7,500 research outputs found

    Phishing Techniques in Mobile Devices

    Full text link
    The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to performing critical and sensitive tasks like money payments. Since the mobile device is accompanying a person most of his time, it is highly probably that it includes personal and sensitive data for that person. The increased use of mobile devices in daily life made mobile systems an excellent target for attacks. One of the most important attacks is phishing attack in which an attacker tries to get the credential of the victim and impersonate him. In this paper, analysis of different types of phishing attacks on mobile devices is provided. Mitigation techniques - anti-phishing techniques - are also analyzed. Assessment of each technique and a summary of its advantages and disadvantages is provided. At the end, important steps to guard against phishing attacks are provided. The aim of the work is to put phishing attacks on mobile systems in light, and to make people aware of these attacks and how to avoid themComment: 9 pages, two figure

    Optimal Prefix Codes with Fewer Distinct Codeword Lengths are Faster to Construct

    Full text link
    A new method for constructing minimum-redundancy binary prefix codes is described. Our method does not explicitly build a Huffman tree; instead it uses a property of optimal prefix codes to compute the codeword lengths corresponding to the input weights. Let nn be the number of weights and kk be the number of distinct codeword lengths as produced by the algorithm for the optimum codes. The running time of our algorithm is O(kn)O(k \cdot n). Following our previous work in \cite{be}, no algorithm can possibly construct optimal prefix codes in o(kn)o(k \cdot n) time. When the given weights are presorted our algorithm performs O(9klog2kn)O(9^k \cdot \log^{2k}{n}) comparisons.Comment: 23 pages, a preliminary version appeared in STACS 200

    A study of energy scavenging strategy in a tapping tree power

    Get PDF
    Energy harvesting has become one of the newest research attraction for both academic and industry fields. The energy is captured from external sources (thermal, wind, solar, vibration and hydrodynamic) and the energy source for energy harvesters is present as ambient background and it is free. The energy can be harvested in term of sensors or direct applying which depends on the source applied to. One of the energy harvesting topologies is from tapping tree which is new topology that can be applied direct to the tree by inserting electrode into the tree while the other is into the surrounding soil. This project introduces a method for the energy to be harvested from a tree, where the voltage obtained is conducted to three types of trees (Palm, Agrawood, and Palm Oil). Both type of electrodes and pH value of the surrounding soil are considered in order to get maximum voltage. Furthermore, the depth of the electrode inserted and the height from the surrounding soil play a role for voltage variation. The maximum voltage can be obtained is from (Al Alloy with Al) electrodes, at neutral pH, dry mositure and in Palm Oil Tree which is almost 0.8V - 1.2V. However, at such small energy from tree source, converter is required to increase the power. Boost converter contains of BQ25504 IC is applied to increase the voltage from small input to 3V - 4V. As well as, buck converter with TPS62231 IC is introduced for the output voltage of the boost converter and can be applied for small voltage as 1.8V. Simulation using Tina software simulate the converters mentioned and get better results for the energy harvested with battery charging system and energy storage. Field test is conducted with the selected converter to insure the power observed from the plant. In addition, this work has been taken to enhance the growth of energy harvesting from small sources and to go further for nature sources that has a high impact for low applications in the future

    Estimation of growth and financial analysis through the application of Ipil ipil (Leucaena leucocephala) leaf meal as supplements to soybean and fish meal in the diet of juvenile monosex tilapia (Oreochromis niloticus)

    Get PDF
    Among plant protein ingredients,ipil ipil (Leucaena leucocephala) leafmeal (ILLM) is considered the most nutritive plant protein source after soybean meal in aquatic feeds. That was proven in a 21-day experiment conducted to assess the response of juvenile Monosex Nile tilapia Oreochromis niloticus with four iso-nitrogenous formulated diets: One control diet was formulated based on fishmeal, one on soybean meal and one on rice bran, ipil ipil leafmeal was also included in experimental diets

    Microcanonical Simulation of Complex Actions: The Wess Zumino Witten Case

    Get PDF
    We present the main results of our microcanonical simulation of the Wess Zumino Witten action functional. This action, being highly non-trivial and capable of exhibiting many different phase transitions, is chosen to be representative of general complex actions. We verify the applicability of microcanonical simulation by successfully obtaining two of the many critical points of the Wess Zumino Witten action. The microcanonical algorithm has the additional advantage of exhibiting critical behaviour for a small 8×88\times 8 lattice. We also briefly discuss the subtleties that, in general, arise in simulating a complex action. Our algorithm for complex actions can be extended to the study of D-branes in the Wess Zumino Witten action.Comment: 5 figure

    Quantum Mechanics, Path Integrals and Option Pricing: Reducing the Complexity of Finance

    Full text link
    Quantum Finance represents the synthesis of the techniques of quantum theory (quantum mechanics and quantum field theory) to theoretical and applied finance. After a brief overview of the connection between these fields, we illustrate some of the methods of lattice simulations of path integrals for the pricing of options. The ideas are sketched out for simple models, such as the Black-Scholes model, where analytical and numerical results are compared. Application of the method to nonlinear systems is also briefly overviewed. More general models, for exotic or path-dependent options are discussed.Comment: 10 pages, 4 figures, presented by C.Coriano at the Intl. Workshop "Nonlinear Physics, THeory and Experiment II", Gallipoli, Lecce, June 28-July 6, 200

    Geographic Determinants of Hi-Tech Employment Growth in U.S. Counties

    Get PDF
    This paper examines the spatial pattern of U.S. county employment growth in high-tech industries. The spatial growth dimensions examined include industry cluster effects, urbanization effects, proximity to a college, and proximity in the urban hierarchy. Growth is examined for overall high-tech employment and for employment in various high-tech sectors. Econometric analyses are conducted for a sample of all counties and for metropolitan and non-metropolitan counties separately. Among our primary findings, we do not find evidence of positive localization or cluster growth effects, generally finding negative growth effects. We instead find some evidence of positive urbanization effects and growth penalties for greater distances from larger urban areas.
    corecore