Search results for: secure key exchange
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2185

Search results for: secure key exchange

2155 Money and Inflation in Cambodia

Authors: Siphat Lim

Abstract:

The result of the study revealed that the interaction between money, exchange rate, and price level was mainly derived from the policy-induced by the central bank. Furthermore, the variation of inflation was explained weakly by exchange rate and money supply. In the period of twelfth-month, the variation of inflation which caused by exchange rate and money supply were not more than 1.78 percent and 9.77 percent, respectively.

Keywords: money supply, exchange rate, price level, VAR model

Procedia PDF Downloads 251
2154 The Impact of Exchange Rate Volatility on Real Total Export and Sub-Categories of Real Total Export of Malaysia

Authors: Wong Hock Tsen

Abstract:

This study aims to investigate the impact of exchange rate volatility on real export in Malaysia. The moving standard deviation with order three (MSD(3)) is used for the measurement of exchange rate volatility. The conventional and partially asymmetric autoregressive distributed lag (ARDL) models are used in the estimations. This study finds exchange rate volatility to have significant impact on real total export and some sub-categories of real total export. Moreover, this study finds that the positive or negative exchange rate volatility tends to have positive or negative impact on real export. Exchange rate volatility can be harmful to export of Malaysia.

Keywords: exchange rate volatility, autoregressive distributed lag, export, Malaysia

Procedia PDF Downloads 288
2153 Exchange Rate Fluctuations and Economic Performance of Manufacturing Sector: Evidence from Nigeria

Authors: Ifeoma Patricia Osamor, Ayotunde Qudus Saka, Godwin Omoregbee, Hikmat Oreoluwalomo Omolaja

Abstract:

Persistent fall in the value of Nigeria's currency compared to other foreign currencies, constant fluctuations in the exchange rate, and an increase in the price of goods and services necessitated the examination of the effects of exchange rate fluctuations on the economic performance of the manufacturing sector in Nigeria. An ex-post facto research design was adopted. Manufacturing gross domestic product (MGDP) was proxied for performance; Naira/Dollar exchange rate (NDE), Naira/Pounds exchange rate (NPE), Foreign exchange supply (FES) were used for exchange rate fluctuations; and inflation rate (INF) was a control variable. Data were collected from CBN Statistical Bulletin (2020) also World Development Indicators of the World Bank, while data collected were analysed using descriptive analysis, unit root, bounds cointegration test, and ARDL. Findings showed that changes in Naira/Dollar exchange rate (NDE) and Naira/Pound Sterling exchange rate negatively but significantly impact the economic performance of the manufacturing sector, while foreign exchange supply leads to an insignificant positive effect on the economic performance of the manufacturing. The study concludes that exchange rate fluctuations negatively impact the performance of the manufacturing sector in Nigeria and, therefore, recommends that government should encourage export diversification through agriculture, agro-investment, and agro-allied industries that would boost export in order to improve the value of the Naira, thereby stabilizing the exchange rate.

Keywords: exchange rate, economic performance, gross domestic product, inflation rate, foreign exchange supply

Procedia PDF Downloads 164
2152 Modelling of Passengers Exchange between Trains and Platforms

Authors: Guillaume Craveur

Abstract:

The evaluation of the passenger exchange time is necessary for railway operators in order to optimize and dimension rail traffic. Several influential parameters are identified and studied. Each parameter leads to a modeling completed with the buildingEXODUS software. The objective is the modelling of passenger exchanges measured by passenger counting. Population size is dimensioned using passenger counting files which are a report of the train service and contain following useful informations: number of passengers who get on and leave the train, exchange time. These information are collected by sensors placed at the top of each train door. With passenger counting files it is possible to know how many people are engaged in the exchange and how long is the exchange, but it is not possible to know passenger flow of the door. All the information about observed exchanges are thus not available. For this reason and in order to minimize inaccuracies, only short exchanges (less than 30 seconds) with a maximum of people are performed.

Keywords: passengers exchange, numerical tools, rolling stock, platforms

Procedia PDF Downloads 204
2151 An Efficient Proxy Signature Scheme Over a Secure Communications Network

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Proxy signature scheme permits an original signer to delegate his/her signing capability to a proxy signer, and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on the discrete logarithm problem.

