Search results for: independent auditors
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2280

Search results for: independent auditors

2220 Native Language Identification with Cross-Corpus Evaluation Using Social Media Data: ’Reddit’

Authors: Yasmeen Bassas, Sandra Kuebler, Allen Riddell

Abstract:

Native language identification is one of the growing subfields in natural language processing (NLP). The task of native language identification (NLI) is mainly concerned with predicting the native language of an author’s writing in a second language. In this paper, we investigate the performance of two types of features; content-based features vs. content independent features, when they are evaluated on a different corpus (using social media data “Reddit”). In this NLI task, the predefined models are trained on one corpus (TOEFL), and then the trained models are evaluated on different data using an external corpus (Reddit). Three classifiers are used in this task; the baseline, linear SVM, and logistic regression. Results show that content-based features are more accurate and robust than content independent ones when tested within the corpus and across corpus.

Keywords: NLI, NLP, content-based features, content independent features, social media corpus, ML

Procedia PDF Downloads 102
2219 Accounting Information Systems of Kuwaiti Companies: Obstacles and Barriers

Authors: Haya Y Alobaid

Abstract:

The aim of this paper is to identify and discuss the obstacles to the ability of the accounting information systems of Kuwaiti companies to deal with electronic commerce, and then to propose appropriate solutions to overcome the barriers. The study revealed a remarkable decrease in external auditors who have professional certification. The results also showed an agreement regarding the accounting systems and the ability to deal with e-commerce, with a different degree of importance, despite the presence of obstacles to the ability of accounting systems in dealing with different companies.

Keywords: accounting information systems, obstacle and barriers, electronic commerce, Kuwait companies

Procedia PDF Downloads 201
2218 Model-Independent Price Bounds for the Swiss Re Mortality Bond 2003

Authors: Raj Kumari Bahl, Sotirios Sabanis

Abstract:

In this paper, we are concerned with the valuation of the first Catastrophic Mortality Bond that was launched in the market namely the Swiss Re Mortality Bond 2003. This bond encapsulates the behavior of a well-defined mortality index to generate payoffs for the bondholders. Pricing this bond is a challenging task. We adapt the payoff of the terminal principal of the bond in terms of the payoff of an Asian put option and present an approach to derive model-independent bounds exploiting comonotonic theory. We invoke Jensen’s inequality for the computation of lower bounds and employ Lagrange optimization technique to achieve the upper bound. The success of these bounds is based on the availability of compatible European mortality options in the market. We carry out Monte Carlo simulations to estimate the bond price and illustrate the strength of these bounds across a variety of models. The fact that our bounds are model-independent is a crucial breakthrough in the pricing of catastrophic mortality bonds.

Keywords: mortality bond, Swiss Re Bond, mortality index, comonotonicity

Procedia PDF Downloads 221
2217 Neighbourhood Design for Independent Living of Adults with Intellectual Disability

Authors: Cate MacMillan, Nicholas J. Stevens, Johanna Rosier, Steven Boyd

Abstract:

Choosing where to live is an important decision for anybody, however, this decision is more complex if you are an adult with intellectual disability. Our research asked adults with intellectual disability, parents and carers and disability, housing and built environment decision makers what they considered important in deciding where to live. If medical advances continue to improve the longevity of adults with intellectual disability, many of these adults will outlive their parents. With appropriate community support, and in appropriately designed neighbourhoods, many will be able to live independently. Our research suggests that the key to achieving independent living as an adult with intellectual disability is not so much about the house but the type of neighbourhood and its design. This paper presents the results of interviews and details a practical approach which will better inform urban development decision-makers in establishing safe, inclusive and accessible neighbourhood design.

Keywords: inclusion, independent living, intellectual disability, neighbourhoods, systems thinking, urban design and planning

Procedia PDF Downloads 328
2216 Structural Reliability Analysis Using Extreme Learning Machine

Authors: Mehul Srivastava, Sharma Tushar Ravikant, Mridul Krishn Mishra

Abstract:

In structural design, the evaluation of safety and probability failure of structure is of significant importance, mainly when the variables are random. On real structures, structural reliability can be evaluated obtaining an implicit limit state function. The structural reliability limit state function is obtained depending upon the statistically independent variables. In the analysis of reliability, we considered the statistically independent random variables to be the load intensity applied and the depth or height of the beam member considered. There are many approaches for structural reliability problems. In this paper Extreme Learning Machine technique and First Order Second Moment Method is used to determine the reliability indices for the same set of variables. The reliability index obtained using ELM is compared with the reliability index obtained using FOSM. Higher the reliability index, more feasible is the method to determine the reliability.

