Abstract: A psychological contract is an agreement between the
employer and an employee that covers the parties’ informal and
frequently non-verbalized obligations and expectations towards each
other. The contract is a cognitive pattern-governing employee’s
behaviour in the organization. A gap between employee’s
expectations and the organizational reality may lead to difficult-to-solve
conflicts or cause the employee to modify their behaviour
towards organizational values and goals, if they are willing and ready
to verbalize their expectations. The article discusses psychological contracts in the financial
institutions in Poland. Its theoretical part outlines the types of
psychological contracts in organizations (relational, transactional, and
balanced) and shows the process of their verbalization. The purpose
of the article is to present how the type of the psychological contract
relates to employee’s readiness to verbalize it. The article ends with
conclusions arising from the study.
Abstract: Social Avoidance is one of the most important
problems that face a good number of disabled students. It results from
the negative attitudes of non-disabled students, teachers and others.
Some of the past research has shown that non-disabled individuals
hold negative attitudes toward persons with disabilities. The present
study aims to alleviate Social Avoidance by applying the Cognitive
Behavioral Intervention. 24 Blind students aged 19–24 (university students) were randomly
chosen we compared an experimental group (consisted of 12
students) who went through the intervention program, with a control
group (12 students also) who did not go through such intervention.
We used the Social Avoidance and Distress Scale (SADS) to assess
social anxiety and distress behavior. The author used many
techniques of cognitive behavioral intervention such as modeling,
cognitive restructuring, extension, contingency contracts, selfmonitoring,
assertiveness training, role play, encouragement and
others. Statistically, T-test was employed to test the research
hypothesis. Result showed that there is a significance difference between the
experimental group and the control group after the intervention and
also at the follow up stages of the Social Avoidance and Distress
Scale. Also for the experimental group, there is a significance
difference before the intervention and the follow up stages for the
scale. Results showed that, there is a decrease in social avoidance.
Accordingly, cognitive behavioral intervention program was
successful in decreasing social avoidance for blind students.
Abstract: The US Consumer Price Indices (CPIs) measures
hundreds of items in the US economy. Many social programs
and government benefits index to the CPIs. The purpose of
this project is to modernize an existing process. This paper will
show the development of a small, visual, software product that
documents the Economic Price Adjustment (EPA) for longterm
contracts. The existing workbook does not provide the
flexibility to calculate EPAs where the base-month and the
option-month are different. Nor does the workbook provide
automated error checking. The small, visual, software product
provides the additional flexibility and error checking. This
paper presents the feedback to project.
Abstract: Public-private partnerships (PPP) arrangements have
been extensively used in Canada, where the participation of private
companies in financing and managing infrastructure projects has
increased significantly in the last decade, particularly in the
transportation sector. This paper analyses the evolution of the PPP
market for transportation projects in Canada and examines the
participation of Spanish developers in this market, which have been
particularly successful in winning PPP contracts during the last
decade.
Abstract: Contracting authorities in the public sector are
obligated to apply the principles provided for in the Polish law for the
evaluation and selection of contractors. In order to analyse the
methods of contractors selecting applied in practice by public clients,
the notices of contract award results for construction works were
analysed. The analysis shows that the procedure selected more and
more often is open competitive bidding, where the assessment of the
competence of contractors is not very precise, as well as noncompetitive
bidding, i.e. single source procurement. The share of
procurement procedures, where the only criterion is price, is
increasing. The solution to the problems existing here might be the
introduction of one of the forms of pre-selection of contractors. The
article also briefly discusses verification systems for companies
applying for public contracts used in EU countries.