Keywords: proxy signature, warrant partial delegation, key agreement, discrete logarithm

Procedia PDF Downloads 314
2150 ‘Internationalize Yourself’: Mobility in Academia as a Form of Continuing Professional Training

Authors: Sonja Goegele, Petra Kletzenbauer

Abstract:

The FH JOANNEUM- a university of applied sciences based in Austria - cooperates in teaching and research with well-known international universities and thus aims to foster so-called strategic partnerships. The exchange of university lecturers and other faculty members is a way to achieve and secure strategic company goals, in which excellent research and teaching play a central role in order to improve both the development of academics and administration. Thanks to mobility not only the university but also the involved people truly benefit in their professional development which can be seen on several levels: increased foreign language proficiency, excellent networking possibilities within the scientific community as well as reinforced didactic competencies in the form of different teaching and learning methodologies. The paper discusses mobility in the light of the university’s strategic paper entitled ‘Hands on 2022’ by presenting results from an empirical research study among faculty members who participate in exchange programmes on a regular basis. In the form of an online questionnaire, mobility was discussed from different angles such as networking, collaborative research, professional training for academics and the overall impact of the exchange within and outside the organization. From the findings, it can be concluded that mobility is an asset for any university. However, keeping in constant dialogue with partner universities requires more than the purpose of the exchange itself. Building rapport and keeping a relationship of trust are challenges that need to be addressed more closely in order to run successful mobility programmes. Best Practice examples should highlight the importance of mobility as a vital initiative to transfer disciplines.

Keywords: higher education, internationalization, mobility, strategic partnerships

Procedia PDF Downloads 109
2149 A Software Engineering Methodology for Developing Secure Obfuscated Software

Authors: Carlos Gonzalez, Ernesto Linan

Abstract:

We propose a methodology to conciliate two apparently contradictory processes in the development of secure obfuscated software and good software engineered software. Our methodology consists first in the system designers defining the type of security level required for the software. There are four types of attackers: casual attackers, hackers, institution attack, and government attack. Depending on the level of threat, the methodology we propose uses five or six teams to accomplish this task. One Software Engineer Team and one or two software Obfuscation Teams, and Compiler Team, these four teams will develop and compile the secure obfuscated software, a Code Breakers Team will test the results of the previous teams to see if the software is not broken at the required security level, and an Intrusion Analysis Team will analyze the results of the Code Breakers Team and propose solutions to the development teams to prevent the detected intrusions. We also present an analytical model to prove that our methodology is no only easier to use, but generates an economical way of producing secure obfuscated software.

Keywords: development methodology, obfuscated software, secure software development, software engineering

Procedia PDF Downloads 224
2148 Secure Proxy Signature Based on Factoring and Discrete Logarithm

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

A digital signature is an electronic signature form used by an original signer to sign a specific document. When the original signer is not in his office or when he/she travels outside, he/she delegates his signing capability to a proxy signer and then the proxy signer generates a signing message on behalf of the original signer. The two parties must be able to authenticate one another and agree on a secret encryption key, in order to communicate securely over an unreliable public network. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties. In this paper, we present a secure proxy signature scheme over an efficient and secure authenticated key agreement protocol based on factoring and discrete logarithm problem.

Keywords: discrete logarithm, factoring, proxy signature, key agreement

Procedia PDF Downloads 271
2147 Exchange Traded Products on the Warsaw Stock Exchange

Authors: Piotr Prewysz-Kwinto

Abstract:

A dynamic development of financial market is accompanied by the emergence of new products on stock exchanges which give absolutely new possibilities of investing money. Currently, the most innovative financial instruments offered to investors are exchange traded products (ETP). They can be defined as financial instruments whose price depends on the value of the underlying instrument. Thus, they offer investors a possibility of making a profit that results from the change in value of the underlying instrument without having to buy it. Currently, the Warsaw Stock Exchange offers many types of ETPs. They are investment products with full or partial capital protection, products without capital protection as well as leverage products, issued on such underlying instruments as indices, sector indices, commodity indices, prices of energy commodities, precious metals, agricultural produce or prices of shares of domestic and foreign companies. This paper presents the mechanism of functioning of ETP available on the Warsaw Stock Exchange and the results of the analysis of statistical data on these financial instruments.

