967 resultados para BELIEF REVISION


Relevância:

20.00% 20.00%

Publicador:

Resumo:

A könyvvizsgálati kockázat a téves auditjelentés kiadásának kockázata olyan esetekben, amikor a beszámoló lényeges hibás állítást tartalmaz. Ez a kockázat indirekt módon a hitelintézetek és pénzügyi vállalkozások működésében is megjelenik azokban az esetekben, amikor a lényeges hibás állítást a finanszírozott vállalkozás auditált beszámolója tartalmazza, amelynek az alapján finanszírozási döntést hoznak, vagy a finanszírozás folytatásáról a beszámolóban szereplő, hibás információkból számított hitelkovenánsok alapján döntenek. A könyvvizsgálat kockázatában a vizsgált gazdálkodó üzleti kockázatai tükröződnek vissza, ezért a kockázat felmérése és az ellenőrzés ennek alapján való megtervezése, majd végrehajtása kulcsfontosságú. Jelen tanulmány – kapcsolódva a Hitelintézeti Szemle 2011. évi 4. számához – szintén a kockázat és bizonytalanság témakörét tárgyalja, pontosabban ennek egy gyakorlati vetületét: a bizonyosságfüggvények (belief functions) alkalmazását a könyvvizsgálatban; mindezt a teljesség és a tankönyvszerű rendszerfelépítés igénye nélkül. A módszer ugyanis hazánkban szinte ismeretlen, nemzetközi viszonylatban viszont empirikus kutatásban is rámutattak már az alkalmazás lehetséges előnyeire a hagyományos valószínűségelméleten alapuló számszerű kockázatbecslésekkel szemben. Eszerint a bizonyosságfüggvények jobban reprezentálják a könyvvizsgálóknak a kockázatról alkotott képét, mint a valószínűségek, mert – szemben a hagyományos modellel – nem két, hanem három állapotot kezelnek: a pozitív bizonyíték létezését, a negatív bizonyíték létezését és a bizonyíték hiányának esetét. _______ Audit risk is the risk that the auditor expresses an inappropriate audit opinion when the fi nancial statements are materially misstated. This kind of risk indirectly appears in the fi nancial statements of fi nancial institutions, when the material misstatement is in the fi nanced entity’s statements that serve as a basis for lending decisions or when the decision is made based upon credit covenants calculated from misstated information. The risks of the audit process refl ect the business risks of the auditee, so the assessment of risks, and further the planning and performance of the audit based on it is of key importance. The current study – connecting to No 4 2011 of Hitelintézeti Szemle – also discusses the topic of risk and uncertainty, or to be more precise a practical implementation of the aforementioned: the application of belief functions in the fi eld of external audit. All this without the aim of achieving completeness or textbook-like scrutiny in building up the theory. While the formalism is virtually unknown in Hungary, on the international scene empirical studies pointed out the possible advantages of the application of the method in contrast to risk assessments based on the traditional theory of probability. Accordingly, belief functions provide a better representation of auditors’ perception of risk, as in contrast to the traditional model, belief functions deal with three rather than two states: the existence of supportive evidence, that of negative evidence and the lack of evidence.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Meier (2008) shows that the universal knowledge-belief space exists. However, besides the universality there is an other important property might be imposed on knowledge- belief spaces, inherited also from type spaces, the completeness. In this paper we introduce the notion of complete knowledge-belief space, and demonstrate that the universal knowledge-belief space is not complete, that is, some subjective beliefs (probability measures) on the universal knowledge-belief space are not knowledge-belief types.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Mangrove forests are highly productive but globally threatened coastal ecosystems, whose role in the carbon budget of the coastal zone has long been debated. Here we provide a comprehensive synthesis of the available data on carbon fluxes in mangrove ecosystems. A reassessment of global mangrove primary production from the literature results in a conservative estimate of ∼218 ± 72 Tg C a−1. When using the best available estimates of various carbon sinks (organic carbon export, sediment burial, and mineralization), it appears that >50% of the carbon fixed by mangrove vegetation is unaccounted for. This unaccounted carbon sink is conservatively estimated at ∼112 ± 85 Tg C a−1, equivalent in magnitude to ∼30–40% of the global riverine organic carbon input to the coastal zone. Our analysis suggests that mineralization is severely underestimated, and that the majority of carbon export from mangroves to adjacent waters occurs as dissolved inorganic carbon (DIC). CO2 efflux from sediments and creek waters and tidal export of DIC appear to be the major sinks. These processes are quantitatively comparable in magnitude to the unaccounted carbon sink in current budgets, but are not yet adequately constrained with the limited published data available so far.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

