Search results for: secure key exchange
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2185

Search results for: secure key exchange

2035 Removal of Aggregates of Monoclonal Antibodies by Ion Exchange Chromatography

Authors: Ishan Arora, Anurag Rathore

Abstract:

The primary objective of this work was to study the effect of resin chemistry, pH and molarity of binding and elution buffer on aggregate removal using Cation Exchange Chromatography and find the optimum conditions which can give efficient aggregate removal with minimum loss of yield. Four different resins were used for carrying out the experiments: Fractogel EMD SO3-(S), Fractogel EMD COO-(M), Capto SP ImpRes and S Ceramic HyperD. Runs were carried out on the AKTA Avant system. Design of Experiments (DOE) was used for analysis using the JMP software. The dependence of the yield obtained using different resins on the operating conditions was studied. Success has been achieved by obtaining yield greater than 90% using Capto SP ImpRes and Fractogel EMD COO-(M) resins. It has also been found that a change in the operating conditions generally has different effects on the yields obtained using different resins.

Keywords: aggregates, cation exchange chromatography, design of experiments, monoclonal antibodies

Procedia PDF Downloads 233
2034 The Examination of the Mediating Role of Leader-Member Exchange on the Association between Transformational Leadership and Innovative Behavior: A Study in Turkish Technological Organizations

Authors: Gultekin Gurcay

Abstract:

The objective of this study was to examine the relationship between transformational leadership and innovative work behavior and to evaluate the mediating role of leader-member exchange relationships (LMX) on the assumed relationship. This study has focused on the suggestion that LMX might emerge through transformational leadership behaviors and thus could mediate the relationship between transformational leadership and innovative behavior. A cross-sectional survey research has been conducted on the relationship these leadership approaches and their impact on organizational HRM-outcomes has been conducted on two organizations operating in the technical sector in Istanbul-Turkey. The results of the research have supported the hypotheses. Transformational leadership was positively related to the innovative behaviors and LMX emerged to mediate that relationship.

Keywords: innovative leadership, leader-member exchange, transformational leadership, Turkey

Procedia PDF Downloads 249
2033 Analysis of Cross-Correlations in Emerging Markets Using Random Matrix Theory

Authors: Thomas Chinwe Urama, Patrick Oseloka Ezepue, Peters Chimezie Nnanwa

Abstract:

This paper investigates the universal financial dynamics in two dominant stock markets in Sub-Saharan Africa, through an in-depth analysis of the cross-correlation matrix of price returns in Nigerian Stock Market (NSM) and Johannesburg Stock Exchange (JSE), for the period 2009 to 2013. The strength of correlations between stocks is known to be higher in JSE than that of the NSM. Particularly important for modelling Nigerian derivatives in the future, the interactions of other stocks with the oil sector are weak, whereas the banking sector has strong positive interactions with the other sectors in the stock exchange. For the JSE, it is the oil sector and beverages that have greater sectorial correlations, instead of the banks which have the weaker correlation with other sectors in the stock exchange.

Keywords: random matrix theory, cross-correlations, emerging markets, option pricing, eigenvalues eigenvectors, inverse participation ratios and implied volatility

Procedia PDF Downloads 269
2032 Research Repository System (RRS) for Academics

Authors: Ajayi Olusola Olajide, O. Ojeyinka Taiwo, Adeolara Oluwawemimo Janet, Isheyemi Olufemi Gabriel, Lawal Muideen Adekunle

Abstract:

In an academic world where research work is the tool for promotion and elevation to higher cadres, the quest for a system that secure researchers’ work, monitor as well as alert researchers of pending academic research work, cannot be over-emphasized. This study describes how a research repository system for academics is designed. The invention further relates to a system for archiving any paperwork and journal that comprises of a database for storing all researches. It relates to a method for users to communicate through messages which will also allow reviewing all the messages. To create this research repository system, PHP and MySQL were married together for the system implementation.

Keywords: research, repository, academic, archiving, secure, system, implementation

Procedia PDF Downloads 559
2031 An Aspiring Solution to the Man in the Middle Bootstrap Vulnerability

Authors: Mouad Zouina, Benaceur Outtaj

Abstract:

The proposed work falls within the context of improving data security for m-commerce systems. In this context we have placed under the light some flaws encountered in HTTPS the most used m-commerce protocol, particularly the man in the middle attack, shortly MITM. The man in the middle attack is an active listening attack. The idea of this attack is to target the handshake phase of the HTTPS protocol which is the transition from a non-secure connection to a secure connection in our case HTTP to HTTPS. This paper proposes a solution to fix those flaws based on the upgrade of HSTS standard handshake sequence using the DNSSEC standard.

