...camera system performs two functions: the detection of single photons events and the measurement of its energy and position. [5] The gamma camera consists of several components which are Collimator scintillation crystal an array of photomultiplier tubes (PMTs) a pulse height analyzer computer and picture archiving system....
Words: 1500 - Pages: 6
...Monte Carlo Simulation Tutorial This tutorial shows how to use Microsoft Excel to develop Monte Carlo simulations without the use of add-ins or special software (such as @RISK or Crystal Ball). (Note, however, that there are some important advantages of using these dedicated software packages.) After completing the tutorial you should have a sufficient understanding of Monte Carlo concepts and Excel capabilities to begin building your own Monte Carlo simulations applied to a wide range of business problems, including the construction of short-term profit plans (otherwise referred to as “Cost-Volume-Profit” models, covered in Chapter 9 of the text). Monte Carlo refers to a widely used approach for solving complex problems using computer algorithms to simulate the variables in the model (e.g., a CVP model). Typically, an algorithm is developed to "model" the problem, and then the algorithm is run many times (from a few hundred up to millions) in order to develop a statistical data set for how the model behaves. Simple Example: Tossing a “Fair” Coin—Heads vs. Tails? For the simplest example, consider the basic coin toss. This is a process which has two possible outcomes (heads or tails), each with a 50% probability. In a million coin tosses, roughly half will be “heads” and half will be “tails.” A simple Monte Carlo simulation would support this conclusion. If you were to develop a spreadsheet with a random number generator resulting in 0 for “heads” and 1 for “tails,” then...
Words: 2387 - Pages: 10
...UNIVERSITY OF WASHINGTON Graduate School of Business Administration Finance 553 CAPITAL INVESTMENT PLANNING Winter 2003 Professor Robert C. (Rocky) Higgins 306 Mackenzie Hall Tel: 543-4379 E-mail: rhiggins@u.washington.edu Homepage: http://us.badm.washington.edu/higgins/ (From here you’re one click from the class page) Office Hours: M, W: 10:30 – 12:00 COURSE OBJECTIVE Capital Investment Planning is a case course examining corporate investment decisions and related issues in financial strategy. The course is intended as a continuation of Finance 552, Corporate Planning and Financing, and is suitable for generalists and finance specialists who seek a solid grounding in corporate financial management. Finance 555 may be substituted for Finance 552 as a prerequisite. Principal topics include: use of discounted cash flow analysis to evaluate investment opportunities, estimating capital costs, or discount rates, capital budgeting systems and their affect on resource allocation decisions, valuing a company or division, merger analysis, corporate restructuring including leveraged buyouts, and issues in financial strategy. When you complete this course, you should be able to: Estimate an investment’s relevant costs and benefits Estimate a company's weighted-average cost of capital and understand its role in investment decision making Use discounted cash flow techniques, decision trees, and simulation to analyze investment opportunities Value (i...
Words: 3270 - Pages: 14
...Approaches to Process Performance Modeling: A Summary from the SEI Series of Workshops on CMMI High Maturity Measurement and Analysis Robert W. Stoddard II Dennis R. Goldenson January 2010 TECHNICAL REPORT CMU/SEI-2009-TR-021 ESC-TR-2009-021 Software Engineering Measurement and Analysis Unlimited distribution subject to the copyright. http://www.sei.cmu.edu This report was prepared for the SEI Administrative Agent ESC/XPK 5 Eglin Street Hanscom AFB, MA 01731-2100 The ideas and findings in this report should not be construed as an official DoD position. It is published in the interest of scientific and technical information exchange. This work is sponsored by the U.S. Department of Defense. The Software Engineering Institute is a federally funded research and development center sponsored by the U.S. Department of Defense. Copyright 2010 Carnegie Mellon University. NO WARRANTY THIS CARNEGIE MELLON UNIVERSITY AND SOFTWARE ENGINEERING INSTITUTE MATERIAL IS FURNISHED ON AN "AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED OR IMPLIED, AS TO ANY MATTER INCLUDING, BUT NOT LIMITED TO, WARRANTY OF FITNESS FOR PURPOSE OR MERCHANTABILITY, EXCLUSIVITY, OR RESULTS OBTAINED FROM USE OF THE MATERIAL. CARNEGIE MELLON UNIVERSITY DOES NOT MAKE ANY WARRANTY OF ANY KIND WITH RESPECT TO FREEDOM FROM PATENT, TRADEMARK, OR COPYRIGHT INFRINGEMENT. Use of any trademarks in this report is not intended in any way to infringe on...
Words: 27376 - Pages: 110
... | |9-5 |Sensitivity Analysis; Regression Analysis | |9-6 |Profit Planning: Choice of Cost Structure | |9-7 |Pancake World | Readings 9-1: “Tools for Dealing with Uncertainty” by David R. Fordham, CMA, CPA, Ph.D and S. Brooks Marshall, CFA. DBA This article explains how to use simulation methods within a spreadsheet program such as Excel to perform sensitivity analysis for a given decision context. The available spreadsheet simulation software systems include the programs Crystal Ball and @Risk, among others. These software systems allow the user to analyze the effect of uncertainty on the potential outcomes of a decision. These tools can be applied directly to CVP analysis. The tools allow the user to see the potential effect on the breakeven level or total profit of potential variations in the key uncertain factors in the analysis. The uncertain factors affecting breakeven might be the unknown level of unit variable cost, price or fixed cost. Also, in determining total profit, the unknown level of demand might be a key uncertain factor. Exercise: Use a spreadsheet...
Words: 9115 - Pages: 37
... | |9-5 |Sensitivity Analysis; Regression Analysis | |9-6 |Profit Planning: Choice of Cost Structure | |9-7 |Pancake World | Readings 9-1: “Tools for Dealing with Uncertainty” by David R. Fordham, CMA, CPA, Ph.D and S. Brooks Marshall, CFA. DBA This article explains how to use simulation methods within a spreadsheet program such as Excel to perform sensitivity analysis for a given decision context. The available spreadsheet simulation software systems include the programs Crystal Ball and @Risk, among others. These software systems allow the user to analyze the effect of uncertainty on the potential outcomes of a decision. These tools can be applied directly to CVP analysis. The tools allow the user to see the potential effect on the breakeven level or total profit of potential variations in the key uncertain factors in the analysis. The uncertain factors affecting breakeven might be the unknown level of unit variable cost, price or fixed cost. Also, in determining total profit, the unknown level of demand might be a key uncertain factor. Exercise: Use a...
Words: 9076 - Pages: 37
...Although José Rizal, now eleven years old, had passed a good entrance examination in Manila in June, 1872, he nearly failed to matriculate in theAteneo in July, because his mother's arrest had made him a month late, and because he looked so little, so slender, so young. He would not have been admitted at all but for the intercession of Dr. Manuel Burgos, a nephew of the recently executed Dr. José Burgos. When finally the boy was accepted, he went to mass and prayed fervently. (01) He had something to pray about and to study for! Tragedy had set purpose ablaze in his young soul --, purpose that would never die. He did not know how to help his home and country but he wouldfind a way! Following the rigid methodical habits which he had learned from his father and which were taught by his Jesuit teachers, he prepared a schedule so that he would not lose an hour: study and reading until four p.m.; four to five, exercise; five to six social and miscellaneous obligations. This careful husbanding of every minute began to show results almost at once. He began at the bottom of the school, but within a month he was "Emperor of Rome". The Ateneo had divided the students into two "empires", Roman and Carthaginian, to fight for academic supremacy. It was this war that soon brought young Rizal triumph and prizes. At the end of the first quarter he received the grade "excellent". When one of the teachers hurt his feelings he stopped trying for honors, so that at the end of the year he came...
Words: 4264 - Pages: 18
...we consider a different and potentially more informative way of assessing and presenting the risk in an investment. Rather than compute an expected value for an asset that that tries to reflect the different possible outcomes, we could provide information on what the value of the asset will be under each outcome or at least a subset of outcomes. We will begin this section by looking at the simplest version which is an analysis of an asset’s value under three scenarios – a best case, most likely case and worse case – and then extend the discussion to look at scenario analysis more generally. We will move on to examine the use of decision trees, a more complete approach to dealing with discrete risk. We will close the chapter by evaluating Monte Carlo simulations, the most complete approach of assessing risk across the spectrum. Scenario Analysis The expected cash flows that we use to value risky assets can be estimated in one or two ways. They can represent a probability-weighted average of cash flows under all possible scenarios or they can be the cash flows under the most likely scenario. While the former is the more precise measure, it is seldom used simply because it requires far more information to compile. In both cases, there are other scenarios where the cash flows will be different from expectations; higher than expected in some and lower than...
Words: 17404 - Pages: 70
...1 1 Fundamentals of Semiconductor Electrochemistry and Photoelectrochemistry Krishnan Rajeshwar The University of Texas at Arlington, Arlington, Texas 1.1 1.2 1.3 1.3.1 1.3.2 1.3.3 1.3.4 1.4 1.4.1 1.4.2 1.4.3 1.5 1.5.1 1.5.2 1.5.3 1.5.4 1.5.5 1.6 1.7 1.7.1 1.7.2 1.7.3 1.7.4 1.7.5 Introduction and Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Electron Energy Levels in Semiconductors and Energy Band Model . The Semiconductor–Electrolyte Interface at Equilibrium . . . . . . . . The Equilibration Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The Depletion Layer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Mapping of the Semiconductor Band-edge Positions Relative to Solution Redox Levels . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Surface States and Other Complications . . . . . . . . . . . . . . . . . . . Charge Transfer Processes in the Dark . . . . . . . . . . . . . . . . . . . . Current-potential Behavior . . . . . . . . . . . . . . . . . . . . . . . . . . . . Dark Processes Mediated by Surface States or by Space Charge Layer Recombination . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Rate-limiting Steps in Charge Transfer Processes in the Dark . . . . . Light Absorption by the Semiconductor Electrode and Carrier Collection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Light Absorption...
Words: 180197 - Pages: 721
...Summary. Various anthropometric studies have been conducted in the last decade in order to investigate how different physiological or behavioral human characteristics can be used as identity evidence to prove the individuality of each person. Some of these characteristics are: face, eyes, ears, teeth, fingers, hands, feet, veins, voice, signature, typing style and gait. Since the first biometric security systems appeared in the market, an increasing demand for novel techniques that will cover all different scenarios, has been observed. Every new method appears to outmatch some of its competitors but, at the same time, presents disadvantages compared to others. However, there is still no method that consists a single panacea to all different scenarios and demands for security. This is the reason for which researchers are on a continuous effort for more efficient and generic biometric modalities that can be used in various applications. In this chapter, emerging biometric modalities that appeared in the last years in order to improve the performance of biometric recognition systems, are presented. The presented methods are divided in two major categories, intrusive and non-intrusive ones, according to the level of user nuisance that each system sets off. 1 Introduction Biometric recognition is a well-known research area that aims to provide more efficient solutions to everyday growing human need for security. Biometrics refers to methods that can be used for uniquely recognizing...
Words: 12845 - Pages: 52
...SPECIAL REPORT I N T E R N AT I O N A L B A N K I N G May 19th 2012 Retail renaissance SPECIAL REPORT INTERNATIONAL BANKING Retail renaissance The internet and mobile phones are at long last turning boring old retail banking into an exciting industry, says Jonathan Rosenthal IF YOUR BANK could start over, this is what it would be, trumpeted the marketing campaign for the launch in 1999 of Wingspan, an internet bank. The following year the bank was gone. In September 2000, a few months after the dotcom bubble burst, it was absorbed by its boring American bricks-and-mortar parent, Bank One (now part of JPMorgan). For all the high hopes that the internet would transform banking, most other internet banks launched around that time met with a similar fate. Citi f/i, an online bank started by Citigroup, was folded back into its parent in 2000. NetBank, an American pioneer of internet banking, soldiered on for longer than most but was shut down by banking regulators in 2007. On the other side of the Atlantic, Egg, Britain’s rst stand-alone internet bank, shook the market in 1999-2000 when it gained more than 2m customers within months of starting up. But within a few years it, too, had in e ect disappeared, its customers having been sold rst to Citigroup and then to Barclays and the Yorkshire Building Society. It was an ignominious end to a bold experiment in online banking that had caused palms to sweat in banking centres around the world. The promise of internet banking...