Keywords: exchange traded products, financial market, investment, stock exchange

Procedia PDF Downloads 314
2146 Foreign Exchange Volatilities and Stock Prices: Evidence from London Stock Exchange

Authors: Mahdi Karazmodeh, Pooyan Jafari

Abstract:

One of the most interesting topics in finance is the relation between stock prices and exchange rates. During the past decades different stock markets in different countries have been the subject of study for researches. The volatilities of exchange rates and its effect on stock prices during the past 10 years have continued to be an attractive research topic. The subject of this study is one of the most important indices, FTSE 100. 20 firms with the highest market capitalization in 5 different industries are chosen. Firms are included in oil and gas, mining, pharmaceuticals, banking and food related industries. 5 different criteria have been introduced to evaluate the relationship between stock markets and exchange rates. Return of market portfolio, returns on broad index of Sterling are also introduced. The results state that not all firms are sensitive to changes in exchange rates. Furthermore, a Granger Causality test has been run to observe the route of changes between stock prices and foreign exchange rates. The results are consistent, to some level, with the previous studies. However, since the number of firms is not large, it is suggested that a larger number of firms being used to achieve the best results. However results showed that not all firms are affected by foreign exchange rates changes. After testing Granger Causality, this study found out that in some industries (oil and gas, pharmaceuticals), changes in foreign exchange rate will not cause any changes in stock prices (or vice versa), however, in banking sector the situation was different. This industry showed more reaction to these changes. The results are similar to the ones with Richards and Noel, where a variety of firms in different industries were evaluated.

Keywords: stock prices, foreign exchange rate, exchange rate exposure, Granger Causality

Procedia PDF Downloads 416
2145 Forecasting the Fluctuation of Currency Exchange Rate Using Random Forest

Authors: Lule Basha, Eralda Gjika

Abstract:

The exchange rate is one of the most important economic variables, especially for a small, open economy such as Albania. Its effect is noticeable in one country's competitiveness, trade and current account, inflation, wages, domestic economic activity, and bank stability. This study investigates the fluctuation of Albania’s exchange rates using monthly average foreign currency, Euro (Eur) to Albanian Lek (ALL) exchange rate with a time span from January 2008 to June 2021, and the macroeconomic factors that have a significant effect on the exchange rate. Initially, the Random Forest Regression algorithm is constructed to understand the impact of economic variables on the behavior of monthly average foreign currencies exchange rates. Then the forecast of macro-economic indicators for 12 months was performed using time series models. The predicted values received are placed in the random forest model in order to obtain the average monthly forecast of the Euro to Albanian Lek (ALL) exchange rate for the period July 2021 to June 2022.

Keywords: exchange rate, random forest, time series, machine learning, prediction

Procedia PDF Downloads 72
2144 Importance of Hardware Systems and Circuits in Secure Software Development Life Cycle

Authors: Mir Shahriar Emami

Abstract:

Although it is fully impossible to ensure that a software system is quite secure, developing an acceptable secure software system in a convenient platform is not unreachable. In this paper, we attempt to analyze software development life cycle (SDLC) models from the hardware systems and circuits point of view. To date, the SDLC models pay merely attention to the software security from the software perspectives. In this paper, we present new features for SDLC stages to emphasize the role of systems and circuits in developing secure software system through the software development stages, the point that has not been considered previously in the SDLC models.

Keywords: SDLC, SSDLC, software security, software process engineering, hardware systems and circuits security

Procedia PDF Downloads 224
2143 Investigation of Modified Microporous Materials for Environmental Depollution

Authors: Souhila Bendenia, Chahrazed Bendenia, Hanaa Merad-Dib, Sarra Merabet, Samia Moulebhar, Sid Ahmed Khantar

Abstract:

Today, environmental pollution is a major concernworldwide, threateninghumanhealth. Various techniques have been used, includingdegradation, filtration, advancedoxidationprocesses, ion exchange, membrane processes, and adsorption. The latter is one of the mostsuitablemethods, usinghighly efficient materials. In this study, NaX zeolite was modified with Cu or Ni at various rates. Following ion exchange, the samples were characterized by XRD, BET and SEM/EDX. After characterization, the exchanged zeolites were used for adsorption of various pollutants as CO2. Different thermodynamic parameters were studied such as Qst. XRD results show that the most intense peaks characteristic of 13X persist after the exchange reaction for all samples. The SEM images of our samples have uniform and regular crystal shapes. The results show that ion exhange with Cu or Ni affect the textural properties of X zeolites and prove that the exchange zeolites can be used as an adsorbent for depollution.

