Search results for: secure key exchange
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2185

Search results for: secure key exchange

2065 Hybrid Model for Measuring the Hedge Strategy in Exchange Risk in Information Technology Industry

Authors: Yi-Hsien Wang, Fu-Ju Yang, Hwa-Rong Shen, Rui-Lin Tseng

Abstract:

The business is notably related to the market risk according to the increase of liberalization of financial markets. Hence, the company usually utilized high financial leverage of derivatives to hedge the risk. When the company choose different hedging instruments to face a variety of exchange rate risk, we employ the Multinomial Logistic-AHP to analyze the impact of various derivatives. Hence, the research summarized the literature on relevant factors affecting managers selected exchange rate hedging instruments, using Multinomial Logistic Model and and further integrate AHP. Using Experts’ Questionnaires can test multi-level selection and hedging effect of different hedging instruments in order to calculate the hedging instruments and the multi-level factors of weights to understand the gap between the empirical results and practical operation. Finally, the Multinomial Logistic-AHP Model will sort the weights to analyze. The research findings can be a basis reference for investors in decision-making.

Keywords: exchange rate risk, derivatives, hedge, multinomial logistic-AHP

Procedia PDF Downloads 411
2064 An Empirical Investigation into the Effect of Macroeconomic Policy on Economic Growth in Nigeria

Authors: Rakiya Abba

Abstract:

This paper investigates the effect of the money supply, exchange and interest rate on economic growth in Nigeria through the application of Augmented Dickey-Fuller technique in testing the unit root property of the series and Granger causality test of causation between GDP, money supply, the exchange, and interest rate. The results of unit root suggest that all the variables in the model are stationary at 1, 5 and 10 percent level of significance, and the results of Causality suggest that money supply and exchange granger cause IR, the result further reveals two – way causation existed between M2 and EXR while IR granger cause GDP the null hypothesis is rejected and GDP does not granger cause IR as indicated by their probability values of 0.4805 and confirmed by F-statistics values of 0.75483. The results revealed that M2 and EXR do not granger causes GDP, the null hypothesis is accepted at 75percent 18percent respectively as indicated by their probability values of 0.7472 and 0.1830 respectively; also, GDP does not granger cause M2 and EXR. The Johansen cointegration result indicates that despite GDP does not granger cause M2, IR, and EXR, but there existed 1 cointegrating equation, implying the existence of long-run relationship between GDP, M2 IR, and EXR. A major policy implication of this result is that economic growth is function of and money supply and exchange rate, effective monetary policies should direct on manipulating instruments and importance should be placed on justification for adopting a particular policy be rationalized in order to increase growth in economy

Keywords: economic growth, money supply, interest rate, exchange rate, causality

Procedia PDF Downloads 243
2063 A Secure Digital Signature Scheme with Fault Tolerance Based on the Improved RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. In this paper, we propose a secure and efficient digital signature scheme with fault tolerance based on the improved RSA system. The proposed scheme for the RSA cryptosystem contains three prime numbers and overcome several attacks possible on RSA. By using the Chinese Reminder Theorem (CRT) the proposed scheme has a speed improvement on the RSA decryption side and it provides high security also.

Keywords: digital signature, fault tolerance, RSA, security analysis

Procedia PDF Downloads 448
2062 Interoperability Model Design of Smart Grid Power System

Authors: Seon-Hack Hong, Tae-Il Choi

Abstract:

Interoperability is defined as systems, components, and devices developed by different entities smoothly exchanging information and functioning organically without mutual consultation, being able to communicate with each other and computer systems of the same type or different types, and exchanging information or the ability of two or more systems to exchange information and use the information exchanged without extra effort. Insufficiencies such as duplication of functions when developing systems and applications due to lack of interoperability in the electric power system and low efficiency due to a lack of mutual information transmission system between the inside of the application program and the design is improved, and the seamless linkage of newly developed systems is improved. Since it is necessary to secure interoperability for this purpose, we designed the smart grid-based interoperability standard model in this paper.