Keywords: reliability, reliability index, statistically independent, extreme learning machine

Procedia PDF Downloads 648
2215 Implementation of a Serializer to Represent PHP Objects in the Extensible Markup Language

Authors: Lidia N. Hernández-Piña, Carlos R. Jaimez-González

Abstract:

Interoperability in distributed systems is an important feature that refers to the communication of two applications written in different programming languages. This paper presents a serializer and a de-serializer of PHP objects to and from XML, which is an independent library written in the PHP programming language. The XML generated by this serializer is independent of the programming language, and can be used by other existing Web Objects in XML (WOX) serializers and de-serializers, which allow interoperability with other object-oriented programming languages.

Keywords: interoperability, PHP object serialization, PHP to XML, web objects in XML, WOX

Procedia PDF Downloads 207
2214 Political Agency of Women Voters in India: Dependent or Independent Voters

Authors: Priyanka Sharma

Abstract:

The women voter turnout in India is increasing. The rising female voter turnout is explained in part by men intimidating women in the household to vote. Women are more likely than men to be guided before voting. What is perhaps more significant is that the gender gap has shrunk significantly over the years. However, there are layers and categories of women voters in India. Some women are much more likely than the average woman to follow advice. Against this backdrop, this paper investigates the variation among women voters during the national elections of 2019 in India. The central question of this research paper is whether or not the development of greater political opinion among women would offset guided voting and allow them to emerge as more independent voters. So the independent variable of the study is Indian women’s opinion on politics, and the dependent variable is their voting behavior. The methodology used in this paper is both quantitative and qualitative. This study investigated and examined Lokniti’s election survey data. The sample size used in this survey is 11568. The analysis of this study has revealed that there is a considerable impact of women having a political opinion on their voting behavior. The Bivariate analysis of the variables states that 83% of Indian women who have opinions on political issues do not seek advice while going to vote. This proves the hypothesis of this paper that women with an opinion on politics are more likely to be independent voters. To check the statistical significance of the finding, a chi-square test was done and the p-value found is 0.009737, which shows it is statistically significant. Furthermore, a regression test has been done by controlling certain variables like age, educational qualification, caste, and financial position of the women to probe the influence on the dependent variable. The findings provide worthwhile insights into the relationship between these control variables and the women voting behavior in India.

Keywords: dependent voter, independent voter, political opinion, voting behavior, women voter

Procedia PDF Downloads 56
2213 Pairwise Relative Primality of Integers and Independent Sets of Graphs

Authors: Jerry Hu

Abstract:

Let G = (V, E) with V = {1, 2, ..., k} be a graph, the k positive integers a₁, a₂, ..., ak are G-wise relatively prime if (aᵢ, aⱼ ) = 1 for {i, j} ∈ E. We use an inductive approach to give an asymptotic formula for the number of k-tuples of integers that are G-wise relatively prime. An exact formula is obtained for the probability that k positive integers are G-wise relatively prime. As a corollary, we also provide an exact formula for the probability that k positive integers have exactly r relatively prime pairs.

Keywords: graph, independent set, G-wise relatively prime, probability

Procedia PDF Downloads 60
2212 The Effect of Role Conflict, Role Ambiguity and Job Satisfaction on Auditor Performance

Authors: Binti Shofiatul Jannah, Hans Wakhida Rakhmatullah

Abstract:

This paper aims to examine the influence of role conflict, role ambiguity and job satisfaction on auditor performance. This study uses survey method using a questionnaire to collect the data. The questionnaires distributes were 104 respondents. The respondents are auditors who work for public accounting firms in East Java. Partial Least Square (PLS) with program SmartPLS version 2.0 were used to hypothesis testing. The result shows that: (1) there is no negative influence of role conflict on auditor performance; (2) there is negative influence of role ambiguity on auditor performance; (3) there is positive influence of job satisfaction on auditor performance.

Keywords: role conflict, role ambiguity, job satisfaction, performance

Procedia PDF Downloads 435
2211 Exploiting Fast Independent Component Analysis Based Algorithm for Equalization of Impaired Baseband Received Signal

Authors: Muhammad Umair, Syed Qasim Gilani

Abstract:

A technique using Independent Component Analysis (ICA) for blind receiver signal processing is investigated. The problem of the receiver signal processing is viewed as of signal equalization and implementation imperfections compensation. Based on this, a model similar to a general ICA problem is developed for the received signal. Then, the use of ICA technique for blind signal equalization in the time domain is presented. The equalization is regarded as a signal separation problem, since the desired signal is separated from interference terms. This problem is addressed in the paper by over-sampling of the received signal. By using ICA for equalization, besides channel equalization, other transmission imperfections such as Direct current (DC) bias offset, carrier phase and In phase Quadrature phase imbalance will also be corrected. Simulation results for a system using 16-Quadraure Amplitude Modulation(QAM) are presented to show the performance of the proposed scheme.