Keywords: X zeolites (NaX), ion exchange, characterization, adsorption

Procedia PDF Downloads 43
2142 A Lightweight Authentication and Key Exchange Protocol Design for Smart Homes

Authors: Zhifu Li, Lei Li, Wanting Zhou, Yuanhang He

Abstract:

This paper proposed a lightweight certificate-less authentication and key exchange protocol (Light-CL-PKC) based on elliptic curve cryptography and the Chinese Remainder Theorem for smart home scenarios. Light-CL-PKC can efficiently reduce the computational cost of both sides of authentication by forgoing time-consuming bilinear pair operations and making full use of point-addition and point-multiplication operations on elliptic curves. The authentication and key exchange processes in this system are also completed in a a single round of communication between the two parties. The analysis result demonstrates that it can significantly minimize the communication overhead of more than 32.14% compared with the referenced protocols, while the runtime for both authentication and key exchange have also been significantly reduced.

Keywords: authentication, key exchange, certificateless public key cryptography, elliptic curve cryptography

Procedia PDF Downloads 55
2141 Wireless Transmission of Big Data Using Novel Secure Algorithm

Authors: K. Thiagarajan, K. Saranya, A. Veeraiah, B. Sudha

Abstract:

This paper presents a novel algorithm for secure, reliable and flexible transmission of big data in two hop wireless networks using cooperative jamming scheme. Two hop wireless networks consist of source, relay and destination nodes. Big data has to transmit from source to relay and from relay to destination by deploying security in physical layer. Cooperative jamming scheme determines transmission of big data in more secure manner by protecting it from eavesdroppers and malicious nodes of unknown location. The novel algorithm that ensures secure and energy balance transmission of big data, includes selection of data transmitting region, segmenting the selected region, determining probability ratio for each node (capture node, non-capture and eavesdropper node) in every segment, evaluating the probability using binary based evaluation. If it is secure transmission resume with the two- hop transmission of big data, otherwise prevent the attackers by cooperative jamming scheme and transmit the data in two-hop transmission.

Keywords: big data, two-hop transmission, physical layer wireless security, cooperative jamming, energy balance

Procedia PDF Downloads 456
2140 Composition Dependence of Exchange Anisotropy in PtₓMn₁₋ₓ/Co₇₀Fe₃₀ Films

Authors: Sina Ranjbar, Masakiyo Tsunoda, Mikihiko Oogane, Yasuo Ando

Abstract:

We systematically investigated the exchange anisotropy for ferromagnetic Co70Fe30 and antiferromagnetic PtMn bilayer films. We focused on the relevance between the exchange bias and the composition of the Ptₓ Mn₁₋ₓ (14 < x < 22 and 45 < x < 56 at %) films, and we successfully optimized the composition. The crystal structure of the Ptₓ Mn₁₋ₓ films was FCC for 14 < x < 22 at % and FCT for 45 < x < 56 at % after annealing at 370 ◦C for 6 hours. The unidirectional anisotropy constant (Jₖ) for fcc-Pt₁₅Mn₈₅ (20 nm) and fct-Pt₄₈Mn₅₂ (20 nm) prepared under optimum conditions in composition were 0.16 and 0.20 erg/cm², respectively. Both Pt₁₅Mn₈₅ and Pt₄₈Mn₅₂ films showed a larger unidirectional anisotropy constant (Jₖ) than in other reports. They also showed a flatter surface than that of other antiferromagnetic materials. The obtained PtMn films with a large exchange anisotropy and slight roughness are useful as an antiferromagnetic layer in spintronic applications.

Keywords: antiferromagnetic material, PtMn thin film, exchange anisotropy, composition dependence

Procedia PDF Downloads 235
2139 Mitigating the Unwillingness of e-Forums Members to Engage in Information Exchange

Authors: Dora Triki, Irena Vida, Claude Obadia

Abstract:

Social networks such as e-Forums or dating sites often face the reluctance of key members to participate. Relying on the conation theory, this study investigates this phenomenon and proposes solutions to mitigate the issue. We show that highly experienced e-Forum members refuse to share business information in a peer to peer information exchange forums. However, forums managers can mitigate this behavior by developing a sentiment of belongingness to the network. Furthermore, by selecting only elite forum participants with ample experience, they can reduce the reluctance of key information providers to engage in information exchange. Our hypotheses are tested with PLS structural equations modeling using survey data from members of a French e-Forum dedicated to the exchange of business information about exporting.