Abstract: In this article, we have elaborated a study over the
nature of financial intermediation in Islamic banks by comparison to
those of conventional ones. We have found a striking difference
between two kinds of intermediation. We tried, from another side, to
study the relationship between the capital level and deficiency risk
relying on econometric model, and we have obtained a positive and
significant relation between the capital and the deficiency risk for the
conventional banks. This means that when the capital of these banks
increases, the deficiency risk increases as well. In return, since the
Islamic banks are constrained to respect the Sharia Committee as well
as customers’ demands that may, in certain contracts, choose to
invest their capitals in projects they are interested in. These
constraints have as effects to reduce the deficiency risk even when
the capital increases.
Abstract: There have been a lot of efforts and researches undertaken in developing efficient tools for performing several tasks in data mining. Due to the massive amount of information embedded in huge data warehouses maintained in several domains, the extraction of meaningful pattern is no longer feasible. This issue turns to be more obligatory for developing several tools in data mining. Furthermore the major aspire of data mining software is to build a resourceful predictive or descriptive model for handling large amount of information more efficiently and user friendly. Data mining mainly contracts with excessive collection of data that inflicts huge rigorous computational constraints. These out coming challenges lead to the emergence of powerful data mining technologies. In this survey a diverse collection of data mining tools are exemplified and also contrasted with the salient features and performance behavior of each tool.
Abstract: The purpose of this paper is to analyze the influence and relative share of underwriting risks in explaining the variation in insurance cycles in subsequent periods. Through the insurance contracts they underwrite, insurance companies assume risks. Underwriting risks include pricing risk, reserve risk, reinsurance risk and occurrence risk. These risks pose major risks for property and liability insurers, and therefore their impact on the insurance cycle is important. The main goal of this paper is to determine the relative proportion of underwriting risks in explaining the variation of insurance cycle. In order to fulfill the main goal of the paper vector autoregressive model, VAR, will be applied.
Abstract: Numerical methods like binomial and trinomial trees and finite difference methods can be used to price a wide range of options contracts for which there are no known analytical solutions. American options are the most famous of that kind of options. Besides numerical methods, American options can be valued with the approximation formulas, like Bjerksund-Stensland formulas from 1993 and 2002. When the value of American option is approximated by Bjerksund-Stensland formulas, the computer time spent to carry out that calculation is very short. The computer time spent using numerical methods can vary from less than one second to several minutes or even hours. However to be able to conduct a comparative analysis of numerical methods and Bjerksund-Stensland formulas, we will limit computer calculation time of numerical method to less than one second. Therefore, we ask the question: Which method will be most accurate at nearly the same computer calculation time?
Abstract: The importance of logistics has changed enormously in the last few decades. While logistics was formerly one of the core functions of most companies, logistics or at least parts of their functions are nowadays outsourced to external logistic service providers in terms of contracts. As a result of this shift new business models like the fourth party logistics provider emerged, which designs, plans and monitors the resulting logistics networks. This new business model and topics such as Synchromodality or Big Data impose new requirements on the underlying IT, which cannot be met with conventional concepts and approaches.
In this paper, the challenges of logistics network monitoring are outlined by using a scenario. The most common layers in a logical multilayered architecture for an information system are used to point out the arising challenges for IT. In addition, first appropriate solution approaches are introduced.
Abstract: Managing a capital group is a complex and specific process. It creates special conditions for the introduction of team work organization of managers. The selection of a manager employment form is a problem which gets complicated in case of management teams. The considered possibilities are an employment-based and non-employment managerial contract, which can be based on a thorough action or on formulating definite expectations regarding the results of a manager’s work. The problem of selection between individual and collegiate settlement of managers’ work has been pointed out. The deliberations were based on the assumptions of chosen company management theories, including transactional cost, agency theory, nexus of contracts theory, stewardship theory and theories referring directly to management teams, i.e. Upper echelons theory.
Abstract: Public procurement is one of the most
important areas in the public sector that introduces a possibility for a
corruption. Due to the volume of the funds that are
allocated through this institution (in the EU countries it is between 10
– 15% of GDP), it has very serious implications for the efficiency of
public expenditures and the overall economic efficiency as
well. Indicators that are usually used for the measurement of the
corruption (such as Corruption Perceptions Index - CPI) show that
the worst situation is in the post-communist countries
and Mediterranean countries.