Keywords: blind equalization, blind signal separation, equalization, independent component analysis, transmission impairments, QAM receiver

Procedia PDF Downloads 183
2210 Mechanism Design and Dynamic Analysis of Active Independent Front Steering System

Authors: Cheng-Chi Yu, Yu-Shiue Wang, Kei-Lin Kuo

Abstract:

Active Independent Front Steering system is a steering system which can according to vehicle driving situation adjusts the relation of steering angle between inner wheel and outer wheel. In low-speed cornering, AIFS sets the steering angles of inner and outer wheel into Ackerman steering geometry to make vehicle has less cornering radius. Besides, AIFS changes the steering geometry to parallel or even anti-Ackerman steering geometry to keep vehicle stability in high-speed cornering. Therefore, based on the analysis of the vehicle steering behavior from different steering geometries, this study develops a new screw type of active independent front steering system to make vehicles best cornering performance at any speeds. The screw type of active independent front steering system keeps the pinion and separates the rack into main rack and second rack. Two racks connect by a screw. Extra screw rotated motion powered by assistant motor through coupler makes second rack move relative to main rack, which can adjust both steering ratio and steering geometry. First of all, this study distinguishes the steering geometry by using Ackerman percentage and utilizes the software of ADAMS/Car to construct diverse steering geometry models. The different steering geometries are compared at low-speed and high-speed cornering, and then control strategies of the active independent front steering systems could be formulated. Secondly, this study applies closed loop equation to analyze tire steering angles and carries out optimization calculations to make the steering geometry from traditional rack and pinion steering system near to Ackerman steering geometry. Steering characteristics of the optimum steering mechanism and motion characteristics of vehicle installed the steering mechanism are verified by ADAMS/Car models of front suspension and full vehicle respectively. By adding dual auxiliary rack and dual motor to the optimum steering mechanism, the active independent front steering system could be developed to achieve the functions of variable steering ratio and variable steering geometry. At last, this study uses ADAMS/Car and Matlab/Simulink to co-simulate the cornering motion of vehicles confirms the vehicle installed the Active Independent Front Steering (AIFS) system has better handling performance than that with Active Independent Steering (AFS) system or with Electric Power Steering (EPS) system. At low-speed cornering, the vehicles with AIFS system and with AFS system have better maneuverability, less cornering radius, than the traditional vehicle with EPS system because that AIFS and AFS systems both provide function of variable steering ratio. However, there is a slight penalty in the motor(s) power consumption. In addition, because of the capability of variable steering geometry, the vehicle with AIFS system has better high-speed cornering stability, trajectory keeping, and even less motor(s) power consumption than that with EPS system and also with AFS system.

Keywords: active front steering system, active independent front steering system, steering geometry, steering ratio

Procedia PDF Downloads 156
2209 Dynamic Fault Diagnosis for Semi-Batch Reactor Under Closed-Loop Control via Independent RBFNN

Authors: Abdelkarim M. Ertiame, D. W. Yu, D. L. Yu, J. B. Gomm

Abstract:

In this paper, a new robust fault detection and isolation (FDI) scheme is developed to monitor a multivariable nonlinear chemical process called the Chylla-Haase polymerization reactor when it is under the cascade PI control. The scheme employs a radial basis function neural network (RBFNN) in an independent mode to model the process dynamics and using the weighted sum-squared prediction error as the residual. The recursive orthogonal Least Squares algorithm (ROLS) is employed to train the model to overcome the training difficulty of the independent mode of the network. Then, another RBFNN is used as a fault classifier to isolate faults from different features involved in the residual vector. The several actuator and sensor faults are simulated in a nonlinear simulation of the reactor in Simulink. The scheme is used to detect and isolate the faults on-line. The simulation results show the effectiveness of the scheme even the process is subjected to disturbances and uncertainties including significant changes in the monomer feed rate, fouling factor, impurity factor, ambient temperature and measurement noise. The simulation results are presented to illustrate the effectiveness and robustness of the proposed method.

Keywords: Robust fault detection, cascade control, independent RBF model, RBF neural networks, Chylla-Haase reactor, FDI under closed-loop control

Procedia PDF Downloads 473
2208 Experimental Design for Formulation Optimization of Nanoparticle of Cilnidipine

Authors: Arti Bagada, Kantilal Vadalia, Mihir Raval

Abstract:

Cilnidipine is practically insoluble in water which results in its insufficient oral bioavailability. The purpose of the present investigation was to formulate cilnidipine nanoparticles by nanoprecipitation method to increase the aqueous solubility and dissolution rate and hence bioavailability by utilizing various experimental statistical design modules. Experimental design were used to investigate specific effects of independent variables during preparation cilnidipine nanoparticles and corresponding responses in optimizing the formulation. Plackett Burman design for independent variables was successfully employed for optimization of nanoparticles of cilnidipine. The influence of independent variables studied were drug concentration, solvent to antisolvent ratio, polymer concentration, stabilizer concentration and stirring speed. The dependent variables namely average particle size, polydispersity index, zeta potential value and saturation solubility of the formulated nanoparticles of cilnidipine. The experiments were carried out according to 13 runs involving 5 independent variables (higher and lower levels) employing Plackett-Burman design. The cilnidipine nanoparticles were characterized by average particle size, polydispersity index value, zeta potential value and saturation solubility and it results were 149 nm, 0.314, 43.24 and 0.0379 mg/ml, respectively. The experimental results were good correlated with predicted data analysed by Plackett-Burman statistical method.