Keywords: interoperability, power system, common information model, SCADA, IEEE2030, Zephyr

Procedia PDF Downloads 80
2061 An Approach to Secure Mobile Agent Communication in Multi-Agent Systems

Authors: Olumide Simeon Ogunnusi, Shukor Abd Razak, Michael Kolade Adu

Abstract:

Inter-agent communication manager facilitates communication among mobile agents via message passing mechanism. Until now, all Foundation for Intelligent Physical Agents (FIPA) compliant agent systems are capable of exchanging messages following the standard format of sending and receiving messages. Previous works tend to secure messages to be exchanged among a community of collaborative agents commissioned to perform specific tasks using cryptosystems. However, the approach is characterized by computational complexity due to the encryption and decryption processes required at the two ends. The proposed approach to secure agent communication allows only agents that are created by the host agent server to communicate via the agent communication channel provided by the host agent platform. These agents are assumed to be harmless. Therefore, to secure communication of legitimate agents from intrusion by external agents, a 2-phase policy enforcement system was developed. The first phase constrains the external agent to run only on the network server while the second phase confines the activities of the external agent to its execution environment. To implement the proposed policy, a controller agent was charged with the task of screening any external agent entering the local area network and preventing it from migrating to the agent execution host where the legitimate agents are running. On arrival of the external agent at the host network server, an introspector agent was charged to monitor and restrain its activities. This approach secures legitimate agent communication from Man-in-the Middle and Replay attacks.

Keywords: agent communication, introspective agent, isolation of agent, policy enforcement system

Procedia PDF Downloads 273
2060 Security Design of Root of Trust Based on RISC-V

Authors: Kang Huang, Wanting Zhou, Shiwei Yuan, Lei Li

Abstract:

Since information technology develops rapidly, the security issue has become an increasingly critical for computer system. In particular, as cloud computing and the Internet of Things (IoT) continue to gain widespread adoption, computer systems need to new security threats and attacks. The Root of Trust (RoT) is the foundation for providing basic trusted computing, which is used to verify the security and trustworthiness of other components. Design a reliable Root of Trust and guarantee its own security are essential for improving the overall security and credibility of computer systems. In this paper, we discuss the implementation of self-security technology based on the RISC-V Root of Trust at the hardware level. To effectively safeguard the security of the Root of Trust, researches on security safeguard technology on the Root of Trust have been studied. At first, a lightweight and secure boot framework is proposed as a secure mechanism. Secondly, two kinds of memory protection mechanism are built to against memory attacks. Moreover, hardware implementation of proposed method has been also investigated. A series of experiments and tests have been carried on to verify to effectiveness of the proposed method. The experimental results demonstrated that the proposed approach is effective in verifying the integrity of the Root of Trust’s own boot rom, user instructions, and data, ensuring authenticity and enabling the secure boot of the Root of Trust’s own system. Additionally, our approach provides memory protection against certain types of memory attacks, such as cache leaks and tampering, and ensures the security of root-of-trust sensitive information, including keys.

Keywords: root of trust, secure boot, memory protection, hardware security

Procedia PDF Downloads 146
2059 Arsenic Removal by Membrane Technology, Adsorption and Ion Exchange: An Environmental Lifecycle Assessment

Authors: Karan R. Chavan, Paula Saavalainen, Kumudini V. Marathe, Riitta L. Keiski, Ganapati D. Yadav

Abstract:

Co-contamination of groundwaters by arsenic in different forms is often observed around the globe. Arsenic is introduced into the waters by several mechanisms and different technologies are proposed and practiced for effective removal. The assessment of three prominent technologies, namely, adsorption, ion exchange and nanofiltration was carried out in this study based on lifecycle methodology. The life of the technologies was divided into two stages: cradle to gate (C-G) and gate to gate (G-G), in order to find out the impacts in different categories of environmental burdens, human health and resource consumption. Life cycle inventory was estimated by use of models and design equations concerning with the different technologies. Regeneration was considered for each technology and over the course of its full lifetime. The impact values of adsorption technology for the C-G stage are greater by thousand times (103) and million times (106) compared to ion exchange and nanofiltration technologies, respectively. The impact of G-G stage of the lifecycle is the major contributor of the impact for all the 3 technologies due to electricity consumption during the operation. Overall, the ion Exchange technology fares well in this study of removal of As (V) only.

Keywords: arsenic, nanofiltration, lifecycle assessment, membrane technology

Procedia PDF Downloads 219
2058 Behavior of Iran Stock Exchange and Impacts of US Oil and Financial Markets

Authors: Erfan Memarian, Seyyed Fazayel Alizadeh

Abstract:

This study aims to evaluate the impacts of the oil and financial markets of the United States on Iran stock exchange and to develop an ARDL model to predict the short and long-term relationship between these markets. In this regard, all 713 weekly data between 28 July 1999 and 20 March 2013 were analyzed by using Microfit4.0 and Eviews7 econometric softwares. The independent variable of the study is the “Price and Yield Index (TEDPIX)” of Tehran Stock Exchange and the independent variables include S & P 500 Index, the US three-month treasury bill rate and West Texas Intermediate oil spot price index. The results show that the West Texas Intermediate oil spot price and the S&P 500 indices have significant positive relationships with Iran's TEDPIX. Also, there exists a significant negative relationship between Iran's TEDPIX and the US three-month Treasury bill rate.