Keywords: m-commerce, HTTPS, HSTS, DNSSEC, MITM bootstrap vulnerability

Procedia PDF Downloads 371
2030 Trading Volume on the Tunisian Financial Market: An Approach Explaining the Hypothesis of Investors Overconfidence

Authors: Fatma Ismailia, Malek Saihi

Abstract:

This research provides an explanation of exchange incentives on the Tunis stock market from a behavioural point of view. The elucidation of the anomalies of excessive volume of transactions and that of excessive volatility cannot be done without the recourse to the psychological aspects of investors. The excessive confidence has been given the predominant role for the explanation of these phenomena. Indeed, when investors store increments, they become more confident about the precision of their private information and their exchange activities then become more aggressive on the subsequent periods. These overconfident investors carry out the intensive exchanges leading to an increase of securities volatility. The objective of this research is to identify whether the trading volume and the excessive volatility of securities observed on the Tunisian stock market come from the excessive exchange of overconfident investors. We use a sample of daily observations over the period January 1999 - October 2007 and we relied on various econometric tests including the VAR model. Our results provide evidence on the importance to consider the bias of overconfidence in the analysis of Tunis stock exchange specificities. The results reveal that the excess of confidence has a major impact on the trading volume while using daily temporal intervals.

Keywords: overconfidence, trading volume, efficiency, rationality, anomalies, behavioural finance, cognitive biases

Procedia PDF Downloads 387
2029 Developing a Secure Iris Recognition System by Using Advance Convolutional Neural Network

Authors: Kamyar Fakhr, Roozbeh Salmani

Abstract:

Alphonse Bertillon developed the first biometric security system in the 1800s. Today, many governments and giant companies are considering or have procured biometrically enabled security schemes. Iris is a kaleidoscope of patterns and colors. Each individual holds a set of irises more unique than their thumbprint. Every single day, giant companies like Google and Apple are experimenting with reliable biometric systems. Now, after almost 200 years of improvements, face ID does not work with masks, it gives access to fake 3D images, and there is no global usage of biometric recognition systems as national identity (ID) card. The goal of this paper is to demonstrate the advantages of iris recognition overall biometric recognition systems. It make two extensions: first, we illustrate how a very large amount of internet fraud and cyber abuse is happening due to bugs in face recognition systems and in a very large dataset of 3.4M people; second, we discuss how establishing a secure global network of iris recognition devices connected to authoritative convolutional neural networks could be the safest solution to this dilemma. Another aim of this study is to provide a system that will prevent system infiltration caused by cyber-attacks and will block all wireframes to the data until the main user ceases the procedure.

Keywords: biometric system, convolutional neural network, cyber-attack, secure

Procedia PDF Downloads 189
2028 Development and Emerging Risks in the Derivative Market: A Comparison of Impact of Futures Trading on Spot Price Volatility and a Case of Developed, Emerging and Less Developed Economies

Authors: Rancy Chepchirchir Kosgey, John Olukuru

Abstract:

This study examines the impact of introduction of futures trading on the spot price volatility in the commodity market. The paper considers the United States of America, South Africa and Ethiopian economies. Three commodities i.e. coffee, maize and wheat from New York Merchantile Exchange, South African Futures Exchange and Ethiopian Commodity Exchange are analyzed. ARCH LM test is used to check for heteroskedasticity and GARCH and EGARCH are used to check for the behavior of volatility between the pre- and post-futures periods. For all the three economies, the results indicate presence of the ARCH effect in the log returns. For conditional and unconditional variances; spot price volatility for coffee has decreased after futures trading in all the economies and the EGARCH has also shown reduction in persistence of volatility in the post-futures period in the three economies; while that of maize has reduced for the Ethiopian economy while there has been an increase in both the US and South African economies. For wheat, the conditional variance has been found to rise in the post-futures period in all the three economies.

Keywords: derivatives, futures exchange, agricultural commodities, spot price volatility

Procedia PDF Downloads 408
2027 Measuring the Effect of the Privatization of the Kuwait Stock Exchange on Its Performance

Authors: Mohamad H. Atyeh, Wael Alrashed, Steven Telford

Abstract:

The main objective of this research is to measure if there have been any notable changes in the trading actives of the Kuwait stock Exchange (KSE) after the privatization process that took place on the 25th of April 2016. The data that are used to test if there is any change in the KSE market performance are the daily indices for the period from the 25th of April 2016 till the 24th of October 2016 (after privatization) and a similar six months period before the date of the privatization from the 24th of October 2015 till the 24th of April 2016. In addition, as a control, the study included a period that is a period parallel to the six months period after the privatization. The results indicate that privatization is associated with lower variability for the majority of variables, but that the observed switch in slope direction is not actually a product of privatization, but rather one of serial correlation.