Keywords: dissolution enhancement, nanoparticles, Plackett-Burman design, nanoprecipitation

Procedia PDF Downloads 137
2207 A Hybrid Model for Secure Protocol Independent Multicast Sparse Mode and Dense Mode Protocols in a Group Network

Authors: M. S. Jimah, A. C. Achuenu, M. Momodu

Abstract:

Group communications over public infrastructure are prone to a lot of security issues. Existing network protocols like Protocol Independent Multicast Sparse Mode (PIM SM) and Protocol Independent Multicast Dense Mode (PIM DM) do not have inbuilt security features. Therefore, any user or node can easily access the group communication as long as the user can send join message to the source nodes, the source node then adds the user to the network group. In this research, a hybrid method of salting and hashing to encrypt information in the source and stub node was designed, and when stub nodes need to connect, they must have the appropriate key to join the group network. Object oriented analysis design (OOAD) was the methodology used, and the result shows that no extra controlled bandwidth overhead cost was added by encrypting and the hybrid model was more securing than the existing PIM SM, PIM DM and Zhang secure PIM SM.

Keywords: group communications, multicast, PIM SM, PIM DM, encryption

Procedia PDF Downloads 137
2206 Investigation of Compressive Strength of Fly Ash-Based Geopolymer Bricks with Hierarchical Bayesian Path Analysis

Authors: Ersin Sener, Ibrahim Demir, Hasan Aykut Karaboga, Kadir Kilinc

Abstract:

Bayesian methods, which have very wide range of applications, are implemented to the data obtained from the production of F class fly ash-based geopolymer bricks’ experimental design. In this study, dependent variable is compressive strength, independent variables are treatment type (oven and steam), treatment time, molding time, temperature, water absorbtion ratio and density. The effect of independent variables on compressive strength is investigated. There is no difference among treatment types, but there is a correlation between independent variables. Therefore, hierarchical Bayesian path analysis is applied. In consequence of analysis we specified that treatment time, temperature and density effects on compressive strength is higher, molding time, and water absorbtion ratio is relatively low.

Keywords: experimental design, F class fly ash, geopolymer bricks, hierarchical Bayesian path analysis

Procedia PDF Downloads 359
2205 The Impact of Religiosity and Ethical Senstivity on Accounting Students’ Ethical Judgement Decision

Authors: Ahmed Mohamed Alteer

Abstract:

The purpose of this paper is come up with theoretical model through understanding the causes and motives behind the auditors' sensitive to ethical dilemma through Auditing Students. This study considers the possibility of auditing students’ ethical judgement being affected by two individual factors, namely ethical sensitivity and religiosity. The finding of this study that there are several ethical theories a models provide a significant understanding of ethical issues and supported that ethical sensitivity and religiosity may affect ethical judgement decision among accounting students. The suggestion model proposes that student ethical judgement is influenced by their ethical sensitivity and their religiosity. Nonetheless, the influence of religiosity on ethical judgement is expected to be via ethical sensitivity.

Keywords: asccounting students, ethical sensitivity, religiosity, ethical judgement

Procedia PDF Downloads 574
2204 Optimizing the Capacity of a Convolutional Neural Network for Image Segmentation and Pattern Recognition

Authors: Yalong Jiang, Zheru Chi

Abstract:

In this paper, we study the factors which determine the capacity of a Convolutional Neural Network (CNN) model and propose the ways to evaluate and adjust the capacity of a CNN model for best matching to a specific pattern recognition task. Firstly, a scheme is proposed to adjust the number of independent functional units within a CNN model to make it be better fitted to a task. Secondly, the number of independent functional units in the capsule network is adjusted to fit it to the training dataset. Thirdly, a method based on Bayesian GAN is proposed to enrich the variances in the current dataset to increase its complexity. Experimental results on the PASCAL VOC 2010 Person Part dataset and the MNIST dataset show that, in both conventional CNN models and capsule networks, the number of independent functional units is an important factor that determines the capacity of a network model. By adjusting the number of functional units, the capacity of a model can better match the complexity of a dataset.

