Search results

1 – 10 of over 2000
Content available
Article
Publication date: 28 March 2023

Samhita Vemuri and Ziaul Haque Munim

While previous studies focused mainly on East Asia to Europe or United States trade routes, in recent years, trade among South-East Asian countries has increased notably. The…

Abstract

Purpose

While previous studies focused mainly on East Asia to Europe or United States trade routes, in recent years, trade among South-East Asian countries has increased notably. The price of transporting a container is not fixed and can fluctuate heavily over the course of a week. Besides, extant literature only identified seasonality patterns in the container freight market, but did not explore route-varying seasonality patterns. Hence, this study analyses container freight seasonality patterns of the six South-East Asian routes of the South-East Asian Freight Index (SEAFI) and the index itself and forecasts them.

Design/methodology/approach

Data of the composite SEAFI and six routes are collected from the Shanghai Shipping Exchange (SSE) including 167 weekly observations from 2016 to 2019. The SEAFI and individual route data reflect spot rates from the Shanghai Port to South-East Asia base ports. The authors analyse seasonality patterns using polar plots. For forecasting, the study utilize two univariate models, autoregressive integrated moving average (ARIMA) and seasonal autoregressive neural network (SNNAR). For both models, the authors compare forecasting results of original level and log-transformed data.

Findings

This study finds that the seasonality patterns of the six South-East Asian container trade routes are identical in an overall but exhibits unique characteristics. ARIMA models perform better than SNNAR models for one-week ahead test-sample forecasting. The SNNAR models offer better performance for 4-week ahead forecasting for two selected routes only.

Practical implications

Major industry players such as shipping lines, shippers, ship-owners and others should take into account the route-level seasonality patterns in their decision-making. Forecast analysts can consider using the original level data without log transformation in their analysis. The authors suggest using ARIMA models in one-step and four-step ahead forecasting for majority of the routes. The SNNAR models are recommended for multi-step forecasting for Shanghai to Vietnam and Shanghai to Thailand routes only.

Originality/value

This study analyses a new shipping index, that is, the SEAFI and its underlying six routes. The authors analyze the seasonality pattern of container freight rate data using polar plot and perform forecasting using ARIMA and SNNAR models. Moreover, the authors experiment forecasting performance of log-transformed and non-transformed series.

Details

Maritime Business Review, vol. 8 no. 2
Type: Research Article
ISSN: 2397-3757

Keywords

Open Access
Article
Publication date: 28 August 2020

Sean R. Aguilar, Vladik Kreinovich and Uyen Pham

In many real-life situations ranging from financial to volcanic data, growth is described either by a power law – which is linear in log-log scale or by a quadratic dependence in…

Abstract

Purpose

In many real-life situations ranging from financial to volcanic data, growth is described either by a power law – which is linear in log-log scale or by a quadratic dependence in the log-log scale. The purpose of this paper is to explain this empirical fact.

Design/methodology/approach

The authors use natural scale invariance requirements.

Findings

In this paper, the authors used natural scale invariance requirement to explain the ubiquity of quadratic log-log dependencies. The authors also explain what to do if quadratic log-log models turn out to be insufficiently accurate. In this case, scale-invariance requirements lead to dependencies which in the log-log scale take cubic, 4th order, etc. form.

Originality/value

To the best of authors’ knowledge, this is the first theoretical explanation of the empirical quadratic log-log dependence.

Details

Asian Journal of Economics and Banking, vol. 5 no. 1
Type: Research Article
ISSN: 2615-9821

Keywords

Content available
Book part
Publication date: 16 September 2022

Pedro Brinca, Nikolay Iskrev and Francesca Loria

Since its introduction by Chari, Kehoe, and McGrattan (2007), Business Cycle Accounting (BCA) exercises have become widespread. Much attention has been devoted to the results of

Abstract

Since its introduction by Chari, Kehoe, and McGrattan (2007), Business Cycle Accounting (BCA) exercises have become widespread. Much attention has been devoted to the results of such exercises and to methodological departures from the baseline methodology. Little attention has been paid to identification issues within these classes of models. In this chapter, the authors investigate whether such issues are of concern in the original methodology and in an extension proposed by Šustek (2011) called Monetary Business Cycle Accounting. The authors resort to two types of identification tests in population. One concerns strict identification as theorized by Komunjer and Ng (2011) while the other deals both with strict and weak identification as in Iskrev (2010). Most importantly, the authors explore the extent to which these weak identification problems affect the main economic takeaways and find that the identification deficiencies are not relevant for the standard BCA model. Finally, the authors compute some statistics of interest to practitioners of the BCA methodology.

