12,081 research outputs found
Lending Cycles and Real Outcomes: Costs of Political Misalignment. LEQS Paper No. 139/2018 December 2018
We document a strong political cycle in bank credit and industry outcomes in Turkey.
In line with theories of tactical redistribution, state-owned banks systematically adjust
their lending around local elections compared with private banks in the same province
based on electoral competition and political alignment of incumbent mayors. This
effect only exists in corporate lending as opposed to consumer loans. It creates credit
constraints for firms in opposition areas, which suffer drops in employment and sales
but not firm entry. There is substantial misallocation of financial resources as
provinces and industries with high initial efficiency suffer the greatest constraints
Short Synthetic Terminators for Assembly of Transcription Units in vitro and Stable Chromosomal Integration in Yeast S. cerevisiae
The authors thank the assistance of the Iain Fraser Cytometry Centre at the University of Aberdeen. We also thank Claire MacGregor, Diane Massie and Yvonne Turnbull for technical assistance, Alexander Lorenz and Ryohei Sekido for critical reading of the manuscript and Richard Newton for preliminary results. This work was supported by Scottish Universities Life Sciences Alliance (SULSA).Peer reviewedPostprin
Dimensional Reduction, Seiberg--Witten Map and Supersymmetry
It is argued that dimensional reduction of Seiberg-Witten map for a gauge
field induces Seiberg-Witten maps for the other noncommutative fields of a
gauge invariant theory. We demonstrate this observation by dimensionally
reducing the noncommutative N=1 SYM theory in 6 dimensions to obtain
noncommutative N=2 SYM in 4 dimensions. We explicitly derive Seiberg-Witten
maps of the component fields in 6 and 4 dimensions. Moreover, we give a general
method to define the deformed supersymmetry transformations that leaves the
actions invariant after performing the Seiberg-Witten maps.Comment: 14 pages. One Ref. added. To appear in PR
Recommended from our members
Relaxation Of Brownian Particles In A Gravitational Field
We describe an upper level undergraduate experiment on the time-dependent behavior of a suspension of Brownian particles under gravitational attraction. We employed the Fokker-Planck equation in the strong friction limit and measured the time-evolution of the probability distribution for 1.0 mu m diameter latex Brownian particles in water at room temperature and pressure. The experiment provides evidence of the atomic nature of water.Physic
Theoretical basis of the community effect in development
Peer reviewedPublisher PD
S-Mbank: Secure Mobile Banking Authentication Scheme Using Signcryption, Pair Based Text Authentication, and Contactless Smartcard
Nowadays, mobile banking becomes a popular tool which consumers can conduct
financial transactions such as shopping, monitoring accounts balance,
transferring funds and other payments. Consumers dependency on mobile needs,
make people take a little bit more interest in mobile banking. The use of the
one-time password which is sent to the user mobile phone by short message
service (SMS) is a vulnerability which we want to solve with proposing a new
scheme called S-Mbank. We replace the authentication using the one-time
password with the contactless smart card to prevent attackers to use the
unencrypted message which is sent to the user's mobile phone. Moreover, it
deals vulnerability of spoofer to send an SMS pretending as a bank's server.
The contactless smart card is proposed because of its flexibility and security
which easier to bring in our wallet than the common passcode generators. The
replacement of SMS-based authentication with contactless smart card removes the
vulnerability of unauthorized users to act as a legitimate user to exploit the
mobile banking user's account. Besides that, we use public-private key pair and
PIN to provide two factors authentication and mutual authentication. We use
signcryption scheme to provide the efficiency of the computation. Pair based
text authentication is also proposed for the login process as a solution to
shoulder-surfing attack. We use Scyther tool to analyze the security of
authentication protocol in S-Mbank scheme. From the proposed scheme, we are
able to provide more security protection for mobile banking service.Comment: 6 page
- …