Keywords: conation, e-Forum, information exchange, members participation

Procedia PDF Downloads 119
2138 Aligning Cultural Practices through Information Exchange: A Taxonomy in Global Manufacturing Industry

Authors: Hung Nguyen

Abstract:

With the rise of global supply chain network, the choice of supply chain orientation is critical. The alignment between cultural similarity and supply chain information exchange could help identify appropriate supply chain orientations, which would differentiate the stronger competitors and performers from the weaker ones. Through developing a taxonomy, this study examined whether the choices of action programs and manufacturing performance differ depending on the levels of attainment cultural similarity and information exchange. This study employed statistical tests on a large-scale dataset consisting of 680 manufacturing plants from various cultures and industries. Firms need to align cultural practices with the level of information exchange in order to achieve good overall business performance. There appeared to be consistent three major orientations: the Proactive, the Initiative and the Reactive. Firms are experiencing higher payoffs from various improvements are the ones successful alignment in both information exchange and cultural similarity The findings provide step-by-step decision making for supply chain information exchange and offer guidance especially for global supply chain managers. In including both cultural similarity and information exchange, this paper adds greater comprehensiveness and richness to the supply chain literature.

Keywords: culture, information exchange, supply chain orientation, similarity

Procedia PDF Downloads 333
2137 A Secure Routing Algorithm for ‎Underwater Wireless Sensor Networks

Authors: Seyed Mahdi Jameii

Abstract:

Underwater wireless sensor networks have been attracting the interest of many ‎researchers lately, and the past three decades have beheld the rapid progress of ‎underwater acoustic communication. One of the major problems in underwater wireless ‎sensor networks is how to transfer data from the moving node to the base stations and ‎choose the optimized route for data transmission. Secure routing in underwater ‎wireless sensor network (UWCNs) is necessary for packet delivery. Some routing ‎protocols are proposed for underwater wireless sensor networks. However, a few ‎researches have been done on secure routing in underwater sensor networks. In this ‎article, a secure routing protocol is provided to resist against wormhole and sybil ‎attacks. The results indicated acceptable performance in terms of increasing the packet ‎delivery ratio with regards to the attacks, increasing network lifetime by creating ‎balance in the network energy consumption, high detection rates against the attacks, ‎and low-end to end delay.‎

Keywords: attacks, routing, security, underwater wireless sensor networks

Procedia PDF Downloads 380
2136 Modelling Exchange-Rate Pass-Through: A Model of Oil Prices and Asymmetric Exchange Rate Fluctuations in Selected African Countries

Authors: Fajana Sola Isaac

Abstract:

In the last two decades, we have witnessed an increased interest in exchange rate pass-through (ERPT) in developing economies and emerging markets. This is perhaps due to the acknowledged significance of the pattern of exchange rate pass-through as a key instrument in monetary policy design, principally in retort to a shock in exchange rate in literature. This paper analyzed Exchange Rate Pass-Through by A Model of Oil Prices and Asymmetric Exchange Rate Fluctuations in Selected African Countries. The study adopted A Non-Linear Autoregressive Distributed Lag approach using yearly data on Algeria, Burundi, Nigeria and South Africa from 1986 to 2022. The paper found asymmetry in exchange rate pass-through in net oil-importing and net oil-exporting countries in the short run during the period under review. An ERPT exhibited a complete pass-through in the short run in the case of net oil-importing countries but an incomplete pass-through in the case of the net oil-exporting countries that were examined. An extended result revealed a significant impact of oil price shock on exchange rate pass-through to domestic price in the long run only for net oil importing countries. The Wald restriction test also confirms the evidence of asymmetric with the role of oil price acting as an accelerator to exchange rate pass-through to domestic price in the countries examined. The study found the outcome to be very useful for gaining expansive knowledge on the external shock impact on ERPT and could be of critical value for national monetary policy decisions on inflation targeting, especially for countries examined and other developing net oil importers and exporters.

Keywords: pass through, exchange rate, ARDL, monetary policy

Procedia PDF Downloads 41
2135 Implementation of a Virtual Testbed for Secure IoT Firmware Update Using Blockchain

Authors: Tarun Chand, Michael Jurczyk

Abstract:

With the increasing need and popularity of IoT devices and how integrated they are becoming in our daily lives and industries, these devices make for a very lucrative target for malicious actors. And since these devices have such limited resources, the implementation of robust security features is a tradeoff to be made for the actual functionality the device was intended for. This makes them an easy target with high returns. Several frameworks for the secure firmware update of these devices have been recently proposed in the literature. They focus on methods such as blockchains and distributed file systems to secure firmware updates, but do not go into the details of the actual implementation of these frameworks and the lower-level interactions among these methods used. This work integrates some of these security measures into one overall framework and details the actual lower-level implementation of this framework in a virtual dockerized testbed running on AWS.

Keywords: blockchain, Ethereum, Geth, IPFS, secure IoT-firmware update, virtual testbed development

Procedia PDF Downloads 27
2134 Exchange Rate Variation and Balance of Payments: The Nigerian Experience (1970-2012)

Authors: Vitus Onyebuchim Onyemailu, Olive Obianuju Okalibe

Abstract:

The study tried to examine relationship between exchange rate variations on the balance of payments in Nigeria from 1970 to 2012. Using time series on econometric measures such as Granger causality and ordinary least square (OLS), the study found that exchange rate movements especially the depreciation of naira has not contributed significantly on the balance of payments under the year of the study. The granger result conform the Marshall-Lerner short and long run prepositions that exchange rate devaluation enhances balance of payments. On disaggregation exchange rate granger causes current and capital account balances give the Nigeria data from 1970 to 2012. Overall in the long run OLS regression analysis, exchange rate on semi log functional form, exchange rate variation did not record significant effect on balance of payment equation. This height was also maintained in the current or trade balance which does not match the Marshall-Lerner. The capital account balance in reverse reported a significant impact of exchange rate variability on the capital account balance. Finally, on exchange rate determination equation, where many fundamentals were considered including lagged of exchange rate. Thus, the lagged of exchange rate recorded a positive and significant influence on the present exchange rate. This means that players in the financial markets usually out plays authority’s policy’s stances through their speculative tendencies. The work therefore, recommend that effort should be made by the authorities to providing enabling environment for production of goods and services to triumph in order to take advantages of steady devaluation of its currency. This is done by providing infrastructure, provision of science and technology. Thus, when this is done Nigeria would be able to have competitive power against the rest of the world.

Keywords: exchange rate variation, balance of payments, current account, capital account, Marshall-Lerner hypothesis

Procedia PDF Downloads 371
2133 Secure Automatic Key SMS Encryption Scheme Using Hybrid Cryptosystem: An Approach for One Time Password Security Enhancement

Authors: Pratama R. Yunia, Firmansyah, I., Ariani, Ulfa R. Maharani, Fikri M. Al

Abstract:

Nowadays, notwithstanding that the role of SMS as a means of communication has been largely replaced by online applications such as WhatsApp, Telegram, and others, the fact that SMS is still used for certain and important communication needs is indisputable. Among them is for sending one time password (OTP) as an authentication media for various online applications ranging from chatting, shopping to online banking applications. However, the usage of SMS does not pretty much guarantee the security of transmitted messages. As a matter of fact, the transmitted messages between BTS is still in the form of plaintext, making it extremely vulnerable to eavesdropping, especially if the message is confidential, for instance, the OTP. One solution to overcome this problem is to use an SMS application which provides security services for each transmitted message. Responding to this problem, in this study, an automatic key SMS encryption scheme was designed as a means to secure SMS communication. The proposed scheme allows SMS sending, which is automatically encrypted with keys that are constantly changing (automatic key update), automatic key exchange, and automatic key generation. In terms of the security method, the proposed scheme applies cryptographic techniques with a hybrid cryptosystem mechanism. Proofing the proposed scheme, a client to client SMS encryption application was developed using Java platform with AES-256 as encryption algorithm, RSA-768 as public and private key generator and SHA-256 for message hashing function. The result of this study is a secure automatic key SMS encryption scheme using hybrid cryptosystem which can guarantee the security of every transmitted message, so as to become a reliable solution in sending confidential messages through SMS although it still has weaknesses in terms of processing time.

