Suchergebnisse
Filter
17 Ergebnisse
Sortierung:
Weaker Economies in SAFTA: Issues and Concerns
In: Promoting Economic Cooperation in South Asia: Beyond SAFTA, S. 373-401
Aid for Trade: Impact on Sub-Saharan Africa
In: Assessing Aid for Trade, S. 102-127
Domestic Violence Against Women: Its Determinants and Implications for Gender Resource Allocation
In: UNU-Wider Research Paper No. 2007/80
SSRN
Working paper
Does Women's Status Matter for Food Security? Evidence from Bangladesh
In: UNU-Wider, Research Paper No. 2007/79
SSRN
Working paper
World Affairs Online
Trade Facilitation in the Commonwealth: An Economic Analysis
In: Margin: the journal of applied economic research, Band 10, Heft 3, S. 305-336
ISSN: 0973-8029
This article examines the economic impact of trade facilitation between Commonwealth country members, using a global computable general equilibrium framework. We document enormous economic impact, much higher than a complete tariff liberalisation amongst these countries. The economic impact is quite visible in terms of welfare, gross domestic product, employment and trade in several sectors. We abstract from the costs involved in such trade facilitation—accounting for them is beyond the scope of this study. JEL Classification: F13, F62, F68
Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
In: Doroodgar , F , Razzaque , M A & Isnin , I 2014 , ' Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks ' , Sensors , pp. - . https://doi.org/10.3390/s140305004
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
BASE
Aid for Trade: Effectiveness, Current Issues and Future Directions – An Overview
In: Assessing Aid for Trade, S. 1-13
Exchange Rate and Economic Growth: An Empirical Assessment for Bangladesh
In: Journal of South Asian Development, Band 12, Heft 1, S. 42-64
ISSN: 0973-1733
This article aims to understand the effects of exchange rate movements on economic growth in Bangladesh. Using a suitable analytical framework to derive an empirical specification, we construct a real exchange rate series and employ cointegration techniques to determine the output response to Bangladeshi currency depreciations. Our results suggest that in the long run, a 10 per cent depreciation of the real exchange rate is associated with, on average, a 3.2 per cent rise in aggregate output. However, a contractionary effect is observed in the short run so that the same magnitude of real depreciation would result in about a half per cent decline in GDP. While the long-run expansionary effect of real depreciations may be appealing for considering exchange rate policy as a development strategy, the likelihood of rising inflationary pressures needs to be kept in mind while pursuing this policy option.
Seluge++: A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
Over-the-air dissemination of code updates in wireless sensor networks have been researchers' point of interest in the last few years, and, more importantly, security challenges toward the remote propagation of code updating have occupied the majority of efforts in this context. Many security models have been proposed to establish a balance between the energy consumption and security strength, having their concentration on the constrained nature of wireless sensor network (WSN) nodes. For authentication purposes, most of them have used a Merkle hash tree to avoid using multiple public cryptography operations. These models mostly have assumed an environment in which security has to be at a standard level. Therefore, they have not investigated the tree structure for mission-critical situations in which security has to be at the maximum possible level (e.g., military applications, healthcare). Considering this, we investigate existing security models used in over-the-air dissemination of code updates for possible vulnerabilities, and then, we provide a set of countermeasures, correspondingly named Security Model Requirements. Based on the investigation, we concentrate on Seluge, one of the existing over-the-air programming schemes, and we propose an improved version of it, named Seluge++, which complies with the Security Model Requirements and replaces the use of the inefficient Merkle tree with a novel method. Analytical and simulation results show the improvements in Seluge++ compared to Seluge.
BASE
Aid for Trade and the Integration of Small and Vulnerable Economies into the Global Economy
In: Assessing Aid for Trade, S. 58-101