20 resultados para zero

em Deakin Research Online - Australia


Relevância:

20.00% 20.00%

Publicador:

Resumo:

Managers often try to forecast dividends because as Brown et al. (2002)  suggest, dividends have cash flow implications for investors and are important signalling devices. This study analyses the dividend forecasts in the prospectuses of initial public offerings (IPOs) in Australia over the period 1994 to 1999. While many companies forecast dividends, many make no dividend forecast at all and some forecast no (or zero) dividends for the forthcoming year. This paper seeks to determine if no forecast at all should present a different signal to investors than a zero dividend forecast. It is found that those that do not forecast a dividend, by and large, do not pay a dividend. It is also found that those that forecast a zero dividend, true to their forecast, pay no dividend.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Preventing the development of obesity in children is an international health priority. To assess the effectiveness of interventions designed to prevent obesity, promote healthy eating and/or physical activity and/or to reduce sedentary behaviours in 0–5-year-old children, a systematic review of the literature was performed. Literature searches were limited to articles published between January 1995 and June 2006, printed in English and sampling children aged 0–5-years. Searches excluded literature concerned with breastfeeding, eating disorders, and interventions which were school-based or concerned with obesity treatment. Two reviewers independently extracted data and assessed study strengths and weaknesses. Nine included studies were grouped based on the settings in which they were delivered. Most studies involved multi-approach interventions, were conducted in the USA and varied in study designs and quality. All showed some level of effectiveness on at least one obesity-behaviour in young children. These studies support, at a range of levels, the premise that parents are receptive to and capable of some behavioural changes that may promote healthy weight in their young children. The small quantity of research heralds the need, particularly given the potential for early intervention to have long-lasting impacts on individual and population health, to build in a substantial way upon this evidence base.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

In 2001 approximately 700 Australian final-year undergraduate law students were surveyed as the first part of a three-year study of Australian lawyers' values. This study is being undertaken in an effort to understand what values are important in determining lawyers' attitudes to difficult behavioural choices confronting them in legal practice. It is hoped that knowledge of the actual values held by lawyers (in the context of critical professional choices) will enable better targeted values awareness education in both pre- and post-admission contexts.

The main quantitative survey employed a number of hypothetical scenarios. These were designed through the use of ethical dilemmas to examine issues of conflicting loyalties within a context of self-interest and lawyers' perceived obligations to the community, employers, family, friends and clients. (1)

Our approach in this paper is to set the scene by providing basic frequencies to responses in each scenario, followed by an analysis of themes elicited from respondents during the focus groups. Our immediate objective is to provide representative interviewee (that is, respondent) commentary designed to throw some light on the major choices of those respondents in the first year of the main quantitative survey. (2) Note that these focus groups were conducted some months after the quantitative analyses, and in particular after respondents had left law school. All respondents were, by that stage, working within a variety of legal workforce environments. In this analysis, it must be stressed, we have not attempted to match and compare individual respondents' comments with their earlier choices in the quantitative survey. That task awaits the longitudinal analysis now under way for the whole period of data collection during the three-year study.

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Masonry walls are usually laid with the individual masonry units along a course overlapping units in the course below. Commonly, the perpend joints in the course occur above the mid-points of the units below to form a ‘half-bond’ or above a third point to form a ‘third-bond’. The amount of this overlap has a profound influence on the strength of a wall supported on three or four sides, where lateral pressures from wind cause combined vertical and horizontal flexure. Where masonry units are laid with mortar joints, the torsional shear bond resistance between the mortar and overlapping units largely determines the horizontal flexural strength. If there is zero bond strength between units, then the horizontal flexural strength is derived from the frictional resistance to torsion on the overlapping bed-faces of the units. This thesis reports a theoretical and experimental investigation into the frictional properties of overlapping units when subjected to combinations of vertical and horizontal moments and vertical axial compression. These basic properties were used to develop a theory to predict the lateral strength of walls supported on two, three or four sides. A plastic theory of behaviour was confirmed by experiment. The theory was then used to determine maximum unbraced panel sizes for particular boundary conditions. Design charts were developed to determine temporary bracing requirements for panels during construction.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

