Modelling of intraday increases in peak electricity demand using an autoregressive moving average-exponential generalized autoregressive conditional heteroskedastic-generalized single Pareto (ARMA-EGARCH-GSP) approach...Modelling of intraday increases in peak electricity demand using an autoregressive moving average-exponential generalized autoregressive conditional heteroskedastic-generalized single Pareto (ARMA-EGARCH-GSP) approach is discussed in this paper. The developed model is then used for extreme tail quantile estimation using daily peak electricity demand data from South Africa for the period, years 2000 to 2011. The advantage of this modelling approach lies in its ability to capture conditional heteroskedasticity in the data through the EGARCH framework, while at the same time estimating the extreme tail quantiles through the GSP modelling framework. Empirical results show that the ARMA-EGARCH-GSP model produces more accurate estimates of extreme tails than a pure ARMA-EGARCH model.展开更多
To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers dat...To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to another.This authentication works via OpenID,Kerberos,password authentication protocols,etc.However,there are still some limitations present in the reported security protocols.In this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method.The proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and trustworthy.The first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication link.This Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing attacks.This study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and OpenID.The experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via Email.The proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.展开更多
We study the periodic cosmic transit behavior of the accelerated universe in the framework of symmetric teleparallelism. The exact solution of field equations is obtained by employing a wellknown deceleration paramete...We study the periodic cosmic transit behavior of the accelerated universe in the framework of symmetric teleparallelism. The exact solution of field equations is obtained by employing a wellknown deceleration parameter(DP) called periodic varying DP, q =m coskt-1. The viability and physical reliability of the DP are studied by using observational constraints. The dynamics of periodicity and singularity are addressed in detail with respect to time and redshift parameter.Several energy conditions are discussed in this setting.展开更多
文摘Modelling of intraday increases in peak electricity demand using an autoregressive moving average-exponential generalized autoregressive conditional heteroskedastic-generalized single Pareto (ARMA-EGARCH-GSP) approach is discussed in this paper. The developed model is then used for extreme tail quantile estimation using daily peak electricity demand data from South Africa for the period, years 2000 to 2011. The advantage of this modelling approach lies in its ability to capture conditional heteroskedasticity in the data through the EGARCH framework, while at the same time estimating the extreme tail quantiles through the GSP modelling framework. Empirical results show that the ARMA-EGARCH-GSP model produces more accurate estimates of extreme tails than a pure ARMA-EGARCH model.
文摘To secure web applications from Man-In-The-Middle(MITM)and phishing attacks is a challenging task nowadays.For this purpose,authen-tication protocol plays a vital role in web communication which securely transfers data from one party to another.This authentication works via OpenID,Kerberos,password authentication protocols,etc.However,there are still some limitations present in the reported security protocols.In this paper,the presented anticipated strategy secures both Web-based attacks by leveraging encoded emails and a novel password form pattern method.The proposed OpenID-based encrypted Email’s Authentication,Authorization,and Accounting(EAAA)protocol ensure security by relying on the email authenticity and a Special Secret Encrypted Alphanumeric String(SSEAS).This string is deployed on both the relying party and the email server,which is unique and trustworthy.The first authentication,OpenID Uniform Resource Locator(URL)identity,is performed on the identity provider side.A second authentication is carried out by the hidden Email’s server side and receives a third authentication link.This Email’s third SSEAS authentication link manages on the relying party(RP).Compared to existing cryptographic single sign-on protocols,the EAAA protocol ensures that an OpenID URL’s identity is secured from MITM and phishing attacks.This study manages two attacks such as MITM and phishing attacks and gives 339 ms response time which is higher than the already reported methods,such as Single Sign-On(SSO)and OpenID.The experimental sites were examined by 72 information technology(IT)specialists,who found that 88.89%of respondents successfully validated the user authorization provided to them via Email.The proposed EAAA protocol minimizes the higher-level risk of MITM and phishing attacks in an OpenID-based atmosphere.
基金the University of Kwa-Zulu Natal for its fellowship and its continued supportsupported in part by the FRGS research grant (Grant No. FRGS/1/2021/ STG06/UTAR/02/1)
文摘We study the periodic cosmic transit behavior of the accelerated universe in the framework of symmetric teleparallelism. The exact solution of field equations is obtained by employing a wellknown deceleration parameter(DP) called periodic varying DP, q =m coskt-1. The viability and physical reliability of the DP are studied by using observational constraints. The dynamics of periodicity and singularity are addressed in detail with respect to time and redshift parameter.Several energy conditions are discussed in this setting.