AAOIFI accounting standards (FAS) had a negative and significant effect on intentional income smoothing and earning persistence. As a result, the income smoothing efficiency is lower for IFIs that use FASs than IFIs that use IFRSs. Our findings emphasize the need for specific standards to enhance the relevance of financial reports disclosed by Islamic financial institutions.

Keywords: AAOIFI, financial reporting quality, income smoothing perspective, MENA countries

Procedia PDF Downloads 62
204 An Approach to Tackle Start up Problems Using Applied Games

Authors: Aiswarya Gopal, Kamal Bijlani, Vinoth Rengaraj, R. Jayakrishnan

Abstract:

In the business world, the term “startup” is frequently ringing the bell with the high frequency of young ventures. The main dilemma of startups is the unsuccessful management of the unique risks that have to be confronted in the present world of competition and technology. This research work tried to bring out a game based methodology to improve enough real-world experience among entrepreneurs as well as management students to handle risks and challenges in the field. The game will provide experience to the player to overcome challenges like market problems, running out of cash, poor management, and product problems which can be resolved by a proper strategic approach in the entrepreneurship world. The proposed serious game works on the life cycle of a new software enterprise where the entrepreneur moves from the planning stage to secured financial stage, laying down the basic business structure, and initiates the operations ensuring the increment in confidence level of the player.

Keywords: business model, game based learning, poor management, start up

Procedia PDF Downloads 450
203 An Efficient Approach for Recyclable Waste Detection and Classification Using Deep Learning

Authors: Aminul Haque, Aminul Islam, Prabal Kumar Chowdhury

Abstract:

One of the world’s most pressing issues right now is the lack of a competent waste management system, particularly in emerging and underdeveloped countries. Recycling solid waste, which comprises numerous dangerous non-biodegradable sub-stances like glass, metals, plastics, etc, is the most essential step in reducing waste-related issues in the environment. Typically, collected waste includes all types of waste that must be thoroughly sorted to be recycled efficiently. Most countries use manual waste sorting techniques, which are efficient. Nevertheless, the waste sorting process by human beings is not safe as there is always a risk of exposing themselves to toxic wastes, which could be serious for their health. Our thesis presents a Deep Learning technique based on computer vision for automatically identifying waste. To construct the model, we used Convolutional Neural Networks, real-time object detection systems, such as YOLOv5 and YOLOv7, as well as several transfers learning-based architectures, including VGG16, MobileNet, Inception-Resnet-v2. The model is trained on numerous images for each type of waste to ensure no overfitting and greater accuracy. The highest accuracy we achieved for our waste detection model YOLOv5x, is 93.7%.

Keywords: deep learning, object detection, YOLOv7, image processing, computer vision

Procedia PDF Downloads 18
202 Value of Mergers

Authors: Reza Yaghoubi, Stuart Locke, Jenny Gibb

Abstract:

This study investigates sources of value in mergers and acquisitions. While much emphasis is put on operating synergies from acquisitions the evidence provided in this study shows that the difference between the WACCs of the combined firm and the merging firms may have a significant role on the value effect of mergers. These findings suggest that changes in the capital structure of the combined firm, compared to capital structures of the acquirer and the target, play a key role in determining the value of an acquisition. Moreover, findings of this study suggest that reducing the cost of capital of the combined firm, compared to the merging firms, is value creating even in the absence of operating synergies. Furthermore, this study shows that the component of value associated with the difference between the WACCs of the combined firm and the acquirer is mainly determined by leverage of the acquiring firm and the method of payment. While cash payment is value creating, high leverage of the acquirer prior to an acquisition can destroy value by raising the cost of capital of the firm. This is especially important to managers when they are planning an acquisition.

Keywords: acquisitions, mergers, synergy, value, WACC

Procedia PDF Downloads 240
201 Evaluation and Analysis of the Secure E-Voting Authentication Preparation Scheme

Authors: Nidal F. Shilbayeh, Reem A. Al-Saidi, Ahmed H. Alsswey

Abstract:

In this paper, we presented an evaluation and analysis of E-Voting Authentication Preparation Scheme (EV-APS). EV-APS applies some modified security aspects that enhance the security measures and adds a strong wall of protection, confidentiality, non-repudiation and authentication requirements. Some of these modified security aspects are Kerberos authentication protocol, PVID scheme, responder certificate validation, and the converted Ferguson e-cash protocol. Authentication and privacy requirements have been evaluated and proved. Authentication guaranteed only eligible and authorized voters were permitted to vote. Also, the privacy guaranteed that all votes will be kept secret. Evaluation and analysis of some of these security requirements have been given. These modified aspects will help in filtering the counter buffer from unauthorized votes by ensuring that only authorized voters are permitted to vote.

Keywords: e-voting preparation stage, blind signature protocol, Nonce based authentication scheme, Kerberos Authentication Protocol, pseudo voter identity scheme PVID

Procedia PDF Downloads 267
200 Survey Based Data Security Evaluation in Pakistan Financial Institutions against Malicious Attacks

Authors: Naveed Ghani, Samreen Javed

Abstract:

In today’s heterogeneous network environment, there is a growing demand for distrust clients to jointly execute secure network to prevent from malicious attacks as the defining task of propagating malicious code is to locate new targets to attack. Residual risk is always there no matter what solutions are implemented or whet so ever security methodology or standards being adapted. Security is the first and crucial phase in the field of Computer Science. The main aim of the Computer Security is gathering of information with secure network. No one need wonder what all that malware is trying to do: It's trying to steal money through data theft, bank transfers, stolen passwords, or swiped identities. From there, with the help of our survey we learn about the importance of white listing, antimalware programs, security patches, log files, honey pots, and more used in banks for financial data protection but there’s also a need of implementing the IPV6 tunneling with Crypto data transformation according to the requirements of new technology to prevent the organization from new Malware attacks and crafting of its own messages and sending them to the target. In this paper the writer has given the idea of implementing IPV6 Tunneling Secessions on private data transmission from financial organizations whose secrecy needed to be safeguarded.

Keywords: network worms, malware infection propagating malicious code, virus, security, VPN

Procedia PDF Downloads 328
199 Determinants of Mobile Payment Adoption among Retailers in Ghana

Authors: Ibrahim Masud, Yusheng Kong, Adam Diyawu Rahman

Abstract:

Mobile payment variously referred to as mobile money, mobile money transfer, and mobile wallet refers to payment services operated under financial regulation and performed from or via a mobile device. Mobile payment systems have come to augment and to some extent try to replace the conventional payment methods like cash, cheque, or credit cards. This study examines mobile payment adoption factors among retailers in Ghana. A conceptual framework was adopted from the extant literature using the Technology Acceptance Model and the Theory of Reasoned action as the theoretical bases. Data for the study was obtained from a sample of 240 respondents through a structured questionnaire. The PLS-SEM was used to analyze the data through SPSS v.22 and SmartPLS v.3. The findings indicate that factors such as perceived usefulness, perceived ease of use, perceived security, competitive pressure and facilitating conditions are the main determinants of mobile payment adoption among retailers in Ghana. The study contributes to the literature on mobile payment adoption from developing country context.

Keywords: mobile payment, retailers, structural equation modeling, technology acceptance model

Procedia PDF Downloads 144
198 Hohmann Transfer and Bi-Elliptic Hohmann Transfer in TRAPPIST-1 System

Authors: Jorge L. Nisperuza, Wilson Sandoval, Edward. A. Gil, Johan A. Jimenez

Abstract:

In orbital mechanics, an active research topic is the calculation of interplanetary trajectories efficient in terms of energy and time. In this sense, this work concerns the calculation of the orbital elements for sending interplanetary probes in the extrasolar system TRAPPIST-1. Specifically, using the mathematical expressions of the circular and elliptical trajectory parameters, expressions for the flight time and the orbital transfer rate increase between orbits, the orbital parameters and the graphs of the trajectories of Hohmann and Hohmann bi-elliptic for sending a probe from the innermost planet to all the other planets of the studied system, are obtained. The relationship between the orbital transfer rate increments and the relationship between the flight times for the two transfer types is found. The results show that, for all cases under consideration, the Hohmann transfer results to be the least energy and temporary cost, a result according to the theory associated with Hohmann and Hohmann bi-elliptic transfers. Saving in the increase of the speed reaches up to 87% was found, and it happens for the transference between the two innermost planets, whereas the time of flight increases by a factor of up to 6.6 if one makes use of the bi-elliptic transfer, this for the case of sending a probe from the innermost planet to the outermost.