Keywords: TEDPIX; Tehran Stock Exchange; S&P 500 index; USA three-month Treasury bill rate; West Texas Intermediate oil

Procedia PDF Downloads 302
2057 Secure Hashing Algorithm and Advance Encryption Algorithm in Cloud Computing

Authors: Jaimin Patel

Abstract:

Cloud computing is one of the most sharp and important movement in various computing technologies. It provides flexibility to users, cost effectiveness, location independence, easy maintenance, enables multitenancy, drastic performance improvements, and increased productivity. On the other hand, there are also major issues like security. Being a common server, security for a cloud is a major issue; it is important to provide security to protect user’s private data, and it is especially important in e-commerce and social networks. In this paper, encryption algorithms such as Advanced Encryption Standard algorithms, their vulnerabilities, risk of attacks, optimal time and complexity management and comparison with other algorithms based on software implementation is proposed. Encryption techniques to improve the performance of AES algorithms and to reduce risk management are given. Secure Hash Algorithms, their vulnerabilities, software implementations, risk of attacks and comparison with other hashing algorithms as well as the advantages and disadvantages between hashing techniques and encryption are given.

Keywords: Cloud computing, encryption algorithm, secure hashing algorithm, brute force attack, birthday attack, plaintext attack, man in middle attack

Procedia PDF Downloads 251
2056 A Robust Implementation of a Building Resources Access Rights Management System

Authors: Eugen Neagoe, Victor Balanica

Abstract:

A Smart Building Controller (SBC) is a server software that offers secured access to a pool of building specific resources, executes monitoring tasks and performs automatic administration of a building, thus optimizing the exploitation cost and maximizing comfort. This paper brings to discussion the issues that arise with the secure exploitation of the SBC administered resources and proposes a technical solution to implement a robust secure access system based on roles, individual rights and privileges (special rights).

Keywords: smart building controller, software security, access rights, access authorization

Procedia PDF Downloads 413
2055 On the Combination of Patient-Generated Data with Data from a Secure Clinical Network Environment: A Practical Example

Authors: Jeroen S. de Bruin, Karin Schindler, Christian Schuh

Abstract:

With increasingly more mobile health applications appearing due to the popularity of smartphones, the possibility arises that these data can be used to improve the medical diagnostic process, as well as the overall quality of healthcare, while at the same time lowering costs. However, as of yet there have been no reports of a successful combination of patient-generated data from smartphones with data from clinical routine. In this paper, we describe how these two types of data can be combined in a secure way without modification to hospital information systems, and how they can together be used in a medical expert system for automatic nutritional classification and triage.

Keywords: mobile health, data integration, expert systems, disease-related malnutrition

Procedia PDF Downloads 456
2054 The Effect of Tax Avoidance on Firm Value: Evidence from Amman Stock Exchange

Authors: Mohammad Abu Nassar, Mahmoud Al Khalilah, Hussein Abu Nassar

Abstract:

The purpose of this study is to examine whether corporate tax avoidance practices can impact firm value in the Jordanian context. The study employs a quantitative approach using s sample of (124) industrial and services companies listed on the Amman Stock Exchange for the period from 2010 to 2019. Multiple linear regression analysis has been applied to test the study's hypothesis. The study employs effective tax rate and book-tax difference to measure tax avoidance and Tobin's Q factor to measure firm value. The results of the study revealed that tax avoidance practices, when measured using effective tax rates, do not significantly impact firm value. When the book-tax difference is used to measure tax avoidance, the study results showed a negative impact on firm value. The result of the study has not supported the traditional view of tax avoidance as a transfer of wealth from the government to shareholders for industrial and services companies listed on the Amman Stock Exchange, indicating that Jordanian firms should not use tax avoidance strategies to enhance their value.

