...DETERMINANTS OF FOREIGN DIRECT INVESTMENT IN THE MALAYSIAN MANUFACTURING SECTOR NOR AMIRA IZZATI BINTI MOHD IKHWAN 2011362629 NUR HASIDAH BINTI HUSSEIN 2011391659 BACHELOR OF BUSINESS ADMINISTRATION (HONS) FINANCE FACULTY OF BUSINESS MANAGEMENT UNIVERSITI TEKNOLOGI MARA JOHOR. DECEMBER 2013 TITLE PAGE DETERMINANTS OF FOREIGN DIRECT INVESTMENT IN THE MALAYSIAN MANUFACTURING SECTOR NOR AMIRA IZZATI BINTI MOHD IKHWAN 2011362629 NUR HASIDAH BINTI HUSSEIN 2011391659 Submitted in Partial Fulfillment Of the Requirement for the Bachelor of Business Administration (Hons) Finance FACULTY OF BUSINESS MANAGEMENT UNIVERSITI TEKNOLOGI MARA, JOHOR. DECEMBER 2013 i BACHELOR OF BUSINESS ADMINISTRATION (HONS) FINANCE FACULTY OF BUSINESS MANAGEMENT UNIVERSITI TEKNOLOGI MARA SEGAMAT, JOHOR DECLARATION OF ORIGINAL WORK NOR AMIRA IZZATI BINTI MOHD IKHWAN 2011362629 NUR HASIDAH BINTI HUSSEIN 2011391659 We are here by, declare that, This work has not previously been accepted in substance for any degree, locally or overseas and is not being concurrently submitted for this degree or any other degrees. This project paper is the result of our independent work and investigation, except where otherwise stated. All verbatim extracts have been distinguished by quotation marks and sources of our information have been specifically acknowledged. Signature: _______________ Date: _________________ ii LETTER OF SUBMISSION ...
Words: 16196 - Pages: 65
...Journal of Banking & Finance 22 (1998) 613±673 The economics of small business ®nance: The roles of private equity and debt markets in the ®nancial growth cycle Allen N. Berger a a,b,* , Gregory F. Udell c Board of Governors of the Federal Reserve System, Washington, DC 20551, USA b Wharton Financial Institutions Center, Philadelphia, PA 19104, USA c Kelley School of Business, Indiana University, Bloomington, IN 47405, USA Abstract This article examines the economics of ®nancing small business in private equity and debt markets. Firms are viewed through a ®nancial growth cycle paradigm in which different capital structures are optimal at dierent points in the cycle. We show the sources of small business ®nance, and how capital structure varies with ®rm size and age. The interconnectedness of small ®rm ®nance is discussed along with the impact of the macroeconomic environment. We also analyze a number of research and policy issues, review the literature, and suggest topics for future research. Ó 1998 Published by Elsevier Science B.V. All rights reserved. JEL classi®cation: G21; G28; G34; E58; L89 Keywords: Venture capital; Small business lending; Bank; Mergers 1. Introduction The role of the entrepreneurial enterprise as an engine of economic growth has garnered considerable public attention in the 1990s. Much of this focus * Corresponding author. Tel.: 1 202 452 2903; fax: 1 202 452 5295; e-mail: aberger@frb.gov. 0378-4266/98/$19.00 Ó 1998 Published...
Words: 30009 - Pages: 121
...Wireless Physical Layer Security: An Information Theoretic Approach DISSERTATION Presented in Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy in the Graduate School of The Ohio State University By Onur Ozan K¨yl¨o˘lu, B.S., M.S. o u g Graduate Program in Electrical and Computer Engineering The Ohio State University 2010 Dissertation Committee: Hesham El Gamal, Adviser C. Emre K¨ksal o Ness B. Shroff Atilla Eryılmaz c Copyright by Onur Ozan K¨yl¨ o˘lu o u g 2010 ABSTRACT We are in the midst of wireless revolution, and increasing demand continues for wireless applications. This explosive growth, of wireless communications and services, inevitably renders security into a challenging quality of service constraint that must be accounted for in the network design. The state of the art methods in combating the security threats are usually founded on cryptographic approaches. These techniques typically assume limited computational resources at adversaries, are usually derived from unproven assumptions, and most of the time do not offer a measurable security notion. Information theoretic security, on the other hand, eliminates the aforementioned limitations of the cryptographic techniques at the physical layer of communication systems. In this thesis, we concentrate on both the theoretical and the practical aspects of physical layer security. We first start by analyzing elemental interference networks, in particular, two-user channels with an adversary...
Words: 47476 - Pages: 190