Keywords: bi-elliptic Hohmann transfer, exoplanet, extrasolar system, Hohmann transfer, TRAPPIST-1

Procedia PDF Downloads 161
197 An Analysis Study of a Participatory Design Workshop from the Perspectives of Communication Strategies and Tools

Authors: Meng-Yu Wun, Jiunde Lee

Abstract:

Participatory design transfers the role of design team becoming the facilitator who manages to work collaboratively with the 'partners of innovation': users. This facilitator role not just concerns the users’ behaviors or insights under the common practice of user-centered design, it emphasizes the importance of communication experience conducted by various strategies and tools in a workshop session which could profoundly impact the quality of the co-creation process. To investigate the communication experience in the participatory design, this study proposed a qualitative research to analyze communication strategies and tools. A participatory design workshop and following in-depth interviews were carried out to explore how participants (facilitators, users) might apply different strategies and tools to enhance the communication process. The major study findings are as follows: (a) roles had influence on communication experience; facilitators’ principles and methods influenced the usage of facilitation strategies in various situations, while users put more emphasis on communication activities and goals aimed to complete the design tasks, (b) communication tools should be both fixed and changeable: participants had fixed cognition on different forms of communication tools; with the fundamental cognition, they could choose and make use of tools according to their needs, (c) the management of workshop communication should be flexible: controlling the schedule, stimulating innovations, and creating the space for conversation are crucial to facilitate in a participatory workshop.

Keywords: communication experience, facilitation, participatory design, workshop

Procedia PDF Downloads 128
196 Pricing the Risk Associated to Weather of Variable Renewable Energy Generation

Authors: Jorge M. Uribe

Abstract:

We propose a methodology for setting the price of an insurance contract targeted to manage the risk associated with weather conditions that affect variable renewable energy generation. The methodology relies on conditional quantile regressions to estimate the weather risk of a solar panel. It is illustrated using real daily radiation and weather data for three cities in Spain (Valencia, Barcelona and Madrid) from February 2/2004 to January 22/2019. We also adapt the concepts of value at risk and expected short fall from finance to this context, to provide a complete panorama of what we label as weather risk. The methodology is easy to implement and can be used by insurance companies to price a contract with the aforementioned characteristics when data about similar projects and accurate cash flow projections are lacking. Our methodology assigns a higher price to an insurance product with the stated characteristics in Madrid, compared to Valencia and Barcelona. This is consistent with Madrid showing the largest interquartile range of operational deficits and it is unrelated to the average value deficit, which illustrates the importance of our proposal.

Keywords: insurance, weather, vre, risk

Procedia PDF Downloads 120
195 Leveraging NFT Secure and Decentralized Lending: A Defi Solution

Authors: Chandan M. S., Darshan G. A., Vyshnavi, Abhishek T.

Abstract:

In the evolving world of technology and digital assets, non-fungible tokens (NFTs) have emerged as the latest advancement. These digital assets represent ownership of intangible items and hold significant value. Unlike cryptocurrencies, like Ethereum or Bitcoin, NFTs cannot be exchanged due to their nature. Each NFT has an indivisible value. NFTs not only pave the way for financial services but also open up fresh opportunities for creators, buyers and artists. To revolutionize financing in the DeFi space, this proposed approach utilizes NFTs generated from digital arts. By eliminating intermediaries, this innovative method ensures trust and security in transactions. The idea entails automating borrower-lender interactions through contracts while securely storing data using blockchain technology. Borrowers can obtain funding by leveraging assets such as estate, artwork and collectibles that are often illiquid. The key component of this system is contracts that independently execute lending agreements and collateral transfers within predefined parameters. By leveraging the Ethereum blockchain, this project aims to provide consumers with access to a platform offering a wide range of financial services. The demonstration illustrates how NFT lending and borrowing is managed through contracts, providing a secure and trustworthy transaction environment.