Keywords: tax avoidance, effective tax rate, book-tax difference, firm value, Amman stock exchange

Procedia PDF Downloads 126
2053 Synthesis of Epoxidized Castor Oil Using a Sulphonated Polystyrene Type Cation Exchange Resin and Its Blend Preparation with Epoxy Resin

Authors: G. S. Sudha, Smita Mohanty, S. K. Nayak

Abstract:

Epoxidized oils can replace petroleum derived materials in numerous industrial applications, because of their respectable oxirane oxygen content and high reactivity of oxirane ring. Epoxidized castor oil (ECO) has synthesized in the presence of a sulphonated polystyrene type cation exchange resin. The formation of the oxirane ring was confirmed by Fourier Transform Infrared Spectroscopy (FTIR) analysis. The epoxidation reaction was evaluated by Nuclear Magnetic Resonance (NMR) studies. ECO is used as a toughening phase to increase the toughness of petroleum-based epoxy resin.

Keywords: epoxy resin, epoxidized castor oil, sulphonated polystyrene type cation exchange resin, petroleum derived materials

Procedia PDF Downloads 444
2052 Secure Watermarking not at the Cost of Low Robustness

Authors: Jian Cao

Abstract:

This paper describes a novel watermarking technique which we call the random direction embedding (RDE) watermarking. Unlike traditional watermarking techniques, the watermark energy after the RDE embedding does not focus on a fixed direction, leading to the security against the traditional unauthorized watermark removal attack. In addition, the experimental results show that when compared with the existing secure watermarking, namely natural watermarking (NW), the RDE watermarking gains significant improvement in terms of robustness. In fact, the security of the RDE watermarking is not at the cost of low robustness, and it can even achieve more robust than the traditional spread spectrum watermarking, which has been shown to be very insecure.

Keywords: robustness, spread spectrum watermarking, watermarking security, random direction embedding (RDE)

Procedia PDF Downloads 357
2051 Influence of Security Attributes in Component-Based Software Development

Authors: Somayeh Zeinali

Abstract:

A component is generally defined as a piece of executable software with a published interface. Component-based software engineering (CBSE) has become recognized as a new sub-discipline of software engineering. In the component-based software development, components cannot be completely secure and thus easily become vulnerable. Some researchers have investigated this issue and proposed approaches to detect component intrusions or protect distributed components. Software security also refers to the process of creating software that is considered secure.The terms “dependability”, “trustworthiness”, and “survivability” are used interchangeably to describe the properties of software security.

Keywords: component-based software development, component-based software engineering , software security attributes, dependability, component

Procedia PDF Downloads 519
2050 Efficient Signcryption Scheme with Provable Security for Smart Card

Authors: Jayaprakash Kar, Daniyal M. Alghazzawi

Abstract:

The article proposes a novel construction of signcryption scheme with provable security which is most suited to implement on smart card. It is secure in random oracle model and the security relies on Decisional Bilinear Diffie-Hellmann Problem. The proposed scheme is secure against adaptive chosen ciphertext attack (indistiguishbility) and adaptive chosen message attack (unforgebility). Also, it is inspired by zero-knowledge proof. The two most important security goals for smart card are Confidentiality and authenticity. These functions are performed in one logical step in low computational cost.

Keywords: random oracle, provable security, unforgebility, smart card

Procedia PDF Downloads 568
2049 Determinants of Financial Performance of South African Businesses in Africa: Evidence from JSE Listed Telecommunications Companies

Authors: Nomakhosi Tshuma, Carley Chetty

Abstract:

This study employed panel regression analysis to investigate the financial performance determinants of MTN and Vodacom’s rest of Africa businesses between 2012 to 2020. It used net profit margin, return on assets (ROA), and return on equity (ROE) as financial performance proxies. Financial performance determinants investigated were asset size, debt ratio, liquidity, number of subscribers, and exchange rate. Data relating to exchange rates were obtained from the World Bank website, while financial data and subscriber information were obtained from the companies’ audited financial statements. The study found statistically significant negative relationships between debt and both ROA and net profit, exchange rate and both ROA and net profit, and subscribers and ROE. It also found significant positive relationships between ROE and both asset size and exchange rate. The study recommends strategic options that optimise on the above findings, and these include infrastructure sharing to reduce infrastructure costs and the minimisation of foreign-denominated debt.

