14,691 research outputs found
Efficiency of the foreign exchange markets in South Asian Countries
This paper examines the weak form efficiency of the foreign exchange markets in seven SAARC countries using monthly return series for each of these markets over a period of 21 years (1985-2005). We applied a battery of unit root tests and variance ratio tests (individual and multiple) to see whether the return series (and also, the raw data) follow random walk process. Our results suggest that the increments of the return series are not serially correlated. Therefore, we conclude that foreign exchange markets in SAARC countries are weak form efficient.
Fungi - an Amalgam of Toxins and Antibiotics: a Mini- Review
Fungi are eukaryotes with many functions. Earlier, fungi were classified in the plant kingdom but were later classified as a separate kingdom due to their unique cell walls. Fungi are heterotrophs like animals and are more closely related to animals. The perception of fungi is inconspicuous due to their small sizes and their ability to grow symbiotically in plants, animals, other fungi, and parasites. Fungi are used for their nutrition, fermentation potential, and bactericidal potential. However, fungi are also toxic due to certain bioactive compounds known as mycotoxins. Candida and Aspergillus are invasive species that contribute to a high percentage of mycoses in oncological and haematological patients. The mortality rate due to invasive aspergillosis and candidiasis is high, at 4% and 2%, respectively. In the agriculture sector, a significant contributor to damage to crops globally is the invasion of filamentous fungi. Fungi invasion destroys over 125 million tons of wheat, rice, soybeans, potatoes, and maize annually. If prevented, 600 million people may be fed. Therefore, it is vital to consider the dual role of fungi, therapeutic, and pathogenic
Governance and institutional changes in fisheries : issues and priorities for research
Policy, Fishery policy, Cambodia, Bangladesh, Philippines, Malawi, Mozambique,
Analyzing Energy-efficiency and Route-selection of Multi-level Hierarchal Routing Protocols in WSNs
The advent and development in the field of Wireless Sensor Networks (WSNs) in
recent years has seen the growth of extremely small and low-cost sensors that
possess sensing, signal processing and wireless communication capabilities.
These sensors can be expended at a much lower cost and are capable of detecting
conditions such as temperature, sound, security or any other system. A good
protocol design should be able to scale well both in energy heterogeneous and
homogeneous environment, meet the demands of different application scenarios
and guarantee reliability. On this basis, we have compared six different
protocols of different scenarios which are presenting their own schemes of
energy minimizing, clustering and route selection in order to have more
effective communication. This research is motivated to have an insight that
which of the under consideration protocols suit well in which application and
can be a guide-line for the design of a more robust and efficient protocol.
MATLAB simulations are performed to analyze and compare the performance of
LEACH, multi-level hierarchal LEACH and multihop LEACH.Comment: NGWMN with 7th IEEE Inter- national Conference on Broadband and
Wireless Computing, Communication and Applications (BWCCA 2012), Victoria,
Canada, 201
MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks
Flawed authentication protocols led to the need for a secured protocol for radio frequency identification (RFID) techniques. In this paper, an authentication protocol named Modified ultralightweight mutual authentication protocol (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The proposed protocol aimed to reduce memory requirements in the authentication process for low-cost RFID tags with limited resources. Lightweight operations like XOR and Left Rotation, are used to circumvent the flaws made in the other protocols. The proposed protocol has three-phase of authentication. Security analysis of the proposed protocol proves its resistivity against attacks like desynchronization, disclosure, tracking, and replay attack. On the other hand, performance analysis indicates that it is an effective protocol to use in low-cost RFID tags. Juel-Weis challenge verifies the proposed protocol where it shows insusceptibility against modular operations
Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric
Biometric techniques are often used as an extra security factor in
authenticating human users. Numerous biometrics have been proposed and
evaluated, each with its own set of benefits and pitfalls. Static biometrics
(such as fingerprints) are geared for discrete operation, to identify users,
which typically involves some user burden. Meanwhile, behavioral biometrics
(such as keystroke dynamics) are well suited for continuous, and sometimes more
unobtrusive, operation. One important application domain for biometrics is
deauthentication, a means of quickly detecting absence of a previously
authenticated user and immediately terminating that user's active secure
sessions. Deauthentication is crucial for mitigating so called Lunchtime
Attacks, whereby an insider adversary takes over (before any inactivity timeout
kicks in) authenticated state of a careless user who walks away from her
computer. Motivated primarily by the need for an unobtrusive and continuous
biometric to support effective deauthentication, we introduce PoPa, a new
hybrid biometric based on a human user's seated posture pattern. PoPa captures
a unique combination of physiological and behavioral traits. We describe a low
cost fully functioning prototype that involves an office chair instrumented
with 16 tiny pressure sensors. We also explore (via user experiments) how PoPa
can be used in a typical workplace to provide continuous authentication (and
deauthentication) of users. We experimentally assess viability of PoPa in terms
of uniqueness by collecting and evaluating posture patterns of a cohort of
users. Results show that PoPa exhibits very low false positive, and even lower
false negative, rates. In particular, users can be identified with, on average,
91.0% accuracy. Finally, we compare pros and cons of PoPa with those of several
prominent biometric based deauthentication techniques
- …