Abstract: Internal controls of accounting are an essential
business function for a growth-oriented organization, and include the
elements of risk assessment, information communications and even
employees' roles and responsibilities. Internal controls of accounting
systems are designed to protect a company from fraud, abuse and
inaccurate data recording and help organizations keep track of
essential financial activities. Internal controls of accounting provide a
streamlined solution for organizing all accounting procedures and
ensuring that the accounting cycle is completed consistently and
successfully. Implementing a formal Accounting Procedures Manual
for the organization allows the financial department to facilitate
several processes and maintain rigorous standards. Internal controls
also allow organizations to keep detailed records, manage and
organize important financial transactions and set a high standard for
the organization's financial management structure and protocols. A
well-implemented system also reduces the risk of accounting errors
and abuse. A well-implemented controls system allows a company's
financial managers to regulate and streamline all functions of the
accounting department. Internal controls of accounting can be set up
for every area to track deposits, monitor check handling, keep track
of creditor accounts, and even assess budgets and financial statements
on an ongoing basis. Setting up an effective accounting system to
monitor accounting reports, analyze records and protect sensitive
financial information also can help a company set clear goals and
make accurate projections. Creating efficient accounting processes
allows an organization to set specific policies and protocols on
accounting procedures, and reach its financial objectives on a regular
basis. Internal accounting controls can help keep track of such areas
as cash-receipt recording, payroll management, appropriate recording
of grants and gifts, cash disbursements by authorized personnel, and
the recording of assets. These systems also can take into account any
government regulations and requirements for financial reporting.
Abstract: Modern information and communication technologies
offer a variety of support options for the efficient handling of
customer relationships. CRM systems have been developed, which
are designed to support the processes in the areas of marketing, sales
and service. Along with technological progress, CRM systems are
constantly changing, i.e. the systems are continually enhanced by
new functions. However, not all functions are suitable for every
company because of different frameworks and business processes. In
this context the question arises whether or not CRM systems are
widely used in Austrian companies and which business processes are
most frequently supported by CRM systems. This paper aims to shed
light on the popularity of CRM systems in Austrian companies in
general and the use of different functions to support their daily
business. First of all, the paper provides a theoretical overview of the
structure of modern CRM systems and proposes a categorization of
currently available software functionality for collaborative,
operational and analytical CRM processes, which provides the
theoretical background for the empirical study. Apart from these
theoretical considerations, the paper presents the empirical results of
a field survey on the use of CRM systems in Austrian companies and
analyzes its findings.
Abstract: Currently, the Malaysian construction industry is
focusing on transforming construction processes from conventional
building methods to the Industrialized Building System (IBS). Still,
research on the decision making of IBS technology adoption with the
influence of contextual factors is scarce. The purpose of this paper is
to explore how contextual factors influence the IBS decision making
in building projects which is perceived by those involved in
construction industry namely construction stakeholders and IBS
supply chain members. Theoretical background, theoretical
frameworks and literatures which identify possible contextual factors
that influence decision making towards IBS technology adoption are
presented. This paper also discusses the importance of contextual
factors in IBS decision making, highlighting some possible crossover
benefits and making some suggestions as to how these can be
utilized. Conclusions are drawn and recommendations are made with
respect to the perception of socio-economic, IBS policy and IBS
technology associated with building projects.
Abstract: Irradiated material is a typical example of a complex
system with nonlinear coupling between its elements. During
irradiation the radiation damage is developed and this development
has bifurcations and qualitatively different kinds of behavior.
The accumulation of primary defects in irradiated crystals is
considered in frame work of nonlinear evolution of complex system.
The thermo-concentration nonlinear feedback is carried out as a
mechanism of self-oscillation development.
It is shown that there are two ways of the defect density evolution
under stationary irradiation. The first is the accumulation of defects;
defect density monotonically grows and tends to its stationary state
for some system parameters. Another way that takes place for
opportune parameters is the development of self-oscillations of the
defect density.