Keywords: privatization, Kuwait stock exchange (KSE), market capitalization (MCAP), capital markets authority (CMA), Boursa Kuwait securities company (BKSC)

Procedia PDF Downloads 274
2026 Study on Security and Privacy Issues of Mobile Operating Systems Based on Malware Attacks

Authors: Huang Dennis, Aurelio Aziel, Burra Venkata Durga Kumar

Abstract:

Nowadays, smartphones and mobile operating systems have been popularly widespread in our daily lives. As people use smartphones, they tend to store more private and essential data on their devices, because of this it is very important to develop more secure mobile operating systems and cloud storage to secure the data. However, several factors can cause security risks in mobile operating systems such as malware, malicious app, phishing attacks, ransomware, and more, all of which can cause a big problem for users as they can access the user's private data. Those problems can cause data loss, financial loss, identity theft, and other serious consequences. Other than that, during the pandemic, people will use their mobile devices more and do all sorts of transactions online, which may lead to more victims of online scams and inexperienced users being the target. With the increase in attacks, researchers have been actively working to develop several countermeasures to enhance the security of operating systems. This study aims to provide an overview of the security and privacy issues in mobile operating systems, identifying the potential risk of operating systems, and the possible solutions. By examining these issues, we want to provide an easy understanding to users and researchers to improve knowledge and develop more secure mobile operating systems.

Keywords: mobile operating system, security, privacy, Malware

Procedia PDF Downloads 49
2025 Alternative Futures for the Middle East

Authors: Dorsa Bakhshandehgeyazdi

Abstract:

This paper examines elective future of security in the Middle East trying to find a way that could take the district from a shaky past to a more secure future. Taking a gander at five situations about the eventual future of world legislative issues, in particular, globalization, fragmentation, conflict of civilizations, majority rule peace and the development of a security group, the paper contends that albeit every situation has its qualities (and in addition shortcomings), it is the situation that predicts the foundation of a security group that joins a more express thought for forming a more secure future for the Middle East.

Keywords: Middle East, Globalization, Fragmentation, Conflict of civilizations, Majority rule peace, Development of a security group

Procedia PDF Downloads 270
2024 The Different Roles between Sodium and Potassium Ions in Ion Exchange of WO3/SiO2 Catalysts

Authors: Kritsada Pipitthapan

Abstract:

WO3/SiO2 catalysts were modified by an ion exchange method with sodium hydroxide or potassium hydroxide solution. The performance of the modified catalysts was tested in the metathesis of ethylene and trans-2-butene to propylene. During ion exchange, sodium and potassium ions played different roles. Sodium modified catalysts revealed constant trans-2-butene conversion and propylene selectivity when the concentrations of sodium in the solution were varied. In contrast, potassium modified catalysts showed reduction of the conversion and increase of the selectivity. From these results, potassium hydroxide may affect the transformation of tungsten oxide active species, resulting in the decrease in conversion whereas sodium hydroxide did not. Moreover, the modification of catalysts by this method improved the catalyst stability by lowering the amount of coke deposited on the catalyst surface.

Keywords: acid sites, alkali metal, isomerization, metathesis

Procedia PDF Downloads 226
2023 Data Confidentiality in Public Cloud: A Method for Inclusion of ID-PKC Schemes in OpenStack Cloud

Authors: N. Nalini, Bhanu Prakash Gopularam

Abstract:

The term data security refers to the degree of resistance or protection given to information from unintended or unauthorized access. The core principles of information security are the confidentiality, integrity and availability, also referred as CIA triad. Cloud computing services are classified as SaaS, IaaS and PaaS services. With cloud adoption the confidential enterprise data are moved from organization premises to untrusted public network and due to this the attack surface has increased manifold. Several cloud computing platforms like OpenStack, Eucalyptus, Amazon EC2 offer users to build and configure public, hybrid and private clouds. While the traditional encryption based on PKI infrastructure still works in cloud scenario, the management of public-private keys and trust certificates is difficult. The Identity based Public Key Cryptography (also referred as ID-PKC) overcomes this problem by using publicly identifiable information for generating the keys and works well with decentralized systems. The users can exchange information securely without having to manage any trust information. Another advantage is that access control (role based access control policy) information can be embedded into data unlike in PKI where it is handled by separate component or system. In OpenStack cloud platform the keystone service acts as identity service for authentication and authorization and has support for public key infrastructure for auto services. In this paper, we explain OpenStack security architecture and evaluate the PKI infrastructure piece for data confidentiality. We provide method to integrate ID-PKC schemes for securing data while in transit and stored and explain the key measures for safe guarding data against security attacks. The proposed approach uses JPBC crypto library for key-pair generation based on IEEE P1636.3 standard and secure communication to other cloud services.