Keywords: CNN, convolutional neural network, capsule network, capacity optimization, character recognition, data augmentation, semantic segmentation

Procedia PDF Downloads 122
2203 Design Architecture Anti-Corruption Commission (KPK) According to KPK Law: Strong or Weak?

Authors: Moh Rizaldi, Ali Abdurachman, Indra Perwira

Abstract:

The biggest demonstration after the 1998 reforms that took place in Indonesia for several days at the end of 2019 did not eliminate the intention of the People’s Representative Council (Dewan Perwakilan Rakyat or DPR) and the President to enact the law 19 of 2019 (KPK law). There is a central issue to be highlighted, namely whether the change is intended to strengthen or even weaken the KPK. To achieve this goal, the Analysis focuses on two agency principles namely the independent principle and the control principle as seen from three things namely the legal substance, legal structure, and legal culture. The research method is normative with conceptual, historical and statute approaches. The argument from this writing is that KPK Law has cut most of the KPK's authority as a result the KPK has become symbolic or toothless in combating corruption.

Keywords: control, independent, KPK, law no. 19 of 2019

Procedia PDF Downloads 101
2202 An Investigation into Fraud Detection in Financial Reporting Using Sugeno Fuzzy Classification

Authors: Mohammad Sarchami, Mohsen Zeinalkhani

Abstract:

Always, financial reporting system faces some problems to win public ear. The increase in the number of fraud and representation, often combined with the bankruptcy of large companies, has raised concerns about the quality of financial statements. So, investors, legislators, managers, and auditors have focused on significant fraud detection or prevention in financial statements. This article aims to investigate the Sugeno fuzzy classification to consider fraud detection in financial reporting of accepted firms by Tehran stock exchange. The hypothesis is: Sugeno fuzzy classification may detect fraud in financial reporting by financial ratio. Hypothesis was tested using Matlab software. Accuracy average was 81/80 in Sugeno fuzzy classification; so the hypothesis was confirmed.

Keywords: fraud, financial reporting, Sugeno fuzzy classification, firm

Procedia PDF Downloads 220
2201 Self-Reliant Peer Learning for Nursing Students

Authors: U.-B. Schaer, M. Wehr, R. Hodler

Abstract:

Background: Most nursing students require more training time for necessary nursing skills than defined by nursing schools curriculum to acquire basic nursing skills. Given skills training lessons are too brief to enable effective student learning, meaning in-depth skills practice and repetition various learning steps. This increases stress levels and the pressure to succeed for a nursing student with slower learning capabilities. Another possible consequence is that nursing students are less prepared in the required skills for future clinical practice. Intervention: The Bern College of Higher Education of Nursing, Switzerland, started the independent peer practice learning program in 2012. A concept was developed which defines specific aims and content as well as student’s rights and obligations. Students enlist beforehand and order the required materials. They organize themselves and train in small groups in allocated training location in the area of Learning Training and Transfer (LTT). During the peer practice, skills and knowledge can be repeatedly trained and reflected in the peer groups without the presence of a tutor. All invasive skills are practiced only on teaching dummies. This allows students to use all their potential. The students may access learning materials as literature and their own student notes. This allows nursing students to practice their skills and to deepen their knowledge on corresponding with their own learning rate. Results: Peer group discussions during the independent peer practice learning support the students in gaining certainty and confidence in their knowledge and skills. This may improve patient safety in future daily care practice. Descriptive statics show that the number of students who take advantage of the independent peer practice learning increased continuously (2012-2018). It has to be mentioned that in 2012, solely students of the first semester attended the independent peer practice learning program, while in 2018 over one-third of the participating students were in their fifth semester and final study year. It is clearly visible that the demand for independent peer practice learning is increasing. This has to be considered in the development of future teaching curricula.

Keywords: learning program, nursing students, peer learning, skill training

Procedia PDF Downloads 93
2200 Gig-Work in the Midst of the COVID-19 Pandemic

Authors: Audie Daniel Wood

Abstract:

In the spring of 2020, the country and the economy came to a halt due to an outbreak of the novel coronavirus, SARS-2, virus known as COVID-19. One of the hardest hit sectors of the economy was the gig-sector, which includes Lyft, Uber, Door-Dash, and other services. In this study, we examined the effects of the independent contractor status of laborers in this field to see how a near-complete economic shut-down affected the lives of laborers who are denied access to health-care and unemployment benefits due to their status as independent contractors. What the study found was there was no 'life-altering' change to the lives of the workers who used gig-work as supplementary income during the economic shut-down, but those who relied on Lyft and Uber, etc. as their sole source of income were more heavily impacted by the economic shut-down than part-time workers. The second significant finding of the study was that across all genders and races, the idea of having to seek unemployment or help was something that none of the workers wanted. They all felt as if unemployment and social-insurance were for those who could not work. While the findings are not generalizable due to this being a small qualitative study consisting of 27 participants, the findings suggest that the economic and social impact of COVID-19 on those that work in the gig-industry warrants further discussion and research.

