Sunday, January 26, 2020
Load Balancing as an Optimization Problem: GSO Solution
Load Balancing as an Optimization Problem: GSO Solution METHODOLOGY INTRODUCTION In this chapter, we presented a novel methodology which considers load balancing as an optimization problem. A stochastic approach, Glowworm swarm optimization (GSO) is employed to solve the above mentioned optimization problem. In the proposed method, excellent features of various existing load balancing algorithms as discussed chapter 2 are also integrated. PROPOSED METHODOLOGY There are numerous cloud computing categories. This work mainly focuses on a public cloud. A public cloud is based on the typical cloud computing model, and its services provided by service provider [42]. A public cloud will comprises of several nodes and the nodes are in different physical locations. Cloud is partitioned to manage this large cloud. A cloud consists of several cloud partition with each partition having its own load balancer and there is a main controller which manage all these partition. 3.2.1 Job Assignment Strategy Algorithm for assigning the jobs to cloud partition as shown in Fig. 2 Step 1: jobs arrive at the main controller Step 2: choosing the cloud partition Step 3: if cloud partition state is idle or normal state then Step 4: jobs arrive at the cloud partition balancer. Step 5: assigning the jobs to particular nodes based on the strategy. Figure 3.1: Flowchart of Proposed Job Assignment Strategy. Load Balancing Strategy In cloud, Load Balancing is a technique to allocate workload over one or more servers, network boundary, hard drives, or other total resources. Representative datacenter implementations depends on massive, significant computing hardware and network communications, which are subject to the common risks linked with any physical device, including hardware failure, power interruptions and resource limits in case of high demand. High-quality of load balance will increase the performance of the entire cloud.Though, there is no general procedure that can work in all possible different conditions. There are several method have been employed to solve existing problem. Each specific method has its merit in a specific area but not in all circumstances. Hence, proposed model combines various methods and interchanges between appropriate load balance methods as per system status. Here, the idle status uses an Fuzzy Logic while the normal status uses a global swarm optimization based load balancing strategy. Load Balancing using Fuzzy Logic When the status of cloud partition is idle, several computing resources are free and comparatively few jobs are receiving. In these circumstances, this cloud partition has the capability to process jobs as fast as possible so an effortless load balancing method can be used. Zadeh [12] proposed a fuzzy set theory in which the set boundaries were not precisely defined, but in fact boundaries were gradational. Such a set is characterized by continuum of grades of membership function which allocates to each object a membership grade ranging from zero to one [12]. A new load balancing algorithm based on Fuzzy Logic in Virtualized environment of cloud computing is implemented to achieve better processing and response time. The load balancing algorithm is implemented before it outstretch the processing servers the job is programmed based on various input parameters like assigned load of Virtual Machine (VM) and processor speed. It contains the information in each Virtual machine (VM) and numbers of request currently assigned to VM of the system. Therefore, It recognize the least loaded machine, when a user request come to process its job then it identified the first least loaded machine and process user request but in case of more than one least loaded machine available, In that case, we tried to implement the new Fuzzy logic based load balancing technique, where the fuzzy logic is very natural like human language by which we can formulate the load balancing problem. The fuzzification process is carried out by fuzzifier that transforms two types of input data like assigned load and processor speed of Virtual Machine (VM) and one output as balanced load which are required in the inference system shown in figure 3.2, figure 3.3 and figure 3.4 respectively. By evaluating the load and processor speed in virtual machine in our proposed work like two input parameters to produce the better value to equalize the load in cloud environment, fuzzy logic is used. These parameters are taken for inputs to the fuzzifier, which are needed to estimate the balanced load as output as shown in figure 3.4. Figure 3.2: Membership input function of Processor Speed Figure 3.3: Membership input function of Assigned Load Figure 3.3: Membership output function of Balanced Load To affiliate the outputs of the inferential rules [13] , low-high inference method is employed. A number of IF-THEN rules are determined by making use of the rule-based fuzzy logic to get the output response with given input conditions, here the rule is comprised from a set of semantic control rules and the supporting control objectives in the system. If (processor_speed is low) and (assigned_load is least) then (balanced_load is medium) If (processor_speed is low) and (assigned_load is medium) then (balanced_load is low) If (processor_speed is low) and (assigned_load is high) then (balanced_load is low) If (processor_speed is Medium) and (assigned_load is least) then (balanced_load is high) If (processor_speed is Medium) and (assigned_load is medium) then (balanced_load is medium) If (processor_speed is Medium) and (assigned_load is high) then (balanced_load is low) If (processor_speed is high) and (assigned_load is least) then (balanced_load is high) If (processor_speed is high) and (assigned_load is medium) then (balanced_load is medium) If (processor_speed is high) and (assigned_load is high) then (balanced_load is medium) If (processor_speed is very_high) and (assigned_load is least) then (balanced_load is high) If (processor_speed is very_high) and (assigned_load is medium) then (balanced_load is high) If (processor_speed is very_high) and (assigned_load is high) then (balanced_load is medium) As shown above, there are 12 potential logical output response conclusions in our proposed work. The Defuzzification is the method of changing fuzzy output set into a single value and the smallest of minimum (SOM) procedure is employed for the defuzzification. The total sum of a fuzzy set comprises a range of output values that are defuzzified in order to decode a single output value. Defuzzifier embraces the accumulated semantic values from the latent fuzzy control action and produces a non-fuzzy control output, which enacts the balanced load associated to load conditions. The defuzzification process is used to evaluate the membership function for the accumulated output. The algorithm-1 is defined to manage the load in Virtual machine of cloud computing as follows: Begin Request_to_resource() L1 If (resource free) Begin Estimate connection_string() Select fuzzy_rulebase() Return resource End Else Begin If (Anymore resource found) Select_next_resource() Go to L1 Else Exit End End The proposed algorithm starts with request a connection to resource. It