Keywords: financial performance, determinants of financial performance, business in Africa, telecommunications industry

Procedia PDF Downloads 65
2048 Studies on Separation of Scandium from Sulfate Environment Using Ion Exchange Technique

Authors: H. Hajmohammadi , A. H. Jafari, M. Eskandari Nasab

Abstract:

The ion exchange method was used to assess the absorption of sulfate media from laboratory-grade materials. The Taguchi method was employed for determining the optimum conditions for scandium adsorption. Results show that optimum conditions for scandium adsorption from sulfate were obtained by Purolite C100 cationic resin in 0.1 g/l sulfuric acid and scandium concentration of 2 g/l at 25 °C. Studies also showed that lowering H₂SO₄ concentration and aqueous phase temperature leads to an increase in Sc adsorption. Visual Minteq software was used to ascertain the various possible cation types and the effect of concentration of scandium ion species on scandium adsorption by cationic resins. The simulation results of the above software show that scandium ion species are often cationic species that are consistent with experimental data.

Keywords: scandium, ion exchange resin, simulation, leach copper

Procedia PDF Downloads 98
2047 A Study of Issues and Mitigations on Distributed Denial of Service and Medical Internet of Things Devices

Authors: Robin Singh, Jing-Chiou Liou

Abstract:

The Internet of Things (IoT) devices are being used heavily as part of our everyday routines. Through improved communication and automated procedures, its popularity has assisted users in raising the quality of work. These devices are used in healthcare in order to better collect the patient’s data for their treatment. They are generally considered safe and secure. However, there is some possibility that some loopholes do exist which manufacturers do need to identify before some hacker takes advantage of them. For this study, we focused on two medical IoT devices which are pacemakers and hearing aids. The aim of this paper is to identify if there is any likelihood of these medical devices being hijacked and used as a botnet in Distributed Denial-Of Service attacks. Moreover, some mitigation strategies are being proposed to better secure

Keywords: cybersecurity, DDoS, IoT, medical devices

Procedia PDF Downloads 55
2046 Efficient Control of Some Dynamic States of Wheeled Robots

Authors: Boguslaw Schreyer

Abstract:

In some types of wheeled robots it is important to secure starting acceleration and deceleration maxima while at the same time maintaining transversal stability. In this paper torque distribution between the front and rear wheels as well as the timing of torque application have been calculated. Both secure an optimum traction coefficient. This paper also identifies required input signals to a control unit, which controls the torque values and timing. Using a three dimensional, two mass model of a robot developed by the author a computer simulation was performed confirming the calculations presented in this paper. These calculations were also implemented and confirmed during military robot testing.

Keywords: robot dynamics, torque distribution, traction coefficient, wheeled robots

Procedia PDF Downloads 292
2045 Management and Agreement Protocol in Computer Security

Authors: Abdulameer K. Hussain

Abstract:

When dealing with a cryptographic system we note that there are many activities performed by parties of this cryptographic system and the most prominent of these activities is the process of agreement between the parties involved in the cryptographic system on how to deal and perform the cryptographic system tasks to be more secure, more confident and reliable. The most common agreement among parties is a key agreement and other types of agreements. Despite the fact that there is an attempt from some quarters to find other effective agreement methods but these methods are limited to the traditional agreements. This paper presents different parameters to perform more effectively the task of the agreement, including the key alternative, the agreement on the encryption method used and the agreement to prevent the denial of the services. To manage and achieve these goals, this method proposes the existence of an control and monitoring entity to manage these agreements by collecting different statistical information of the opinions of the authorized parties in the cryptographic system. These statistics help this entity to take the proper decision about the agreement factors. This entity is called Agreement Manager (AM).

Keywords: agreement parameters, key agreement, key exchange, security management

Procedia PDF Downloads 383
2044 Language and Culture Exchange: Tandem Language Learning for University Students

Authors: Hebe Wong, Luz Fernandez Calventos

Abstract:

Tandem language learning, a language exchange process based on the principles of autonomy and reciprocity, provides opportunities for interlocutors to learn each other’s language by communicating online or face-to-face. While much attention has been paid to the process and outcomes of tandem learning via email, little has been discussed about the effectiveness of face-to-face tandem learning on language and culture exchange for university students. The LACTS (Language and Culture Tandem Scheme), an 8-week project, was set up to study students’ perceptions of conducting tandem learning to assist their language and culture exchange. Students of both post-graduate and undergraduate programmes (N=103) from a Hong Kong SAR university were put in groups of 4 to 6 according to their availability and language preferences and met for an hour a week. While sample task sheets on a range of topics were provided to assist the language exchange, all groups were encouraged to take charge of their meeting format and choose their own topics. At the end of the project, a 19-item questionnaire, which included both open-and closed-ended questions investigating students’ perceptions of reciprocal teaching and cultural exchange, was administered. Thirty-minute individual interviews were conducted to elicit students’ views and experiences in the LACTS activities. Quantitative and qualitative data analysis showed that most students agreed that the project had enhanced their cultural awareness and helped create an inclusive and participatory learning environment. Significant differences were found in students’ confidence in speaking their targeted language after joining the scheme. The interviews also provided rich data on the variety of formats and leadership patterns in student-led meetings, which could shed light on student autonomy and future tandem language learning projects.