Keywords: encryption scheme, hybrid cryptosystem, one time password, SMS security

Procedia PDF Downloads 104
2132 Integration of the Battery Passport into the eFTI Platform to Improve Digital Data Exchange in the Context of Battery Transport

Authors: Max Plotnikov, Arkadius Schier

Abstract:

To counteract climate change, the European Commission adopted the European Green Deal (EDG) in 2019. Some of the main objectives of the EDG are climate neutrality by 2050, decarbonization, sustainable mobility, and the shift from a linear economy to a circular economy in the European Union. The mobility turnaround envisages, among other things, the switch from classic internal combustion vehicles to electromobility. The aforementioned goals are therefore accompanied by increased demand for lithium-ion batteries (LIBs) and the associated logistics. However, this inevitably gives rise to challenges that need to be addressed. Depending on whether the LIB is transported by road, rail, air, or sea, there are different regulatory frameworks in the European Union that relevant players in the value chain must adhere to. LIBs are classified as Dangerous Goods Class 9, and against this backdrop, there are various restrictions that need to be adhered to when transporting them for various actors. Currently, the exchange of information in the value chain between the various actors is almost entirely paper-based. Especially in the transport of dangerous goods, this often leads to a delay in the transport or to incorrect data. The exchange of information with the authorities is particularly essential in this context. A solution for the digital exchange of information is currently being developed. Electronic freight transport information (eFTI) enables fast and secure exchange of information between the players in the freight transport process. This concept is to be used within the supply chain from 2025. Another initiative that is expected to improve the monitoring of LIB in this context, among other things, is the battery pass. In July 2023, the latest battery regulation was adopted in the Official Journal of the European Union. This battery pass gives different actors static as well as dynamic information about the batteries depending on their access rights. This includes master data such as battery weight or battery category or information on the state of health or the number of negative events that the battery has experienced. The integration of the battery pass with the eFTI platform will be investigated for synergy effects in favor of the actors for battery transport.

Keywords: battery logistics, battery passport, data sharing, eFTI, sustainability

Procedia PDF Downloads 52
2131 Impact of Interest and Foreign Exchange Rates Liberalization on Investment Decision in Nigeria

Authors: Kemi Olalekan Oduntan

Abstract:

This paper was carried out in order to empirical, and descriptively analysis how interest rate and foreign exchange rate liberalization influence investment decision in Nigeria. The study spanned through the period of 1985 – 2014, secondary data were restricted to relevant variables such as investment (Proxy by Gross Fixed Capital Formation) saving rate, interest rate and foreign exchange rate. Theories and empirical literature from various scholars were reviews in the paper. Ordinary Least Square regression method was used for the analysis of data collection. The result of the regression was critically interpreted and discussed. It was discovered for empirical finding that tax investment decision in Nigeria is highly at sensitive rate. Hence, all the alternative hypotheses were accepted while the respective null hypotheses were rejected as a result of interest rate and foreign exchange has significant effect on investment in Nigeria. Therefore, impact of interest rate and foreign exchange rate on the state of investment in the economy cannot be over emphasized.

Keywords: interest rate, foreign exchange liberalization, investment decision, economic growth

Procedia PDF Downloads 338
2130 Test of Capital Account Monetary Model of Floating Exchange Rate Determination: Further Evidence from Selected African Countries

Authors: Oloyede John Adebayo

Abstract:

This paper tested a variant of the monetary model of exchange rate determination, called Frankel’s Capital Account Monetary Model (CAAM) based on Real Interest Rate Differential, on the floating exchange rate experiences of three developing countries of Africa; viz: Ghana, Nigeria and the Gambia. The study adopted the Auto regressive Instrumental Package (AIV) and Almon Polynomial Lag Procedure of regression analysis based on the assumption that the coefficients follow a third-order Polynomial with zero-end constraint. The results found some support for the CAAM hypothesis that exchange rate responds proportionately to changes in money supply, inversely to income and positively to interest rates and expected inflation differentials. On this basis, the study points the attention of monetary authorities and researchers to the relevance and usefulness of CAAM as appropriate tool and useful benchmark for analyzing the exchange rate behaviour of most developing countries.

