14,086 research outputs found

    Efficiency of the foreign exchange markets in South Asian Countries

    Get PDF
    This paper examines the weak form efficiency of the foreign exchange markets in seven SAARC countries using monthly return series for each of these markets over a period of 21 years (1985-2005). We applied a battery of unit root tests and variance ratio tests (individual and multiple) to see whether the return series (and also, the raw data) follow random walk process. Our results suggest that the increments of the return series are not serially correlated. Therefore, we conclude that foreign exchange markets in SAARC countries are weak form efficient.

    Fungi - an Amalgam of Toxins and Antibiotics: a Mini- Review

    Full text link
    Fungi are eukaryotes with many functions. Earlier, fungi were classified in the plant kingdom but were later classified as a separate kingdom due to their unique cell walls. Fungi are heterotrophs like animals and are more closely related to animals. The perception of fungi is inconspicuous due to their small sizes and their ability to grow symbiotically in plants, animals, other fungi, and parasites. Fungi are used for their nutrition, fermentation potential, and bactericidal potential. However, fungi are also toxic due to certain bioactive compounds known as mycotoxins. Candida and Aspergillus are invasive species that contribute to a high percentage of mycoses in oncological and haematological patients. The mortality rate due to invasive aspergillosis and candidiasis is high, at 4% and 2%, respectively. In the agriculture sector, a significant contributor to damage to crops globally is the invasion of filamentous fungi. Fungi invasion destroys over 125 million tons of wheat, rice, soybeans, potatoes, and maize annually. If prevented, 600 million people may be fed. Therefore, it is vital to consider the dual role of fungi, therapeutic, and pathogenic

    Governance and institutional changes in fisheries : issues and priorities for research

    Get PDF
    Policy, Fishery policy, Cambodia, Bangladesh, Philippines, Malawi, Mozambique,

    Analyzing Energy-efficiency and Route-selection of Multi-level Hierarchal Routing Protocols in WSNs

    Full text link
    The advent and development in the field of Wireless Sensor Networks (WSNs) in recent years has seen the growth of extremely small and low-cost sensors that possess sensing, signal processing and wireless communication capabilities. These sensors can be expended at a much lower cost and are capable of detecting conditions such as temperature, sound, security or any other system. A good protocol design should be able to scale well both in energy heterogeneous and homogeneous environment, meet the demands of different application scenarios and guarantee reliability. On this basis, we have compared six different protocols of different scenarios which are presenting their own schemes of energy minimizing, clustering and route selection in order to have more effective communication. This research is motivated to have an insight that which of the under consideration protocols suit well in which application and can be a guide-line for the design of a more robust and efficient protocol. MATLAB simulations are performed to analyze and compare the performance of LEACH, multi-level hierarchal LEACH and multihop LEACH.Comment: NGWMN with 7th IEEE Inter- national Conference on Broadband and Wireless Computing, Communication and Applications (BWCCA 2012), Victoria, Canada, 201

    MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks

    Get PDF
    Flawed authentication protocols led to the need for a secured protocol for radio frequency identification (RFID) techniques. In this paper, an authentication protocol named Modified ultralightweight mutual authentication protocol (MUMAP) has been proposed and cryptanalysed by Juel-Weis challenge. The proposed protocol aimed to reduce memory requirements in the authentication process for low-cost RFID tags with limited resources. Lightweight operations like XOR and Left Rotation, are used to circumvent the flaws made in the other protocols. The proposed protocol has three-phase of authentication. Security analysis of the proposed protocol proves its resistivity against attacks like desynchronization, disclosure, tracking, and replay attack. On the other hand, performance analysis indicates that it is an effective protocol to use in low-cost RFID tags. Juel-Weis challenge verifies the proposed protocol where it shows insusceptibility against modular operations

    Assentication: User Deauthentication and Lunchtime Attack Mitigation with Seated Posture Biometric

    Full text link
    Biometric techniques are often used as an extra security factor in authenticating human users. Numerous biometrics have been proposed and evaluated, each with its own set of benefits and pitfalls. Static biometrics (such as fingerprints) are geared for discrete operation, to identify users, which typically involves some user burden. Meanwhile, behavioral biometrics (such as keystroke dynamics) are well suited for continuous, and sometimes more unobtrusive, operation. One important application domain for biometrics is deauthentication, a means of quickly detecting absence of a previously authenticated user and immediately terminating that user's active secure sessions. Deauthentication is crucial for mitigating so called Lunchtime Attacks, whereby an insider adversary takes over (before any inactivity timeout kicks in) authenticated state of a careless user who walks away from her computer. Motivated primarily by the need for an unobtrusive and continuous biometric to support effective deauthentication, we introduce PoPa, a new hybrid biometric based on a human user's seated posture pattern. PoPa captures a unique combination of physiological and behavioral traits. We describe a low cost fully functioning prototype that involves an office chair instrumented with 16 tiny pressure sensors. We also explore (via user experiments) how PoPa can be used in a typical workplace to provide continuous authentication (and deauthentication) of users. We experimentally assess viability of PoPa in terms of uniqueness by collecting and evaluating posture patterns of a cohort of users. Results show that PoPa exhibits very low false positive, and even lower false negative, rates. In particular, users can be identified with, on average, 91.0% accuracy. Finally, we compare pros and cons of PoPa with those of several prominent biometric based deauthentication techniques
    corecore