• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 4
  • 4
  • 2
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • 1
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

The South African government auction mechanism: inference from cross-country analysis

Du Plessis, Johannes Jonathan 03 June 2013 (has links)
Thesis submitted in partial fulfilment of the requirements for the degree of Master of Management in Finance and Investment in the faculty of Commerce, Law and Management, Wits Businesss School, University of the Witwatersrand, 2012. / Idiosyncratic considerations relevant to South Africa’s economic and legal framework, as well as determining factors taken from the financial markets and the asset being auctioned are used to critically review the current auction mechanism used by the South African government to borrow funds publicly. A logistic regression with panel data is used in the empirical analysis. The dependent variable has a dichotomous outcome of uniform-price and discriminatory auction mechanisms. Data from 43 different countries over the period 2005 to 2011 are used for the analysis. It was hypothesized that countries with higher uncertainty about the price of their public debt, should use the auction mechanism that reduces under-pricing. Results from the logit regression supported this view. Upon comparing South Africa’s profile with the logit regression results, alongside a review of the literature, it becomes apparent that the proposed model does not provide a definitive answer. However, the model does aid policymakers’ decision on which auction mechanism should be preferred over the other for South Africa.
2

Analysis of Blockchain-based Smart Contracts for Peer-to-Peer Solar Electricity Transactive Markets

Lin, Jason 08 February 2019 (has links)
The emergence of blockchain technology and increasing penetration of distributed energy resources (DERs) have created a new opportunity for peer-to-peer (P2P) energy trading. However, challenges arise in such transactive markets to ensure individual rationality, incentive compatibility, budget balance, and economic efficiency during the trading process. This thesis creates an hour-ahead P2P energy trading network based on the Hyperledger Fabric blockchain and explores a comparative analysis of different auction mechanisms that form the basis of smart contracts. Considered auction mechanisms are discriminatory and uniform k-Double Auction with different k values. This thesis also investigates effects of four consumer and prosumer bidding strategies: random, preference factor, price-only game-theoretic approach, and supply-demand game-theoretic approach. A custom simulation framework that models the behavior of the transactive market is developed. Case studies of a 100-home microgrid at various photovoltaic (PV) penetration levels are presented using typical residential load and PV generation profiles in the metropolitan Washington, D.C. area. Results indicate that regardless of PV penetration levels and employed bidding strategies, discriminatory k-DA can outperform uniform k-DA. Despite so, discriminatory k-DA is more sensitive to market conditions than uniform k-DA. Additionally, results show that the price-only game-theoretic bidding strategy leads to near-ideal economic efficiencies regardless of auction mechanisms and PV penetration levels. / MS
3

Research on efficiency and privacy issues in wireless communication

Rathinakumar, Saravana Manickam January 2018 (has links)
Wireless spectrum is a limited resource that must be used efficiently. It is also a broadcast medium, hence, additional procedures are required to maintain communication over the wireless spectrum private. In this thesis, we investigate three key issues related to efficient use and privacy of wireless spectrum use. First, we propose GAVEL, a truthful short-term auction mechanism that enables efficient use of the wireless spectrum through the licensed shared access model. Second, we propose CPRecycle, an improved Orthogonal Frequency Division Multiplexing (OFDM) receiver that retrieves useful information from the cyclic prefix for interference mitigation thus improving spectral efficiency. Third and finally, we propose WiFi Glass, an attack vector on home WiFi networks to infer private information about home occupants. First we consider, spectrum auctions. Existing short-term spectrum auctions do not satisfy all the features required for a heterogeneous spectrum market. We discover that this is due to the underlying auction format, the sealed bid auction. We propose GAVEL, a truthful auction mechanism, that is based on the ascending bid auction format, that avoids the pitfalls of existing auction mechanisms that are based on the sealed bid auction format. Using extensive simulations we observe that GAVEL can achieve better performance than existing mechanisms. Second, we study the use of cyclic prefix in Orthogonal Frequency Division Multiplexing. The cyclic prefix does contain useful information in the presence of interference. We discover that while the signal of interest is redundant in the cyclic prefix, the interference component varies significantly. We use this insight to design CPRecycle, an improved OFDM receiver that is capable of using the information in the cyclic prefix to mitigate various types of interference. It improves spectral efficiency by decoding packets in the presence of interference. CPRecycle require changes to the OFDM receiver and can be deployed in most networks today. Finally, home WiFi networks are considered private when encryption is enabled using WPA2. However, experiments conducted in real homes, show that the wireless activity on the home network can be used to infer occupancy and activity states such as sleeping and watching television. With this insight, we propose WiFi Glass, an attack vector that can be used to infer occupancy and activity states (limited to three activity classes), using only the passively sniffed WiFi signal from the home environment. Evaluation with real data shows that in most of the cases, only about 15 minutes of sniffed WiFi signal is required to infer private information, highlighting the need for countermeasures.
4

Capacity allocation and rescheduling in supply chains

Liu, Zhixin 20 September 2007 (has links)
No description available.

Page generated in 0.0894 seconds