Keywords: exchange rate, monetary model, interest differentials, capital account

Procedia PDF Downloads 374
2129 Characterization of Internet Exchange Points by Using Quantitative Data

Authors: Yamba Dabone, Tounwendyam Frédéric Ouedraogo, Pengwendé Justin Kouraogo, Oumarou Sie

Abstract:

Reliable data transport over the Internet is one of the goals of researchers in the field of computer science. Data such as videos and audio files are becoming increasingly large. As a result, transporting them over the Internet is becoming difficult. Therefore, it has been important to establish a method to locally interconnect autonomous systems (AS) with each other to facilitate traffic exchange. It is in this context that Internet Exchange Points (IXPs) are set up to facilitate local and even regional traffic. They are now the lifeblood of the Internet. Therefore, it is important to think about the factors that can characterize IXPs. However, other more quantifiable characteristics can help determine the quality of an IXP. In addition, these characteristics may allow ISPs to have a clearer view of the exchange node and may also convince other networks to connect to an IXP. To that end, we define five new IXP characteristics: the attraction rate (τₐₜₜᵣ); and the peering rate (τₚₑₑᵣ); the target rate of an IXP (Objₐₜₜ); the number of IXP links (Nₗᵢₙₖ); the resistance rate τₑ𝒻𝒻 and the attraction failure rate (τ𝒻).

Keywords: characteristic, autonomous system, internet service provider, internet exchange point, rate

Procedia PDF Downloads 65
2128 Attachment and Memories: Activating Attachment in College Students through Narrative-Based Methods

Authors: Catherine Wright, Kate Luedke

Abstract:

This paper questions whether or not individuals who had been exposed to narratives describing secure and insecure-avoidant attachment styles experienced temporary changes in their attachment style when compared to individuals who had been exposed to neutral narratives. The Attachment Style Questionnaire (or ASQ) developed by Feeney, Noller, and Hanrahan in 1994 was utilized to assess attachment style. Participants filled out a truncated version of the ASQ prior to reading the respective narratives assigned to their groups, and filled out the entirety of the ASQ after reading the narratives. Utilizing a one-way independent groups ANOVA, researchers found that the group which read the insecure-avoidant narrative experienced a statistically significant decrease in secure attachment, as did the group which read the secure narrative. The control group, however, experienced a statistically significant increase in secure attachment. Based on these findings, researchers concluded that narratives may have the ability to call attention to parental shortcomings that individuals have experienced in the forms of reminding individuals of positive experiences that they were not able to experience while spending time with their parental figures and calling attention to the shortcomings of said parental figures by reminding them of the negative experiences which they did have with them.

Keywords: attachment, insecure-avoidant, memory, secure

Procedia PDF Downloads 374
2127 Management Accounting Techniques of Companies Listed on the Stock Exchange in Thailand

Authors: Prateep Wajeetongratana

Abstract:

The objectives of the research were to examine that how management accounting techniques were perceived and used by companies listed on the stock exchange and to investigate similarities or differences of management accounting practices between companies listed on the stock exchange and Thai SMEs. Descriptive and inferential statistics were employed. The finding found that almost all of the companies used traditional management accounting techniques more than advanced management accounting techniques. Four management accounting techniques having no significant association with business characteristic were standard costing, job order costing, process costing. The barriers that Thai SMEs encountered were a lack of proper accounting system and the insufficient knowledge in management accounting of the accountants. The comparison results revealed that both companies listed on the stock exchange and Thai SMEs used traditional management accounting techniques more than advanced techniques.

Keywords: companies listed on the stock exchange, financial budget, management accounting, operating budget

Procedia PDF Downloads 358
2126 Financial Instrument with High Investment Risk on the Warsaw Stock Exchange

Authors: Piotr Prewysz-Kwinto

Abstract:

The market of financial instruments with high risk is developing very dynamically in recent years and attracts more and more interest of investors. It consists essentially of two groups of instruments, i.e. derivatives and exchange traded product (ETP), and each year new types are introduced and offered to investors. The aim of this paper is to present the principles concerning financial instruments with high investment risk available on the Warsaw Stock Exchange (WSE), because they have quite complex constructions, and to evaluate the development of this market. In order to achieve this aim, statistical data from 2014-2016 was analyzed. The results confirm that the financial instruments with high investment risk available on the WSE constitute a diversified and the most numerous group of financial instruments and attract the most interest of investors. Responsible investing requires, however, a good knowledge of how they work and how they can generate profit to not expose oneself to unexpected losses.

Keywords: derivatives, exchange traded products (ETP), financial instruments, financial market, risk, stock exchange

Procedia PDF Downloads 351