With the rapid growth of the Internet, computer attacks are increasing at a fast pace and can easily cause millions of dollar in damage to an organization. Detecting these attacks is an important issue of computer security. There are many types of attacks and they fall into four main categories, Denial of Service (DoS) attacks, Probe, User to Root (U2R) attacks, and Remote to Local (R2L) attacks. Within these categories, DoS and Probe attacks continuously show up with greater frequency in a short period of time when they attack systems. They are different from the normal traffic data and can be easily separated from normal activities. On the contrary, U2R and R2L attacks are embedded in the data portions of the packets and normally involve only a single connection. It becomes difficult to achieve satisfactory detection accuracy for detecting these two attacks. Therefore, we focus on studying the ambiguity problem between normal activities and U2R/R2L attacks. The goal is to build a detection system that can accurately and quickly detect these two attacks. In this dissertation, we design a two-phase intrusion detection approach. In the first phase, a correlation-based feature selection algorithm is proposed to advance the speed of detection. Features with poor prediction ability for the signatures of attacks and features inter-correlated with one or more other features are considered redundant. Such features are removed and only indispensable information about the original feature space remains. In the second phase, we develop an ensemble intrusion detection system to achieve accurate detection performance. The proposed method includes multiple feature selecting intrusion detectors and a data mining intrusion detector. The former ones consist of a set of detectors, and each of them uses a fuzzy clustering technique and belief theory to solve the ambiguity problem. The latter one applies data mining technique to automatically extract computer users’ normal behavior from training network traffic data. The final decision is a combination of the outputs of feature selecting and data mining detectors. The experimental results indicate that our ensemble approach not only significantly reduces the detection time but also effectively detect U2R and R2L attacks that contain degrees of ambiguous information.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Goddesses in African religions are spirits that affect humans and demand reverence from them. They are also embodiments of ideas that African people have about women, their powers and their roles in society. This study focused on Mame Wata, a goddess in Half Assini, an Nzema-speaking coastal community in western Ghana. It sought to resolve a paradox, that is, the fact that, the goddess is at the center of a Pentecostalist tradition even though traditional Pentecostalism in Ghana views her as an agent of the devil. The study involved fieldwork in this community of the goddess's female worshippers led by Agyimah, a charismatic man, and an agent of the goddess. The study interpreted the goddess as a post-colonial invented symbol personifying both pre-colonial and emerging ideas about female power. Findings from the study also show that through Mame Wata the followers celebrate the spirituality of the female.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Rapid development in industry have contributed to more complex systems that are prone to failure. In applications where the presence of faults may lead to premature failure, fault detection and diagnostics tools are often implemented. The goal of this research is to improve the diagnostic ability of existing FDD methods. Kernel Principal Component Analysis has good fault detection capability, however it can only detect the fault and identify few variables that have contribution on occurrence of fault and thus not precise in diagnosing. Hence, KPCA was used to detect abnormal events and the most contributed variables were taken out for more analysis in diagnosis phase. The diagnosis phase was done in both qualitative and quantitative manner. In qualitative mode, a networked-base causality analysis method was developed to show the causal effect between the most contributing variables in occurrence of the fault. In order to have more quantitative diagnosis, a Bayesian network was constructed to analyze the problem in probabilistic perspective.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Peer reviewed