Keywords: autonomy, reciprocity, tandem language learning, university students

Procedia PDF Downloads 22
2043 New Practical and Non-Malleable Elgamal Encryption for E-Voting Protoco

Authors: Karima Djebaili, Lamine Melkemi

Abstract:

Elgamal encryption is a fundamental public-key encryption in cryptography, which is based on the difficulty of discrete logarithm problem and the Diffie-Hellman problem. Supposing the Diffie–Hellman problem is computationally infeasible then Elgamal is secure under a chosen plaintext attack, where security indicates it is difficult for the attacker, given the ciphertext, to restore the whole of the plaintext. However, although it is secure against chosen plaintext attack, Elgamal is absolutely malleable i.e. is not secure against an adaptive chosen ciphertext attack, where the attacker can recover the plaintext. We present a extension on Elgamal encryption which result in non-malleability against adaptive chosen plaintext attack using concatenation and a cryptographic hash function, our evidence utilizes the device of plaintext aware. The algorithm proposed can be used in cryptography voting protocol given its level security. Our protocol protects the confidentiality of voters because each voter encrypts their choice before casting their vote, offers public verifiability using a signing algorithm, the final result is correctly computed using homomorphic property, and works even in the presence of an adversary due to the propriety of non-malleability. Moreover, the protocol prevents some parties colluding to fix the vote results.

Keywords: Elgamal encryption, non-malleability, plaintext aware, e-voting

Procedia PDF Downloads 422
2042 Hydrometallurgical Recovery of Cobalt, Nickel, Lithium, and Manganese from Spent Lithium-Ion Batteries

Authors: E. K. Hardwick, L. B. Siwela, J. G. Falconer, M. E. Mathibela, W. Rolfe

Abstract:

Lithium-ion battery (LiB) demand has increased with the advancement in technologies. The applications include electric vehicles, cell phones, laptops, and many more devices. Typical components of the cathodes include lithium, cobalt, nickel, and manganese. Recycling the spent LiBs is necessary to reduce the ecological footprint of their production and use and to have a secondary source of valuable metals. A hydrometallurgical method was investigated for the recovery of cobalt and nickel from LiB cathodes. The cathodes were leached using a chloride solution. Ion exchange was then used to recover the chloro-complexes of the metals. The aim of the research was to determine the efficiency of a chloride leach, as well as ion exchange operating capacities that can be achieved for LiB recycling, and to establish the optimal operating conditions (ideal pH, temperature, leachate and eluant, flowrate, and reagent concentrations) for the recovery of the cathode metals. It was found that the leaching of the cathodes could be hindered by the formation of refractory metal oxides of cathode components. A reducing agent was necessary to improve the leaching rate and efficiency. Leaching was achieved using various chloride-containing solutions. The chloro-complexes were absorbed by the ion exchange resin and eluted to produce concentrated cobalt, nickel, lithium, and manganese streams. Chromatographic separation of these elements was achieved. Further work is currently underway to determine the optimal operating conditions for the recovery by ion exchange.

Keywords: cobalt, ion exchange, leachate formation, lithium-ion batteries, manganese, nickel

Procedia PDF Downloads 70
2041 Differences in Parental Acceptance, Rejection, and Attachment and Associations with Adolescent Emotional Intelligence and Life Satisfaction

Authors: Diana Coyl-Shepherd, Lisa Newland

Abstract:

Research and theory suggest that parenting and parent-child attachment influence emotional development and well-being. Studies indicate that adolescents often describe differences in relationships with each parent and may form different types of attachment to mothers and fathers. During adolescence and young adulthood, romantic partners may also become attachment figures, influencing well being, and providing a relational context for emotion skill development. Mothers, however, tend to be remain the primary attachment figure; fathers and romantic partners are more likely to be secondary attachment figures. The following hypotheses were tested: 1) participants would rate mothers as more accepting and less rejecting than fathers, 2) participants would rate secure attachment to mothers higher and insecure attachment lower compared to father and romantic partner, 3) parental rejection and insecure attachment would be negatively related to life satisfaction and emotional intelligence, and 4) secure attachment and parental acceptance would be positively related life satisfaction and emotional intelligence. After IRB and informed consent, one hundred fifty adolescents and young adults (ages 11-28, M = 19.64; 71% female) completed an online survey. Measures included parental acceptance, rejection, attachment (i.e., secure, dismissing, and preoccupied), emotional intelligence (i.e., seeking and providing comfort, use, and understanding of self emotions, expressing warmth, understanding and responding to others’ emotional needs), and well-being (i.e., self-confidence and life satisfaction). As hypothesized, compared to fathers’, mothers’ acceptance was significantly higher t (190) = 3.98, p = .000 and rejection significantly lower t (190) = - 4.40, p = .000. Group differences in secure attachment were significant, f (2, 389) = 40.24, p = .000; post-hoc analyses revealed significant differences between mothers and fathers and between mothers and romantic partners; mothers had the highest mean score. Group differences in preoccupied attachment were significant, f (2, 388) = 13.37, p = .000; post-hoc analyses revealed significant differences between mothers and romantic partners, and between fathers and romantic partners; mothers have the lowest mean score. However, group differences in dismissing attachment were not significant, f (2, 389) = 1.21, p = .30; scores for mothers and romantic partners were similar; father means score was highest. For hypotheses 3 and 4 significant negative correlations were found between life satisfaction and dismissing parent, and romantic attachment, preoccupied father and romantic attachment, and mother and father rejection variables; secure attachment variables and parental acceptance were positively correlated with life satisfaction. Self-confidence was correlated only with mother acceptance. For emotional intelligence, seeking and providing comfort were negatively correlated with parent dismissing and mother rejection; secure mother and romantic attachment and mother acceptance were positively correlated with these variables. Use and understanding of self-emotions were negatively correlated with parent and partner dismissing attachment, and parent rejection; romantic secure attachment and parent acceptance were positively correlated. Expressing warmth was negatively correlated with dismissing attachment variables, romantic preoccupied attachment, and parent rejection; whereas attachment secure variables were positively associated. Understanding and responding to others’ emotional needs were correlated with parent dismissing and preoccupied attachment variables and mother rejection; only secure father attachment was positively correlated.

Keywords: adolescent emotional intelligence, life satisfaction, parent and romantic attachment, parental rejection and acceptance

Procedia PDF Downloads 167
2040 Quaternized PPO/PSF Anion Exchange Membranes Doped with ZnO-Nanoparticles for Fuel Cell Application

Authors: P. F. Msomi, P. T. Nonjola, P. G. Ndungu, J. Ramontja

Abstract:

In view of the projected global energy demand and increasing levels of greenhouse gases and pollutants issues have inspired an intense search for alternative new energy technologies, which will provide clean, low cost and environmentally friendly solutions to meet the end user requirements. Alkaline anion exchange membrane fuel cells (AAEMFC) have been recognized as ideal candidates for the generation of such clean energy for future stationary and mobile applications due to their many advantages. The key component of the AAEMFC is the anion exchange membrane (AEM). In this report, a series of quaternized poly (2.6 dimethyl – 1.4 phenylene oxide)/ polysulfone (QPPO/PSF) blend anionic exchange membranes (AEM) were successfully fabricated and characterized for alkaline fuel cell application. Zinc Oxide (ZnO) nanoparticles were introduced in the polymer matrix to enhance the intrinsic properties of the AEM. The characteristic properties of the QPPO/PSF and QPPO/PSF-ZnO blend membrane were investigated with X-ray diffraction (XRD), thermogravimetric analysis (TGA) scanning electron microscope (SEM) and contact angle (CA). To confirm successful quaternisation, FT-IR spectroscopy and proton nuclear magnetic resonance (1H NMR) were used. Other properties such as ion exchange capacity (IEC), water uptake, contact angle and ion conductivity (IC) were also undertaken to check if the prepared nanocomposite materials are suitable for fuel cell application. The membrane intrinsic properties were found to be enhanced by the addition of ZnO nanoparticles. The addition of ZnO nanoparticles resulted to a highest IEC of 3.72 mmol/g and a 30-fold IC increase of the nanocomposite due to its lower methanol permeability. The above results indicate that QPPO/PSF-ZnO is a good candidate for AAEMFC application.

Keywords: anion exchange membrane, fuel cell, zinc oxide nanoparticle, nanocomposite

Procedia PDF Downloads 390
2039 Method Comprising One to One Web Based Real Time Communications

Authors: Lata Kiran Dey, Rajendra Kumar, Biren Karmakar

Abstract:

Web Real Time Communications is a collection of standards, protocols, which provides real-time communications capabilities between web browsers and devices. This paper outlines the design and further implementation of web real-time communications on secure web applications having audio and video call capabilities. This proposed application may put up a system that will be able to work over both desktops as well as the mobile browser. Though, WebRTC also gives a set of JavaScript standard RTC APIs, which primarily works over the real-time communication framework. This helps to build a suitable communication application, which enables the audio, video, and message transfer in between the today’s modern browsers having WebRTC support.

Keywords: WebRTC, SIP, RTC, JavaScript, SRTP, secure web sockets, browser

Procedia PDF Downloads 109
2038 Corporate Fund Mobilization for Listed Companies and Economic Development: Case of Mongolian Stock Exchange

Authors: Ernest Nweke, Enkhtuya Bavuudorj

Abstract:

The Mongolia Stock Exchange (MSE) serves as a vehicle for executing the privatization policy of Mongolian Government as it transitioned from socialist to free market economy. It was also the intention of the Government to develop the investment and securities market through its establishment and to further boost the ailing Mongolian economy. This paper focuses on the contributions of the Mongolian Stock Exchange (MSE) to the industrial and economic development of Mongolia via Corporate fund mobilization for listed companies in Mongolia. A study of this nature is imperative as economic development in Mongolia has been accelerated by corporate investments. The key purpose of the research was to critically analyze the operations of the MSE to ascertain the extent to which the objectives for which it was established have been accomplished and to assess its contributions to industrial and economic development of Mongolia. In achieving this, secondary data on the activities of the MSE; its market capitalization over the years were collected and analyzed vis-à-vis the figures for Mongolia’s macro-economic data for the same time period to determine whether the progressive increase in market capitalization of the MSE has positively impacted on Mongolia’s economic growth. Regression analysis package was utilized in dissecting the data. It was proven that the Mongolian Stock Exchange has contributed positively and significantly to Mongolia’s economic development though not yet to the desired level. Against the findings of this research, recommendations were made to address, the problems facing the MSE and to enhance its performance and ultimately its contributions to industrial and economic development of the Mongolian nation.

Keywords: Corporate Fund Mobilization, Gross Domestic Product (GDP), market capitalization, purchasing power, stock exchange

Procedia PDF Downloads 211
2037 Ownership Structure and Portfolio Performance: Pre- and Post-Crisis Evidence from the Amman Stock Exchange

Authors: Mohammad Q. M. Momani

Abstract:

The objective of this study is to examine whether the value relevance of ownership structure changed as the Amman Stock Exchange market conditions changed. Using data from 2005 to 2014, the study finds that the performance of portfolios that contain firms with concentrated ownership structure declines significantly during the post-crisis period. These portfolios exhibit poor performance relative to portfolios that contain firms with dispersed ownership structure during the post-crisis period. The results argue that uninspired performance of the Amman Stock Exchange during the post-crisis period, increased the incentives for controlling shareholders to expropriate. Investors recognized these incentives and discounted firms that were more likely to expropriate.

Keywords: value relevance, ownership structure, portfolio performance, Jordan, ASE

Procedia PDF Downloads 97
2036 Removal of Aggregates of Monoclonal Antibodies by Ion Exchange Chrmoatography

Authors: Ishan Arora, Anurag Rathore

Abstract:

The primary objective of this work was to study the effect of resin chemistry, pH and molarity of binding and elution buffer on aggregate removal using Cation Exchange Chromatography and find the optimum conditions which can give efficient aggregate removal with minimum loss of yield. Four different resins were used for carrying out the experiments: Fractogel EMD SO3-(S), Fractogel EMD COO-(M), Capto SP ImpRes and S Ceramic HyperD. Runs were carried out on the AKTA Avant system. Design of Experiments (DOE) was used for analysis using the JMP software. The dependence of the yield obtained using different resins on the operating conditions was studied. Success has been achieved in obtaining yield greater than 90% using Capto SP ImpRes and Fractogel EMD COO-(M) resins. It has also been found that a change in the operating conditions generally has different effects on the yields obtained using different resins.

Keywords: aggregates, cation exchange chromatography, design of experiments, monoclonal antibodies

Procedia PDF Downloads 236