2,579 research outputs found

    Big 5 ASEAN capital markets forecasting using WEMA method

    Get PDF
    ASEAN through ASEAN Economics Community (AEC) 2020 treaty has proposed financial integration via capital markets integration in order to aim comprehensive ASEAN economic integration. Therefore, the need to have a proper prediction of ASEAN capital market becomes a major issue. In this study, we took big 5 ASEAN capital markets, i.e. Straits Times Index (STI), Kuala Lumpur Stock Exchange (KLSE), Stock Exchange of Thailand (SET), Jakarta Stock Exchange (JKSE), and Philippine Stock Exchange (PSE) to be forecasted using WEMA method. Weighted Exponential Moving Average (WEMA) is a new hybrid moving average method which combines the weighting factor calculation in Weighted Moving Average (WMA) with the procedure of Exponential Moving Average (EMA). WEMA has successfully been implemented and used to forecaste discrete time series data, but never being used to forecast ASEAN capital markets. In this study, we took further action by implementing the WEMA method with brute force approach for scaling factor tuning on big 5 ASEAN capital markets. From the experimental results, we found that WEMA has successfully forecasted all those exchanges. By looking at the forecast error measurement, it gives the best performance on PSE and worst performance on SET dataset among all datasets being considered in this study

    Big Data Security (Volume 3)

    Get PDF
    After a short description of the key concepts of big data the book explores on the secrecy and security threats posed especially by cloud based data storage. It delivers conceptual frameworks and models along with case studies of recent technology

    Security and Privacy in Mobile Computing: Challenges and Solutions

    Get PDF
    abstract: Mobile devices are penetrating everyday life. According to a recent Cisco report [10], the number of mobile connected devices such as smartphones, tablets, laptops, eReaders, and Machine-to-Machine (M2M) modules will hit 11.6 billion by 2021, exceeding the world's projected population at that time (7.8 billion). The rapid development of mobile devices has brought a number of emerging security and privacy issues in mobile computing. This dissertation aims to address a number of challenging security and privacy issues in mobile computing. This dissertation makes fivefold contributions. The first and second parts study the security and privacy issues in Device-to-Device communications. Specifically, the first part develops a novel scheme to enable a new way of trust relationship called spatiotemporal matching in a privacy-preserving and efficient fashion. To enhance the secure communication among mobile users, the second part proposes a game-theoretical framework to stimulate the cooperative shared secret key generation among mobile users. The third and fourth parts investigate the security and privacy issues in mobile crowdsourcing. In particular, the third part presents a secure and privacy-preserving mobile crowdsourcing system which strikes a good balance among object security, user privacy, and system efficiency. The fourth part demonstrates a differentially private distributed stream monitoring system via mobile crowdsourcing. Finally, the fifth part proposes VISIBLE, a novel video-assisted keystroke inference framework that allows an attacker to infer a tablet user's typed inputs on the touchscreen by recording and analyzing the video of the tablet backside during the user's input process. Besides, some potential countermeasures to this attack are also discussed. This dissertation sheds the light on the state-of-the-art security and privacy issues in mobile computing.Dissertation/ThesisDoctoral Dissertation Electrical Engineering 201

    Telecommunications Networks

    Get PDF
    This book guides readers through the basics of rapidly emerging networks to more advanced concepts and future expectations of Telecommunications Networks. It identifies and examines the most pressing research issues in Telecommunications and it contains chapters written by leading researchers, academics and industry professionals. Telecommunications Networks - Current Status and Future Trends covers surveys of recent publications that investigate key areas of interest such as: IMS, eTOM, 3G/4G, optimization problems, modeling, simulation, quality of service, etc. This book, that is suitable for both PhD and master students, is organized into six sections: New Generation Networks, Quality of Services, Sensor Networks, Telecommunications, Traffic Engineering and Routing

    Secure protocol design for mobile Ad Hoc Networks

    Get PDF
    指導教員:姜 暁

    Entropy in Image Analysis II

    Get PDF
    Image analysis is a fundamental task for any application where extracting information from images is required. The analysis requires highly sophisticated numerical and analytical methods, particularly for those applications in medicine, security, and other fields where the results of the processing consist of data of vital importance. This fact is evident from all the articles composing the Special Issue "Entropy in Image Analysis II", in which the authors used widely tested methods to verify their results. In the process of reading the present volume, the reader will appreciate the richness of their methods and applications, in particular for medical imaging and image security, and a remarkable cross-fertilization among the proposed research areas
    corecore