tests for availability of resource. It Calculate the connection strength if the resource found. Then select the connection, which is used to access the resource as per processor speed and load in virtual machine using fuzzy logic. Load Balancing using GSO (Glowworm Swarm Optimization) When the status of cloud partition is normal, tasks arrives with faster rate compare to idle state and the condition becomes more complex, thus a novel strategy is deployed for load balancing. Each user desired his job in the shortest time; as a result the public cloud requires a strategy that can finish the job of all users with adequate response. In this optimization algorithm, each glowworm i is distributed in the objective function definition space [14]. These glowworms transfer own luciferin values and have the respective scope called local-decision range . As the glow searches in the local-decision range for the neighbor set, in the neighbor set, glow attracted to the neighbor with brightest glow. That is glow selects neighbor whose luciferin value greater than its own, and the flight direction will change each time different will change with change in selected neighbor. Each glowworm encodes the object function value at its current location into luciferin value and advertises the same within its neighborhood. The neighborââ¬â¢s set of glowworm comprises of those glowworms that have comparatively a higher luciferin value and that are situated within a dynamic decision range and their movements are updated by equation (8) at each iteration. Local-decision range update: (8) and is the glowworm local-decision range at the iteration, is the sensor range, is the neighbourhood threshold, the parameter generates the rate of change of the neighborhood range. Local-decision range consist of the following number of glow: (9) and, is the glowworm position at the t iteration, is the glowworm luciferin at the iteration.; the set of neighbours of glowworm comprises of those glowworms that have a comparatively higher luciferin value and that are situated within a dynamic decision range whose range is defined above by a circular sensor range Each glowworm as given in equation (10), i elects a neighbor j with a probability and process toward it as: Probability distribution used to select a neighbor: (10) Movement update: (11) Luciferin-update: (12) and is a luciferin value of glowworm at each iteration, leads to the reflection of the accumulative goodness of the path . This path is followed by the glowworms in their ongoing luciferin values, the parameter only ascends the function fitness values, is the value of test function. In this optimization algorithm, each glowworm is distributed in the objective function definition space [43]. These glowworms transfer own luciferin values and have the respective scope called local-decision range . As the glow searches in the local-decision range for the neighbor set, in the neighbor set, glow attracted to the neighbor with brightest glow. That is glow selects neighbor whose luciferin value greater than its own, and the flight direction will change each time different will change with change in selected neighbor. Figure 3.4 shows the flowchart of GSO algorithm. In the context of load balancing for cloud computing GSO algorithm check the status of the server simultaneously if it is free. For example a user wants to download a file size of 50 MB. It checks by iteration if user gets entered in server, it gets the message as achieve target. Figure 3.4: Flowchart of GSO Analysis of the Accrual Anomaly | Accounting Dissertation Analysis of the Accrual Anomaly | Accounting Dissertation Sloan (1996), in a determinative paper, added the accrual anomaly in the list of the market imperfections. Since then, academics have focused on the empirical investigation of the anomaly and the connection it has with other misspricing phenomena. The accrual anomaly is still at an embryonic stage and further research is needed to confirm the profitability of an accruals based strategy net of transaction costs. The current study investigates the accrual anomaly while taking into consideration a UK sample from 1991 to 2008. In addition, the predictive power of the Fama and French (1996) factors HML and SMB is being tested along with the industrial production growth, the dividend yield and the term structure of the interest rates. Chapter 1 Introduction Since the introduction of the random walk theory which formed the basis for the evolvement of the Efficient Market Hypothesis (EMH hereafter) proposed by Fama (1965), the financial literature has made many advances but a piece of the puzzle that is still missing is whether the EMH holds. Undoubtedly, the aforementioned debate can be considered as one of the most fruitful and fast progressing financial debates of the last two decades. The Efficient Market Hypothesis has met many challenges regardless of which of its three forms are being investigated. However, the weak form and semi strong hypothesis have been the most controversial. A literally vast collection of academic papers discuss, explore and argue for phenomena that seem to reject that the financial markets are efficient. The famous label of ââ¬Å"anomalyâ⬠has taken several forms. Many well-known anomalies such as the contrarian investment, the post announcement drift, the accruals anomaly and many others are just the beginning of an endless trip. There is absolutely no doubt that many more are going to be introduced and evidence for the ability for the investors to earn abnormal returns will be documented. Recently, academics try to expand their investigation on whether these well-documented anomalies are actually profitable due to several limitations (transaction costs etc) and whether the anomalies are connected. Many papers are exploring the connection of the anomalies with each other proposing the existence of a ââ¬Å"principalâ⬠misspricing that is documented into several forms. The current study tries to look into the anomaly that was initially documented by Sloan (1996) and has been labelled as the ââ¬Å"accrual anomalyâ⬠. The accrual anomaly can be characterised as being at an embryonic stage if the basis for comparison is the amount of publications and the dimensions of the anomaly that light has been shed on. The facts for the accrual anomaly suggest the existence of the opportunity for investors to earn abnormal returns by taking advantage of simple publicly available information. On the other hand, accruals comprising an accounting figure have been approached from different points of view with consequences visible in the results of the academic papers. Furthermore, Stark et al (2009) challenge the actual profitability of the accrual anomaly by simply taking transaction costs into consideration. The present paper employs an accrual strategy for a sample comprising of UK firms during 1991-2008. The aim is to empirically investigate the profitability of such strategies during the whole data sample. The methodology for the calculation of accruals is largely based on the paper of Hardouvelis et al (2009). Stark et al (2009) propose that the positive excess returns of the accrualsââ¬â¢ strategy are based on the profitability of small stock. In order to investigate the aforementioned claim, the