Keywords: gig-work, Covid-19, independent contractor, Uber

Procedia PDF Downloads 96
2199 Study of Age-Dependent Changes of Peripheral Blood Leukocytes Apoptotic Properties

Authors: Anahit Hakobjanyan, Zdenka Navratilova, Gabriela Strakova, Martin Petrek

Abstract:

Aging has a suppressive influence on human immune cells. Apoptosis may play important role in age-dependent immunosuppression and lymphopenia. Prevention of apoptosis may be promoted by BCL2-dependent and BCL2-independent manner. BCL2 is an antiapoptotic factor that has an antioxidative role by locating the glutathione at mitochondria and repressing oxidative stress. STAT3 may suppress apoptosis in BCL2-independent manner and promote cell survival blocking cytochrome-c release and reducing ROS production. The aim of our study was to estimate the influence of aging on BCL2-dependent and BCL2-independent prevention of apoptosis via measurement of BCL2 and STAT3 mRNAs expressions. The study was done on Armenian population (2 groups: 37 healthy young (mean age±SE; min/max age, male/female: 37.6±1.1; 20/54, 15/22), 28 healthy aged (66.7±1.5; 57/85, 12/16)). mRNA expression in peripheral blood leukocytes (PBL) was determined by RT-PCR using PSMB2 as the reference gene. Statistical analysis was done with Graph-Pad Prism 5; P < 0.05 considered as significant. The expression of BCL2 mRNA was lower in aged group (0.199) compared with young ones (0.643)(p < 0.01). Decrease expression was also recorded for female and male subgroups (p < 0.01). The expression level of STAT3 mRNA was increased (young, 0.228; aged, 0.428) (p < 0.05) during aging (in the whole age group and male/female subgroups). Decreased level of BCL2 mRNA may indicate about the suppression of BCL2-dependent prevention of apoptosis during aging in peripheral blood leukocytes. At the same time increased the level of STAT3 may suggest about activation of BCL2-independent prevention of apoptosis during aging.

Keywords: BCL2, STAT3, aging, apoptosis

Procedia PDF Downloads 297
2198 The Risk and Prevention of Peer-To-Peer Network Lending in China

Authors: Zhizhong Yuan, Lili Wang, Chenya Zheng, Wuqi Yang

Abstract:

How to encourage and support peer-to-peer (P2P) network lending, and effectively monitor the risk of P2P network lending, has become the focus of the Chinese government departments, industrialists, experts and scholars in recent years. The reason is that this convenient online micro-credit service brings a series of credit risks and other issues. Avoiding the risks brought by the P2P network lending model, it can better play a benign role and help China's small and medium-sized private enterprises with vigorous development to solve the capital needs; otherwise, it will bring confusion to the normal financial order. As a form of financial services, P2P network lending has injected new blood into China's non-government finance in the past ten years, and has found a way out for idle funds and made up for the shortage of traditional financial services in China. However, it lacks feasible measures in credit evaluation and government supervision. This paper collects a large amount of data about P2P network lending of China. The data collection comes from the official media of the Chinese government, the public achievements of existing researchers and the analysis and collation of correlation data by the authors. The research content of this paper includes literature review; the current situation of China's P2P network lending development; the risk analysis of P2P network lending in China; the risk prevention strategy of P2P network lending in China. The focus of this paper is to try to find a specific program to strengthen supervision and avoid risks from the perspective of government regulators, operators of P2P network lending platform, investors and users of funds. These main measures include: China needs to develop self-discipline organization of P2P network lending industry and formulate self-discipline norms as soon as possible; establish a regular information disclosure system of P2P network lending platform; establish censorship of credit rating of borrowers; rectify the P2P network lending platform in compliance through the implementation of bank deposition. The results and solutions will benefit all the P2P network lending platforms, creditors, debtors, bankers, independent auditors and government agencies of China and other countries.

Keywords: peer-to-peer(P2P), regulation, risk prevention, supervision

Procedia PDF Downloads 141
2197 From Intuitive to Constructive Audit Risk Assessment: A Complementary Approach to CAATTs Adoption

Authors: Alon Cohen, Jeffrey Kantor, Shalom Levy

Abstract:

The use of the audit risk model in auditing has faced limitations and difficulties, leading auditors to rely on a conceptual level of its application. The qualitative approach to assessing risks has resulted in different risk assessments, affecting the quality of audits and decision-making on the adoption of CAATTs. This study aims to investigate risk factors impacting the implementation of the audit risk model and propose a complementary risk-based instrument (KRIs) to form substance risk judgments and mitigate against heightened risk of material misstatement (RMM). The study addresses the question of how risk factors impact the implementation of the audit risk model, improve risk judgments, and aid in the adoption of CAATTs. The study uses a three-stage scale development procedure involving a pretest and subsequent study with two independent samples. The pretest involves an exploratory factor analysis, while the subsequent study employs confirmatory factor analysis for construct validation. Additionally, the authors test the ability of the KRIs to predict audit efforts needed to mitigate against heightened RMM. Data was collected through two independent samples involving 767 participants. The collected data was analyzed using exploratory factor analysis and confirmatory factor analysis to assess scale validity and construct validation. The suggested KRIs, comprising two risk components and seventeen risk items, are found to have high predictive power in determining audit efforts needed to reduce RMM. The study validates the suggested KRIs as an effective instrument for risk assessment and decision-making on the adoption of CAATTs. This study contributes to the existing literature by implementing a holistic approach to risk assessment and providing a quantitative expression of assessed risks. It bridges the gap between intuitive risk evaluation and the theoretical domain, clarifying the mechanism of risk assessments. It also helps improve the uniformity and quality of risk assessments, aiding audit standard-setters in issuing updated guidelines on CAATT adoption. A few limitations and recommendations for future research should be mentioned. First, the process of developing the scale was conducted in the Israeli auditing market, which follows the International Standards on Auditing (ISAs). Although ISAs are adopted in European countries, for greater generalization, future studies could focus on other countries that adopt additional or local auditing standards. Second, this study revealed risk factors that have a material impact on the assessed risk. However, there could be additional risk factors that influence the assessment of the RMM. Therefore, future research could investigate other risk segments, such as operational and financial risks, to bring a broader generalizability to our results. Third, although the sample size in this study fits acceptable scale development procedures and enables drawing conclusions from the body of research, future research may develop standardized measures based on larger samples to reduce the generation of equivocal results and suggest an extended risk model.

Keywords: audit risk model, audit efforts, CAATTs adoption, key risk indicators, sustainability

Procedia PDF Downloads 35
2196 Developing an IT Management Policy: A Proposal

Authors: Robert Gilliland

Abstract:

In any organization, a potential issue can arise and become a problem when management deviates from the standard norms set in the system development process of an IT system and the policies that pertain to it. In these instances, cybersecurity is a big challenge that organizations have to face in safeguarding the data that they generate and use. When a new idea, task, or process begins, specific standards must be followed, along with the policies and procedures that ensure the safeguard of data in the information system within the company. A good IT Strategy and Policy should have individuals who are in charge of overseeing the design, development, implementation, and auditing of these policies. Auditors are people who check to make sure that the issue conforms with the plan that is in place. Management has the ability through the role of the manager to potentially abuse power is given and to direct specific ideas, events, projects, and outcomes that are contrary to the vision or goals of the company.

Keywords: strategic policy, policy management, new policy, strategic planning

Procedia PDF Downloads 105
2195 The Role of Accounting and Auditing in Anti-Corruption Strategies: The Case of ECOWAS

Authors: Edna Gnomblerou

Abstract:

Given the current scale of corruption epidemic in West African economies, governments are seeking for immediate and effective measures to reduce the likelihood of the plague within the region. Generally, accountants and auditors are expected to help organizations in detecting illegal practices. However, their role in the fight against corruption is sometimes limited due to the collusive nature of corruption. The Denmark anti-corruption model shows that the implementation of additional controls over public accounts and independent efficient audits improve transparency and increase the probability of detection. This study is aimed at reviewing the existing anti-corruption policies of the Economic Commission of West African States (ECOWAS) as to observe the role attributed to accounting, auditing and other managerial practices in their anti-corruption drive. It further discusses the usefulness of accounting and auditing in helping anti-corruption commissions in controlling misconduct and increasing the perception to detect irregularities within public administration. The purpose of this initiative is to identify and assess the relevance of accounting and auditing in curbing corruption. To meet this purpose, the study was designed to answer the questions of whether accounting and auditing processes were included in the reviewed anti-corruption strategies, and if yes, whether they were effective in the detection process. A descriptive research method was adopted in examining the role of accounting and auditing in West African anti-corruption strategies. The analysis reveals that proper recognition of accounting standards and implementation of financial audits are viewed as strategic mechanisms in tackling corruption. Additionally, codes of conduct, whistle-blowing and information disclosure to the public are among the most common managerial practices used throughout anti-corruption policies to effectively and efficiently address the problem. These observations imply that sound anti-corruption strategies cannot ignore the values of including accounting and auditing processes. On one hand, this suggests that governments should employ all resources possible to improve accounting and auditing practices in the management of public sector organizations. On the other hand, governments must ensure that accounting and auditing practices are not limited to the private sector, but when properly implemented constitute crucial mechanisms to control and reduce corrupt incentives in public sector.

