1,356 research outputs found

    Modelling the US/A/A exchange rate using cointegration techniques

    Get PDF
    Recent evidence indicates that Australia's real effective exchange rate, its terms of trade and a long-term real interest rate differential form a cointegrating relationship. This paper uses this evidence to analyse the nominal US/A/A exchange rate. The US/A/A rate is found to be cointegrated with the terms of trade and relative price levels. However, interest rate differentials appear to add nothing to this long-run relationship. Estimated error correction models suggest that there is a substantial two-way relationship between nominal exchange rate changes and changes in the terms of trade. This evidence indicates that the small, open-economy assumption of exogenously given terms of trade may be inappropriate when modelling movements in the US/A/A exchange rate. Changes in a long-run interest rate differential, possibly reflecting differences in expected inflation rates, contribute significantly to an explanation of short-run changes in the nominal exchange rate.peer-reviewe

    Pulmonary Pathologies Following Inhalation of Multi-Walled Carbon Nanotubes at Occupational Levels

    Get PDF
    Multi-walled carbon nanotubes (MWCNT) are a nanomaterial that is growing in use and popularity. The health effects of occupational pulmonary exposure to MWCNT are currently unknown. The goals of this study were to build a dust generator capable of producing occupational levels of MWNCT and to examine pulmonary effects of occupational levels of inhaled dry MWCNT. We designed, built, and tested a dust generator capable of producing MWCNT concentrations in the occupational exposure range (25,000 to 50,000 particles/cm3). In a time course study, C57BL/6J male mice were exposed to either a dust of MWCNT at a daily average of approximately 37,000 particles/cm3 and a daily peak of about 50,000 particles/cm3 or to air alone. Six mice per group were exposed for 4 hours per day for 5 days a week for 2 weeks and sacrificed 1, 3, 7, 10, 14, 28, and 84 days post-exposure. In a strain comparison study DBA/2J and A/J mice underwent the same exposure and were sacrificed at 14 days post-exposure. For both studies bronchoalverlavage (BAL) fluid was collected to assess cellular profile and protein content. The right lung was used for collagen measurement. The left lung was used for histological evaluation. Total protein, a measure of lung permeability, did not change significantly after MWCNT exposure compared to air controls at any time point. Likewise, eosinophil and neutrophil cell counts were not significantly different between air and MWCNT-exposed mice. However, compared to air controls, MWCNT-exposed mice had increased numbers of total cells and macrophages at 28 days post exposure and increased monocytes from 10 to 14 days exposure. The presence of MWCNT was visually noted in BAL cell pellets, histology slides, and lung homogenate membrane pellets at all of the time points. Dark field microscopy showed MWCNT in BAL cells at all of the time points in MWCNT exposed mice. Collagen levels were not different between exposure groups at any time point. The strain comparison found that C57BL/6J mice had increases in monocytes an lymphocytes at 14 days post exposure and A/J mice showed a trend towards an increase in lung protein levels in MWCNT exposed mice at 14 days post exposure. MWCNT were visually detected in lung homogenate membrane pellets and in the histology slides from all strains. Although short-term inhalational exposure to occupationally relevant levels of dry dusts of MWCNTs did not elicit significant increases in measures of lung injury or fibrogenesis, increases in mononuclear cells and lack of particle clearance may indicate an altered host-defense capacity which could lead to disease with further particle accumulation or subsequent pathogen exposure.M.S

    The Relationship Between Money and Income in Thailand: Some Evidence for the 1980s Using a Cointegration Approach

    Get PDF
    This paper uses cointegration and vector auto regression techniques to examine which, if any, of the financial aggregates - the monetary base, M1, M2 or credit - is an appropriate intermediate target for the Thai monetary authorities. From the spectrum of monetary aggregates, M1 seems to be the best leading indicator of money income and the most suitable intermediate target. M1 was found to have a cointegrating relationship with nominal income in the long run and to Granger-cause nominal income in the short run. Overall, the results suggest that a higher weight should be attached to M1 than to other money/credit aggregates in the formulation and conduct of Thai monetary policy

    Two-factor authentication for voice assistance in digital banking using public cloud services

    Get PDF
    This paper presents the results of a project on using voice assistants to enable financial and commercial operations which require authentication with increased level of security. Several prototypes of authentication service with two-factor authentication for the purpose of voice-controlled digital banking and online payments have been developed at the Cyber Security Research Centre of London Metropolitan University. They utilize the power of the cloud technology and the attractiveness of the devices equipped with voice assistant software, such as Amazon Alexa, to provide secure method for two-factor authentication, which meets the recent standards for security of the operations in digital banking

    Intelligence graphs for threat intelligence and security policy validation of cyber systems

    Get PDF
    While the recent advances in Data Science and Machine Learning attract lots of attention in Cyber Security because of their promise for effective security analytics, Vulnerability Analysis, Risk Assessment and Security Policy Validation remain slightly aside. This is mainly due to the relatively slow progress in the theoretical formulation and the technologi-cal foundation of the cyber security concepts such as logical vulnerability, threats and risks. In this article we are proposing a framework for logical analysis, threat intelligence and validation of security policies in cyber systems. It is based on multi-level model, consisting of ontology of situations and actions under security threats, security policies governing the security-related activities, and graph of the transactions. The framework is validated using a set of scenarios describing the most common security threats in digital banking and a proto-type of an event-driven engine for navigation through the intelligence graphs has been im-plemented. Although the framework was developed specifically for application in digital banking, the authors believe that it has much wider applicability to security policy analysis, threat intelligence and security by design of cyber systems for financial, commercial and business operations

    Rapid Molecular Detection Methods for Arboviruses of Livestock of Importance to Northern Europe

    Get PDF
    Arthropod-borne viruses (arboviruses) have been responsible for some of the most explosive epidemics of emerging infectious diseases over the past decade. Their impact on both human and livestock populations has been dramatic. The early detection either through surveillance or diagnosis of virus will be a critical feature in responding and resolving the emergence of such epidemics in the future. Although some of the most important emerging arboviruses are human pathogens, this paper aims to highlight those diseases that primarily affect livestock, although many are zoonotic and some occasionally cause human mortality. This paper also highlights the molecular detection methods specific to each virus and identifies those emerging diseases for which a rapid detection methods are not yet developed

    High-resolution real-world electricity data from three microgrids in the global south

    Get PDF
    Microgrids are a promising solution for providing renewable electricity access to rural populations in the Global South. To ensure such renewable microgrids are affordable, careful planning and dimensioning are required. High-resolution data on electricity generation and consumption is necessary for optimal design. Unfortunately, real-world electricity data for microgrids in the Global South is scarce, and the limited data that is available has a low temporal resolution. Therefore, in this paper, we introduce a unique high-resolution real-world electricity data set from three micro-grids in the Democratic Republic of the Congo, Rwanda, and Haiti. The data has a temporal resolution of up to five seconds and focuses on microgrids with renewable generation from either hydropower or photovoltaic systems. Furthermore, we include data from both residential and industrial microgrids. We describe the recorded data and highlight the advantages of the high resolution. We demonstrate how this resolution offers insight into consumption patterns and enables the analysis of grid voltage and frequency, which is highly relevant for the planning and dimensioning of affordable renewable microgrids in the Global South

    High-Resolution Real-World Electricity Data from Three Microgrids in the Global South

    Get PDF
    Microgrids are a promising solution for providing renewable electricity access to rural populations in the Global South. To ensure such renewable microgrids are affordable, careful planning and dimensioning are required. High-resolution data on electricity generation and consumption is necessary for optimal design. Unfortunately, real-world electricity data for microgrids in the Global South is scarce, and the little data that is available has a low temporal resolution. Therefore, in this paper, we introduce a unique highresolution real-world electricity data set from three microgrids in the Democratic Republic of the Congo, Rwanda, and Haiti. The data has a temporal resolution of up to five seconds and focuses on microgrids with renewable generation from either hydropower or photovoltaic systems. Furthermore, we include data from both residential and industrial microgrids. We describe the recorded data and highlight the advantages of the high resolution. We demonstrate how this resolution offers insight into consumption patterns and enables the analysis of grid voltage and frequency, which is highly relevant for the planning and dimensioning of affordable renewable microgrids in the Global South

    Understanding the implementation and adoption of an information technology intervention to support medicine optimisation in primary care: qualitative study using strong structuration theory

    Get PDF
    Objectives: Using strong structuration theory, we aimed to understand the adoption and implementation of an electronic clinical audit and feedback tool to support medicine optimisation for patients in primary care. Design: This is a qualitative study informed by strong structuration theory. The analysis was thematic, using a template approach. An a priori set of thematic codes, based on strong structuration theory, was developed from the literature and applied to the transcripts. The coding template was then modified through successive readings of the data. Setting: Clinical commissioning group in the south of England. Participants: Four focus groups and five semi-structured interviews were conducted with 18 participants purposively sampled from a range of stakeholder groups (general practitioners, pharmacists, patients and commissioners). Results: Using the system could lead to improved medication safety, but use was determined by broad institutional contexts; by the perceptions, dispositions and skills of users; and by the structures embedded within the technology. These included perceptions of the system as new and requiring technical competence and skill; the adoption of the system for information gathering; and interactions and relationships that involved individual, shared or collective use. The dynamics between these external, internal and technological structures affected the adoption and implementation of the system. Conclusions: Successful implementation of information technology interventions for medicine optimisation will depend on a combination of the infrastructure within primary care, social structures embedded in the technology and the conventions, norms and dispositions of those utilising it. Future interventions, using electronic audit and feedback tools to improve medication safety, should consider the complexity of the social and organisational contexts and how internal and external structures can affect the use of the technology in order to support effective implementation

    Your password is music to my ears: cloud-based authentication using sound

    Get PDF
    This paper details the research in progress into identifying and addressing the threats faced by voice assistants and audio based digital systems. The popularity of these systems continues to grow as does the number of applications and scenarios they are used in. Smart speakers, smart home devices, mobile phones, telephone banking, and even vehicle controls all benefit from being able to be controlled to some extend by voice without diverting the attention of the user to a screen or having to use an input device such as a screen or keyboard. Whilst this removes barriers to use for those with accessibility challenges like visual impairment or motor skills issues and opens up a much more convenient user experience, a number of cyber security threats remain unanswered. This paper details a threat modeling exercise and suggests a model to address the key threats whilst retaining the usability associated with voice driven systems, by using an additional sound-based authentication factor
    corecore