current study employs an additional strategy by constructing intersecting portfolios based on accruals and size. Finally, five variables are being investigating at the second part of the study for their predictive power on the excess returns of the constructed portfolios. The monumental paper of Fama and French (1996) documented an impressive performance of two constructed variables (the returns of portfolios named HML and SMB). In addition, the dividend yield of the FTSE all share index, the industrial production growth and the term structure of the interest rates will be investigated as they are considered as potential candidates for the prediction of stock returns. Chapter 2 Literature review 2.1. Introduction During the last century the financial world has offered many substantial advances. From the Portfolio Theory of Markowitz (1952) to the development of the Capital Asset Pricing Model of Sharpe (1964) and Lintner (1965), and from the market Efficient Market Hypothesis (hereafter EMH), developed by Fama (1965), to the recent literature that challenges both the CAPM and the EMH, they all seem to be a chain reaction.à The financial academic world aims to give difficult but important answers on whether markets are efficient and on how investors should allocate their funds. During the last two decades, many researchers have documented that there exist strategies that challenge the claim of the supporters of the efficient and complete markets. In this chapter, the effort will be focused on reviewing the financial literature from the birth of the idea of the EMH until the recent publications that confirm, reject or challenge it. In a determinative paper, Fama (1970) defined efficient markets and categorised them according to the type of information used by investors. Since then, the finance literature has offered a plethora of studies that aim to test or prove whether markets are indeed efficient or not. Well known anomalies such as the post announcement drift, the value-growth anomaly or the accruals anomaly have been the theme of many articles ever since. 2.2. Review of the value-growth anomaly We consider as helpful to review the literature for the value growth-anomaly since it was one of the first anomalies to be investigated in such an extent. In addition, the research for the value-growth anomaly has yielded a largely productive debate on whether the documented returns are due to higher risk or other source of mispricing. Basu (1970) concluded that stocks with high Earnings to Price ratio tend to outperform stocks with low E/P. Lakonishok, Shleifer and Vishny (1994) documented that stocks that appear to have low price to a fundamental (book value, earnings, dividends etc) can outperform stocks with high price to a fundamental measure of value. Lakonishok, Shleifer and Vishny (1994) initiated a productive period that aimed to settle the dispute on the EMH and investigate the causes of such ââ¬Å"anomaliesâ⬠. Thus, the aforementioned researchers sparked the debate not only on the market efficiency hypothesis but also on what are the sources for these phenomena. Fama and French (1992) supported the idea that certain stocks outperform their counterparts due to the larger risk that the investors bear. Lakonishok, Shleifer and Vishny (1994) supported the idea that investors fail to correctly react to information that is available to them. The same idea was supported by many researchers such as Piotroski (2001). The latter also constructed a score in order to categorise stocks with high B/M that can yield positive abnormal returns (namely, the F Score). Additionally, the ââ¬Å"market efficiency debate ââ¬Å"drove behavioural finance to rise in popularity. The value-growth phenomenon has yielded many articles that aim to find evidence that a profitable strategy is feasible or trace the sources of these profits but, at the same time, the main approach adopted in each study varies significantly. Asness (1997) and Daniel and Titman (1999) examine the price momentum, while Lakonishok, Sougiannis and Chan (2001) examine the impact of the value of intangible assets on security returns. In addition, researchers have found evidence that the value-growth strategies tend to be successful worldwide, as their results suggest. To name a few, Chan, Hamao and Lakonishok (1991) focused on the Japanese market, Put and Veld (1995) based their research on France, Germany and the Netherlands and Gregory, Harris and Michou (2001) examined the UK stock market. It is worth mentioning that solely the evidence of such profitable strategies could be sufficient to draw the attention of practitioners, but academics are additionally interested in exploring the main cause of these arising opportunities as well as the relationship between the aforementioned phenomena (namely, the value growth, post announcement drift and the accrual anomaly). In general, two schools of thought have been developed: the one that supports the risk based explanation or, in other words, that stocks yield higher returns simply because they are riskier, and the one that supports that investors fail to recognise the correct signs included in the available information. 2.3. The accruals anomaly 2.3.1. Introduction of the accrual anomaly. Sloan (1996) documented that firms with high (low) accruals tend to earn negative (positive) returns in the following year. Based on this strategy, a profitable portfolio that has a long position on stocks with low accruals and short position on stocks with high accruals yields approximately 10% abnormal returns. According to Sloan (1996) investors tend to overreact to information on current earnings. Sloanââ¬â¢s (1996) seminar paper has been characterised as a productive work that initiated an interesting to follow debate during the last decade. It is worth noting that even the very recent literature on the accrual anomaly has not reached reconciling conclusion about the main causes of this particular phenomenon and about whether a trading strategy (net of transaction costs) based solely on the mispricing of accruals can be systematically profitable. At this point it is worth mentioning that the accruals have been found to be statistically significant and negative to predict future stock returns. On the other hand, there are papers that examine the accruals and its relations with the aggregate market. A simple example is the paper published by Hirshleifer, Hou and Teoh (2007), who aim to identify the relation of the accruals, if any, with the aggregate stock market. Their findings support that while the operating accruals have been found to be a statistical significant and a negative predictor of the stock returns, the relation with the market portfolio is strong and positive. They support that the sign of the accruals coefficient varies from industry to industry reaching a peek when the High Tech industry is taken into account (1.15), and taking a negative value for the Communication and Beer/Liquor industry. 