Keywords: data confidentiality, identity based cryptography, secure communication, open stack key stone, token scoping

Procedia PDF Downloads 348
2022 Simulation of Colombian Exchange Rate to Cover the Exchange Risk Using Financial Options Like Hedge Strategy

Authors: Natalia M. Acevedo, Luis M. Jimenez, Erick Lambis

Abstract:

Imperfections in the capital market are used to argue the relevance of the corporate risk management function. With corporate hedge, the value of the company is increased by reducing the volatility of the expected cash flow and making it possible to face a lower bankruptcy costs and financial difficulties, without sacrificing tax advantages for debt financing. With the propose to avoid exchange rate troubles over cash flows of Colombian exporting firms, this dissertation uses financial options, over exchange rate between Peso and Dollar, for realizing a financial hedge. In this study, a strategy of hedge is designed for an exporting company in Colombia with the objective of preventing fluctuations because, if the exchange rate down, the number of Colombian pesos that obtains the company by exports, is less than agreed. The exchange rate of Colombia is measured by the TRM (Representative Market Rate), representing the number of Colombian pesos for an American dollar. First, the TMR is modelled through the Geometric Brownian Motion, with this, the project price is simulated using Montecarlo simulations and finding the mean of TRM for three, six and twelve months. For financial hedging, currency options were used. The 6-month projection was covered with financial options on European-type currency with a strike price of $ 2,780.47 for each month; this value corresponds to the last value of the historical TRM. In the compensation of the options in each month, the price paid for the premium, calculated with the Black-Scholes method for currency options, was considered. Finally, with the modeling of prices and the Monte Carlo simulation, the effect of the exchange hedging with options on the exporting company was determined, this by means of the unit price estimate to which the dollars in the scenario without coverage were changed and scenario with coverage. After using the scenarios: is determinate that the TRM will have a bull trend and the exporting firm will be affected positively because they will get more pesos for each dollar. The results show that the financial options manage to reduce the exchange risk. The expected value with coverage is approximate to the expected value without coverage, but the 5% percentile with coverage is greater than without coverage. The foregoing indicates that in the worst scenarios the exporting companies will obtain better prices for the sale of the currencies if they cover.

Keywords: currency hedging, futures, geometric Brownian motion, options

Procedia PDF Downloads 99
2021 Secure Content Centric Network

Authors: Syed Umair Aziz, Muhammad Faheem, Sameer Hussain, Faraz Idris

Abstract:

Content centric network is the network based on the mechanism of sending and receiving the data based on the interest and data request to the specified node (which has cached data). In this network, the security is bind with the content not with the host hence making it host independent and secure. In this network security is applied by taking content’s MAC (message authentication code) and encrypting it with the public key of the receiver. On the receiver end, the message is first verified and after verification message is saved and decrypted using the receiver's private key.

Keywords: content centric network, client-server, host security threats, message authentication code, named data network, network caching, peer-to-peer

Procedia PDF Downloads 613
2020 Controllable Modification of Glass-Crystal Composites with Ion-Exchange Technique

Authors: Andrey A. Lipovskii, Alexey V. Redkov, Vyacheslav V. Rusan, Dmitry K. Tagantsev, Valentina V. Zhurikhina

Abstract:

The presented research is related to the development of recently proposed technique of the formation of composite materials, like optical glass-ceramics, with predetermined structure and properties of the crystalline component. The technique is based on the control of the size and concentration of the crystalline grains using the phenomenon of glass-ceramics decrystallization (vitrification) induced by ion-exchange. This phenomenon was discovered and explained in the beginning of the 2000s, while related theoretical description was given in 2016 only. In general, the developed theory enables one to model the process and optimize the conditions of ion-exchange processing of glass-ceramics, which provide given properties of crystalline component, in particular, profile of the average size of the crystalline grains. The optimization is possible if one knows two dimensionless parameters of the theoretical model. One of them (β) is the value which is directly related to the solubility of crystalline component of the glass-ceramics in the glass matrix, and another (γ) is equal to the ratio of characteristic times of ion-exchange diffusion and crystalline grain dissolution. The presented study is dedicated to the development of experimental technique and simulation which allow determining these parameters. It is shown that these parameters can be deduced from the data on the space distributions of diffusant concentrations and average size of crystalline grains in the glass-ceramics samples subjected to ion-exchange treatment. Measurements at least at two temperatures and two processing times at each temperature are necessary. The composite material used was a silica-based glass-ceramics with crystalline grains of Li2OSiO2. Cubical samples of the glass-ceramics (6x6x6 mm3) underwent the ion exchange process in NaNO3 salt melt at 520 oC (for 16 and 48 h), 540 oC (for 8 and 24 h), 560 oC (for 4 and 12 h), and 580 oC (for 2 and 8 h). The ion exchange processing resulted in the glass-ceramics vitrification in the subsurface layers where ion-exchange diffusion took place. Slabs about 1 mm thick were cut from the central part of the samples and their big facets were polished. These slabs were used to find profiles of diffusant concentrations and average size of the crystalline grains. The concentration profiles were determined from refractive index profiles measured with Max-Zender interferometer, and profiles of the average size of the crystalline grains were determined with micro-Raman spectroscopy. Numerical simulation were based on the developed theoretical model of the glass-ceramics decrystallization induced by ion exchange. The simulation of the processes was carried out for different values of β and γ parameters under all above-mentioned ion exchange conditions. As a result, the temperature dependences of the parameters, which provided a reliable coincidence of the simulation and experimental data, were found. This ensured the adequate modeling of the process of the glass-ceramics decrystallization in 520-580 oC temperature interval. Developed approach provides a powerful tool for fine tuning of the glass-ceramics structure, namely, concentration and average size of crystalline grains.

Keywords: diffusion, glass-ceramics, ion exchange, vitrification

Procedia PDF Downloads 246
2019 Comparison of Performance of Proton Exchange Membrane Fuel Cell Membrane Electrode Assemblies Prepared from 10 and 15-Micron Proton Exchange Membranes

Authors: Yingjeng James Li, Chiao-Chih Hu

Abstract:

Membrane electrode assemblies (MEAs) for proton exchange membrane fuel cell (PEMFC) applications were prepared by using 10 and 15 um PEMs. Except for different membrane thicknesses, these MEAs were prepared by the same conditions. They were prepared by using catalyst coated membrane (CCM) process. The catalyst employed is 40% Pt/C, and the Pt loading is 0.5mg/cm² for the sum of anode and cathode. Active area of the MEAs employed in this study is 5cm*5cm=25cm². In polarization measurements, the flow rates were always set at 1.2 stoic for anode and 3.0 stoic for cathode. The outlets were in open-end mode. The flow filed is tri-serpentine design. The cell temperatures and the humidification conditions were varied for the purpose of MEA performance observations. It was found that the performance of these two types of MEAs is about the same at fully or partially humidified operation conditions; however, 10um MEA exhibits higher current density in dry or low humidified conditions. For example, at 70C cell, 100% RH, and 0.6V condition, both MEAs have similar current density which is 1320 and 1342mA/cm² for 15um and 10um product, respectively. However, when in operation without external humidification, 10um MEA can produce 1085mA/cm²; whereas 15um MEA produces only 720mA/cm².

Keywords: fuel cell, membrane electrode assembly, PEFC, PEMFC, proton exchange membrane

Procedia PDF Downloads 212
2018 Preserving Privacy in Workflow Delegation Models

Authors: Noha Nagy, Hoda Mokhtar, Mohamed El Sherkawi

Abstract:

The popularity of workflow delegation models and the increasing number of workflow provenance-aware systems motivate the need for finding more strict delegation models. Such models combine different approaches for enhanced security and respecting workflow privacy. Although modern enterprises seek conformance to workflow constraints to ensure correctness of their work, these constraints pose a threat to security, because these constraints can be good seeds for attacking privacy even in secure models. This paper introduces a comprehensive Workflow Delegation Model (WFDM) that utilizes provenance and workflow constraints to prevent malicious delegate from attacking workflow privacy as well as extending the delegation functionalities. In addition, we argue the need for exploiting workflow constraints to improve workflow security models.

