463 research outputs found
Countercyclical taxation and price dispersion
In this paper, we explore the benefits from a supply-side oriented fiscal tax policy within the framework of a New Keynesian DSGE model. We show that countercyclical tax rules, which are contingent on the observed welfare gap or on the cost-push shock and levied on value added, remarkably reduce the adverse impact of cost-push shocks on welfare. We state that the tax rule establishes a path for the evolution of marginal cost at the firm level that largely prevents built up of price dispersion. We highlight that this tax policy is also effective under a balancedbudget regime. Hence, fiscal policy can disencumber monetary policy in the light of cost-push shocks. --Countercyclical fiscal policy,welfare costs,nominal rigidities
Countercyclical Taxation and Price Dispersion
In this paper, we explore the benefits from a supply-side oriented fiscal tax policy within the framework of a New Keynesian DSGE model. We show that countercyclical tax rules, which are contingent on the observed welfare gap or alternatively on the markup shock and levied on value added, reduce remarkably the inverse impact of cost push shocks. We state that the tax rule establishes a path for the evolution of marginal cost at the firm level that largely prevents built up of price dispersion. We highlight that this tax policy is also effective under a balancedbudget regime. Hence, fiscal policy can disencumber monetary policy in the light of cost push shocks.Countercyclical fiscal policy, welfare costs, nominal rigidities
A Customizable Speech Practice Application for People Who Stutter
Stuttering is a speech impediment that often requires speech therapy to curb the symptoms. In speech therapy, people who stutter (PWS) learn techniques that they can use to improve their fluency. PWS often practice their techniques extensively in order to maintain fluent speech. Many listen to audio recordings to practice where a single word or sentence is played on the recording and then there is a pause, giving the user a chance to say the word(s) to practice. This style of practice is not customizable and is repetitive since the contents do not change. Thus, we have developed an application for iPhone that uses a text-to-speech API to read single words and sentences to PWS, so that they can practice their techniques. Each practice mode is customizable in that the user can choose to practice certain sounds that they struggle with, and the app will respond by choosing words that start with the desired sound or generate sentences that contain several words that start with the desired sound. We generate sentences in two ways: an AI approach using recurrent neural networks and a “fill-in-the-blank” approach. When generating sentences, the goal is that the sentences are relatively short and contain simple words, so that the user does not struggle to repeat the word or sentence
Context-aware Security for Vehicles and Fleets: A Survey
Vehicles are becoming increasingly intelligent and connected. Interfaces for communication with the vehicle, such as WiFi and 5G, enable seamless integration into the user’s life, but also cyber attacks on the vehicle. Therefore, research is working on in-vehicle countermeasures such as authentication, access controls, or intrusion detection. Recently, legal regulations have also become effective that require automobile manufacturers to set up a monitoring system for fleet-wide security analysis. The growing amount of software, networking, and the automation of driving create new challenges for security. Context-awareness, situational understanding, adaptive security, and threat intelligence are necessary to cope with these ever-increasing risks. In-vehicle security should be adaptive to secure the car in an infinite number of (driving) situations. For fleet-wide analysis and alert triage, knowledge and understanding of the circumstances are required. Context-awareness, nonetheless, has been sparsely considered in the field of vehicle security. This work aims to be a precursor to context-aware, adaptive and intelligent security for vehicles and fleets. To this end, we provide a comprehensive literature review that analyzes the vehicular as well as related domains. Our survey is mainly characterized by the detailed analysis of the context information that is relevant for vehicle security in the future
Generic Patterns for Intrusion Detection Systems in Service-Oriented Automotive and Medical Architectures
To implement new software functions and more flexible updates in the future as well as to provide cloud-based functionality, the service-oriented architecture (SOA) paradigm is increasingly being integrated into automotive electrical and electronic architecture (E/E architectures). In addition to the automotive industry, the medical industry is also researching SOA-based solutions to increase the interoperability of devices (vendor-independent). The resulting service-oriented communication is no longer fully specified during design time, which affects information security measures. In this paper, we compare different SOA protocols for the automotive and medical fields. Furthermore, we explain the underlying communication patterns and derive features for the development of an SOA-based Intrusion Detection System (IDS)