2.3.2 Evidence for the international presence of the phenomenon. Researchers that investigated the accruals anomaly followed different approaches. At this point, it is worth noting that the evidence shows the accrual anomaly (although it was first found to be present in the US market) to exist worldwide. Leippold and Lohre (2008) examine the accrual anomaly within an international framework. The researchers document that the accrual anomaly is a fact for a plethora of markets. The contribution of the paper though, is the large and ââ¬Å"completeâ⬠number of tests used, so that the possibility of pure randomness would be eliminated. Although, similar tests showed that momentum strategies can be profitable, recent methodologies used by the researchers and proposed by Romano and Wolf (2005) and Romano, Shaikh and Wolf (2008), suggest that the accruals anomaly can be partially ââ¬Å"randomâ⬠. It is noteworthy that the additional tests make the ââ¬Å"anomalyâ⬠to fade out for almost all the samples apart from the markets of US, Australia and Denmark. Kaserer and Klingler (2008) examine how the over-reaction of the accrual information is connected with the accounting standards applied. The researchers constructed their sample by solely German firms and their findings document that the anomaly is present in Germany too. We should mention at this point that, interestingly, prior to 2000, that is prior to the adoption of the international accounting standards by Germany, the evidence did not support the existence of the accrual anomaly. However, during 2000-2002, Kaserer and Klingler (2008) found that the market overreacted to accrual information. Hence, the authors support the idea that an additional cause of the anomaly is the lack of legal mechanisms to enforce the preparation of the financial statements according to the international accounting standards which might gave the opportunity to the firms to ââ¬Å"manipulateâ⬠their earnings. Another paper that focuses on the worldwide presence of the accruals mispricing is that of Rajgopal and Venkatachalam (2007). Rajgopal and Venkatachalam examined a total of 19 markets and found that the particular market anomaly exists in Australia, UK, Canada and the US. The authorsââ¬â¢ primal goal was to identify the key drivers that can distinguish the markets where the anomaly was documented. Their evidence supports the idea that an accrual strategy is favoured in countries where there is a common law tradition, an extensive accrual accounting and a low concentration of firmsââ¬â¢ ownership combined with weak shareholdersââ¬â¢ rights. LaFond (2005) also considers the existence of the phenomenon within a global framework. The authorââ¬â¢s findings support the notion that the accrual anomaly is present worldwide. In addition, LaFond argues that there is not a unique driving factor responsible for the phenomenon across the markets. It is worth noting that LaFond (2005) documented that this particular market imperfection is present in markets with diverse methodology of accrual accounting. Findings are against the idea that the accrual anomaly has any relation with the level of the shareholders protection or a common law tradition, as suggested by Rajgopal and Venkatachalam (2007). Finally, the author suggests that, if any, it is not the different method of accrual accounting (measurement issues) that favours or eliminates the accrual anomaly, but the accrual accounting itself. 2.3.3. Further Evidence for the roots of the accruals anomaly. Additionally, papers such as those of Thomas and Zang (2002) or Hribar (2000) decompose accruals into changes in different items (such as inventory, accounts payable etc). The findings catholically suggest that extreme changes in inventory affect returns the most. On the other hand, many articles connect the accruals with information used by investors, such as the behaviour of insiders or analysts, as the latter can be considered a major signal to the investors for a potential manipulation of the firmsââ¬â¢ figures. In particular, Beneish and Vargus (2002) documented that firms with high accruals and significant insider selling have substantial negative returns.à Bradshaw (2001) and Barth and Hutton (2001) examine the analystsââ¬â¢ reports and their relation with the accruals anomaly. Their findings support that the analystsââ¬â¢ forecasting error tends to be larger for firms with high accruals, while analysts do not revise their forecasts when new information for accruals is available. Gu and Jain (2006) decompose accruals into changes in inventory, changes in accounts receivable and payable and depreciation expenses and try to identify the impact of the individual components to the anomaly. Consistent with Sloan (1996), Gu and Jain (2006) document that the accrual anomaly exists at the components level. The findings are important since Desai et al (2004) supported the connection of the accrual anomaly with a single variable (cash flows from operations). The researchers suggest that the results yielded by Desai et al (2004) were highly dependent on the methodology used and thus, suggested that the accruals anomaly is ââ¬Å"alive and wellâ⬠. Moreover, other articles try to confirm whether the anomaly is mainly caused by the wrong interpretation of the information contained in accruals. Ali et al. (2000), investigate whether the naà ¯ve investorsââ¬â¢ hypothesis holds. Following the methodology introduced by Hand (1990) and Walther (1997), they found that for smaller firms, which are more likely to be followed by sophisticated investors, the relation between accruals and negative future returns is weaker compared to larger firms, which are followed by many analysts. Therefore, the researchers suggest that, if anything, the naà ¯ve investorsââ¬â¢ hypothesis does not hold. In contrast to other market anomalies where findings suggest that the naà ¯ve investors hypothesis holds, the accruals anomaly is suggested as unique. Shi and Zhang (2007) investigate the earnings fixation hypothesis suggesting that the accruals anomaly is based on the investors ââ¬Å"fixationâ⬠or ââ¬Å"obsessionâ⬠on earnings. Their primal hypothesis is that if investors are highly based on the reports about earnings and misprice the value-relevant earnings, then the returns should be dependent not only on the accruals but also on how the stockââ¬â¢s price changes according to reported earnings.à The researchersââ¬â¢ hypothesis is confirmed and finding support that an accrual strategy for firms whose stocksââ¬â¢ price highly fluctuates according to earnings yields a 37% annual return. Sawicki and Shrestha (2009) aim to examine two possible explanations for the accruals anomaly. Sloan (1996) proposed the fixation theory under which investors fixate on earnings and thus overvalue or undervalue information for accruals. Kothari et al. (2006) proposed the ââ¬Å"agency theory of overvalued equityâ⬠according to which managers of overvalued firms try to prolong the period of this overvaluation which causes accruals to increase.