The presented paper uses the Czech Republic as an example of a
post-communist country and analyses the factors which influence
the scope of corruption in public procurement. Moreover, the
paper discusses indicators that could point at the public procurement
market inefficiency. The presented results show that post-communist
states use the institute of public contracts significantly more than the
old member countries of the continental Europe. It has a very
important implication because it gives more space for corruption.
Furthermore, it appears that the inefficient functioning of public
procurement market is clearly manifested in the low number of bids,
low level of market transparency and an ineffective control
system. Some of the observed indicators are statistically significantly
correlated with the CPI.
Abstract: This paper analysis performance of disbursement
procedure of public works project in Thailand. The results of
research were summarised based on contracts, submitted invoice,
inspection dated, copies of disbursement dated between client and
their main contractor and interviewed with persons involved in
central and local government projects during 1994-2008 in Thailand.
The data collection was to investigate the disbursement procedure
related to performance in disbursement during construction period
(Planned duration of contract against Actual execution date in each
month). A graphical presentation of a duration analysis of the
projects illustrated significant disbursement formation in each
project. It was established that the shortage of staff, the financial
stability of clients, bureaucratic, method of disbursement and
economics situation has play major role on performance of
disbursement to their main contractors.
Abstract: Defense and Aerospace environment is continuously
striving to keep up with increasingly sophisticated Information
Technology (IT) in order to remain effective in today-s dynamic and
unpredictable threat environment. This makes IT one of the largest
and fastest growing expenses of Defense. Hundreds of millions of
dollars spent a year on IT projects. But, too many of those millions
are wasted on costly mistakes. Systems that do not work properly,
new components that are not compatible with old ones, trendy new
applications that do not really satisfy defense needs or lost through
poorly managed contracts.
This paper investigates and compiles the effective strategies that
aim to end exasperation with low returns and high cost of
Information Technology acquisition for defense; it tries to show how
to maximize value while reducing time and expenditure.
Abstract: Determining reasonable fees is the main objective of designing the cost estimation and payment systems for consultant contracts. However, project clients utilize different cost estimation and payment systems because of their varying views on the reasonableness of consultant fees. This study reviews the cost estimation and payment systems of consultant contracts for five countries, including the US (Washington State Department of Transportation), Japan (Ministry of Land, Infrastructure, Transport and Tourism), China (Engineering Design Charging Standard) and UK (Her Majesty's Treasure). Specifically, this work investigates the budgeting process, contractor selection method, contractual price negotiation process, cost review, and cost-control concept of the systems used in these countries. The main finding indicates that that project client-s view on whether the fee is high will affect the way he controls it. In the US, the fee is commonly considered to be high. As a result, stringent auditing system (low flexibility given to the consultant) is then applied. In the UK, the fee is viewed to be low by comparing it to the total life-cycle project cost. Thus, a system that has high flexibility in budgeting and cost reviewing is given to the consultant. In terms of the flexibility allowed for the consultant, the systems applied in Japan and China fall between those of the US and UK. Both the US and UK systems are helpful in determining a reasonable fee. However, in the US system, rigid auditing standards must be established and additional cost-audit manpower is required. In the UK system, sufficient historical cost data should be needed to evaluate the reasonableness of the consultant-s proposed fee
Abstract: This paper presents one comprehensive modelling approach for maintenance scheduling problem of thermal power units in competitive market. This problem is formulated as a 0/1 mixedinteger linear programming model. Model incorporates long-term bilateral contracts with defined profiles of power and price, and weekly forecasted market prices for market auction. The effectiveness of the proposed model is demonstrated through case study with detailed discussion.