Keywords: workflow delegation models, secure workflow, workflow privacy, workflow provenance

Procedia PDF Downloads 305
2017 Electron Spin Resonance of Conduction and Spin Waves Dynamics Investigations in Bi-2223 Superconductor for Decoding Pairing Mechanism

Authors: S. N. Ekbote, G. K. Padam, Manju Arora

Abstract:

Electron spin resonance (ESR) spectroscopic investigations of (Bi, Pb)₂Sr₂Ca₂Cu₃O₁₀₋ₓ (Bi-2223) bulk samples were carried out in both the normal and superconducting states. A broad asymmetric resonance signal with side signals is obtained in the normal state, and all of them disappear in the superconducting state. The temperature and angular orientation effects on these signals suggest that the broad asymmetric signal arises from electron spin resonance of conduction electrons (CESR) and the side signals from exchange interactions as Platzman-Wolff type spin waves. The disappearance of CESR and spin waves in a superconducting state demonstrates the role of exchange interactions in Cooper pair formation.

Keywords: Bi-2223 superconductor, CESR, ESR, exchange interactions, spin waves

Procedia PDF Downloads 97
2016 Implementing Fault Tolerance with Proxy Signature on the Improvement of RSA System

Authors: H. El-Kamchouchi, Heba Gaber, Fatma Ahmed, Dalia H. El-Kamchouchi

Abstract:

Fault tolerance and data security are two important issues in modern communication systems. During the transmission of data between the sender and receiver, errors may occur frequently. Therefore, the sender must re-transmit the data to the receiver in order to correct these errors, which makes the system very feeble. To improve the scalability of the scheme, we present a proxy signature scheme with fault tolerance over an efficient and secure authenticated key agreement protocol based on the improved RSA system. Authenticated key agreement protocols have an important role in building a secure communications network between the two parties.

Keywords: fault tolerance, improved RSA, key agreement, proxy signature

Procedia PDF Downloads 388
2015 Electronic Health Record System: A Perspective to Improve the Value of Services Rendered to Patients in Healthcare Organization in Rwanda, Case of CHUB and Hopital De Nemba

Authors: Mugabe Nzarama Gabriel

Abstract:

In Rwanda, many healthcare organizations are still using a paper based patients’ data record system although it still present weaknesses to share health patients’ information across different services when necessary. In developed countries, the EHR has been put in place to revolutionize the paper based record system but still the EHR has some challenges related to privacy, security, or interoperability. The purpose of this research was to assess the existing patients’ data record system in healthcare sector in Rwanda, see what an EHR can improve to the system in place and assess the acceptance of EHR as system which is interoperable, very secure and interoperable and see whether stakeholders are ready to adopt the system. The case based methodology was used and TAM theoretical framework to design the questionnaire for the survey. A judgmental sample across two cases, CHUB and Hopital de Nemba, has been selected and SPSS has been used for descriptive statistics. After a qualitative analysis, the findings showed that the paper based record is useful, gives complete information about the patient, protects the privacy of patients but it is still less secure and less interoperable. The respondents shown that they are ready to use the proposed EHR System and want it secure, capable of enforcing the privacy but still they are not all ready for the interoperability. A conclusion has been formulated; recommendations and further research have been proposed.

Keywords: EHR system, healthcare service, TAM, privacy, interoperability

Procedia PDF Downloads 238
2014 Proposal of Commutation Protocol in Hybrid Sensors and Vehicular Networks for Intelligent Transport Systems

Authors: Taha Bensiradj, Samira Moussaoui

Abstract:

Hybrid Sensors and Vehicular Networks (HSVN), represent a hybrid network, which uses several generations of Ad-Hoc networks. It is used especially in Intelligent Transport Systems (ITS). The HSVN allows making collaboration between the Wireless Sensors Network (WSN) deployed on the border of the road and the Vehicular Network (VANET). This collaboration is defined by messages exchanged between the two networks for the purpose to inform the drivers about the state of the road, provide road safety information and more information about traffic on the road. Moreover, this collaboration created by HSVN, also allows the use of a network and the advantage of improving another network. For example, the dissemination of information between the sensors quickly decreases its energy, and therefore, we can use vehicles that do not have energy constraint to disseminate the information between sensors. On the other hand, to solve the disconnection problem in VANET, the sensors can be used as gateways that allow sending the messages received by one vehicle to another. However, because of the short communication range of the sensor and its low capacity of storage and processing of data, it is difficult to ensure the exchange of road messages between it and the vehicle, which can be moving at high speed at the time of exchange. This represents the time where the vehicle is in communication range with the sensor. This work is the proposition of a communication protocol between the sensors and the vehicle used in HSVN. The latter has as the purpose to ensure the exchange of road messages in the available time of exchange.