à The paper uses the insider trading and other firm characteristics and tries to compare and contrast the two major explanations. Evidence produces bd Sawicki and Shrestha (2009) support the Kothari et al. (2006) explanation for the accrual anomaly. In a relatively different in motif paper, Wu and Zhang (2008) examine the role that the discount rates play in the accrual anomaly. They argue that if anything, the anomaly is not caused by irrationality from the investorsââ¬â¢side but by the rationality of firms as it is proposed by the q-theory of investment. They argue that since the discount rates fall and more projects become profitable (which makes accruals to increase) future stock returns should decline. In other words, if the capital investment correctly adjusts to the current discount rates, the accruals should be negatively correlated with the future returns and positively correlated with the current returns. The evidence of Wu and Zhang (2008) support that the accruals are negatively correlated with the future stock returns but the contribution of the paper is in that they document that current stock returns are positively correlated with the accruals. 2.3.4. The relation of the accrual anomaly with other market imperfections. Many papers examine the relation between the accruals anomaly and other well-known anomalies such as the post announcement drift or the value-growth phenomenon. Desai et al. (2002), suggest that the ââ¬Å"value-growthâ⬠anomaly and the accruals anomaly basically interact and conclude that the à ¨accruals strategy and the C/P reflect the same underlying phenomenaâ⬠. Collins and Hribar (2000) suggest that there in no link between the accruals anomaly and the ââ¬Å"PADâ⬠, while Fairfield et al. (2001) support that the accruals anomaly is a sub-category of an anomaly caused by the mistaken interpretation of the information about growth by the investors. Cheng and Thomas (2006) examine the claim that the accrual anomaly is a part of a broader anomaly (and more specifically, the value-glamour anomaly). Prior literature suggested that the operating cash flows to price ratio subordinates accruals in explaining future stock returns (Deshai et al (2004)). Their evidence suggests that the Operating CF to price ratio does not subsume neither abnormal nor total accruals in future announcement returns. This particular result does not confirm the claim that the accrual anomaly is a part of a broad value-glamour anomaly. Atwood and Xie (2005) focus on the relation of the accrual anomaly and the mispricing of the special items first documented by Burgstahler, Jiambalvo and Shevlin (2002). Their hypothesis that the two phenomena are highly related is confirmed since the researchers found that special items and accruals are positively correlated. Additionally, further tests yielded results that suggest that the two imperfections are not distinct, while the special items have an impact on how the market misprices the accruals. Louis and Sun (2008) aim to assess the relation between the abnormal accrual anomaly and the post earnings announcement drift anomaly. The authors hypothesize that both anomalies are related to the management of the earnings and thus, they aim to find whether the two are closely connected. The findings are consistent with the primal hypothesis, as they found that ââ¬Å"firms with large positive change of earnings that were least likely to have manipulated earning downwardsâ⬠did not suffer from PEAD, while the same result was yielded for firms that had large negative change of earnings that were least likely to have managed their earnings upwards. As supported by many researchers the value-growth anomaly and accruals anomaly might be closely related or they might even be caused by the similar or even identical roots.à Fama and French (1996) support that the book to market factor captures the risk of default, while Khan (2008) suggests that in a similar pattern firms with low accruals have a larger possibility to bankrupt. Therefore, many researchers try to connect the two phenomena or to answer whether a strategy based on the accruals can offer more than what the value growth strategy offers. Hardouvelis, Papanastopoulos, Thomakos and Wang (2009) connect the two anomalies by assessing the profitability of interacting portfolios based on the accruals and value-growth measures. Their findings support that positive returns are obtainable and magnified when a long position is held for a portfolio with low accruals while combined with stocks that are characterised as high market to book. The difference of a risked-based explanation or an imperfection of the markets is considered to be a major debate, as it can challenge the market efficiency hypothesis. Many researchers, such as Fama and French (1996) noted that any potential profitable strategy is simply due to the higher risk that the investors have to bear by holding such portfolios. In a similar way, the profitable accruals strategies are considered as a compensation for a higher risk. Stocks that yield larger returns are compared or labelled as stocks of firms that are close to a financial distress. Khan (2000) aims to confirm or reject the risk-based explanation of the accruals anomaly. The researcher uses the ICAPM in order to test if the risk captured by the model can explain the anomaly first documented by Sloan (1996). It is worth noting that the descriptive statistics results for the sample used showed that firms that had low accruals also had high bankruptcy risk.à The contribution of the paper is that, by proposing a four factor model enhanced by recent asset pricing advances, it showed that a great portion of the mispricing that results in the accrual anomaly can be explained within a risk-based framework. Furthermore, Jeffrey Ng (2005) examines the risk based explanation for the accrual anomaly which proposes that accruals include information for financial distress. As proposed by many papers, the accrual anomaly is simply based on the fact that investors bare more risk and thus low accrual firms have positive abnormal returns. The researcher tries to examine how and if the abnormal returns of a portfolio which is short on low accruals stocks and long on high accrual firms changes when controlling for distress risk. Evidence supports that at least a part of the abnormal returns are a compensation for bearing additional risk. Finally, the results support that the big portion of the high abnormal returns of the accrual strategy used in the particular paper is due to stocks that have high distress risk. 2.3.5. The accruals anomaly and its relation with firmsââ¬â¢ characteristics. A noteworthy part of the academic literature examines the existence of some key characteristics or drivers that are highly correlated with the accruals anomaly. Many researchers have published papers that aim to identify the impact of firm characteristics such as the size of the firm, characteristics that belong to the broader environment of the firms such as the accounting standards or the power of the minority shareholders. Zhang (2007) investigates whether the accrual anomaly varies cross-sectionally while being related with firmsââ¬â¢ specific characteristics. The researcher primarily aims to explain which the main reason for the accrual anomaly is. As Zhang (2007) mentions, Sloan (1996) attributes the accrual anomaly to the overestimation of the persistence of accruals by investors, while Fairfield (2003) argues that the accrual anomaly is a ââ¬Å"special case of a wider anomaly based on growthâ⬠. The evidence supports the researcherââ¬â¢s hypothesis that characteristics such as the covariance of the employee growth with the accruals have an impact on the future stock returns. Finally, Zhang (2007) documents that that accruals co-vary with investment in fixed assets and external financing. Louis, Robinson and Sbaraglia (2006) examine whether the non-disclosure of accruals information can have an impact on the accruals anomaly. The researchers, dividing their sample into firms that disclose accruals information on the earnings announcement and firms that do not, investigate whether there exists accrualsââ¬â¢ mispricing. The evidence supports that for firms that disclose accruals information, the market manages to correctly understand the discretionary part of the change of the earnings. On the contrary, firms that do not disclose accruals information are found to experience ââ¬Å"a correctionâ⬠on their stock price. Chambers and Payneââ¬â¢s (2008) primal aim is to examine the relation of the accrual anomaly and the auditing quality. The researchersââ¬â¢ hypothesis is that the accruals mispricing is related with the quality of auditing.