Details

Essays in Honour of Fabio Canova
Type: Book
ISBN: 978-1-80382-636-3

Keywords

Open Access
Article
Publication date: 28 July 2020

Prabhat Pokharel, Roshan Pokhrel and Basanta Joshi

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities…

1076

Abstract

Analysis of log message is very important for the identification of a suspicious system and network activity. This analysis requires the correct extraction of variable entities. The variable entities are extracted by comparing the logs messages against the log patterns. Each of these log patterns can be represented in the form of a log signature. In this paper, we present a hybrid approach for log signature extraction. The approach consists of two modules. The first module identifies log patterns by generating log clusters. The second module uses Named Entity Recognition (NER) to extract signatures by using the extracted log clusters. Experiments were performed on event logs from Windows Operating System, Exchange and Unix and validation of the result was done by comparing the signatures and the variable entities against the standard log documentation. The outcome of the experiments was that extracted signatures were ready to be used with a high degree of accuracy.

Details

Applied Computing and Informatics, vol. 19 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Open Access
Article
Publication date: 31 December 2018

Khuram Ali Khan, Tasadduq Niaz, Đilda Pečarić and Josip Pečarić

In this work, we estimated the different entropies like Shannon entropy, Rényi divergences, Csiszár divergence by using Jensen’s type functionals. The Zipf’s–Mandelbrot law and…

Abstract

In this work, we estimated the different entropies like Shannon entropy, Rényi divergences, Csiszár divergence by using Jensen’s type functionals. The Zipf’s–Mandelbrot law and hybrid Zipf’s–Mandelbrot law are used to estimate the Shannon entropy. The Abel–Gontscharoff Green functions and Fink’s Identity are used to construct new inequalities and generalized them for m-convex function.

Details

Arab Journal of Mathematical Sciences, vol. 26 no. 1/2
Type: Research Article
ISSN: 1319-5166

Keywords

Open Access
Article
Publication date: 30 September 2019

Victor Motta

The purpose of this study is to account for a recent non-mainstream econometric approach using microdata and how it can inform research in business administration. More…

11642

Abstract

Purpose

The purpose of this study is to account for a recent non-mainstream econometric approach using microdata and how it can inform research in business administration. More specifically, the paper draws from the applied microeconometric literature stances in favor of fitting Poisson regression with robust standard errors rather than the OLS linear regression of a log-transformed dependent variable. In addition, the authors point to the appropriate Stata coding and take into account the possibility of failing to check for the existence of the estimates – convergency issues – as well as being sensitive to numerical problems.

Design/methodology/approach

The author details the main issues with the log-linear model, drawing from the applied econometric literature in favor of estimating multiplicative models for non-count data. Then, he provides the Stata commands and illustrates the differences in the coefficient and standard errors between both OLS and Poisson models using the health expenditure dataset from the RAND Health Insurance Experiment (RHIE).

Findings

The results indicate that the use of Poisson pseudo maximum likelihood estimators yield better results that the log-linear model, as well as other alternative models, such as Tobit and two-part models.

Originality/value

The originality of this study lies in demonstrating an alternative microeconometric technique to deal with positive skewness of dependent variables.

Details

RAUSP Management Journal, vol. 54 no. 4
Type: Research Article
ISSN: 2531-0488

Keywords

Open Access
Article
Publication date: 28 October 2022

Szymon Stereńczak

The positive illiquidity–return relationship (so-called liquidity premium) is a well-established pattern in international developed stock markets. The magnitude of liquidity…

Abstract

Purpose

The positive illiquidity–return relationship (so-called liquidity premium) is a well-established pattern in international developed stock markets. The magnitude of liquidity premium should increase with market illiquidity. Existing studies, however, do not confirm this conjecture with regard to frontier markets. This may result from applying different approaches to the investors' holding period. The paper aims to identify the role of the holding period in shaping the illiquidity–return relationship in emerging and frontier stock markets, which are arguably considered illiquid.

Design/methodology/approach

The authors utilise the data on stocks listed on fourteen exchanges in Central and Eastern Europe. The authors regress stock returns on liquidity measures variously transformed to reflect the clientele effect in a liquidity–return relationship.

Findings

The authors show that the investors' holding period moderates the illiquidity–return relationship in CEE markets and also show that the liquidity premium in these markets is statistically and economically relevant.

Practical implications

The findings may be of great interest to investors, companies and regulators. Investors and companies should take liquidity into account when making decisions; regulators should employ liquidity-enhancing actions to decrease companies' cost of capital and expand firms' investment opportunities, which will improve growth perspectives for the entire economy.

Originality/value

These findings enrich the understanding of the role that the investors' holding period plays in the illiquidity–return relationship in CEE markets. To the best knowledge, this is the first study which investigates the effect of holding period on liquidity premium in emerging and frontier markets.

Details

International Journal of Emerging Markets, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1746-8809

Keywords

Open Access
Article
Publication date: 2 November 2021

Rabha W. Ibrahim

In this study, the authors introduce a solvability of special type of Langevin differential equations (LDEs) in virtue of geometric function theory. The analytic solutions of the…

Abstract

Purpose

In this study, the authors introduce a solvability of special type of Langevin differential equations (LDEs) in virtue of geometric function theory. The analytic solutions of the LDEs are considered by utilizing the Caratheodory functions joining the subordination concept. A class of Caratheodory functions involving special functions gives the upper bound solution.

Design/methodology/approach

The methodology is based on the geometric function theory.

Findings

The authors present a new analytic function for a class of complex LDEs.