Keywords: blockchain, defi, NFT, ethereum, marketplace

Procedia PDF Downloads 21
194 Financial Instruments Disclosure: A Review of the Literature

Authors: Y. Tahat, T. Dunne, S. Fifield, D. Power

Abstract:

Information about a firm’s usage of Financial Instruments (FIs) plays a very important role in determining its financial position and performance. Yet accounting standard-setters have encountered problems when deciding on the FI-related disclosures which firms must make. The primary objective of this paper is to review the extant literature on FI disclosure. This objective is achieved by surveying the literature on: the corporate usage of FIs; the different accounting standards adopted concerning FIs; and empirical studies on FI disclosure. This review concludes that the current research on FI disclosure has generated a number of useful insights. In particular, the paper reports that: FIs are a very important risk management mechanism in ensuring that companies have the cash available to make value-enhancing investments, however, without a clear set of risk management objectives, using such instruments can be dangerous; accounting standards concerning FIs have resulted in enhanced transparency about the usage of these instruments; and FI-related information is a key input into investors’ decision-making processes. Finally, the paper provides a number of suggestions for future research in the area.

Keywords: financial instruments, financial reporting, accounting standards, value relevance, corporate disclosure

Procedia PDF Downloads 387
193 Identification of CLV for Online Shoppers Using RFM Matrix: A Case Based on Features of B2C Architecture

Authors: Riktesh Srivastava

Abstract:

Online Shopping have established an astonishing evolution in the last few years. And it is now apparent that B2C architecture is becoming progressively imperative channel for even traditional brick and mortar type traders as well. In this completion knowing customers and predicting behavior are extremely important. More important, when any customer logs onto the B2C architecture, the traces of their buying patterns can be stored and used for future predictions. Such a prediction is called Customer Lifetime Value (CLV). Earlier, we used Net Present Value to do so, however, it ignores two important aspects of B2C architecture, “market risks” and “big amount of customer data”. Now, we use RFM- Recency, Frequency and Monetary Value to estimate the CLV, and as the term exemplifies, market risks, is well sheltered. Big Data Analysis is also roofed in RFM, which gives real exploration of the Big Data and lead to a better estimation for future cash flow from customers. In the present paper, 6 factors (collected from varied sources) are used to determine as to what attracts the customers to the B2C architecture. For these 6 factors, RFM is computed for 3 years (2013, 2014 and 2015) respectively. CLV and Revenue are the two parameters defined using RFM analysis, which gives the clear picture of the future predictions.

Keywords: CLV, RFM, revenue, recency, frequency, monetary value

Procedia PDF Downloads 192
192 The Role of Law Corruption and Culture in Investment Fund Manager Fees

Authors: Samir Assal

Abstract:

This paper considers an international sample of venture capital and private equity funds to assess the role of law, corruption and culture in setting fund manager fees in terms of their fixed management fees, carried interest performance fees, clawbacks of fees and cash versus share distributions of fees. The data highlight a role of legal conditions in shaping fees paid to fund managers. In countries with better legal conditions, fixed fees are lower, carried interest fees are higher, clawbacks are less likely, and share distributions are more likely. These findings suggest legal conditions help to align the interests of managers and shareholders. More specifically, we examine which element of legal conditions matter most, and discover that corruption levels play a pronounced role in shaping fund manager fee contracts. We also show that cultural forces such as Hofstede’s measures of power distance and uncertainty avoidance likewise play a role in influencing fees.

Keywords: managerial compensation, incentive contracts, private equity, law and finance

Procedia PDF Downloads 279
191 Design of a Solar Water Heating System with Thermal Storage for a Three-Bedroom House in Newfoundland

Authors: Ahmed Aisa, Tariq Iqbal

Abstract:

This letter talks about the ready-to-use design of a solar water heating system because, in Canada, the average consumption of hot water per person is approximately 50 to 75 L per day and the average Canadian household uses 225 L. Therefore, this paper will demonstrate the method of designing a solar water heating system with thermal storage. It highlights the renewable hybrid power system, allowing you to obtain a reliable, independent system with the optimization of the ingredient size and at an improved capital cost. The system can provide hot water for a big building. The main power for the system comes from solar panels. Solar Advisory Model (SAM) and HOMER are used. HOMER and SAM are design models that calculate the consumption of hot water and cost for a house. Some results, obtained through simulation, were for monthly energy production, annual energy production, after tax cash flow, the lifetime of the system and monthly energy usage represented by three types of energy. These are system energy, electricity load electricity and net metering credit.