The stationary state, its stability and type are found. The
bifurcation values of parameters (environment temperature, defect
generation rate, etc.) are obtained. The frequency of the selfoscillation
and the conditions of their development is found and
rated. It is shown that defect density, heat fluxes and temperature
during self-oscillations can reach much higher values than the
expected steady-state values. It can lead to a change of typical
operation and an accident, e.g. for nuclear equipment.
Abstract: As the Internet continues to grow at a rapid pace as
the primary medium for communications and commerce and as
telecommunication networks and systems continue to expand their
global reach, digital information has become the most popular and
important information resource and our dependence upon the
underlying cyber infrastructure has been increasing significantly.
Unfortunately, as our dependency has grown, so has the threat to the
cyber infrastructure from spammers, attackers and criminal
enterprises. In this paper, we propose a new machine learning based
network intrusion detection framework for cyber security. The
detection process of the framework consists of two stages: model
construction and intrusion detection. In the model construction stage,
a semi-supervised machine learning algorithm is applied to a
collected set of network audit data to generate a profile of normal
network behavior and in the intrusion detection stage, input network
events are analyzed and compared with the patterns gathered in the
profile, and some of them are then flagged as anomalies should these
events are sufficiently far from the expected normal behavior. The
proposed framework is particularly applicable to the situations where
there is only a small amount of labeled network training data
available, which is very typical in real world network environments.
Abstract: Ontology is widely being used as a tool for organizing
information, creating the relation between the subjects within the
defined knowledge domain area. Various fields such as Civil,
Biology, and Management have successful integrated ontology in
decision support systems for managing domain knowledge and to
assist their decision makers. Gross pollutant traps (GPT) are devices
used in trapping and preventing large items or hazardous particles in
polluting and entering our waterways. However choosing and
determining GPT is a challenge in Malaysia as there are inadequate
GPT data repositories being captured and shared. Hence ontology is
needed to capture, organize and represent this knowledge into
meaningful information which can be contributed to the efficiency of
GPT selection in Malaysia urbanization. A GPT Ontology framework
is therefore built as the first step to capture GPT knowledge which
will then be integrated into the decision support system. This paper
will provide several examples of the GPT ontology, and explain how
it is constructed by using the Protégé tool.
Abstract: Circle grid space filling plate is a flow conditioner with a fractal pattern and used to eliminate turbulence originating from pipe fittings in experimental fluid flow applications. In this paper, steady state, incompressible, swirling turbulent flow through circle grid space filling plate has been studied. The solution and the analysis were carried out using finite volume CFD solver FLUENT 6.2. Three turbulence models were used in the numerical investigation and their results were compared with the pressure drop correlation of BS EN ISO 5167-2:2003. The turbulence models investigated here are the standard k-ε, realizable k-ε, and the Reynolds Stress Model (RSM). The results showed that the RSM model gave the best agreement with the ISO pressure drop correlation. The effects of circle grids space filling plate thickness and Reynolds number on the flow characteristics have been investigated as well.
Abstract: The development of shape and size of a crack in a
pressure vessel under uniaxial and biaxial loadings is important in
fitness-for-service evaluations such as leak-before-break. In this
work finite element modelling was used to evaluate the mean stress
and the J-integral around a front of a surface-breaking crack. A
procedure on the basis of ductile tearing resistance curves of high and
low constrained fracture mechanics geometries was developed to
estimate the amount of ductile crack extension for surface-breaking
cracks and to show the evolution of the initial crack shape. The
results showed non-uniform constraint levels and crack driving forces
around the crack front at large deformation levels. It was also shown
that initially semi-elliptical surface cracks under biaxial load
developed higher constraint levels around the crack front than in
uniaxial tension. However similar crack shapes were observed with
more extensions associated with cracks under biaxial loading.