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Jane Smiley retells the tale of “King Lear” through the perspective of one of the evil sisters, in her novel “A Thousand Acres”. While the literary canon places William Shakespeare and his plays at the top of the list, I disagree that the canon should denote what is considered “classic” and what would be disregarded. Jane Smiley's novel is not canonized, but why? Her feminist revision of “King Lear” answers why Goneril and Regan were so evil. I argue that “King Lear” (both the text and the play) does not provide the evidence of dysfunction that Smiley's novel exhibits. “A Thousand Acres” opens up questions about gender formation, issues that are misrepresented and occluded in Shakespeare's “King Lear”. By bringing the trauma of incest to the forefront of the novel, its reverse emotional structures allow the reader to obtain a new perspective to a complex four-century-old play.

Relevância:

20.00% 20.00%

Publicador:

Resumo:

50 years after the birth of the Nouvelle Vague, the inheritance that the contemporary cinema receives from it is inevitable. Figures and visual motifs; stories, themes, faces or common places; aesthetic and language devices. The echoes appear in various ways, each affiliation involves a different relationship and therefore a dissimilar approximation to its analysis. And yet, both the academy and the film critics maintain their will to think the Nouvelle Vague as a whole, a universe, a stream or an aesthetic trend. However, does a Nouvelle Vague’s aesthetic exist? And if so: why and how to address their historical revision? Taking Deleuze’s thesis on the time-image and Serge Daney’s assertion according to which 50 years after the birth of the Nouvelle Vague, the inheritance that the contemporary cinema receives from it is inevitable. Figures and visual motifs; stories, themes, faces or common places; aesthetic and language devices. The echoes appear in various ways, each affiliation involves a different relationship and therefore a dissimilar approximation to its analysis. And yet, both the academy and the film critics maintain their will to think the Nouvelle Vague as a whole, a universe, a stream or an aesthetic trend. However, does a Nouvelle Vague’s aesthetic exist? And if so: why and how to address their historical revision? Taking Deleuze’s thesis on the time-image and Serge Daney’s assertion according to which

Relevância:

20.00% 20.00%

Publicador:

Resumo:

Bakgrund Revisionsplikten avskaffades 1 november 2010 i Sverige. Detta innebar att cirka 250,000 små aktiebolag inte längre var tvingade till revision. Idag har det gått drygt fem år sedan beslutet togs om att avskaffa revisionsplikten och trots detta väljer en del små aktiebolag att revidera sina räkenskaper. Syfte Syftet med studien var att få en djupare förståelse för varför små aktiebolag, som inte omfattas av revisionsplikten, väljer att revidera sina räkenskaper. Metod Vi har använt oss av en kvalitativ metod och genomfört semistrukturerade intervjuer med företagsrepresentanter för små aktiebolag. Det empiriska materialet har analyserats genom en innehållsanalys. Slutsats Vår studie visar att små aktiebolag efterfrågar frivillig revision främst av fyra anledningar. Dessa är:  Spritt delägarskap  Försäkran om att den interna bokföringen är korrekt  Rutinmässigt av företagsledning med erfarenhet från revisionspliktade företag  Önskan om att uppfattas som legitima

Relevância:

20.00% 20.00%

Publicador:

Resumo:

What opportunities and challenges are presented to religious education across the globe by the basic human right of freedom of religion and belief? To what extent does religious education facilitate or inhibit ‘freedom of religion’ in schools? What contribution can religious education make to freedom in the modern world? This volume provides answers to these and related questions by drawing together a selection of the papers delivered at the seventeenth session of the International Seminar on Religious Education and Values held in Ottawa in 2010. These reflections from international scholars, drawing upon historical, theoretical and empirical perspectives, provide insights into the development of religious education in a range of national contexts, from Europe to Canada and South Africa, as well as illuminating possible future directions for the subject.

Relevância:

20.00% 20.00%

Publicador: