7,500 research outputs found
Phishing Techniques in Mobile Devices
The rapid evolution in mobile devices and communication technology has
increased the number of mobile device users dramatically. The mobile device has
replaced many other devices and is used to perform many tasks ranging from
establishing a phone call to performing critical and sensitive tasks like money
payments. Since the mobile device is accompanying a person most of his time, it
is highly probably that it includes personal and sensitive data for that
person. The increased use of mobile devices in daily life made mobile systems
an excellent target for attacks. One of the most important attacks is phishing
attack in which an attacker tries to get the credential of the victim and
impersonate him. In this paper, analysis of different types of phishing attacks
on mobile devices is provided. Mitigation techniques - anti-phishing techniques
- are also analyzed. Assessment of each technique and a summary of its
advantages and disadvantages is provided. At the end, important steps to guard
against phishing attacks are provided. The aim of the work is to put phishing
attacks on mobile systems in light, and to make people aware of these attacks
and how to avoid themComment: 9 pages, two figure
Optimal Prefix Codes with Fewer Distinct Codeword Lengths are Faster to Construct
A new method for constructing minimum-redundancy binary prefix codes is
described. Our method does not explicitly build a Huffman tree; instead it uses
a property of optimal prefix codes to compute the codeword lengths
corresponding to the input weights. Let be the number of weights and be
the number of distinct codeword lengths as produced by the algorithm for the
optimum codes. The running time of our algorithm is . Following
our previous work in \cite{be}, no algorithm can possibly construct optimal
prefix codes in time. When the given weights are presorted our
algorithm performs comparisons.Comment: 23 pages, a preliminary version appeared in STACS 200
A study of energy scavenging strategy in a tapping tree power
Energy harvesting has become one of the newest research attraction for both academic and industry fields. The energy is captured from external sources (thermal, wind, solar, vibration and hydrodynamic) and the energy source for energy harvesters is present as ambient background and it is free. The energy can be harvested in term of sensors or direct applying which depends on the source applied to. One of the energy harvesting topologies is from tapping tree which is new topology that can be applied direct to the tree by inserting electrode into the tree while the other is into the surrounding soil. This project introduces a method for the energy to be harvested from a tree, where the voltage obtained is conducted to three types of trees (Palm, Agrawood, and Palm Oil). Both type of electrodes and pH value of the surrounding soil are considered in order to get maximum voltage. Furthermore, the depth of the electrode inserted and the height from the surrounding soil play a role for voltage variation. The maximum voltage can be obtained is from (Al Alloy with Al) electrodes, at neutral pH, dry mositure and in Palm Oil Tree which is almost 0.8V - 1.2V. However, at such small energy from tree source, converter is required to increase the power. Boost converter contains of BQ25504 IC is applied to increase the voltage from small input to 3V - 4V. As well as, buck converter with TPS62231 IC is introduced for the output voltage of the boost converter and can be applied for small voltage as 1.8V. Simulation using Tina software simulate the converters mentioned and get better results for the energy harvested with battery charging system and energy storage. Field test is conducted with the selected converter to insure the power observed from the plant. In addition, this work has been taken to enhance the growth of energy harvesting from small sources and to go further for nature sources that has a high impact for low applications in the future
Estimation of growth and financial analysis through the application of Ipil ipil (Leucaena leucocephala) leaf meal as supplements to soybean and fish meal in the diet of juvenile monosex tilapia (Oreochromis niloticus)
Among plant protein ingredients,ipil ipil (Leucaena leucocephala) leafmeal (ILLM) is considered the most nutritive plant protein source after soybean meal in aquatic
feeds. That was proven in a 21-day experiment conducted to assess the response of juvenile Monosex Nile tilapia Oreochromis niloticus with four iso-nitrogenous formulated diets: One control diet was formulated based on fishmeal, one on soybean meal and one on rice bran, ipil ipil leafmeal was
also included in experimental diets
Microcanonical Simulation of Complex Actions: The Wess Zumino Witten Case
We present the main results of our microcanonical simulation of the Wess
Zumino Witten action functional. This action, being highly non-trivial and
capable of exhibiting many different phase transitions, is chosen to be
representative of general complex actions. We verify the applicability of
microcanonical simulation by successfully obtaining two of the many critical
points of the Wess Zumino Witten action. The microcanonical algorithm has the
additional advantage of exhibiting critical behaviour for a small
lattice. We also briefly discuss the subtleties that, in general, arise in
simulating a complex action. Our algorithm for complex actions can be extended
to the study of
D-branes in the Wess Zumino Witten action.Comment: 5 figure
Quantum Mechanics, Path Integrals and Option Pricing: Reducing the Complexity of Finance
Quantum Finance represents the synthesis of the techniques of quantum theory
(quantum mechanics and quantum field theory) to theoretical and applied
finance. After a brief overview of the connection between these fields, we
illustrate some of the methods of lattice simulations of path integrals for the
pricing of options. The ideas are sketched out for simple models, such as the
Black-Scholes model, where analytical and numerical results are compared.
Application of the method to nonlinear systems is also briefly overviewed. More
general models, for exotic or path-dependent options are discussed.Comment: 10 pages, 4 figures, presented by C.Coriano at the Intl. Workshop
"Nonlinear Physics, THeory and Experiment II", Gallipoli, Lecce, June 28-July
6, 200
Geographic Determinants of Hi-Tech Employment Growth in U.S. Counties
This paper examines the spatial pattern of U.S. county employment growth in high-tech industries. The spatial growth dimensions examined include industry cluster effects, urbanization effects, proximity to a college, and proximity in the urban hierarchy. Growth is examined for overall high-tech employment and for employment in various high-tech sectors. Econometric analyses are conducted for a sample of all counties and for metropolitan and non-metropolitan counties separately. Among our primary findings, we do not find evidence of positive localization or cluster growth effects, generally finding negative growth effects. We instead find some evidence of positive urbanization effects and growth penalties for greater distances from larger urban areas.
- …
