A Comprehensive Survey and Comparative Analysis of Black Hole Attack in Mobile Ad Hoc Network

A Mobile Ad-hoc Network (MANET) is a self managing network consists of versatile nodes that are capable of communicating with each other without having any fixed infrastructure. These nodes may be routers and/or hosts. Due to this dynamic nature of the network, routing protocols are vulnerable to various kinds of attacks. The black hole attack is one of the conspicuous security threats in MANETs. As the route discovery process is obligatory and customary, attackers make use of this loophole to get success in their motives to destruct the network. In Black hole attack the packet is redirected to a node that actually does not exist in the network. Many researchers have proposed different techniques to detect and prevent this type of attack. In this paper, we have analyzed various routing protocols in this context. Further we have shown a critical comparison among various protocols. We have shown various routing metrics are required proper and significant analysis of the protocol.

Analyzing and Determining the Ideal Response Force for Combatting Terrorist Groups

Terror is a modern war strategy which uses violence as a means of communication in order to achieve political objectives. In today’s security environment narrowing the propaganda field of terrorist organization is the primary goal for the security forces. In this sense, providing and maintaining public support is the most necessary ability for security units. Rather than enemy and threat-oriented approach, homeland security oriented approach is essential to ensure public support. In this study, terror assumed as a homeland security issue and assigning the law enforcement forces with military status is analyzed.

Incorporating Multiple Supervised Learning Algorithms for Effective Intrusion Detection

As internet continues to expand its usage with an  enormous number of applications, cyber-threats have significantly  increased accordingly. Thus, accurate detection of malicious traffic in  a timely manner is a critical concern in today’s Internet for security.  One approach for intrusion detection is to use Machine Learning (ML)  techniques. Several methods based on ML algorithms have been  introduced over the past years, but they are largely limited in terms of  detection accuracy and/or time and space complexity to run. In this  work, we present a novel method for intrusion detection that  incorporates a set of supervised learning algorithms. The proposed  technique provides high accuracy and outperforms existing techniques  that simply utilizes a single learning method. In addition, our  technique relies on partial flow information (rather than full  information) for detection, and thus, it is light-weight and desirable for  online operations with the property of early identification. With the  mid-Atlantic CCDC intrusion dataset publicly available, we show that  our proposed technique yields a high degree of detection rate over 99%  with a very low false alarm rate (0.4%).   

Solid Waste Management through Mushroom Cultivation – An Eco Friendly Approach

Waste of certain process can be the input source of  other sectors in order to reduce environmental pollution. Today there  are more and more solid wastes are generated, but only very small  amount of those are recycled. So, the threatening of environmental  pressure to public health is very serious. The methods considered for  the treatment of solid waste are biogas tanks or processing to make  animal feed and fertilizer, however, they did not perform well. An  alternative approach is growing mushrooms on waste residues. This  is regarded as an environmental friendly solution with potential  economical benefit. The substrate producers do their best to produce  quality substrate at low cost. Apart from other methods, this can be  achieved by employing biologically degradable wastes used as the  resource material component of the substrate. Mushroom growing is  a significant tool for the restoration, replenishment and remediation  of Earth’s overburdened ecosphere. One of the rational methods of  waste utilization involves locally available wastes. The present study  aims to find out the yield of mushroom grown on locally available  waste for free and to conserve our environment by recycling wastes.  

Performance of Bridge Girder with Perforations under Tsunami Wave Loading

Tsunami disaster poses a great threat to coastal infrastructures. Bridges without adequate provisions for earthquake and tsunami loading is generally vulnerable to tsunami attack. During the last two disastrous tsunami event (i.e. Indian Ocean and Japan Tsunami) a number of bridges were observed subsequent damages by tsunami waves. In this study, laboratory experiments were conducted to study the effects of perforations in bridge girder in force reduction. Results showed that significant amount of forces were reduced using perforations in girder. Approximately 10% to 18% force reductions were achieved by using about 16% perforations in bridge girder. Subsequent amount of force reductions revealed that perforations in girder are effective in reducing tsunami forces as perforations in girder let water to be passed through. Thus, less bridge damages are expected with the presence of perforations in girder during tsunami period.