An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures
New requirements from the customers\u27 and manufacturers\u27 point of view such as adding new software functions during the product life cycle require a transformed architecture design for future vehicles. The paradigm of signal-oriented communication established for many years will increasingly be replaced by service-oriented approaches in order to increase the update and upgrade capability. In this article, we provide an overview of current protocols and communication patterns for automotive architectures based on the service-oriented architecture (SOA) paradigm and compare them with signal-oriented approaches. Resulting challenges and opportunities of SOAs with respect to information security are outlined and discussed. For this purpose, we explain different security countermeasures and present a state of the section of automotive approaches in the fields of firewalls, Intrusion Detection Systems (IDSs) and Identity and Access Management (IAM). Our final discussion is based on an exemplary hybrid architecture (signal- and service-oriented) and examines the adaptation of existing security measures as well as their specific security features
Energy levels and their correlations in quasicrystals
Quasicrystals can be considered, from the point of view of their electronic
properties, as being intermediate between metals and insulators. For example,
experiments show that quasicrystalline alloys such as AlCuFe or AlPdMn have
conductivities far smaller than those of the metals that these alloys are
composed from. Wave functions in a quasicrystal are typically intermediate in
character between the extended states of a crystal and the exponentially
localized states in the insulating phase, and this is also reflected in the
energy spectrum and the density of states. In the theoretical studies we
consider in this review, the quasicrystals are described by a pure hopping
tight binding model on simple tilings. We focus on spectral properties, which
we compare with those of other complex systems, in particular, the Anderson
model of a disordered metal.Comment: 15 pages including 19 figures. Review article, submitted to Phil. Ma
Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle
Due to the ongoing legislative shift towards mandatedcybersecurity for road vehicles, the automotive cybersecurityengineering standard ISO/SAE 21434 is seeing fastadoption throughout the industry. Early efforts are focusing onthreat analysis and risk assessment (TARA) in the concept anddevelopment phases, exposing the challenge of managing TARAresults coherently throughout the supply chain and life cycle.While the industry focuses on TARA, other aspects such asvulnerability or incident handling are receiving less attention.However, the increasing threat landscape makes these processesincreasingly important, posing another industry challenge.In order to better address these two challenges, we analyzethe cybersecurity engineering framework of ISO/SAE 21434for gaps or deficiencies regarding TARA management andvulnerability and incident handling, as well as similar processesfor incident handling in IT security. The result is a proposalfor modifications and augmentations of the ISO/SAE 21434cybersecurity engineering framework. In particular, we proposea TARA management process to facilitate the coordination andinformation exchange between different systems and life cyclephases, and we propose improvements to the vulnerability andincident handling processes in ISO/SAE 21434 so that they aremore aligned with established standards. This amounts to 13new terminology definitions, 4 new process steps, 2 modifiedprocess steps and 1 entirely new process
Century-scale paleoclimatic reconstruction from Moon Lake, a closed-basin lake in the northern Great Plains
Estimates of past lake-water salinity from fossil diatom assemblages were used to infer past climatic conditions at Moon Lake, a climatically sensitive site in the northern Great Plains. A good correspondence between diatom-inferred salinity and historical records of mean annual precipitation minus evapotranspiration (P - ET) strongly suggests that the sedimentary record from Moon Lake can be used to reconstruct past climatic conditions. Century-scale analysis of the Holocene diatom record indicates four major hydrological periods: an early Holocene transition from an open freshwater system to a closed saline system by 7300 B.P., which corresponds with a transition from spruce forest to deciduous parkland to prairie and indicates a major shift from wet to dry climate; a mid-Holocene period of high salinity from 7300 to 4700 B.P., indicating low effective moisture (P - ET); a transitional period of high salinity from 4700 to 2200 B.P., characterized by poor diatom preservation; and a late Holocene period of variable lower salinity during the past 2,200 yr, indicating fluctuations in effective moisture
- …