29,993 research outputs found

    Secure agent data integrity shield

    Get PDF
    In the rapidly expanding field of E-Commerce, mobile agent is the emerging technology that addresses the requirement of intelligent filtering/processing of information. This paper will address the area of mobile agent data integrity protection. We propose the use of Secure Agent Data Integrity Shield (SADIS) as a scheme that protects the integrity of data collected during agent roaming. With the use of a key seed negotiation protocol and integrity protection protocol, SADIS protects the secrecy as well as the integrity of agent data. Any illegal data modification, deletion, or insertion can be detected either by the subsequent host or the agent butler. Most important of all, the identity of each malicious host can be established. To evaluate the feasibility of our design, a prototype has been developed using Java. The result of benchmarking shows improvement both in terms of data and time efficiency

    SAFE: Secure-Roaming Agents for E-commerce

    Get PDF
    The development of the Internet has made a powerful impact on the concept of commerce. E-commerce, a new way to conduct business, is gaining more and more popularity. Despite its rapid growth, there are limitations that hinder the expansion of e-commerce. The primary concern for most people when talking about on-line shopping is security. Due to the open nature of the Internet, personal financial details necessary for on-line shopping can be stolen if sufficient security mechanism is not put in place. How to provide the necessary assurance of security to consumers remains a question mark despite various past efforts. Another concern is the lack of intelligence. The Internet is an ocean of information depository. It is rich in content but lacks the necessary intelligent tools to help one locate the correct piece of information. Intelligent agent, a piece of software that can act on behalf of its owner intelligently, is designed to fill this gap. However, no matter how intelligent an agent is, if it remains on its owner’s machine and does not have any roaming capability, its functionality is limited. With the roaming capability, more security concerns arise. In response to these concerns, SAFE, Secure roaming Agent For E-commerce, is designed to provide secure roaming capability to intelligent agents

    Earnings Management and Long-Run Stock Underperformance of Private Placements

    Get PDF
    The study investigates whether private placement issuers manipulate their earnings around the time of issuance and the effect of earnings management on the long-run stock performance. We find that managers of U.S. private placement issuers tend to engage in income-increasing earnings management in the year prior to the issuance of private placements. We further speculate that earnings management serves as a likely source of investor over-optimism at the time of private placements. To support this speculation, we find evidence suggesting that the income-increasing accounting accruals made at the time of private placements predict the post-issue long-term stock underperformance. The study contributes to the large body of literature on earnings manipulation around the time of securities issuance

    Universal Properties of Fermi Gases in One-dimension

    Get PDF
    In this Rapid Communication, we investigate the universal properties of a spin-polarized two-component Fermi gas in one dimension (1D) using Bethe ansatz. We discuss the quantum phases and phase transitions by obtaining exact results for the equation of state, the contact, the magnetic susceptibility and the contact susceptibility, giving a precise understanding of the 1D analogue of the Bose-Einstein condensation and Bardeen-Cooper-Schrieffer crossover in three dimension (3D) and the associated universal magnetic properties. In particular, we obtain the exact form of the magnetic susceptibility χ1/Texp(Δ/T)\chi \sim {1}/{\sqrt{T}}\exp(-\Delta/T) at low temperatures, where Δ\Delta is the energy gap and TT is the temperature. Moreover, we establish exact upper and lower bounds for the relation between polarization PP and the contact CC for both repulsive and attractive Fermi gases. Our findings emphasize the role of the pair fluctuations in strongly interacting 1D fermion systems that can shed light on higher dimensions.Comment: 4 figures, the main pape

    Dynamic Resource Allocation for Multiple-Antenna Wireless Power Transfer

    Full text link
    We consider a point-to-point multiple-input-single-output (MISO) system where a receiver harvests energy from a wireless power transmitter to power itself for various applications. The transmitter performs energy beamforming by using an instantaneous channel state information (CSI). The CSI is estimated at the receiver by training via a preamble, and fed back to the transmitter. The channel estimate is more accurate when longer preamble is used, but less time is left for wireless power transfer before the channel changes. To maximize the harvested energy, in this paper, we address the key challenge of balancing the time resource used for channel estimation and wireless power transfer (WPT), and also investigate the allocation of energy resource used for wireless power transfer. First, we consider the general scenario where the preamble length is allowed to vary dynamically. Taking into account the effects of imperfect CSI, the optimal preamble length is obtained online by solving a dynamic programming (DP) problem. The solution is shown to be a threshold-type policy that depends only on the channel estimate power. Next, we consider the scenario in which the preamble length is fixed. The optimal preamble length is optimized offline. Furthermore, we derive the optimal power allocation schemes for both scenarios. For the scenario of dynamic-length preamble, the power is allocated according to both the optimal preamble length and the channel estimate power; while for the scenario of fixed-length preamble, the power is allocated according to only the channel estimate power. The analysis results are validated by numerical simulations. Encouragingly, with optimal power allocation, the harvested energy by using optimized fixed-length preamble is almost the same as the harvested energy by employing dynamic-length preamble, hence allowing a low-complexity WPT system to be implemented in practice.Comment: 30 pages, 6 figures, Submitted to the IEEE Transactions on Signal Processin
    corecore