Keywords: HSVN, ITS, VANET, WSN

Procedia PDF Downloads 334
2013 Decentralized Data Marketplace Framework Using Blockchain-Based Smart Contract

Authors: Meshari Aljohani, Stephan Olariu, Ravi Mukkamala

Abstract:

Data is essential for enhancing the quality of life. Its value creates chances for users to profit from data sales and purchases. Users in data marketplaces, however, must share and trade data in a secure and trusted environment while maintaining their privacy. The first main contribution of this paper is to identify enabling technologies and challenges facing the development of decentralized data marketplaces. The second main contribution is to propose a decentralized data marketplace framework based on blockchain technology. The proposed framework enables sellers and buyers to transact with more confidence. Using a security deposit, the system implements a unique approach for enforcing honesty in data exchange among anonymous individuals. Before the transaction is considered complete, the system has a time frame. As a result, users can submit disputes to the arbitrators which will review them and respond with their decision. Use cases are presented to demonstrate how these technologies help data marketplaces handle issues and challenges.

Keywords: blockchain, data, data marketplace, smart contract, reputation system

Procedia PDF Downloads 134
2012 Polyampholytic Resins: Advances in Ion Exchanging Properties

Authors: N. P. G. N. Chandrasekara, R. M. Pashley

Abstract:

Ion exchange (IEX) resins are commonly available as cationic or anionic resins but not as polyampholytic resins. This is probably because sequential acid and base washing cannot produce complete regeneration of polyampholytic resins with chemically attached anionic and cationic groups in close proximity. The ‘Sirotherm’ process, developed by the Commonwealth Scientific and Industrial Research Organization (CSIRO) in Melbourne, Australia was originally based on the use of a physical mixture of weakly basic (WB) and weakly acidic (WA) ion-exchange resin beads. These resins were regenerated thermally and they were capable of removing salts from an aqueous solution at higher temperatures compared to the salt sorbed at ambient temperatures with a significant reduction of the sorption capacity with increasing temperature. A new process for the efficient regeneration of mixed bead resins using ammonium bicarbonate with heat was studied recently and this chemical/thermal regeneration technique has the capability for completely regenerating polyampholytic resins. Even so, the low IEX capacities of polyampholytic resins restrict their commercial applications. Recently, we have established another novel process for increasing the IEX capacity of a typical polyampholytic resin. In this paper we will discuss the chemical/thermal regeneration of a polyampholytic (WA/WB) resin and a novel process for enhancing its ion exchange capacity, by increasing its internal pore area. We also show how effective this method is for completely recycled regeneration, with the potential of substantially reducing chemical waste.

Keywords: capacity, ion exchange, polyampholytic resin, regeneration

Procedia PDF Downloads 349
2011 Cryptographic Protocol for Secure Cloud Storage

Authors: Luvisa Kusuma, Panji Yudha Prakasa

Abstract:

Cloud storage, as a subservice of infrastructure as a service (IaaS) in Cloud Computing, is the model of nerworked storage where data can be stored in server. In this paper, we propose a secure cloud storage system consisting of two main components; client as a user who uses the cloud storage service and server who provides the cloud storage service. In this system, we propose the protocol schemes to guarantee against security attacks in the data transmission. The protocols are login protocol, upload data protocol, download protocol, and push data protocol, which implement hybrid cryptographic mechanism based on data encryption before it is sent to the cloud, so cloud storage provider does not know the user's data and cannot analysis user’s data, because there is no correspondence between data and user.

Keywords: cloud storage, security, cryptographic protocol, artificial intelligence

Procedia PDF Downloads 309
2010 Economic Indicators as Correlates of Inward Foreign Direct Investment in Nigeria

Authors: C. F. Popoola, P. Osho, S. B. Babarinde

Abstract:

This study examined economic indicators as correlates of inward FDI. An exploratory research design was used to obtained annual published data on inflation rate, market size, exchange rate, political instability, human development, and infrastructure from Central Bank of Nigeria, National Bureau of Statistics, Nigerian Capital Market, Nigeria Institute of Social and Economic Research, and UNCTAD. Data generated were analyzed using Pearson correlation, analysis of variance and regression. The findings of the study revealed that market size (r = 0.852, p < 0.001), infrastructure (r = 0.264, p < 0.001), human development (r = 0.154, p < 0.01) and exchange rate ( r= 0.178, p < 0.05) correlate positively with inward FDI, while inflation rate (r = -0.88, p < 0.001), and political instability (r= -0.102, p < 0.05) correlate negatively with inward FDI. Findings also revealed that the economic indicators significantly predicted inward FDI (R2 = 0.913; F(1,19) = 29.40; p < 0.05) for Nigeria. It was concluded that exchange rate, market size, human development, and infrastructure positively related to inward FDI while the high level of inflation and political instability negatively related to inward FDI. Therefore, it was suggested that policy makers and government agencies should readdress steps and design policies that would encourage more FDI into the country.

