摘要:
The present invention is directed to an alternative method for gauging market participant behavior, which is identified herein as “Market Barometer.” In one embodiment, Market Barometer is based on the recent performance ranks of particular equity strategy indices as compared to their historical ranks. Significant deviations from historical ranks is a predictor of market performance over subsequent near term time periods, for example, a subsequent month and, in turn, these deviations can be used to estimate the current market expected return. Empirical tests reveal that expected market returns vary over time in line with Market Barometer readings.
摘要:
The present invention is directed to an asset classification system based on investment strategy. The system determines a number for performance measures and strategy classifications. These measures indicate, in one configuration, an extent to which a security or manager is outperforming or attempting to outperform a benchmark and how successful the security or manager has been based on historic performance data.
摘要:
The present invention is directed to an asset classification system based on investment strategy. The system determines a number for performance measures and strategy classifications. These measures indicate, in one configuration, an extent to which a security or manager is outperforming or attempting to outperform a benchmark and how successful the security or manager has been based on historic performance data.
摘要:
The present invention is directed to an asset classification system based on investment strategy. The investment strategies include capitalization strategy, competitive position strategy, economic conditions strategy, future growth investment strategy, market condition strategy, opportunity strategy, profitability strategy, risk strategy, social considerations strategy, and valuation strategy.
摘要:
The present invention is directed to an asset classification system based on investment strategy. The investment strategies include capitalization strategy, competitive position strategy, economic conditions strategy, future growth investment strategy, market condition strategy, opportunity strategy, profitability strategy, risk strategy, social considerations strategy, and valuation strategy.
摘要:
A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a SQL database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records.
摘要:
A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records.
摘要:
A biomarker for pancreatic beta-cell mass comprising measuring the levels of CFC1 in the serum of a subject is described. The biomarker provides a noninvasive means for measuring pancreatic beta cell mass that is particularly useful for monitoring the efficacy of treatments for metabolic disorders such as Type I or Type II diabetes, including pancreatic islet cell transplantations.
摘要:
The present invention features MCH-1R antagonist binding proteins. MCH-1R antagonist binding proteins described herein are based on an MCH-1R having one or more alterations to the second intracellular loop or carboxy terminus that render the receptor substantially inactive to MCH binding. An MCH-1R antagonist binding protein can bind MCH-1R antagonists, but does not exhibit high affinity MCH binding and is not activated by the MCH.
摘要:
A system and methods for detecting intrusions in the operation of a computer system comprises a sensor configured to gather information regarding the operation of the computer system, to format the information in a data record having a predetermined format, and to transmit the data in the predetermined data format. A data warehouse is configured to receive the data record from the sensor in the predetermined data format and to store the data in a SQL database. A detection model generator is configured to request data records from the data warehouse in the predetermined data format, to generate an intrusion detection model based on said data records, and to transmit the intrusion detection model to the data warehouse according to the predetermined data format. A detector is configured to receive a data record in the predetermined data format from the sensor and to classify the data record in real-time as one of normal operation and an attack based on said intrusion detection model. A data analysis engine is configured to request data records from the data warehouse according to the predetermined data format and to perform a data processing function on the data records.