2,057 research outputs found

    Optimal Banking Sector Recapitalization

    Get PDF
    Government-financed bank restructuring programs, occasionally costing up to 50% of GDP, are commonly used to resolve banking crises. We analyze the Ramsey-optimal paths of bank recapitalization programs that weigh recapitalization benefits and costs under different financing options. In our model bank credit is essential, due to a working capital constraint on firms, and banks are financial intermediaries that borrow from households and lend to firms. A banking crisis produces a disruption of credit and a fall in output equivalent to those in developing countries affected by banking crises. Full recapitalization of the banking system immediately after the crisis is optimal only if international credit is available. One-shot recapitalization is not optimal with domestically-financed programs, even if the government has access to non-distortionary taxes. The welfare cost of a crisis is substantial: the equivalent permanent decline in the no-crisis steady state consumption ranges between 0.51% and 0.65%, depending on the source of financing the recapitalization program.financial intermediation; bank recapitalization; banking crises; banking capital

    Lightweight and privacy-preserving two-factor authentication scheme for IoT devices

    Get PDF
    Device authentication is an essential security feature for Internet of Things (IoT). Many IoT devices are deployed in the open and public places, which makes them vulnerable to physical and cloning attacks. Therefore, any authentication protocol designed for IoT devices should be robust even in cases when an IoT device is captured by an adversary. Moreover, many of the IoT devices have limited storage and computational capabilities. Hence, it is desirable that the security solutions for IoT devices should be computationally efficient. To address all these requirements, in this paper, we present a lightweight and privacy-preserving two-factor authentication scheme for IoT devices, where physically uncloneable functions have been considered as one of the authentication factors. Security and performance analysis show that our proposed scheme is not only robust against several attacks, but also very efficient in terms of computational efficiently

    An efficient privacy-preserving authentication scheme for energy internet-based vehicle-to-grid communication

    Get PDF
    The energy Internet (EI) represents a new electric grid infrastructure that uses computing and communication to transform legacy power grids into systems that support open innovation. EI provides bidirectional communication for analysis and improvement of energy usage between service providers and customers. To ensure a secure, reliable, and efficient operation, the EI should be protected from cyber attacks. Thus, secure and efficient key establishment is an important issue for this Internet-based smart grid environment. In this paper, we propose an efficient privacy-preserving authentication scheme for EI-based vehicle-to-grid communication using lightweight cryptographic primitives such as one-way non-collision hash functions. In our proposed scheme, a customer can securely access services provided by the service provider using a symmetric key established between them. Detailed security and performance analysis of our proposed scheme are presented to show that it is resilient against many security attacks, cost effective in computation and communication, and provides an efficient solution for the EI

    Optimal banking sector recapitalization

    Get PDF
    Government-financed bank restructuring programs, occasionally costing up to 50% of GDP, are commonly used to resolve banking crises. We analyze the Ramsey-optimal paths of bank recapitalization programs that weigh recapitalization benefits and costs under different financing options. In our model bank credit is essential, due to a working capital constraint on firms, and banks are financial intermediaries that borrow from households and lend to firms. A banking crisis produces a disruption of credit and a fall in output equivalent to those in developing countries affected by banking crises. Full recapitalization of the banking system immediately after the crisis is optimal only if international credit is available. One-shot recapitalization is not optimal with domestically-financed programs, even if the government has access to non-distortionary taxes. The welfare cost of a crisis is substantial: the equivalent permanent decline in the no-crisis steady state consumption ranges between 0.51% and 0.65%, depending on the source of financing the recapitalization program

    Investigation and Control of Narayanbagar Landslide, District Chamoli, Uttaranchal, India – A Case Study

    Get PDF
    Incidences of landslide hazards are quite common in the hilly terrain of Himalayas. These landslides not only damage the hill slopes causing enormous loss of slope forming materials but also become responsible for creating frequent disturbances to the moving traffics on hill roads and consequent adverse socio-economic impacts to the communities. As road communication system is the only lifeline for the people residing in the hilly terrain of Himalayas, detailed scientific study of landslide-affected area is , therefore, very much essential to overcome all sorts of geo-environmental and socio-economic problems created by the landslide. Numbers of landslides have already occurred along the stretch of the hill slope adjoining the Almora – Baijnath – Gowaldam – Karanprayag (A-BG- K) State Highway, located in Uttaranchal, in India. The present paper deals with such a problematic Narayanbagar Landslide at 129 km on this Highway. This landslide affected area is situated within the vicinity of Narayanbagar town on the left bank of River Pinder. This is the only road, which connects the two Commissionaires (Garhawal and Kumaun) of Uttaranchal State. Because of the present existing situation of Narayanbagar, which is lying very close to the boundary of Almora and Berinag Nappe, the geology has played a very important major role in creating slope instability in this area. Both geological and geo-technical studies have, therefore, been carried out with a view to understand the cause and mechanism of failure of the hill slope materials and to suggest the best possible suitable remedial measures to stabilize the Narayanbagar landslide affected area

    An efficient privacy-preserving authenticated key agreement scheme for edge-assisted internet of drones

    Get PDF
    There has been a a significant increase in the popularity of using Unmanned Aerial Vehicles (UAVs), popularly known as drones, in several applications. In many application scenarios, UAVs are deployed in missions where sensitive data is collected, such as monitoring critical infrastructure, industrial facilities, crops, and public safety. Due to the sensitive and/or safety critical nature of the data collected in these applications, it is imperative to consider the security and privacy aspects of the UAVs used in these scenarios. In this article, we propose an efficient privacy aware authentication scheme for edge-assisted UAVs (Internet of Drones). Unlike the existing security solutions for UAV, our proposed scheme does not require to store any secret key in the devices but still can ensure the desired security level. To the best of our knowledge, this is the first article, where physical security of the UAV has taken into account. The proposed system allows third-party communication and mobile edge computing service provides to authenticate the UAVs without any loss of provacy and outperforms existing methods in terms of computational complexity

    Structural sparsity of complex networks: bounded expansion in random models and real-world graphs

    Get PDF
    This research establishes that many real-world networks exhibit bounded expansion, a strong notion of structural sparsity, and demonstrates that it can be leveraged to design efficient algorithms for network analysis. Specifically, we give a new linear-time fpt algorithm for motif counting and linear time algorithms to compute localized variants of several centrality measures. To establish structural sparsity in real-world networks, we analyze several common network models regarding their structural sparsity. We show that, with high probability, (1) graphs sampled with a prescribed sparse degree sequence; (2) perturbed bounded-degree graphs; (3) stochastic block models with small probabilities; result in graphs of bounded expansion. In contrast, we show that the Kleinberg and the Barabási–Albert model have unbounded expansion. We support our findings with empirical measurements on a corpus of real-world networks

    RP-HPLC method development and validation for the estimation of antifungal drug terbinafine HCL in bulk and pharmaceutical dosage form

    Get PDF
    In the present work RP-HPLC method has been developed for the quantitative estimation of Terbinafine hydrochloride in bulk drug and pharmaceutical formulations. A rapid and sensitive RP-HPLC Method with PDA detection (220 nm) for routine analysis of in Bulk drug and Pharmaceutical formulation was developed. Chromatography was performed with mobile phase containing a mixture of Potassium dihydrogen phosphate and Acetonitrile (65:35 v/v) with flow rate 1.5 ml/min. The linearity was found to be in the range of 50-150 µg/ml with (r2=0.999). The proposed method was validated by determining sensitivity, accuracy, precision, LOD, LOQ and system suitability parameters according to ICH guidrelines
    • …
    corecore