Keywords: exchange rate, foreign direct investment, human development, inflation rate, infrastructure, market size, political instability

Procedia PDF Downloads 373
2009 Working Capital Management Effectiveness

Authors: Asif Iqbal

Abstract:

Working capital management has its effect on liquidity as well as on profitability of a firm. In this research we have selected a sample of 100 respondents whose firms are listed on Karachi stock exchange. We have studied the effect of different variable s of working capital management. We find that organizations throughout the world as well as in Pakistan have to give immense recognition to the working capital management as it is an effective thing from their long term perspective especially to their shareholders to have a firm confidence over the companies for investment purpose.

Keywords: working capital management, Karachi stock exchange, shareholders, capital management

Procedia PDF Downloads 540
2008 Currency Boards in Crisis: Experience of Baltic Countries

Authors: Gordana Kordić, Petra Palić

Abstract:

The European countries that during the past two decades based their exchange rate regimes on currency board arrangement (CBA) are usually analysed from the perspective of corner solution choice’s stabilisation effects. There is an open discussion on the positive and negative background of a strict exchange rate regime choice, although it should be seen as part of the transition process towards the monetary union membership. The focus of the paper is on the Baltic countries that after two decades of a rigid exchange rate arrangement and strongly influenced by global crisis are finishing their path towards the euro zone. Besides the stabilising capacity, the CBA is highly vulnerable regime, with limited developing potential. The rigidity of the exchange rate (and monetary) system, despite the ensured credibility, do not leave enough (or any) space for the adjustment and/or active crisis management. Still, the Baltics are in a process of recovery, with fiscal consolidation measures combined with (painful and politically unpopular) measures of internal devaluation. Today, two of them (Estonia and Latvia) are members of euro zone, fulfilling their ultimate transition targets, but de facto exchanging one fixed regime with another. The paper analyses the challenges for the CBA in unstable environment since the fixed regimes rely on imported stability and are sensitive to external shocks. With limited monetary instruments, these countries were oriented to the fiscal policies and used a combination of internal devaluation and tax policy measures. Despite their rather quick recovery, our second goal is to analyse the long term influence that the measures had on the national economy.

Keywords: currency board arrangement, internal devaluation, exchange rate regime, great recession

Procedia PDF Downloads 235
2007 Secure Bio Semantic Computing Scheme

Authors: Hiroshi Yamaguchi, Phillip C. Y. Sheu, Ryo Fujita, Shigeo Tsujii

Abstract:

In this paper, the secure BioSemantic Scheme is presented to bridge biological/biomedical research problems and computational solutions via semantic computing. Due to the diversity of problems in various research fields, the semantic capability description language (SCDL) plays and important role as a common language and generic form for problem formalization. SCDL is expected the essential for future semantic and logical computing in Biosemantic field. We show several example to Biomedical problems in this paper. Moreover, in the coming age of cloud computing, the security problem is considered to be crucial issue and we presented a practical scheme to cope with this problem.

Keywords: biomedical applications, private information retrieval (PIR), semantic capability description language (SCDL), semantic computing

Procedia PDF Downloads 365
2006 Secure E-Pay System Using Steganography and Visual Cryptography

Authors: K. Suganya Devi, P. Srinivasan, M. P. Vaishnave, G. Arutperumjothi

Abstract:

Today’s internet world is highly prone to various online attacks, of which the most harmful attack is phishing. The attackers host the fake websites which are very similar and look alike. We propose an image based authentication using steganography and visual cryptography to prevent phishing. This paper presents a secure steganographic technique for true color (RGB) images and uses Discrete Cosine Transform to compress the images. The proposed method hides the secret data inside the cover image. The use of visual cryptography is to preserve the privacy of an image by decomposing the original image into two shares. Original image can be identified only when both qualified shares are simultaneously available. Individual share does not reveal the identity of the original image. Thus, the existence of the secret message is hard to be detected by the RS steganalysis.

Keywords: image security, random LSB, steganography, visual cryptography

Procedia PDF Downloads 306