Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Entire DC Network

Combining Technical Analysis And Neural Networks In The Australian Stockmarket, Bruce Vanstone, Gavin Finnie Aug 2006

Combining Technical Analysis And Neural Networks In The Australian Stockmarket, Bruce Vanstone, Gavin Finnie

Bruce Vanstone

One of the greatest difficulties facing a stock trader or investment manager is the stock selection process. In this process, the investor is faced with a large number of competing investments, and a fixed amount of capital. The goal is to spread the available capital across a reduced subset of the competing investments, with the aim of increasing the return. Typically, the investor relies on one of two main frameworks to guide the selection process, namely Fundamental Analysis, and Technical Analysis. This paper focuses on Technical Analysis, and implements a neural network which supports the stock selection process.


Generic Skills For Hospitality Management: A Comparative Study Of Management Expectations And Student Perceptions, Michael Raybould, Hugh Wilkins Jul 2006

Generic Skills For Hospitality Management: A Comparative Study Of Management Expectations And Student Perceptions, Michael Raybould, Hugh Wilkins

Michael Raybould

Tertiary providers of hospitality management degree programs must fulfil the needs of student, industry and academic stakeholder groups. The students attracted to this type of program tend to be motivated primarily by the anticipated vocational outcomes. As a result, hospitality management curriculum needs to meet both industry and student expectations by delivering the skill sets needed in the workplace and the institutional demands for academic rigour. This article reports on research that aimed to compare hospitality managers' expectations of graduate skills with student perceptions of the skills that hospitality managers valued. In contrast to previous research on this topic, this …


Simulation Of Airport Security Checkpoint Operations, Rajan Batta, Colin Drury, Li Lin, Jomon Aliyas Paul, Xiaofeng Nie, Clara Marin Dec 2005

Simulation Of Airport Security Checkpoint Operations, Rajan Batta, Colin Drury, Li Lin, Jomon Aliyas Paul, Xiaofeng Nie, Clara Marin

Jomon Aliyas Paul

Screening of passengers at the airport security check point is one of the most critical measures to ensure our nation’s aviation security and safety. In this study, we investigate the operational efficiency and inspection effectiveness of passenger screening, including the magnetometer (MAG), X-Ray machines, manual wand search, trace of explosive residuals, and private screening at an airport. Passenger volumes by the day of the week and times of the day, along with the corresponding staffing levels of the screening personnel are modeled. Performance of the security system with respect to passengers making the flights on time is evaluated for various …


Simulation And Lean Six Sigma Integration For Improvement Of Hospital Operations., Jomon Aliyas Paul, Li Lin Dec 2005

Simulation And Lean Six Sigma Integration For Improvement Of Hospital Operations., Jomon Aliyas Paul, Li Lin

Jomon Aliyas Paul

Patient throughput has become one of the most common measures of hospital performance in terms of patient satisfaction and operational efficiency. Throughout the country hospital emergency departments, which generally supply almost 50% of the inpatient population, face increased pressure on improving patient flow. Similarly performance of ORs, the largest revenue grosser for the hospital significantly affects the patient satisfaction considerably. In addition to employing a DMAIC - Lean Six Sigma approach to resolve these problems, In simulation has been used as an excellent tool to implement the Analyze and Improve phases of the six-sigma methodology. We used simulation, integrated with …


Transient Modeling In Simulation Of Hospital Operations For Emergency Response., Jomon Paul, Santosh George, Pengfei Yi, Li Lin Dec 2005

Transient Modeling In Simulation Of Hospital Operations For Emergency Response., Jomon Paul, Santosh George, Pengfei Yi, Li Lin

Jomon Aliyas Paul

Rapid estimates of hospital capacity after an event that may cause a disaster can assist disaster-relief efforts. Due to the dynamics of hospitals, following such an event, it is necessary to accurately model the behavior of the system. A transient modeling approach using simulation and exponential functions is presented, along with its applications in an earthquake situation. The parameters of the exponential model are regressed using outputs from designed simulation experiments. The developed model is capable of representing transient, patient waiting times during a disaster. Most importantly, the modeling approach allows real-time capacity estimation of hospitals of various sizes and …


Macro Determinants Of Total Factor Productivity In Pakistan, Safdar Khan Dec 2005

Macro Determinants Of Total Factor Productivity In Pakistan, Safdar Khan

Safdar Khan

No abstract provided.


Faculty And Male Football And Basketball Players On University Campuses: An Empirical Investigation Of The "Intellectual" As Mentor To The Student Athlete, Keith Harrison Dec 2005

Faculty And Male Football And Basketball Players On University Campuses: An Empirical Investigation Of The "Intellectual" As Mentor To The Student Athlete, Keith Harrison

Dr. C. Keith Harrison

No abstract provided.


Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara Dec 2005

Economics Of Information Security Investment In The Case Of Simultaneous Attacks, C. Derrick Huang, Qing Hu, Ravi S. Behara

Qing Hu

With billions of dollars being spent on information security related products and services each year, the economics of information security investment has become an important area of research, with significant implications for management practices. Drawing on recent studies that examine optimal security investment levels under various attack scenarios, we propose an economic model that considers simultaneous attacks from multiple external agents with distinct characteristics, and derive optimal investments based on the principle of benefit maximization. The relationships among the major variables, such as systems vulnerability, security breach probability, potential loss of security breach, and security investment levels, are investigated via …