Abstract: It is widely believed that mobile device is a promising technology for lending the opportunity for the third wave of electronic commerce. Mobile devices have changed the way companies do business. Many applications are under development or being incorporated into business processes. In this day, mobile applications are a vital component of any industry strategy.One of the greatest benefits of selling merchandise and providing services on a mobile application is that it widens a company’s customer base significantly.Mobile applications are accessible to interested customers across regional and international borders in different electronic business (e-business) area. But there is a dark side to this success story. The security risks associated with mobile devices and applications are very significant. This paper introduces a broad risk analysis for the various threats, vulnerabilities, and risks in mobile e-business applications and presents some important risk mitigation approaches. It reviews and compares two different frameworks for security assurance in mobile e-business applications. Based on the comparison, the paper suggests some recommendations for applications developers and business owners in mobile e-business application development process.
Abstract: A Distributed Denial of Service (DDoS) attack is a
major threat to cyber security. It originates from the network layer or
the application layer of compromised/attacker systems which are
connected to the network. The impact of this attack ranges from the
simple inconvenience to use a particular service to causing major
failures at the targeted server. When there is heavy traffic flow to a
target server, it is necessary to classify the legitimate access and
attacks. In this paper, a novel method is proposed to detect DDoS
attacks from the traces of traffic flow. An access matrix is created
from the traces. As the access matrix is multi dimensional, Principle
Component Analysis (PCA) is used to reduce the attributes used for
detection. Two classifiers Naive Bayes and K-Nearest neighborhood
are used to classify the traffic as normal or abnormal. The
performance of the classifier with PCA selected attributes and actual
attributes of access matrix is compared by the detection rate and
False Positive Rate (FPR).
Abstract: Securing the confidential data transferred via wireless
network remains a challenging problem. It is paramount to ensure
that data are accessible only by the legitimate users rather than by the
attackers. One of the most serious threats to organization is jamming,
which disrupts the communication between any two pairs of nodes.
Therefore, designing an attack-defending scheme without any packet
loss in data transmission is an important challenge. In this paper,
Dependence based Malicious Route Defending DMRD Scheme has
been proposed in multi path routing environment to prevent jamming
attack. The key idea is to defend the malicious route to ensure
perspicuous transmission. This scheme develops a two layered
architecture and it operates in two different steps. In the first step,
possible routes are captured and their agent dependence values are
marked using triple agents. In the second step, the dependence values
are compared by performing comparator filtering to detect malicious
route as well as to identify a reliable route for secured data
transmission. By simulation studies, it is observed that the proposed
scheme significantly identifies malicious route by attaining lower
delay time and route discovery time; it also achieves higher
throughput.
Abstract: The inspection of underneath vehicle system has been
given significant attention by governments after the threat of
terrorism become more prevalent. New technologies such as mobile
robots and computer vision are led to have more secure environment.
This paper proposed that a mobile robot like Aria robot can be used
to search and inspect the bombs under parking a lot vehicle. This
robot is using fuzzy logic and subsumption algorithms to control the
robot that movies underneath the vehicle. An OpenCV library and
laser Hokuyo are added to Aria robot to complete the experiment for
under vehicle inspection. This experiment was conducted at the
indoor environment to demonstrate the efficiency of our methods to
search objects and control the robot movements under vehicle. We
got excellent results not only by controlling the robot movement but
also inspecting object by the robot camera at same time. This success
allowed us to know the requirement to construct a new cost effective
robot with more functionality.
Abstract: Children are more susceptible to medication errors
than adults. Medication administration process is the last stage in the
medication treatment process and most of the errors detected in this
stage. Little research has been undertaken about medication errors in
children in the Middle East countries. This study was aimed to
evaluate how the paediatric nurses adhere to the medication
administration policy and also to identify any medication preparation
and administration errors or any risk factors. An observational,
prospective study of medication administration process from when
the nurses preparing patient medication until administration stage
(May to August 2014) was conducted in Saudi Arabia. Twelve
paediatric nurses serving 90 paediatric patients were observed. 456
drug administered doses were evaluated. Adherence rate was variable
in 7 steps out of 16 steps. Patient allergy information, dose
calculation, drug expiry date were the steps in medication
administration with lowest adherence rates. 63 medication
preparation and administration errors were identified with error rate
13.8% of medication administrations. No potentially life-threating
errors were witnessed. Few logistic and administrative factors were
reported. The results showed that the medication administration
policy and procedure need an urgent revision to be more sensible for
nurses in practice. Nurses’ knowledge and skills regarding to the
medication administration process should be improved.
Abstract: Urban public spaces are sutured with a range of
surveillance and sensor technologies that claim to enable new forms
of ‘data based citizen participation’, but also increase the tendency
for ‘function-creep’, whereby vast amounts of data are gathered,
stored and analysed in a broad application of urban surveillance. This
kind of monitoring and capacity for surveillance connects with
attempts by civic authorities to regulate, restrict, rebrand and reframe
urban public spaces. A direct consequence of the increasingly
security driven, policed, privatised and surveilled nature of public
space is the exclusion or ‘unfavourable inclusion’ of those considered
flawed and unwelcome in the ‘spectacular’ consumption spaces of
many major urban centres. In the name of urban regeneration,
programs of securitisation, ‘gentrification’ and ‘creative’ and ‘smart’
city initiatives refashion public space as sites of selective inclusion
and exclusion. In this context of monitoring and control procedures,
in particular, children and young people’s use of space in parks,
neighbourhoods, shopping malls and streets is often viewed as a
threat to the social order, requiring various forms of remedial action.
This paper suggests that cities, places and spaces and those who
seek to use them, can be resilient in working to maintain and extend
democratic freedoms and processes enshrined in Marshall’s concept
of citizenship, calling sensor and surveillance systems to account.
Such accountability could better inform the implementation of public
policy around the design, build and governance of public space and
also understandings of urban citizenship in the sensor saturated urban
environment.
Abstract: Tumor is an uncontrolled growth of tissues in any part
of the body. Tumors are of different types and they have different
characteristics and treatments. Brain tumor is inherently serious and
life-threatening because of its character in the limited space of the
intracranial cavity (space formed inside the skull). Locating the tumor
within MR (magnetic resonance) image of brain is integral part of the
treatment of brain tumor. This segmentation task requires
classification of each voxel as either tumor or non-tumor, based on
the description of the voxel under consideration. Many studies are
going on in the medical field using Markov Random Fields (MRF) in
segmentation of MR images. Even though the segmentation process
is better, computing the probability and estimation of parameters is
difficult. In order to overcome the aforementioned issues, Conditional
Random Field (CRF) is used in this paper for segmentation, along
with the modified artificial bee colony optimization and modified
fuzzy possibility c-means (MFPCM) algorithm. This work is mainly
focused to reduce the computational complexities, which are found in
existing methods and aimed at getting higher accuracy. The
efficiency of this work is evaluated using the parameters such as
region non-uniformity, correlation and computation time. The
experimental results are compared with the existing methods such as
MRF with improved Genetic Algorithm (GA) and MRF-Artificial
Bee Colony (MRF-ABC) algorithm.
Abstract: Oases are complex and fragile agro-ecosystems. They
have always existed in environments characterized by an arid climate,
scarcity of rainfall, high temperatures and high evaporation. These
palms have grown up despite the severity of the physical
characteristics thanks to the water's existence and irrigation practice.
The oases are generally spread along non-perennial rivers (wadis),
shallow water table or deep artesian groundwater. However, the
sustainability of oasis system is threatened by water scarcity and
declining of water table levels particularly in arid areas. Located in
the southern east area of Morocco, Tafilalet plain encompasses one of
the largest palm groves in the kingdom. In recent years, this area has
become increasingly threatened by water shortage and has seen a
sharp deterioration under the effect of several combined
anthropogenic and climatic factors. The Bayoud disease, successive
years of drought, Hassan Addakhil dam construction etc are all
factors that have affected both water and phoenicicole heritage of the
area. The objective of this study is to understand the interaction
between qualitative and quantitative degradation of groundwater
resources, and the palm grove dynamics, while reviewing the
assumption that groundwater resources contribute in a direct way to
the conservation of this oasis agroecosystem. A historical analysis
tracing both the oasis dynamics and the groundwater evolution has
been established. Data were collected from satellite images, surveys
with different actors (farmers, Regional Office for Agricultural
Development, Basin agency...). They were complemented by a
synthesis of numerous technical reports in the area. The results
showed that within 40 years, the thickness of the groundwater table
has dropped in 50 %. Along with this, there has been a downsizing of
date palm by 50 %. Areas with higher groundwater level were the
least affected by the downsizing. So we can say that the shallow
groundwater contribute significantly and directly to the water supply
of date palm through its root system, and largely ensures the oasis
ecosystem sustainability.
Abstract: Botnets are one of the most serious and widespread
cyber threats. Today botnets have been facilitating many
cybercrimes, especially financial, top secret thefts. Botnets can be
available for lease in the market and are utilized by the
cybercriminals to launch massive attacks like DDoS, click fraud,
phishing attacks etc., Several large institutions, hospitals, banks,
government organizations and many social networks such as twitter,
facebook etc., became the target of the botmasters. Recently,
noteworthy researches have been carried out to detect bot, C&C
channels, botnet and botmasters. Using many sophisticated
technologies, botmasters made botnet a titan of the cyber world.
Innumerable challenges have been put forth by the botmasters to the
researchers in the detection of botnet. In this paper we present a
survey of different types of botnet C&C channels and also provide a
comparison of various botnet categories. Finally we hope that our
survey will create awareness for forthcoming botnet research
endeavors.
Abstract: Multispectral screening systems are becoming more
popular because of their very interesting properties and applications.
One of the most significant applications of multispectral screening
systems is prevention of terrorist attacks. There are many kinds of
threats and many methods of detection. Visual detection of objects
hidden under clothing of a person is one of the most challenging
problems of threats detection. There are various solutions of the
problem; however, the most effective utilize multispectral
surveillance imagers. The development of imaging devices and
exploration of new spectral bands is a chance to introduce new
equipment for assuring public safety. We investigate the possibility
of long lasting detection of potentially dangerous objects covered
with various types of clothing. In the article we present the results of
comparative studies of passive imaging in three spectrums – visible,
infrared and terahertz.
Abstract: As currently various portable devices were launched,
smart business conducted using them became common. Since smart
business can use company-internal resources in an exlternal remote
place, user authentication that can identify authentic users is an
important factor. Commonly used user authentication is a method of
using user ID and Password. In the user authentication using ID and
Password, the user should see and enter authentication information
him or her. In this user authentication system depending on the user’s
vision, there is the threat of password leaks through snooping in the
process which the user enters his or her authentication information.
This study designed and produced a user authentication module
using an actuator to respond to the snooping threat.
Abstract: Climate change and poverty are global issues which cannot be waved aside in welfare of the ever increasing population. The causes / consequences are far more elaborate in developing countries, including Nigeria, which poses threats to the existence of man and his environment. The dominant role of agriculture makes it obvious that even minor climate deteriorations can cause devastating socio-economic consequences. Policies to curb the climate change by reducing the consumption of fossil fuels like oil, gas or carbon compounds have significant economical impacts on the producers/suppliers of these fuels. Thus a unified political narrative that advances both agendas is needed, because their components of an environmental coin that needs to be addressed. The developed world should maintain a low-carbon growth & real commitment of 0.7% of gross national income, as aid to developing countries & renewable energy approach should be emphasized, hence global poverty combated.
Abstract: In recent years, in addition to face the external threats such as energy shortages and climate change, traffic congestion and environmental pollution have become anxious problems for many cities. Considering private automobile-oriented urban development had produced many negative environmental and social impacts, the transit-oriented development (TOD) has been considered as a sustainable urban model. TOD encourages public transport combined with friendly walking and cycling environment designs, however, non-motorized modes help improving human health, energy saving, and reducing carbon emissions. Due to environmental changes often affect the planners’ decision-making; this research applies dynamic network process (DNP) which includes the time dependent concept to promoting friendly walking and cycling environmental designs as an advanced planning support system for environment improvements.
This research aims to discuss what kinds of design strategies can improve a friendly walking and cycling environment under TOD. First of all, we collate and analyze environment designing factors by reviewing the relevant literatures as well as divide into three aspects of “safety”, “convenience”, and “amenity” from fifteen environment designing factors. Furthermore, we utilize fuzzy Delphi Technique (FDT) expert questionnaire to filter out the more important designing criteria for the study case. Finally, we utilized DNP expert questionnaire to obtain the weights changes at different time points for each design criterion. Based on the changing trends of each criterion weight, we are able to develop appropriate designing strategies as the reference for planners to allocate resources in a dynamic environment. In order to illustrate the approach we propose in this research, Taipei city as one example has been used as an empirical study, and the results are in depth analyzed to explain the application of our proposed approach.
Abstract: The work delineates the threats of maladjustment of the capacity of rain canals, designed and built in the early 20th century, in connection to heavy rainfall, especially in summer. This is the cause of the so called 'urban floods.' It directly relates to fierce raise of paving in the cities. Resolving this problem requires a change in philosophy of draining the rainfall by wider use of retention, infiltration and usage of rainwater.
In systemic approach to managing the safety of urban drainage systems the risk, which is directly connected to safety failures, has been accepted as a measure. The risk level defines the probability of occurrence of losses greater than the ones forecast for a given time frame. The procedure of risk modelling, enabling its numeric analysis by using appropriate weights, is a significant issue in this paper.
Abstract: Wetlands are one of the most important ecosystems on
Earth. Nevertheless, various challenges threaten these ecosystems
and disrupt their ecological character. Among these, the effects of
human-based threats are more devastating. Following mass
degradation of wetlands during 1970s, the Ramsar Convention on
Wetlands (Ramsar, Iran, 1971) was concluded to conserve wetlands
of international importance and prevent destruction and degradation
of such ecosystems through wise use of wetlands as a mean to
achieve sustainable development in all over the world. Therefore, in
this paper, efforts have been made to analyze threats to wetlands and
then investigate solutions in the framework of the Ramsar
Convention. Finally, in order to operate these mechanisms, this study
concludes that all states should in turn make their best effort to
improve and restore global wetlands through preservation of
environmental standards and close contribution and also through
taking joint measures with other states effectively.
Abstract: The topic of enhancing security in XML databases is important as it includes protecting sensitive data and providing a secure environment to users. In order to improve security and provide dynamic access control for XML databases, we presented XLog file to calculate user trust values by recording users’ bad transaction, errors and query severities. Severity-aware trust-based access control for XML databases manages the access policy depending on users' trust values and prevents unauthorized processes, malicious transactions and insider threats. Privileges are automatically modified and adjusted over time depending on user behaviour and query severity. Logging in database is an important process and is used for recovery and security purposes. In this paper, the Xlog file is presented as a dynamic and temporary log file for XML databases to enhance the level of security.
Abstract: Soil is a complex physical and biological system that provides support, water, nutrients and oxygen to the plants. Apart from these, it acts as a connecting link between inorganic, organic and living components of the ecosystem. In recent years, presence of xenobiotics, alterations in the natural soil environment, application of pesticides/inorganic fertilizers, percolation of contaminated surface water as well as leachates from landfills to subsurface strata and direct discharge of industrial wastes to the land have resulted in soil pollution which in turn has posed severe threats to human health especially in terms of causing carcinogenicity by direct DNA damage. The present review is an attempt to summarize literature on sources of soil pollution, characterization of pollutants and their consequences in different living systems.
Abstract: Concrete durability as an important engineering property of concrete, determining the service life of concrete structures very significantly, can be threatened and even lost due to the interactions of concrete with external environment. Bio-corrosion process caused by presence and activities of microorganisms producing sulphuric acid is a special type of sulphate deterioration of concrete materials. The effects of sulphur-oxidizing bacteria Acidithiobacillus thiooxidans on various concrete samples, based on silica fume and zeolite, were investigated in laboratory during 180 days. A laboratory study was conducted to compare the performance of concrete samples in terms of the concrete deterioration influenced by the leaching of calcium and silicon compounds from the cement matrix. The changes in the elemental concentrations of calcium and silicon in both solid samples and liquid leachates were measured by using X – ray fluorescence method. Experimental studies confirmed the silica fume based concrete samples were found out to have the best performance in terms of both silicon and calcium ions leaching.
Abstract: Economic development and globalization of international markets have created a favourable atmosphere for the emergence of new forms of crime such as money laundering or financing of terrorism, which may contribute to destabilized and damage economic systems. In particular, money laundering have acquired great importance since the 11S attacks, what has caused on the one hand, the establishment and development of preventive measures and, on the other hand, a progressive hardening of penal measures. Since then, the regulations imposed to fight against money laundering have been viewed as key components also in the fight against terrorist financing. Terrorism, at the beginning, was a “national” crime connected with internal problems of the State (for instance the RAF in Germany or ETA in Spain) but in the last 20 years has started to be an international problem that is connected with the defence and security of the States. Therefore, the new strategic concept for the defense and security of NATO has a comprehensive list of security threats to the Alliance, such as terrorism, international instability, money laundering or attacks on cyberspace, among others. With this new concept, money laundering and terrorism has become a priority in the national defense.
In this work we will analyze the methods to combat these new threats to the national security. We will study the preventive legislations to combat money laundering and financing of terrorism, the UIF that exchange information between States, and the hawala-Banking.
Abstract: This paper claims that architecture is a contingent discipline, despite the fact that its contingency has long been denied through a retreat to Vitruvian writing. It is evident that contingency is rejected not only by architecture but also by modernity as a whole. Vitruvius attempted to cover the entire field of architecture in a systematic form in order to bring the whole body of this great discipline to a complete order. The legacy of his theory hitherto lasted not only that it is the only major work on the architecture of Classical Antiquity to have survived, but also that its conformity with the project of modernity. In the scope of the paper, it will be argued that contingency should be taken into account rather than avoided as a potential threat.