Keywords: water heating, thermal storage, capital cost solar, consumption

Procedia PDF Downloads 403
190 Foreign Debt and Firm Performance: Evidence from French Non-Financial Firms

Authors: Salma Mefteh-Wali, Marie-Josephe Rigobert

Abstract:

We investigate the impact of foreign currency debt on firm performance for a sample of non-financial French firms studied over the period 2002 to 2012. As foreign currency debt is both a financing and hedging instrument against foreign exchange risk, we mobilize optimal hedging theory and capital structure theory. When we study the impact on firm value, our main results show that before and after the financial crisis of 2008, foreign debt had the same behavior as domestic debt. We find that during the crisis period, foreign debt positively affects firm value. Investors perceive foreign debt as a natural hedging instrument that is likely to reduce the costs of underinvestment, alleviate cash flow volatility, limit the costs of financial distress, and generate tax shield benefits. Also, our results show that foreign leverage negatively affects the firm performance proxied by ROA and ROE, during and after the financial crisis. However, this impact is positive in the pre-crisis period.

Keywords: foreign currency derivatives, foreign currency debt, foreign currency hedging, firm performance

Procedia PDF Downloads 270
189 Factor Study Affecting Visual Awareness on Dynamic Object Monitoring

Authors: Terry Liang Khin Teo, Sun Woh Lye, Kai Lun Brendon Goh

Abstract:

As applied to dynamic monitoring situations, the prevailing approach to situation awareness (SA) assumes that the relevant areas of interest (AOI) be perceived before that information can be processed further to affect decision-making and, thereafter, action. It is not entirely clear whether this is the case. This study seeks to investigate the monitoring of dynamic objects through matching eye fixations with the relevant AOIs in boundary-crossing scenarios. By this definition, a match is where a fixation is registered on the AOI. While many factors may affect monitoring characteristics, traffic simulations were designed in this study to explore two factors, namely: the number of inbounds/outbound traffic transfers and the number of entry and/or exit points in a radar monitoring sector. These two factors were graded into five levels of difficulty ranging from low to high traffic flow numbers. Combined permutation in terms of levels of difficulty of these two factors yielded a total of thirty scenarios. Through this, results showed that changes in the traffic flow numbers on transfer resulted in greater variations having match limits ranging from 29%-100%, as compared to the number of sector entry/exit points of range limit from 80%-100%. The subsequent analysis is able to determine the type and combination of traffic scenarios where imperfect matching is likely to occur.

Keywords: air traffic simulation, eye-tracking, visual monitoring, focus attention

Procedia PDF Downloads 29
188 The Biology of Persister Cells and Antibiotic Resistance

Authors: Zikora K. G. Anyaegbunam, Annabel A. Nnawuihe, Ngozi J. Anyaegbunam, Emmanuel A. Eze

Abstract:

The discovery and production of new antibiotics is unavoidable in the fight against drug-resistant bacteria. However, this is only part of the problem; we have never really had medications that could completely eradicate an infection. All pathogens create a limited number of dormant persister cells that are resistant to antibiotic treatment. When the concentration of antibiotics decreases, surviving persisters repopulate the population, resulting in a recurrent chronic infection. Bacterial populations have an alternative survival strategy to withstand harsh conditions or antibiotic exposure, in addition to the well-known methods of antibiotic resistance and biofilm formation. Persister cells are a limited subset of transiently antibiotic-tolerant phenotypic variations capable of surviving high-dose antibiotic therapy. Persisters that flip back to a normal phenotype can restart growth when antibiotic pressure drops, assuring the bacterial population's survival. Persister cells have been found in every major pathogen, and they play a role in antibiotic tolerance in biofilms as well as the recalcitrance of chronic infections. Persister cells has been implicated to play a role in the establishment of antibiotic resistance, according to growing research. Thusthe need to basically elucidate the biology of persisters and how they are linked to antibiotic resistance, and as well it's link to diseases.