Words: 17111 - Pages: 69
...redirecting... | |cover |next page > | | | | | | | | | | | | | | | | | | | | ...
Words: 30800 - Pages: 124
...An Analysis of Small Business Patents by Industry and Firm Size by Anthony Breitzman, Ph.D. and Diana Hicks, Ph.D. Haddonfield, NJ 08033 for Under contract no. SBAHQ-07-Q-0010 Release Date: November 2008 This report was developed under a contract with the Small Business Administration, Office of Advocacy, and contains information and analysis that was reviewed and edited by officials of the Office of Advocacy. However, the final conclusions of the report do not necessarily reflect the views of the Office of Advocacy. Office of Advocacy ww w.sba.gov/advo Small Business Research Summary Advocacy: the voice of small business in government No. 335 November 2008 An Analysis of Small Business Patents by Industry and Firm Size Anthony Breitzman and Diana Hicks., Haddonfield, NJ 08033 2008 [60] pages. Under contract no. SBAHQ-07-Q-0010 Background This study is the third in a series that examines small business patent activity. The authors created a database of 1,293 technology firms with 15 or more patents issued between 2002 and 2006. These firms are designated as innovative firms because of their high level of patent activity. Using this database, the authors analyze the relative strengths of small and large technology businesses, including information such as the industry and technology within which the firm patents and the importance of the patent. The results demonstrate that small businesses that innovate are indeed special and that the technology...
Words: 31696 - Pages: 127
...The Most Dangerous Game Connell, Richard Published: 1924 Categorie(s): Fiction, Action & Adventure, Mystery & Detective, Short Stories, Thrillers Source: Feedbooks 1 About Connell: Richard Edward Connell, Jr. (October 28, 1893 – November 23, 1949) was an American author and journalist, best known for his short story "The Most Dangerous Game." Connell was one of the best-known American short story writers of his time and his stories appeared in the Saturday Evening Post and Collier's Weekly. Connell had equal success as a journalist and screenwriter. He was nominated for an Academy Award for best original story for 1941's Meet John Doe. He died of a heart attack in Beverly Hills, California on November 22, 1949 at the age of fifty-six. Copyright: This work is available for countries where copyright is Life+50. Note: This book is brought to you by Feedbooks http://www.feedbooks.com Strictly for personal use, do not use this file for commercial purposes. 2 "Off there to the right—somewhere—is a large island," said Whitney." It's rather a mystery—" "What island is it?" Rainsford asked. "The old charts call it `Ship-Trap Island,"' Whitney replied." A suggestive name, isn't it? Sailors have a curious dread of the place. I don't know why. Some superstition—" "Can't see it," remarked Rainsford, trying to peer through the dank tropical night that was palpable as it pressed its thick warm blackness in upon the yacht. "You've good eyes," said Whitney, with a laugh," and...
Words: 9275 - Pages: 38
...B2B Brand Management Philip Kotler ´ Waldemar Pfoertsch B2B Brand Management With the Cooperation of Ines Michi With 76 Figures and 7 Tables 12 Philip Kotler S. C. Johnson & Son Distinguished Professor of International Marketing Kellogg School of Business Northwestern University 2001 Sheridan Rd. Evanston, IL 60208, USA p-kotler@kellogg.northwestern.edu Waldemar Pfoertsch Professor International Business Pforzheim University Tiefenbronnerstrasse 65 75175 Pforzheim, Germany waldemar.pfoertsch@pforzheim-university.de ISBN-10 3-540-25360-2 Springer Berlin Heidelberg New York ISBN-13 978-3-540-25360-0 Springer Berlin Heidelberg New York Cataloging-in-Publication Data Library of Congress Control Number: 2006930595 This work is subject to copyright. All rights are reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag. Violations are liable for prosecution under the German Copyright Law. Springer is a part of Springer Science+Business Media springeronline.com ° Springer Berlin ´ Heidelberg 2006 Printed in Germany The use of general descriptive names, registered...
Words: 104254 - Pages: 418