Management by Sufficient Economy Philosophy for Hospitality Business in Samut Songkram

The objectives of this research are to know the management form of Samut Songkram lodging entrepreneurs with sufficient economy framework, to know the threat that affect this business and drawing the fit model for this province in order to sustain their business with Samut Songkram style. What will happen if they do not use this philosophy? Will they have a cash short fall? The data and information are collected by informal discussion with 8 managers and 400 questionnaires. We will use a mix of methods both qualitative research and quantitative research for our study. Bent Flyvbjerg’s phronesis is utilized for this analysis. Our research will prove that sufficient economy can help small and medium business firms solve their problems. We think that the results of our research will be a financial model to solve many problems of the entrepreneurs and this way will use to practice in other areas of our country. 

Retrofitting of Bridge Piers against the Scour Damages: Case Study of the Marand-Soofian Route Bridge

Bridge piers which are constructed in the track of high water rivers cause some variations in the flow patterns. This variation mostly is a result of the changes in river sections. Decreasing the river section, bridge piers significantly impress the flow patterns. Once the flow approaches the piers, the stream lines change their order, causing the appearance of different flow patterns around the bridge piers. New flow patterns are created following the geometry and the other technical characteristics of the piers. One of the most significant consequences of this event is the scour generated around the bridge piers which threatens the safety of the structure. In order to determine the properties of scour holes, to find maximum depth of the scour is an important factor. In this manuscript a numerical simulation of the scour around Marand-Soofian route bridge piers has been carried out via SSIIM 2.0 Software and the amount of maximum scour has been achieved subsequently. Eventually the methods for retrofitting of bridge piers against scours and also the methods for decreasing the amount of scour have been offered.

Highlighting of the Factors and Policies Affecting CO2 Emissions Level in Malaysian Transportation Sector

Global CO2 emission and increasing fuel consumption to meet energy demand has become a threat in recent decades. Effort to reduce the CO2 emission is now a matter of priority in most countries of the world including Malaysia. Transportation has been identified as the most intensive sector of carbon-based fuels and achievement of the voluntary target to meet 40% carbon intensity reduction set at the 15th Conference of the Parties (COP15) means that the emission from the transport sector must be reduced accordingly. This posed a great challenge to Malaysia and effort has to be made to embrace suitable and appropriate energy policy for sustainable energy and emission reduction of this sector. The focus of this paper is to analyze the trends of Malaysia’s energy consumption and emission of four different transport sub-sectors (road, rail, aviation and maritime). Underlying factors influencing the growth of energy consumption and emission trends are discussed. Besides, technology status towards energy efficiency in transportation sub-sectors is presented. By reviewing the existing policies and trends of energy used, the paper highlights prospective policy options towards achieving emission reduction in the transportation sector.

The Use Support Vector Machine and Back Propagation Neural Network for Prediction of Daily Tidal Levels along the Jeddah Coast, Saudi Arabia

Sea level rise threatens to increase the impact of future  storms and hurricanes on coastal communities. Accurate sea level  change prediction and supplement is an important task in determining  constructions and human activities in coastal and oceanic areas. In  this study, support vector machines (SVM) is proposed to predict  daily tidal levels along the Jeddah Coast, Saudi Arabia. The optimal  parameter values of kernel function are determined using a genetic  algorithm. The SVM results are compared with the field data and  with back propagation (BP). Among the models, the SVM is superior  to BPNN and has better generalization performance.  

A Novel Application of Network Equivalencing Method in Time Domain to Precise Calculation of Dead Time in Power Transmission Title

Various studies have showed that about 90% of single line to ground faults occurred on High voltage transmission lines have transient nature. This type of faults is cleared by temporary outage (by the single phase auto-reclosure). The interval between opening and reclosing of the faulted phase circuit breakers is named “Dead Time” that is varying about several hundred milliseconds. For adjustment of traditional single phase auto-reclosures that usually are not intelligent, it is necessary to calculate the dead time in the off-line condition precisely. If the dead time used in adjustment of single phase auto-reclosure is less than the real dead time, the reclosing of circuit breakers threats the power systems seriously. So in this paper a novel approach for precise calculation of dead time in power transmission lines based on the network equivalencing in time domain is presented. This approach has extremely higher precision in comparison with the traditional method based on Thevenin equivalent circuit. For comparison between the proposed approach in this paper and the traditional method, a comprehensive simulation by EMTP-ATP is performed on an extensive power network.

