151 resultados para Margins (Security trading)
Resumo:
In this paper, the impact of multiple active eavesdroppers on cooperative single carrier systems with multiple relays and multiple destinations is examined. To achieve the secrecy diversity gains in the form of opportunistic selection, a two-stage scheme is proposed for joint relay and destination selection, in which, after the selection of the relay with the minimum effective maximum signal-to-noise ratio (SNR) to a cluster of eavesdroppers, the destination that has the maximum SNR from the chosen relay is selected. In order to accurately assess the secrecy performance, the exact and asymptotic expressions are obtained in closed-form for several security metrics including the secrecy outage probability, the probability of non-zero secrecy rate, and the ergodic secrecy rate in frequency selective fading. Based on the asymptotic analysis, key design parameters such as secrecy diversity gain, secrecy array gain, secrecy multiplexing gain, and power cost are characterized, from which new insights are drawn. Moreover, it is concluded that secrecy performance limits occur when the average received power at the eavesdropper is proportional to the counterpart at the destination. Specifically, for the secrecy outage probability, it is confirmed that the secrecy diversity gain collapses to zero with outage floor, whereas for the ergodic secrecy rate, it is confirmed confirm that its slope collapses to zero with capacity ceiling.
Resumo:
This paper investigates whether the momentum effect exists in the NYSE energy sector. Momentum is defined as the strategy that buys (sells) these stocks that are best (worst) performers, over a pre-specified past period of time (the 'look-back' period), by constructing equally weighted portfolios. Different momentum strategies are obtained by changing the number of stocks included in these portfolios, as well as the look-back period. Next, their performance is compared against two benchmarks: the equally weighted portfolio consisting of most stocks in the NYSE energy index and the market portfolio, and the S&P500 index. The results indicate that the momentum effect is strongly present in the energy sector, and leads to highly profitable portfolios, improving the risk-reward measures and easily outperforming both benchmarks.
Resumo:
This study investigates the trading activity in options and stock markets around informed events with extreme daily stock price movements. We find that informed agents are more likely to trade options prior to negative news and stocks ahead of positive news. We also show that optioned stocks overreact to the arrival of negative news, but react efficiently to positive news. However, the overreaction patterns are unique to the subsample of stocks with the lowest pre-event abnormal option/stock volume ratio (O/S). This finding suggests that the incremental benefit of option listing is related to the level of option trading activity, over and beyond the presence of an options market on the firm's stock. Finally, we find that the pre-event abnormal O/S is a better predictor of stock price patterns following a negative shock than is the pre-event O/S, implying that the former may contain more information about the future value of stocks than the latter.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.
Resumo:
Geography and retail store location are inherently bound together; this study links food retail changes to systemic logistics changes in an emerging market. Current logistic practices underplay demand-led models and online market evolution in large metropolises such as Istanbul, Rio de Janeiro, and Delhi. The later include raising income and education, access to a wide range of technologies, traffic and transport difficulties, lagging retail provision, changing family structure and roles, as well as changing food culture and taste. The study incorporates demand for premium products defined by Kapferer and Bastien, (2009b) as comprising a broad variety of higher quality and unique or distinctive products and brands including in grocery organic ranges, healthy options, allergy free selections, and international and gourmet/specialty products through an online grocery model (n=356) that integrates a novel view of home delivery (HD) in Istanbul. More importantly from a logistic perspective our model incorporates any products from any online vendors broadening the range beyond listed items found in any traditional online supermarkets. Data collected via phone survey and analysed via structural equation modelling (SEM) suggest that the offer of online premium products significantly affects consumers’ delivery logistics expectations. We discuss logistics operations and business management implications, identifying the emerging geography of logistic models which respond to consumers’ unmet expectations using multiple sourcing and consolidation points.
Resumo:
On 26 December 2003 an Israeli activist was shot by the Israeli Army while he was participating in a demonstration organized by Anarchists Against the Wall (AAtW) in the West Bank. This was the first time Israeli Soldiers have deliberately shot live bullets at a Jewish-Israeli activist. This paper is an attempt to understand the set of conditions, the enveloping frameworks, and the new discourses that have made this event, and similar shootings that soon followed, possible. Situating the actions of AAtW within a much wider context of securitization—of identities, movements, and bodies—we examine strategies of resistance which are deployed in highly securitized public spaces. We claim that an unexpected matrix of identity in which abnormality is configured as security threat render the bodies of activists especially precarious. The paper thus provides an account of the new rationales of security technologies and tactics which increasingly govern public spaces.
Resumo:
This letter proposes several relay selection policies for secure communication in cognitive decode-and-forward (DF) relay networks, where a pair of cognitive relays are opportunistically selected for security protection against eavesdropping. The first relay transmits the secrecy information to the destination,
and the second relay, as a friendly jammer, transmits the jamming signal to confound the eavesdropper. We present new exact closed-form expressions for the secrecy outage probability. Our analysis and simulation results strongly support our conclusion that the proposed relay selection policies can enhance the performance of secure cognitive radio. We also confirm that the error floor phenomenon is created in the absence of jamming.
Resumo:
Cognitive radio has emerged as an essential recipe for future high-capacity high-coverage multi-tier hierarchical networks. Securing data transmission in these networks is of utmost importance. In this paper, we consider the cognitive wiretap channel and propose multiple antennas to secure the transmission at the physical layer, where the eavesdropper overhears the transmission from the secondary transmitter to the secondary receiver. The secondary receiver and the eavesdropper are equipped with multiple antennas, and passive eavesdropping is considered where the channel state information of the eavesdropper’s channel is not available at the secondary transmitter. We present new closedform expressions for the exact and asymptotic secrecy outage probability. Our results reveal the impact of the primary network on the secondary network in the presence of a multi-antenna wiretap channel.
Resumo:
This paper critically interrogates how borders are produced by scientists, engineers and security experts in advance of the actual deployment of technical devices they develop. This paper explores the prior stages of translation and decision-making as a socio-technical device is conceived and developed. Drawing on in-depth interviews, observations and ethnographic research of the EU-funded Handhold project (consisting of nine teams in five countries), it explores how assumptions about the way security technologies will and should perform at the border shape the way that scientists, engineers, and security experts develop a portable, integrated device to detect CBRNE threats at borders. In disaggregating the moments of sovereign decision making across multiple sites and times, this paper questions the supposed linearity of how science comes out of and feeds back into the world of border security. An interrogation of competing assumptions and understandings of security threats and needs, of competing logics of innovation and pragmatism, of the demands of differentiated temporalities in detection and interrogation, and of the presumed capacities, behaviours, and needs of phantasmic competitors and end-users reveals a complex, circulating and co-constitutive process of device development that laboratises the border itself. We trace how sovereign decisions are enacted as assemblages in the antecedent register of device development itself through the everyday decisions of researchers in the laboratory, and the material components of the Handhold device itself.