The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The level of readiness to use information and communication technologies is referred to as a measure of “e-Readiness”. South African universities may be well-placed to use some applications of information and communication technologies, but unable to use others. From review of existing literature, it is unclear as to which factors are regarded as important to be “e-Ready” in the South African Higher...
Japan has the highest debt-to-GDP ratio among advanced countries. Japanese central government debt has increased rapidly in the past 20 years. According to the data provided by Ministry of Finance, Japan, the total central government debt (TCGD) of Japan reached ¥1, 066,423.4 billion (December 31, 2016). This number refreshes the history record of Japanese central government debt. It is important...
Computational finance is a challenging application domain with ever-increasing performance requirements. Driven by the competition between companies, computational finance pushes High Performance Computing (HPC) technology to its limits. In this paper, we consider Asian options which are financial derivatives whose payoff is determined by the average price of their underlying asset at predetermined...
Victim-enabled identity theft is a crime in which an individual victim is deceived into providing their personally identifying information (PII) to a criminal to facilitate its theft and/or misuse. In this paper we analyse a particular victim- enabled tax-related identity theft scheme recently reported in Australia, which has also been reported, in a slightly different guise, in the US. We find that...
In this paper the adaptive mesh model is studied. First we introduce the 3 subdivision method which is already exist. Second, in order to make the simulation result more realistic and reasonable, we extend the traditional scheme and apply two different subdivision schemes on the triangular mesh. At last, a new mesh coarsening method is proposed, with the help of this method, we build a extended adaptive...
In this paper, we propose a new role analyzing paradigm for social networks enlightened by topic modeling, which can be adopted as a primitive building block in various security related tasks, such as hidden community finding, important person recognizing and so on. We first present the social network under analyzing as a heterogeneous network constructed by both the users and the subjects discussed...
We integrate heterogeneous terminologies into our category-theoretic model of faceted browsing and show that existing terminologies and vocabularies can be reused as facets in a cohesive, interactive system. Commonly found in online search engines and digital libraries, faceted browsing systems depend upon one or more taxonomies which outline the structure and content of the facets available for user...
The rapid growth in information science, information technology, and cloud computing play a vital role in the field of organizational management. The emerging and revolutionary benefits of using these techniques increases the use of organizational services. Cloud computing is an emerging field, which is a result of integration of programming methodologies, database technology, communication network...
With the rapid growth of usage of social network, the patterns, the scales, and the rate of information exchange have brought profound impacts on research and practice in finance. One important topic is the stock market efficiency analysis. Traditional schemes in finance focus on identifying significant abnormal returns triggered by important events. However, those events are merely identified by...
Tax control is one of the most important tools for the administration of the tax system (fiscal, social, regulatory and control). Tax audit enables to increase the revenue of taxes and fees in the state budget. Assume that each taxpayer can declare his income less then his true income level, however total tax audits of the taxpayers' population is economically unreasonable and even selective tax audits...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
This paper focuses on studies of the effects of information trading on stock excess returns. We try to illustrate the information trading effect on the stock excess returns with a sample of 176 stocks on Shenzhen GEM. Using empirical tests, the results show that there is a positive and statistically significant correlation between information trading and stock excess returns.
Three emerging applications are driving a renewed interest in vector point processes: neural coding, high frequency finance and genomics. This pressure has revealed a gross lack of models and system identification methods. In particular in at least the first two applications coincidences can occur i.e. more than one event can occur at the same time. Yet the models in common use exclude this possibility...
This study aims to retrieve useful knowledge from commonly adopted technical indicators, based on a soft computing model, to support investment decisions. Though the validity of technical analysis (TA) has been examined extensively by various statistical models in financial literature, a practical approach that may consider the inconsistency among various technical indicators and the down-side risk...
In this paper, we investigate the lookback option pricing problem under the exponential normal inverse Gaussian model for the underlying asset price by antithetic variate and control variate methods combined with the quasi-Monte Carlo methods. The payoff of the geometric Asian option and a random variate conditional on the geometric mean of asset prices are used as the control vartiates. Numerical...
We present a highly stylized agent-based computational model (ABM) of an artificial economic and monetary union. Contrary to other current macroeconomic ABMs, it focuses on the relations/consequences of credit-financed, high-leveraged economies, conspicuous consumption within and across borders and a monetary and economic union of individual countries. The model includes a number of boundedly rational...
Limit order book simulations based on “zero-intelligence” or “entropy-maximizing” agents address two difficult issues in financial economics. First, the models address the significance of trading mechanisms by explicitly accounting for the logic of those mechanisms. Second, they avoid the difficulty of modeling human decision-making by generating orders stochastically. This paper reports on a computational...
The second edition of this book develops this modern quantitative theory of investments from a rigorous scientific and mathematical perspective. While there are many books that cover the topic of investments for business or finance students, this book is unique in that it contains a broad coverage of many facets of investment theory while maintaining the style of an engineering book. The result is...
First, the paper studies three features of Alibaba Financial service product: based on credit evaluation, service to small and micro businesses, large-scale data processing technology based on cloud computing. Then, the paper compares E-commerce financial product with traditional financial product, analyzes its advantages, disadvantages and policy limits. Last, based on the applying of cloud computing,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.