Abstract: Mathematical and computational modeling of calcium
signalling in nerve cells has produced considerable insights into how
the cells contracts with other cells under the variation of biophysical
and physiological parameters. The modeling of calcium signaling in
astrocytes has become more sophisticated. The modeling effort has
provided insight to understand the cell contraction. Main objective
of this work is to study the effect of voltage gated (Operated)
calcium channel (VOC) on calcium profile in the form of advection
diffusion equation. A mathematical model is developed in the form
of advection diffusion equation for the calcium profile. The model
incorporates the important physiological parameter like diffusion
coefficient etc. Appropriate boundary conditions have been framed.
Finite volume method is employed to solve the problem. A program
has been developed using in MATLAB 7.5 for the entire problem
and simulated on an AMD-Turion 32-bite machine to compute the
numerical results.
Abstract: The Ministry of Defense (MoD) spends hundreds of
millions of dollars on software to support its infrastructure, operate
its weapons and provide command, control, communications,
computing, intelligence, surveillance, and reconnaissance (C4ISR)
functions. These and other all new advanced systems have a common
critical component is information technology. Defense and
Aerospace environment is continuously striving to keep up with
increasingly sophisticated Information Technology (IT) in order to
remain effective in today-s dynamic and unpredictable threat
environment. This makes it one of the largest and fastest growing
expenses of Defense. Hundreds of millions of dollars spent a year on
IT projects. But, too many of those millions are wasted on costly
mistakes. Systems that do not work properly, new components that
are not compatible with old once, trendily new applications that do
not really satisfy defense needs or lost though poorly managed
contracts.
This paper investigates and compiles the effective strategies that
aim to end exasperation with low returns and high cost of
Information Technology Acquisition for defense; it tries to show how
to maximize value while reducing time and expenditure.
Abstract: Over the past few years, a number of efforts have
been exerted to build parallel processing systems that utilize the idle
power of LAN-s and PC-s available in many homes and corporations.
The main advantage of these approaches is that they provide cheap
parallel processing environments for those who cannot afford the
expenses of supercomputers and parallel processing hardware.
However, most of the solutions provided are not very flexible in the
use of available resources and very difficult to install and setup.
In this paper, a multi-level web-based parallel processing system
(MWPS) is designed (appendix). MWPS is based on the idea of
volunteer computing, very flexible, easy to setup and easy to use.
MWPS allows three types of subscribers: simple volunteers (single
computers), super volunteers (full networks) and end users. All of
these entities are coordinated transparently through a secure web site.
Volunteer nodes provide the required processing power needed by
the system end users. There is no limit on the number of volunteer
nodes, and accordingly the system can grow indefinitely. Both
volunteer and system users must register and subscribe. Once, they
subscribe, each entity is provided with the appropriate MWPS
components. These components are very easy to install.
Super volunteer nodes are provided with special components that
make it possible to delegate some of the load to their inner nodes.
These inner nodes may also delegate some of the load to some other
lower level inner nodes .... and so on. It is the responsibility of the
parent super nodes to coordinate the delegation process and deliver
the results back to the user.
MWPS uses a simple behavior-based scheduler that takes into
consideration the current load and previous behavior of processing
nodes. Nodes that fulfill their contracts within the expected time get a
high degree of trust. Nodes that fail to satisfy their contract get a
lower degree of trust.
MWPS is based on the .NET framework and provides the minimal
level of security expected in distributed processing environments.
Users and processing nodes are fully authenticated. Communications
and messages between nodes are very secure. The system has been
implemented using C#.
MWPS may be used by any group of people or companies to
establish a parallel processing or grid environment.
Abstract: We consider a Principal-Agent model with the
Principal being a seller who does not know perfectly how much the
buyer (the Agent) is willing to pay for the good. The buyer-s
preferences are hence his private information. The model corresponds
to the nonlinear pricing problem of Maskin and Riley. We assume
there are three types of Agents. The model is solved using
“informational rents" as variables. In the last section we present the
main characteristics of the optimal contracts in asymmetric
information and some possible extensions of the model.