A Study on Abnormal Behavior Detection in BYOD Environment

Advancement of communication technologies and smart devices in the recent times is leading to changes into the integrated wired and wireless communication environments. Since early days, businesses had started introducing environments for mobile device application to their operations in order to improve productivity (efficiency) and the closed corporate environment gradually shifted to an open structure. Recently, individual user's interest in working environment using mobile devices has increased and a new corporate working environment under the concept of BYOD is drawing attention. BYOD (bring your own device) is a concept where individuals bring in and use their own devices in business activities. Through BYOD, businesses can anticipate improved productivity (efficiency) and also a reduction in the cost of purchasing devices. However, as a result of security threats caused by frequent loss and theft of personal devices and corporate data leaks due to low security, companies are reluctant about adopting BYOD system. In addition, without considerations to diverse devices and connection environments, there are limitations in detecting abnormal behaviors, such as information leaks, using the existing network-based security equipment. This study suggests a method to detect abnormal behaviors according to individual behavioral patterns, rather than the existing signature-based malicious behavior detection, and discusses applications of this method in BYOD environment.

Level of Behavioral Development for Hepatitis C Virus Cases versus Their Contacts: Does Infection Make a Difference and What Is Beyond?

Hepatitis C virus infection is a public health threat in Egypt. To control infection, efforts should be spent to encourage healthy behavior. This study aimed to assess the level of behavioral development in order to create a positive environment for the adoption of the recommended behaviors. The study was conducted over one year from Jan. 2011 till Jan. 2012.Knowledge, attitude and behavior of 540 HCV patients and 102 of their contacts were assessed and the level of behavioral development was determined. The study revealed that the majority of patients and contacts knew that HCV infection is dangerous with perceived concern for early diagnosis and treatment. More than 75% knew the correct modes of transmission. The assessment showed positive attitudes towards the recommended practices with intention to adopt those practices. Strategies of creating opportunities to continue the recommended behaviors should be adopted together with the reinforcement of social support.

A Proposed Optimized and Efficient Intrusion Detection System for Wireless Sensor Network

In recent years intrusions on computer network are the major security threat. Hence, it is important to impede such intrusions. The hindrance of such intrusions entirely relies on its detection, which is primary concern of any security tool like Intrusion detection system (IDS). Therefore, it is imperative to accurately detect network attack. Numerous intrusion detection techniques are available but the main issue is their performance. The performance of IDS can be improved by increasing the accurate detection rate and reducing false positive. The existing intrusion detection techniques have the limitation of usage of raw dataset for classification. The classifier may get jumble due to redundancy, which results incorrect classification. To minimize this problem, Principle component analysis (PCA), Linear Discriminant Analysis (LDA) and Local Binary Pattern (LBP) can be applied to transform raw features into principle features space and select the features based on their sensitivity. Eigen values can be used to determine the sensitivity. To further classify, the selected features greedy search, back elimination, and Particle Swarm Optimization (PSO) can be used to obtain a subset of features with optimal sensitivity and highest discriminatory power. This optimal feature subset is used to perform classification. For classification purpose, Support Vector Machine (SVM) and Multilayer Perceptron (MLP) are used due to its proven ability in classification. The Knowledge Discovery and Data mining (KDD’99) cup dataset was considered as a benchmark for evaluating security detection mechanisms. The proposed approach can provide an optimal intrusion detection mechanism that outperforms the existing approaches and has the capability to minimize the number of features and maximize the detection rates.

Study on Network-Based Technology for Detecting Potentially Malicious Websites

Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.