A new homologous series of norbornylogous (NB) bridges has been synthesized in which the average curvature of the bridges is very small. The molecules are rigid and have two thiol moieties at each end to allow them to form self-assembled monolayers (SAMs) and to connect to two gold electrodes to form a molecular junction. The SAMs formed were characterized using electrochemistry to determine the surface coverage of molecules on gold surface and to provide an indication of the packing of the NB bridges while ellipsometry and X-ray photoelectron spectroscopy (XPS) were used to provide an indication of the SAM thickness and orientation. Single molecule conductance of NB bridges was measured as a function of the molecular length. The conductance was found to decrease exponentially with the length with a decay constant that is exactly correlated with photoelectron transfer and other studies at the multiple molecule level. The molecule−electrode contact resistance was determined and compared with that of related alkanedithiol molecular junctions.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Desalination processes used worldwide produce a large amount of waste concentrate, the disposal of which can have significant environmental impacts. As such, there has been research carried out into the development of zero liquid discharge technologies which recognise that the waste concentrate streams contain valuable salts, minerals and water. These technologies include the proprietary SALPROC systems, as well as other integrated systems that use a variety of different technologies for the extraction of salts and minerals from waste concentrates. Research has also been conducted on using forward osmosis as a means of treating the waste concentrate in order to produce additional product water and thus reduce the volume of waste concentrate. This article provides a review of these technologies and evaluates the potential for achieving zero liquid discharge by combining these technologies with conventional desalination technologies into integrated processes.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Zero-day or unknown malware are created using code obfuscation techniques that can modify the parent code to produce offspring copies which have the same functionality but with different signatures. Current techniques reported in literature lack the capability of detecting zero-day malware with the required accuracy and efficiency. In this paper, we have proposed and evaluated a novel method of employing several data mining techniques to detect and classify zero-day malware with high levels of accuracy and efficiency based on the frequency of Windows API calls. This paper describes the methodology employed for the collection of large data sets to train the classifiers, and analyses the performance results of the various data mining algorithms adopted for the study using a fully automated tool developed in this research to conduct the various experimental investigations and evaluation. Through the performance results of these algorithms from our experimental analysis, we are able to evaluate and discuss the advantages of one data mining algorithm over the other for accurately detecting zero-day malware successfully. The data mining framework employed in this research learns through analysing the behavior of existing malicious and benign codes in large datasets. We have employed robust classifiers, namely Naïve Bayes (NB) Algorithm, k−Nearest Neighbor (kNN) Algorithm, Sequential Minimal Optimization (SMO) Algorithm with 4 differents kernels (SMO - Normalized PolyKernel, SMO – PolyKernel, SMO – Puk, and SMO- Radial Basis Function (RBF)), Backpropagation Neural Networks Algorithm, and J48 decision tree and have evaluated their performance. Overall, the automated data mining system implemented for this study has achieved high true positive (TP) rate of more than 98.5%, and low false positive (FP) rate of less than 0.025, which has not been achieved in literature so far. This is much higher than the required commercial acceptance level indicating that our novel technique is a major leap forward in detecting zero-day malware. This paper also offers future directions for researchers in exploring different aspects of obfuscations that are affecting the IT world today.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Google advertises the Android permission framework as one of the core security features present on its innovative and flexible mobile platform. The permissions are a means to control access to restricted AP/s and system resources. However, there are Android applications which do not request permissions at all.In this paper, we analyze the repercussions of installing an Android application that does not include any permission and the types of sensitive information that can be accessed by such an application. We found that even app/icaaons with no permissions are able to access sensitive information (such the device ID) and transmit it to third-parties.

Relevância:

20.00% 20.00%

Publicador: