463 research outputs found

    Countercyclical taxation and price dispersion

    Get PDF
    In this paper, we explore the benefits from a supply-side oriented fiscal tax policy within the framework of a New Keynesian DSGE model. We show that countercyclical tax rules, which are contingent on the observed welfare gap or on the cost-push shock and levied on value added, remarkably reduce the adverse impact of cost-push shocks on welfare. We state that the tax rule establishes a path for the evolution of marginal cost at the firm level that largely prevents built up of price dispersion. We highlight that this tax policy is also effective under a balancedbudget regime. Hence, fiscal policy can disencumber monetary policy in the light of cost-push shocks. --Countercyclical fiscal policy,welfare costs,nominal rigidities

    Countercyclical Taxation and Price Dispersion

    Get PDF
    In this paper, we explore the benefits from a supply-side oriented fiscal tax policy within the framework of a New Keynesian DSGE model. We show that countercyclical tax rules, which are contingent on the observed welfare gap or alternatively on the markup shock and levied on value added, reduce remarkably the inverse impact of cost push shocks. We state that the tax rule establishes a path for the evolution of marginal cost at the firm level that largely prevents built up of price dispersion. We highlight that this tax policy is also effective under a balancedbudget regime. Hence, fiscal policy can disencumber monetary policy in the light of cost push shocks.Countercyclical fiscal policy, welfare costs, nominal rigidities

    A Customizable Speech Practice Application for People Who Stutter

    Get PDF
    Stuttering is a speech impediment that often requires speech therapy to curb the symptoms. In speech therapy, people who stutter (PWS) learn techniques that they can use to improve their fluency. PWS often practice their techniques extensively in order to maintain fluent speech. Many listen to audio recordings to practice where a single word or sentence is played on the recording and then there is a pause, giving the user a chance to say the word(s) to practice. This style of practice is not customizable and is repetitive since the contents do not change. Thus, we have developed an application for iPhone that uses a text-to-speech API to read single words and sentences to PWS, so that they can practice their techniques. Each practice mode is customizable in that the user can choose to practice certain sounds that they struggle with, and the app will respond by choosing words that start with the desired sound or generate sentences that contain several words that start with the desired sound. We generate sentences in two ways: an AI approach using recurrent neural networks and a “fill-in-the-blank” approach. When generating sentences, the goal is that the sentences are relatively short and contain simple words, so that the user does not struggle to repeat the word or sentence

    Context-aware Security for Vehicles and Fleets: A Survey

    Get PDF
    Vehicles are becoming increasingly intelligent and connected. Interfaces for communication with the vehicle, such as WiFi and 5G, enable seamless integration into the user’s life, but also cyber attacks on the vehicle. Therefore, research is working on in-vehicle countermeasures such as authentication, access controls, or intrusion detection. Recently, legal regulations have also become effective that require automobile manufacturers to set up a monitoring system for fleet-wide security analysis. The growing amount of software, networking, and the automation of driving create new challenges for security. Context-awareness, situational understanding, adaptive security, and threat intelligence are necessary to cope with these ever-increasing risks. In-vehicle security should be adaptive to secure the car in an infinite number of (driving) situations. For fleet-wide analysis and alert triage, knowledge and understanding of the circumstances are required. Context-awareness, nonetheless, has been sparsely considered in the field of vehicle security. This work aims to be a precursor to context-aware, adaptive and intelligent security for vehicles and fleets. To this end, we provide a comprehensive literature review that analyzes the vehicular as well as related domains. Our survey is mainly characterized by the detailed analysis of the context information that is relevant for vehicle security in the future

    Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures

    Get PDF
    To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic architecture (E/E architectures). In addition to the automotive industry, the medical industry is also researching SOA-based solutions to increase the interoperability of devices (vendor-independent). The resulting service-oriented communication is no longer fully specified during design time, which affects information security measures. In this paper, we compare different SOA protocols for the automotive and medical fields. Furthermore, we explain the underlying communication patterns and derive features for the development of an SOA-based Intrusion Detection System (IDS)

    An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures

    Get PDF
    New requirements from the customers\u27 and manufacturers\u27 point of view such as adding new software functions during the product life cycle require a transformed architecture design for future vehicles. The paradigm of signal-oriented communication established for many years will increasingly be replaced by service-oriented approaches in order to increase the update and upgrade capability. In this article, we provide an overview of current protocols and communication patterns for automotive architectures based on the service-oriented architecture (SOA) paradigm and compare them with signal-oriented approaches. Resulting challenges and opportunities of SOAs with respect to information security are outlined and discussed. For this purpose, we explain different security countermeasures and present a state of the section of automotive approaches in the fields of firewalls, Intrusion Detection Systems (IDSs) and Identity and Access Management (IAM). Our final discussion is based on an exemplary hybrid architecture (signal- and service-oriented) and examines the adaptation of existing security measures as well as their specific security features

    Energy levels and their correlations in quasicrystals

    Full text link
    Quasicrystals can be considered, from the point of view of their electronic properties, as being intermediate between metals and insulators. For example, experiments show that quasicrystalline alloys such as AlCuFe or AlPdMn have conductivities far smaller than those of the metals that these alloys are composed from. Wave functions in a quasicrystal are typically intermediate in character between the extended states of a crystal and the exponentially localized states in the insulating phase, and this is also reflected in the energy spectrum and the density of states. In the theoretical studies we consider in this review, the quasicrystals are described by a pure hopping tight binding model on simple tilings. We focus on spectral properties, which we compare with those of other complex systems, in particular, the Anderson model of a disordered metal.Comment: 15 pages including 19 figures. Review article, submitted to Phil. Ma

    Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle

    Get PDF
    Due to the ongoing legislative shift towards mandatedcybersecurity for road vehicles, the automotive cybersecurityengineering standard ISO/SAE 21434 is seeing fastadoption throughout the industry. Early efforts are focusing onthreat analysis and risk assessment (TARA) in the concept anddevelopment phases, exposing the challenge of managing TARAresults coherently throughout the supply chain and life cycle.While the industry focuses on TARA, other aspects such asvulnerability or incident handling are receiving less attention.However, the increasing threat landscape makes these processesincreasingly important, posing another industry challenge.In order to better address these two challenges, we analyzethe cybersecurity engineering framework of ISO/SAE 21434for gaps or deficiencies regarding TARA management andvulnerability and incident handling, as well as similar processesfor incident handling in IT security. The result is a proposalfor modifications and augmentations of the ISO/SAE 21434cybersecurity engineering framework. In particular, we proposea TARA management process to facilitate the coordination andinformation exchange between different systems and life cyclephases, and we propose improvements to the vulnerability andincident handling processes in ISO/SAE 21434 so that they aremore aligned with established standards. This amounts to 13new terminology definitions, 4 new process steps, 2 modifiedprocess steps and 1 entirely new process

    Century-scale paleoclimatic reconstruction from Moon Lake, a closed-basin lake in the northern Great Plains

    Get PDF
    Estimates of past lake-water salinity from fossil diatom assemblages were used to infer past climatic conditions at Moon Lake, a climatically sensitive site in the northern Great Plains. A good correspondence between diatom-inferred salinity and historical records of mean annual precipitation minus evapotranspiration (P - ET) strongly suggests that the sedimentary record from Moon Lake can be used to reconstruct past climatic conditions. Century-scale analysis of the Holocene diatom record indicates four major hydrological periods: an early Holocene transition from an open freshwater system to a closed saline system by 7300 B.P., which corresponds with a transition from spruce forest to deciduous parkland to prairie and indicates a major shift from wet to dry climate; a mid-Holocene period of high salinity from 7300 to 4700 B.P., indicating low effective moisture (P - ET); a transitional period of high salinity from 4700 to 2200 B.P., characterized by poor diatom preservation; and a late Holocene period of variable lower salinity during the past 2,200 yr, indicating fluctuations in effective moisture
    • …
    corecore