Abstract: The third phase of web means semantic web requires many web pages which are annotated with metadata. Thus, a crucial question is where to acquire these metadata. In this paper we propose our approach, a semi-automatic method to annotate the texts of documents and web pages and employs with a quite comprehensive knowledge base to categorize instances with regard to ontology. The approach is evaluated against the manual annotations and one of the most popular annotation tools which works the same as our tool. The approach is implemented in .net framework and uses the WordNet for knowledge base, an annotation tool for the Semantic Web.
Abstract: The complexity of today-s software systems makes
collaborative development necessary to accomplish tasks.
Frameworks are necessary to allow developers perform their tasks
independently yet collaboratively. Similarity detection is one of the
major issues to consider when developing such frameworks. It allows
developers to mine existing repositories when developing their own
views of a software artifact, and it is necessary for identifying the
correspondences between the views to allow merging them and
checking their consistency. Due to the importance of the
requirements specification stage in software development, this paper
proposes a framework for collaborative development of Object-
Oriented formal specifications along with a similarity detection
approach to support the creation, merging and consistency checking
of specifications. The paper also explores the impact of using
additional concepts on improving the matching results. Finally, the
proposed approach is empirically evaluated.
Abstract: We present a simplified equalization technique for a
π/4 differential quadrature phase shift keying ( π/4 -DQPSK) modulated
signal in a multipath fading environment. The proposed equalizer is
realized as a fractionally spaced adaptive decision feedback equalizer
(FS-ADFE), employing exponential step-size least mean square
(LMS) algorithm as the adaptation technique. The main advantage of
the scheme stems from the usage of exponential step-size LMS algorithm
in the equalizer, which achieves similar convergence behavior
as that of a recursive least squares (RLS) algorithm with significantly
reduced computational complexity. To investigate the finite-precision
performance of the proposed equalizer along with the π/4 -DQPSK
modem, the entire system is evaluated on a 16-bit fixed point digital
signal processor (DSP) environment. The proposed scheme is found
to be attractive even for those cases where equalization is to be
performed within a restricted number of training samples.
Abstract: This work presents the highly accurate numerical calculation
of the natural frequencies for functionally graded beams with
simply supported boundary conditions. The Timoshenko first order
shear deformation beam theory and the higher order shear deformation
beam theory of Reddy have been applied to the functionally
graded beams analysis. The material property gradient is assumed
to be in the thickness direction. The Hamilton-s principle is utilized
to obtain the dynamic equations of functionally graded beams. The
influences of the volume fraction index and thickness-to-length ratio
on the fundamental frequencies are discussed. Comparison of the
numerical results for the homogeneous beam with Euler-Bernoulli
beam theory results show that the derived model is satisfactory.
Abstract: In view of current IT integration development of SOA, this paper examines AIS design based on SOA, including information sources collection, accounting business process integration and real-time financial reports. The main objective of this exploratory paper is to facilitate AIS research combing the Web Service, which is often ignored in accounting and computer research. It provides a conceptual framework that clarifies the interdependency between SOA and AIS, and also presents the major SOA functions in different areas of AIS
Abstract: In highly competitive environments, a growing
number of companies must regularly launch new products speedily
and successfully. A company-s success is based on the systematic,
conscious product designing method which meets the market
requirements and takes risks as well as resources into consideration.
Research has found that developing and launching new products are
inherently risky endeavors. Hence in this research, we aim at
introducing a risk evaluation framework for the new product
innovation process. Our framework is based on the fuzzy analytical
hierarchy process (FAHP) methodology. We have applied all the
stages of the framework on the risk evaluation process of a
pharmaceuticals company.
Abstract: In this paper, some brief sufficient conditions for the stability of FO-LTI systems dαx(t) dtα = Ax(t) with the fractional order are investigated when the matrix A and the fractional order α are uncertain or both α and A are uncertain, respectively. In addition, we also relate the stability of a fractional-order system with order 0 < α ≤ 1 to the stability of its equivalent fractional-order system with order 1 ≤ β < 2, the relationship between α and β is presented. Finally, a numeric experiment is given to demonstrate the effectiveness of our results.