à Additionally, their findings support that the stock prices do not reflect the accruals persistence characterising the lower-quality audit firms. Finally, their empirical work finds that the returns are greater for the lower-quality audit portfolio of firms. Palmon, Sudit and Yezegel (2008) examine the relation of the accruals mispricing and the company size. Evidence shows that company size affects the returns and, as the researchers documented, the negative abnormal returns are mostly due to larger firms while the positive abnormal returns come from the relatively small firms. Particularly, as the strategy with the highest profits they found the one that had a short position in the largest-top-accrual decile and a long position in the smallest-low-accrual decile. Bjojraj, Sengupta and Zhang (2009) examine the introduction of the Sarbanes-Oxley Act and the FAS 146 and how these two changes affected the accrual anomaly. FAS 146 (liabilities are recognized only when they are incurred) reduced the companyââ¬â¢s ability to ââ¬Å"manipulateâ⬠earnings while the SOX aims to enhance the credibility of the financial statements. The evidence recognises a change on how the market conceives information about restructurings charges. The authors propose that a possible explanation is that before the introduction of SOX and the FAS 146, the market was reluctant due to the ability of the firms to manage earnings. Finally, Bjojraj, Sengupta and Zhang (2009) document that post to the FAS 146 and the SOX act, low accrual portfolios do not generate positive abnormal returns. 2.4. The applications of the accruals phenomenon and reasons why it is not arbitraged away. The importance of the analysis of the anomalies is substantial for two reasons. Firstly, the profitability of a costless strategy challenges the EMH, especially if the strategy is based on bearing no additional risk. Secondly, managersââ¬â¢ incentives to manipulate the financial statements and consequently the accruals would be obvious if a profitable strategy based on such widely available information existed. Chen and Cheng (2002) find that the managersââ¬â¢ incentive to record abnormal accruals is highly correlated with the accrual anomaly. The hypothesis of the researchers, which their findings support, was that the investors fail to detect when the managers aim to record abnormal accruals and that may contribute to the accruals anomaly. Richardsonââ¬â¢s (2000) main objective is to examine whether the information contained in the accruals is utilized by short sellers. As the researcher mentions, previous articles such as that of Teoh and Wong (1999) found that sell side analysts were unable to correctly ââ¬Å"exploitâ⬠the information contained in accruals for future returns. Richardson suggests that short sellers are considered as sophisticated enough to utilize the accruals information. Findings confirm previous work, such as that of Sloan (2000), who suggests that even short sellers do not correctly utilize the information contained into accruals. Ali, Chen, Yao and Yu (2007) examine whether and how equity funds benefit from the accrual anomaly by taking long position into low accruals firms. The researchers aim to identify how exposed are the equity firms to such a well known anomaly and what characteristics these funds share. By constructing a measure called ââ¬Å"accruals investing measureâ⬠(AIM), they try to document the portion of the low accruals firms into the actively managed funds. The evidence shows that generally funds are not widely exposed to low accruals firms but when they do so, they have an average of 2.83% annual return. It is worth noting that the annual return is net of transaction costs. Finally, the side-effects of high volatility in returns and in fund flows of the equity funds that are partially based on the accrual anomaly might be the reason behind the reluctance of the managers. Soares and Stark (2009) used UK firms to test whether a profitable accrual strategy is feasible net of transactions costs. Their findings support that indeed the accrual anomaly is present in the UK market. The authors suggest that for such a strategy to be profitable, someone is required to trade on firms with small market capitalization. They also suggest that although the accrualsââ¬â¢ mispricing seems to exist also in the UK, the transaction costs limit the profits to such an extent that the accrual anomaly could be difficult characterised as a challenge to the semi strong form of the efficient market hypothesis. Finally, we should not neglect to mention two papers that discourse on why the markets do not simply correct the accruals anomaly. According to the classical theory, markets are so imperfect that can produce the incentive to the market to correct the ââ¬Å"anomaliesâ⬠at any point of time. Mashruwala, Rajgopal and Shevlin (2006) examined the transactions costs and the idiosyncratic risk as possible reasons of why the accrual anomaly is not arbitraged away. The researchers aimed to investigate why the market does not correct the anomaly, but also to identify whether the low accruals firms are riskier. The paper poses the question of what stops the informed investors from taking long positions into profitable stocks according to the accrual anomaly so that they can arbitrage it away. The paper examines the practical difficulty of finding substitutes so that the risk can be minimized and its relation with the accrual anomaly. Additionally, the paper investigates the transaction co sts and findings support that according to the accrual anomaly, the profitable stocks tend to be the ones with low stock prices and low trading volume. Lev and Nissim (2004) focus on the persistence of the accr
Saturday, January 18, 2020
Automobile Industry in India Essay