Keywords: persister cells, phenotypic variations, repopulation, mobile genetic transfers, antibiotic resistance

Procedia PDF Downloads 174
187 Utilization of Municipal Solid Waste in Thermal Power Production: A Techno-Economic Study of Kasur City, Punjab, Pakistan

Authors: Hafiz Muhammad Umer Aslam, Mohammad Rafiq Khan

Abstract:

This techno-economic study reports the feasibility of generating thermoelectric power from municipal solid waste (MSW) of Kasur City by incineration process. The data was gathered from different establishments of Kasur, through appropriate permission from their heads, and processed to design different alternative projects for installation of a thermal power plant in the city of Kasur. A technique of discounted cash flow was used to evaluate alternative projects so that their Benefit to Cost Ratio, Net Present Value, Internal Rate of Return and Payback Period can be determined. The study revealed that Kasur City currently consumes 18MWh electricity and generates 179 tons/day MSW. The generated waste has the ability to produce 2.1MWh electricity at the cost of USD 0.0581/unit with an expenditure of USD 3,907,692 as initial fixed investment of forming about 1/7th of consumption of Kasur. The cost from this source, when compared to current rate of electricity in Pakistan (USD 0.1346), is roughly half.

Keywords: Kasur City, resource recovery, thermoelectric power, waste management

Procedia PDF Downloads 135
186 The Poetics of Space through the Prism of Geography: The Case of La Honte by Annie Ernaux

Authors: Neda Mozaffari

Abstract:

This study represents an investigation into the poetics of space within Annie Ernaux's autobiographical work La honte, highlighting the intricate interplay among space, the individual, and society. The research aims to dissect the spatial dimension of the town Yvetot, the referential locale of the author's childhood, drawing upon the frameworks of geocriticism and geopoetics. Our analysis exposes a profound dialectical tension fundamentally predicated on the binaries of "interior/exterior" and "here/there," emphasizing how space and its occupants may reciprocally influence each other. This endeavor aspires to attribute meaning to space in Ernaux's writing in La honte and to forge a connection between spatial elements and the author's autobiographical perspective, heavily imprinted by social dynamics. Ernaux's approach fluctuates between certain binaries that segment space according to the collective perception of social hierarchy, thus unveiling the author's preoccupation with social distancing. Consequently, space transforms into a structured milieu that transfers fear and insecurity to the child, where spatial and architectural segregation further cements class divisions in terms of the language employed by its inhabitants. Ernaux's depiction of space serves both as a repository of collective memory and an instrument of social distinction, where her autobiographical perception echoes within a collective geography marked by class determinism and culture.

Keywords: geocriticism, literary study, social class, social space, spatial analysis

Procedia PDF Downloads 24
185 Traditional Drawing, BIM and Erudite Design Process

Authors: Maryam Kalkatechi

Abstract:

Nowadays, parametric design, scientific analysis, and digital fabrication are dominant. Many architectural practices are increasingly seeking to incorporate advanced digital software and fabrication in their projects. Proposing an erudite design process that combines digital and practical aspects in a strong frame within the method was resulted from the dissertation research. The digital aspects are the progressive advancements in algorithm design and simulation software. These aspects have assisted the firms to develop more holistic concepts at the early stage and maintain collaboration among disciplines during the design process. The erudite design process enhances the current design processes by encouraging the designer to implement the construction and architecture knowledge within the algorithm to make successful design processes. The erudite design process also involves the ongoing improvements of applying the new method of 3D printing in construction. This is achieved through the ‘data-sketches’. The term ‘data-sketch’ was developed by the author in the dissertation that was recently completed. It accommodates the decisions of the architect on the algorithm. This paper introduces the erudite design process and its components. It will summarize the application of this process in development of the ‘3D printed construction unit’. This paper contributes to overlaying the academic and practice with advanced technology by presenting a design process that transfers the dominance of tool to the learned architect and encourages innovation in design processes.

Keywords: erudite, data-sketch, algorithm design in architecture, design process

Procedia PDF Downloads 244