Abstract: Economic crime (i.e. corporate fraud) has a
significant impact on business. This study analyzes the fraud cases
reported by the Malaysian Securities Commission. Frauds involving
market manipulation and/or illegal share trading are the most
common types of fraud reported over the 6 years analyzed. The
highest number of frauds reported involved investment and fund
holding companies. Alarmingly the results indicate quite a high
number of frauds cases are committed by management. The higher
number of Chinese perpetrators may be due to fact that they are the
dominant group in Malaysian business. The result also shows that
more than half of companies involved with fraud are privately held
companies in the investment/fund/finance sector. The results of this
study highlight general characteristic of perpetrators (person and
company) that commit fraud which could help the regulators in their
monitoring and enforcement activities. To investors, this would help
in analyzing their business investment or portfolio risk.
Abstract: This paper tries to shed light on the existence of a bank lending channel (BLC) in South Eastern European countries (SEE). Based on a VAR framework we test the responsiveness of credit supply to monetary policy shocks. By compiling a new data set and using the reserve requirement ratio, among others, as the policy instrument we measure the effectiveness of the BLC and the buffering effect of the banks in the SEE countries. The results indicate that loan supply is significantly affected by shifts in monetary policy, when demand factors are controlled. Furthermore, by analyzing the effect of the Greek banks in the region we conclude that Greek banks do buffer the negative effects of monetary policy transmission. By having a significant market share of the SEE-s banking markets we argue that Greek banks influence positively the economic growth of SEE countries.
Abstract: The analysis to detect arrhythmias and life-threatening
conditions are highly essential in today world and this analysis
can be accomplished by advanced non-linear processing methods
for accurate analysis of the complex signals of heartbeat dynamics.
In this perspective, recent developments in the field of multiscale
information content have lead to the Microcanonical Multiscale
Formalism (MMF). We show that such framework provides several
signal analysis techniques that are especially adapted to the
study of heartbeat dynamics. In this paper, we just show first hand
results of whether the considered heartbeat dynamics signals have
the multiscale properties by computing local preticability exponents
(LPEs) and the Unpredictable Points Manifold (UPM), and thereby
computing the singularity spectrum.
Abstract: Mobile Ad hoc network consists of a set of mobile
nodes. It is a dynamic network which does not have fixed topology.
This network does not have any infrastructure or central
administration, hence it is called infrastructure-less network. The
change in topology makes the route from source to destination as
dynamic fixed and changes with respect to time. The nature of
network requires the algorithm to perform route discovery, maintain
route and detect failure along the path between two nodes [1]. This
paper presents the enhancements of ARA [2] to improve the
performance of routing algorithm. ARA [2] finds route between
nodes in mobile ad-hoc network. The algorithm is on-demand source
initiated routing algorithm. This is based on the principles of swarm
intelligence. The algorithm is adaptive, scalable and favors load
balancing. The improvements suggested in this paper are handling of
loss ants and resource reservation.
Abstract: For decades financial economists have been attempted to determine the optimal investment policy by recognizing the option value embedded in irreversible investment whose project value evolves as a geometric Brownian motion (GBM). This paper aims to examine the effects of the optimal investment trigger and of the misspecification of stochastic processes on investment in real options applications. Specifically, the former explores the consequence of adopting optimal investment rules on the distributions of corporate value under the correct assumption of stochastic process while the latter analyzes the influence on the distributions of corporate value as a result of the misspecification of stochastic processes, i.e., mistaking an alternative process as a GBM. It is found that adopting the correct optimal investment policy may increase corporate value by shifting the value distribution rightward, and the misspecification effect may decrease corporate value by shifting the value distribution leftward. The adoption of the optimal investment trigger has a major impact on investment to such an extent that the downside risk of investment is truncated at the project value of zero, thereby moving the value distributions rightward. The analytical framework is also extended to situations where collection lags are in place, and the result indicates that collection lags reduce the effects of investment trigger and misspecification on investment in an opposite way.