Originality/value

The authors introduced a new class of complex differential equation, presented a new technique to indicate the analytic solution and used some special functions.

Details

Arab Journal of Mathematical Sciences, vol. 29 no. 1
Type: Research Article
ISSN: 1319-5166

Keywords

Open Access
Article
Publication date: 20 August 2021

Daniel Hofer, Markus Jäger, Aya Khaled Youssef Sayed Mohamed and Josef Küng

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases…

2188

Abstract

Purpose

For aiding computer security experts in their study, log files are a crucial piece of information. Especially the time domain is very important for us because in most cases, timestamps are the only linking points between events caused by attackers, faulty systems or simple errors and their corresponding entries in log files. With the idea of storing and analyzing this log information in graph databases, we need a suitable model to store and connect timestamps and their events. This paper aims to find and evaluate different approaches how to store timestamps in graph databases and their individual benefits and drawbacks.

Design/methodology/approach

We analyse three different approaches, how timestamp information can be represented and stored in graph databases. For checking the models, we set up four typical questions that are important for log file analysis and tested them for each of the models. During the evaluation, we used the performance and other properties as metrics, how suitable each of the models is for representing the log files’ timestamp information. In the last part, we try to improve one promising looking model.

Findings

We come to the conclusion, that the simplest model with the least graph database-specific concepts in use is also the one yielding the simplest and fastest queries.

Research limitations/implications

Limitations to this research are that only one graph database was studied and also improvements to the query engine might change future results.

Originality/value

In the study, we addressed the issue of storing timestamps in graph databases in a meaningful, practical and efficient way. The results can be used as a pattern for similar scenarios and applications.

Details

International Journal of Web Information Systems, vol. 17 no. 5
Type: Research Article
ISSN: 1744-0084

Keywords

Open Access
Article
Publication date: 3 July 2017

Khar Kheng Yeoh

This Scholarship of Teaching and Learning research is a part of the larger study grant to analyze written reflections through learning log among the third and final year students…

15760

Abstract

Purpose

This Scholarship of Teaching and Learning research is a part of the larger study grant to analyze written reflections through learning log among the third and final year students undertaking BPME 3073 Entrepreneurship module in University Utara Malaysia (UUM). The paper aims to discuss these issues.

Design/methodology/approach

The data collection techniques are researcher-directed textual data through reflective learning log, taken from 140 students from three classes. A thematic approach was utilized to present the reflections of the students and all data were recorded in a verbatim format.

Findings

The findings show that most students have never written a reflective log or essay in the formative assessment. As a consequence, they had difficulty in writing the reflection when being requested to do so. A total 75 (approximately 55 percent) of the reflective logs were identified as level 1 (from 1 to 5 percent) in which reflections were simply written in a descriptive manner, resulted in a balance of 61 learning logs being utilized for further analysis. The students’ reflections on their entrepreneurship’s experience systematically categorize into four different themes comprised of: the nature of entrepreneurship module, entrepreneurial characteristics, opportunity recognition, and creativity and innovation.

Research limitations/implications

As for the limitation of the study, it is important to not to underestimate the challenges of introducing a grade assessment that most of them are not familiar with in their university academic journey. Students need guidance, assurance and confidence writing something that require personal opinion, own thinking, sensitive and personal nature of narration. For most students as found out in this study, self-confessional writing is hard to come by (they dare not attempt it in the first place), only a handful appreciating the writing start with “I,” “me” as first person. More research in this study should be conducted across the university to gauge the response from the students to see if the result of this study is only applicable to this group of students or to this discipline of studies. The researchers would also like to recommend for future studies which take the form of a longitudinal study of similar kind to examine the problems and challenges with regards to promoting learning reflection at the undergraduate level.

Practical implications

Based on the result of the 61 students who had demonstrated an ability in reflective writing, it is suggested that perhaps the university should consider offering coursework that contains a component of reflective writing as part of the assessment. As such, if this is implemented, students of such ability like the one in this sample group would have been benefitted from such assessment which look at reflective ability (Greene, 2014) and which they were allowed to form a broader perspective in relation to the module undertaken. This in turns will foster the growth of reflective ability which is recognized as a learned behavior (Gustafson and Bennett, 1999). In addition, for the future exercise of this reflective learning log, the researcher opined that we should encourage our students to engage with another student (e.g. close friend) in a way that encourages talking with, questioning, or confronting, helped the reflective process by placing the learner in a safe environment in which self-revelation can take place. In addition, students were able to distance themselves from their actions, ideas and beliefs, by holding them up for scrutiny in the company of a peer with whom they are willing to take such risks (Hatton and Smith, 1995).

Originality/value

The results of this research have strongly suggested the need to urgently develop among the students the skills in writing reflectively as they go through the process of higher education which is useful in molding their future professional and entrepreneurial behavior as when they entered the job market which requires a critical reasoning ability.

Details

Journal of Research in Innovative Teaching & Learning, vol. 10 no. 2
Type: Research Article
ISSN: 2397-7604

Keywords

1 – 10 of over 2000