Keywords: accounting, anti-corruption strategy, auditing, ECOWAS

Procedia PDF Downloads 228
2194 Factors Impacting Technology Integration in EFL Classrooms: A Study of Qatari Independent Schools

Authors: Youmen Chaaban, Maha Ellili-Cherif

Abstract:

The purpose of this study was to examine the effects of teachers’ individual characteristics and perceptions of environmental factors that impact their technology integration into their EFL (English as a Foreign Language) classrooms. To this end, a national survey examining EFL teachers’ perceptions was conducted at Qatari Independent schools. 263 EFL teachers responded to the survey which investigated several factors known to impact technology integration. These factors included technology availability and support, EFL teachers’ perceptions of importance, obstacles facing technology integration, competency with technology use, and formal technology preparation. The impact of these factors on teachers’ and students’ educational technology use was further measured. The analysis of the data included descriptive statistics and a chi-square analysis test in order to examine the relationship between these factors. The results revealed important cultural factors that impact teachers’ practices and attitudes towards technology in the Qatari context. EFL teachers were found to integrate technology most prominently for instructional delivery and preparation. The use of technology as a learning tool received less emphasis. Teachers further revealed consistent perceptions about obstacles to integration, high levels of confidence in using technology, and consistent beliefs about the importance of using technology as a learning tool. Further analyses of the factors impacting technology integration can assist with Qatar’s technology advancement and development efforts by indicating the areas of strength and areas where additional efforts are needed. The results will lay the foundation for conducting context-specific professional development suitable for the needs of EFL teachers in Qatari Independent Schools.

Keywords: educational technology integration, Qatar, EFL, independent schools, ICT

Procedia PDF Downloads 361
2193 Gas Condensing Unit with Inner Heat Exchanger

Authors: Dagnija Blumberga, Toms Prodanuks, Ivars Veidenbergs, Andra Blumberga

Abstract:

Gas condensing units with inner tubes heat exchangers represent third generation technology and differ from second generation heat and mass transfer units, which are fulfilled by passive filling material layer. The first one improves heat and mass transfer by increasing cooled contact surface of gas and condensate drops and film formed in inner tubes heat exchanger. This paper presents a selection of significant factors which influence the heat and mass transfer. Experimental planning is based on the research and analysis of main three independent variables; velocity of water and gas as well as density of spraying. Empirical mathematical models show that the coefficient of heat transfer is used as dependent parameter which depends on two independent variables; water and gas velocity. Empirical model is proved by the use of experimental data of two independent gas condensing units in Lithuania and Russia. Experimental data are processed by the use of heat transfer criteria-Kirpichov number. Results allow drawing the graphical nomogram for the calculation of heat and mass transfer conditions in the innovative and energy efficient gas cooling unit.

Keywords: gas condensing unit, filling, inner heat exchanger, package, spraying, tunes

Procedia PDF Downloads 257
2192 Independent Encryption Technique for Mobile Voice Calls

Authors: Nael Hirzalla

Abstract:

The legality of some countries or agencies’ acts to spy on personal phone calls of the public became a hot topic to many social groups’ talks. It is believed that this act is considered an invasion to someone’s privacy. Such act may be justified if it is singling out specific cases but to spy without limits is very unacceptable. This paper discusses the needs for not only a simple and light weight technique to secure mobile voice calls but also a technique that is independent from any encryption standard or library. It then presents and tests one encrypting algorithm that is based of frequency scrambling technique to show fair and delay-free process that can be used to protect phone calls from such spying acts.

Keywords: frequency scrambling, mobile applications, real-time voice encryption, spying on calls

Procedia PDF Downloads 439
2191 Using Bidirectional Encoder Representations from Transformers to Extract Topic-Independent Sentiment Features for Social Media Bot Detection

Authors: Maryam Heidari, James H. Jones Jr.

Abstract:

Millions of online posts about different topics and products are shared on popular social media platforms. One use of this content is to provide crowd-sourced information about a specific topic, event or product. However, this use raises an important question: what percentage of information available through these services is trustworthy? In particular, might some of this information be generated by a machine, i.e., a bot, instead of a human? Bots can be, and often are, purposely designed to generate enough volume to skew an apparent trend or position on a topic, yet the consumer of such content cannot easily distinguish a bot post from a human post. In this paper, we introduce a model for social media bot detection which uses Bidirectional Encoder Representations from Transformers (Google Bert) for sentiment classification of tweets to identify topic-independent features. Our use of a Natural Language Processing approach to derive topic-independent features for our new bot detection model distinguishes this work from previous bot detection models. We achieve 94\% accuracy classifying the contents of data as generated by a bot or a human, where the most accurate prior work achieved accuracy of 92\%.

Keywords: bot detection, natural language processing, neural network, social media

Procedia PDF Downloads 90