Chennai accounts for 60% of the countryââ¬â¢s automotive exports. In tune with international standards to reduce vehicular pollution, the central government unveiled the standards titled ââ¬ËIndia 2000ââ¬â¢ in 2000 with later upgraded guidelines as ââ¬ËBharat Stageââ¬â¢. These standards are quite similar to the more stringent European standards and have been traditionally implemented in a phased manner, with the latest upgrade getting implemented in 13 cities and later, in the rest of the nation. The Automotive Industry has flourished in Pune Region in Maharashtra, What were the special conditions were there for this development. Still Indian cars are not considered as a class in itself compared to European cars. Indiaââ¬â¢s strong engineering base and expertise in the manufacturing of low-cost, fuel-efficient cars has resulted in the expansion of manufacturing facilities of several automobile companies like Hyundai, Nissan, Toyota, Volkswagen and Maruti Suzuki In recent years, India has emerged as a leading center for the manufacture of small cars. Indian brands: AMW(Asian motor works- Commersial vehicles), Eicher Motors(tractors, Buses, components), Force(Bajaj Tempo), Hindustan motors(Birla, Ambassador car, Joint venture with Mitsubishi), Premier(Padmini, Moved from Mumbai to Pune), Tata, Mahindra, BharatBenz. Per capita penetration at around nine cars per thousand people is among the lowest in the world. While the industry is highly capital intensive in nature in case of four-wheelers, capital intensity is a lot less for two-wheelers. Though three-wheelers and tractors have low barriers to entry in terms of technology, four wheelers is technology intensive. Costs involved in branding, distribution network and spare parts availability increase entry barriers. With the Indian market moving towards complying with global standards, capital expenditure will rise to take into account future safety regulations. Automobile majors increase profitability by selling more units. As number of units sold increases, average cost of selling an incremental unit comes down. This is because the industry has a high fixed cost component. This is the key reason why operating efficiency through increased localization of components and maximizing output per employee is of significance. Maruti Suzuki, which is the market leader in PVs, had to deal with labour strikes at its plant at Manesar as a result of which production was severely hit. As petrol prices firmed up, the differential between petrol and diesel widened. Thus, there was a surge in demand for diesel cars. Most companies faced pressure at the operating level as margins declined due to rise in input costs. Steep depreciation of the rupee also took its toll. Tractors: While good monsoon is a positive for the sector, given the fact that non-farm incomes have continued to climb up, volumes should still hold up well in the longer run despite a year or two of poor monsoons. privatisation of select state transport undertakings bodes well for the bus segment.
Friday, January 10, 2020
New Article Reveals the Low Down on English Essay Topics for Class 12th and Why You Must Take Action Today
New Article Reveals the Low Down on English Essay Topics for Class 12th and Why You Must Take Action Today Up in Arms About English Essay Topics for Class 12th? What actually is terrorism it's the spread of terror, as its name indicates. This list of topics may supply a notion that you could get excited about. Make certain you use language which is appropriate for the audience you're addressing to. You will need to back up your viewpoint with well-researched facts and data also. Ensure you write in paragraphs. OR you could begin with a quote regarding the topic and go with the salutations and introduction. A quote in the center of the speech would likewise be fine. Feel free to provide your own personal opinion in a couple of lines. Facts, Fiction and English Essay Topics for Class 12th Use of quotes is highly advised. Senator Denton has called it `the most commonly practiced kind of contemporary warfare. Students are requested to indicate how a specific sentence may be corrected or improved or the way the organization or development of a paragraph may be strengthened. Cell phones should not be used while driving. Top English Essay Topics for Class 12th Secrets When it's the start of the semester, this might be a little harder to do. You will need that opportunity to write. Scientists have also said that early morning is the ideal time to study and earn knowledge. Rising up early also relieves tension and tension as it offers you the opportunit y to squeeze in a workout before getting distracted. The End of English Essay Topics for Class 12th Spam mail needs to be outlawed. It will provide you with an idea concerning how they are in fact written. It's been proved that morning folks are persistent and proactive. It just isn't likely to take place. What Does English Essay Topics for Class 12th Mean? You're not likely to have the ability to compose a successful essay with no practice or preparation. You may surely start your practice for the exact same! Yearly driving tests ought to be mandatory over a specific age. They should be mandatory for the first five years after getting a license. Terrorism can likewise be defined as an organized method of intimidation and violence particularly for political function. India has been facing the issue of terrorism in various parts of the nation. Governments and militaries can deal with the external threats but to have an authentic independent nation, we will need to fix the internal issue. Terrorism is the principal problem of our country this moment. Of late, it has become a world-wide phenomenon. School tests aren't powerful. A lot of students put on a uniform. They should be allowed to pray in school. They learn to write effectively when they write more often. English Essay Topics for Class 12th Secrets That No One Else Knows About Also, there may be essay, speech or debate questions for Technology Technology has come to be an integral portion of our lives. Life is far better than it was 50 decades ago. Students often discover that a large part of their work on those essays is done before they even begin writing. Presentation is vital. Activity Here are a couple topics for essay writing. Books ought never to be banned. Answers of all of the questions of latest CBSE Sample Paper can be found in this Marking Scheme. The English Essay Topics for Class 12th Game Teens ought to be able to select their bedtime. They should be required to take parenting classes. Parents should speak to kids about drugs at a youthful age. Parents of bullies should need to pay a fine. If an individual is physically fit, he's also mentally fit and healthy. When you own a lot of varied points, it is wise you select a few best ones and compose a line on each. It's possible you've too many points or hardly any points. Underlining the primary points is quite important. If this is the case, you are likely to assume he'll request that you write something about the source of the war. How people will act if there will not be any rules in any way. Indeed, the sky isn't far. Therefore, if you don't develop a tradition of waking up before the remainder of the planet, you won't be in a position to modify the world. Gun ownership ought to be tightly controlled. They're matters of private option, not forc ed. She would like to keep quiet within her class when she teaches. If you're requested to include three or more examples, make certain you've included three. They're activities that we're really interestedin and hence give us a good deal of pleasure. For this, one should keep up an appropriate schedule and has to go to bed in time. Snow days are excellent for family quality time. Imagine the simplicity and convenience of having all your kilts and accessories in 1 place.
Thursday, January 2, 2020
Malware And Its Effects On Our Computer - 1882 Words
Have you ever been surfing the web when all of a sudden a vibrant window pops up congratulating you for being the nth visitor and the lucky recipient of some amazing prize which youââ¬â¢ll receive just as soon as you enter your email address or download a file? Almost everyone encounters a pop-up like this every now and then. Some of us, including myself, have even followed the instructions only to learn that weââ¬â¢ve helped a malware program run on our computer. Malware, also known as malicious software, has a deep history behind it. By definition, malware is a code or a software that is designed to damage, disrupt, steal, or inflict malice in some form or another on computer data, personal files, hosts, or networks. It poses a major threat to home and business computers worldwide and there arenââ¬â¢t many means to stop it. Malware comes in a variety of forms, and from a variety of sources. Over the last few decades malware has grown more sophisticated and more dangerous. The main types of malware include computer viruses, worms, trojans, and bots. Malware can be separated further into sub-categories such as backdoor trojans, remote access trojans, information stealers, and ransomware. The different forms of malware use different techniques to damage or infect the targeted computer. However, all malware has one thing in common, self-replication. Before we can learn about this self-replication that is key to all malware today, we must learn about the evolution of malware. The evolutionShow MoreRelatedTaking a Look at Cybercrime1019 Words à |à 4 PagesIntroduction Malware is a malicious software and act a single term to refer to virus, trojan horse, spy ware, worm and spam. It is design to harm to a standalone computer or a network computer. Type Of Malware Virus is a program that replicates by being copied to another program, computer or documents. It can be send toward via e-mail or downloaded file that person receive from the website that he download. Trojan horse is a program that harmful to the computer or data in such a way that it canRead MoreBotnet Essay1045 Words à |à 5 Pages The idea of the malicious code or malware, (e.g., infections, worms, bots) moved as of late from upsetting support of effectively looking for financial benefit. Beforehand, worms were arranged essentially to spread. The effect on casualties and associations was essentially an interruption of administration bringing about the loss of efficiency and now and at that a point lost pay. Before long, innumerable imperative worms are proposed to take delicate information, for instance, Mastercard numbersRead MoreDenial Of Services Attack Essay1467 Words à |à 6 PagesDenial of Service attack (DoS attack) are attacks making the computer unusable and the programs unavailable as systems flood a userââ¬â¢s bandwidth Historically, a computer system is overloaded with false requests and data, causing the system to go into shock and crash. The multiple attacks from different IP addresses, sometimes thousands, making it hard for the computer to pinpoint the source. Used in large and layered net works, using multi-threaded OSI layered attacks and a pre-scanned reconnaissanceRead MoreHow Antivirus Effects Our Lives Essay examples1177 Words à |à 5 Pagesprotect a computer from malware such as virus, Trojan horses, computer worms and other malicious programs. Besides from protecting a computer, the anti-virus offers many solutions to prevent new infections into your computer by scanning emails and files when they are being downloaded. An antivirus program is considered a security strategy. A computer virus is similar to a biological virus; it spreads from one computer to another just as the biological virus spreads from human to human. The computer virusRead MoreThe Breach Of Target Security Breach Incident Response1447 Words à |à 6 PagesIn December 2013, the CEO, Gregg Steinhafle, of Target announced that their company was affected by a data breach that occurred between November 27 and December 15, 2013. ââ¬Å"Target disclosed that online thieves hacked into its computer system, stealing credit card or personal information from more than 100 million customers. Both personal data and credit card information may have been stolen from about 12 million peopleâ⬠(Abrams, 2014). The outcome of this breach has cost Gregg Steinhafle his job,Read MoreCyber Security Includes Ensuring The Data Essay1625 Words à |à 7 Pagesvolume and modernity of digital security threatsââ¬âincluding focusing on phishing tricks, information robbery, and other online vulnerabiliti esââ¬âdemand that we stay cautious about securing our frameworks and data. The normal unprotected associated with the Internet can be hacked in minutes. A great deal of computers and website pages are being found with viruses each day. New hacking strategies are invented constantly. These are only a couple case of hacking we hear about and they highlight the significanceRead MoreCybercrime And Its Effects On Society1239 Words à |à 5 PagesAbstract-This research explores the different forms of cybercrime and its effects on society when compared to several years ago. Moreover, it focuses on the changes that have been made to fight the rise of cybercrimes. With the advances in technology allowing society to stay interconnected online, criminals, both who is not an expert and experienced, have taken advantage of growing opportunities. By taking into consideration the dangers on this issue, it is important to take action and provide solutionsRead MoreContemporary Information Secur ity Systems And Computer Systems1519 Words à |à 7 PagesAccording to identitytheft.info, almost 15 million Americans have their identity used fraudulently due to information leaks and information insecurities. With the growing dependency on computer systems to store confidential information across the world, it is only necessary that that the information be protected by strong security systems which include both hardware and software so that both the businesses and the consumers feel safe in the transportation of information over the inter-webs. ContemporaryRead MoreComputer Virus And Its Effect On The Computer2535 Words à |à 11 Pages1. Introduction Today, the term ââ¬Ëcomputer virusââ¬â¢ is definitely not unfamiliar to most people. In the early 1980s, people started to gain awareness of Computer virus or Malware. However, it was only in 1987 that computer virus became prominent; especially to those in the press and trade industry. [1] Computer virus has evolved over the years - from the early days of Internet distributed Morris worm to remote access Trojans(RAT). Often not, a personal computer tends to be vulnerable to a virus attackRead MoreComputer Networks And The Internet1379 Words à |à 6 Pagesme? The simple fact of having an unprotected computer network, law enforcement not up to par, and a challenge is all a hacker needs to cash in; sometimes personal, but for the most part, just business as usual. Hackers once admired in the 1960ââ¬â¢s are now dangerous and a threat to big box corporations, small businesses, and personal computer users. Data breaches are the most lucrative business for hackers still. An example of data breaching is Computer Memory Racking or also known as memory consumption
Subscribe to:
Comments (Atom)