Soil Compaction in Tropical Organic Farming Systems and Its Impact on Natural Soil-Borne Disease Suppression: Challenges for Management

Organic farming systems still depend on intensive, mechanical soil tillage. Frequent passes by machinery traffic cause substantial soil compaction that threatens soil health. Adopting practices as reduced tillage and organic matter retention on the soil surface are considered effective ways to control soil compaction. In tropical regions, however, the acceleration of soil organic matter decomposition and soil carbon turnover on the topsoil layer is influenced more rapidly by the oscillation process of drying and wetting. It is hypothesized therefore, that rapid reduction in soil organic matter hastens the potential for compaction to occur in organic farming systems. Compaction changes soil physical properties and as a consequence it has been implicated as a causal agent in the inhibition of natural disease suppression in soils. Here we describe relationships between soil management in organic vegetable systems, soil compaction, and declining soil capacity to suppress pathogenic microorganisms.

Can EEG Test Helps in Identifying Brain Tumor?

Brain tumor is inherently serious and life-threatening disease. Brain tumor builds the intracranial pressure in the brain, by shifting the brain or pushing against the skull, and also damaging nerves and healthy brain tissues. This intracranial pressure affects and interferes with normal brain functionality, which results in generation of abnormal electrical activities from brain. With recent development in the medical engineering and instruments, EEG instruments are able to record the brain electric activities with high accuracy, which establishes EEG as a primary tool for diagnosing the brain abnormalities. Research scholars and general physicians, often face difficulty in understanding EEG patterns. This paper presents the EEG patterns associated with brain tumor by combing medicine theory and neurologist experience. Paper also explains the pros-cons of the EEG based brain tumor identification.

Engagement of Young People in Social Networks: Awareness and Security

Numerous threats have been identified when using social networks. The question is whether young people are aware of these negative impacts of online and mobile technologies. Will they identify threats when needed? Will they know where to get help? Students and school children were part of a survey where their behavior and use of Facebook and an instant messaging application - MXit were studied. This paper presents some of the results. It can be concluded that awareness on security and privacy issues should be raised. The benefit of doing such a survey is that it may help to direct educational efforts from a young age. In this way children – with their parents – can strive towards more secure behavior. Educators can focus their lessons towards the areas that need attention resulting in safer cyber interaction and ultimately more responsible online use.

Cloud Computing for E-Learning with More Emphasis on Security Issues

In today's world, success of most systems depend on the use of new technologies and information technology (IT) which aimed to increase efficiency and satisfaction of users. One of the most important systems that use information technology to deliver services is the education system. But for educational services in the form of E-learning systems, hardware and software equipment should be containing high quality, which requires substantial investment. Because the vast majority of educational establishments can not invest in this area so the best way for them is reducing the costs and providing the E-learning services by using cloud computing. But according to the novelty of the cloud technology, it can create challenges and concerns that the most noted among them are security issues. Security concerns about cloud-based E-learning products are critical and security measures essential to protect valuable data of users from security vulnerabilities in products. Thus, the success of these products happened if customers meet security requirements then can overcome security threats. In this paper tried to explore cloud computing and its positive impact on E- learning and put main focus to identify security issues that related to cloud-based E-learning efforts which have been improve security and provide solutions in management challenges.

A Critical Review on the Development of a Theoretical Framework for Managing Environmental Impacts of Construction Project

Construction industry is considered as one of the main contributor of natural resources depletion, responsible for high level pollution and it is one of the attributes that pose climate changes and other environmental threats. A lot of efforts had and have been done to reduce and control these impacts. Project Environmental Management (PEM) includes the processes required to ensure that the impacts of the project execution to the surrounding environment will remain within the limits stated in legal permits. The main aim of most of researches conducted managing Environmental Impacts (EI) is to protect earth planet from pollution. Those researches are presenting four major environmental elements; Environmental Management Systems (EMS), Environmental Design (ED), Environmental Planning (EP) and Environmental Impacts Assessments (EIA). Although everything has been said about environmental management for construction projects, but almost everything remains to be said and therefore to be explored or rediscovered because incontestably, almost everything remains to be done. This paper aimed at reviewing some of what has been said about PEM. Also one of its objectives is to explore and rediscover the whole view of managing the EI problems by proposing a framework that based on the relation between these environmental researches.

A Statistical Prediction of Likely Distress in Nigeria Banking Sector Using a Neural Network Approach

One of the most significant threats to the economy of a nation is the bankruptcy of its banks. This study evaluates the susceptibility of Nigerian banks to failure with a view to identifying ratios and financial data that are sensitive to solvency of the bank. Further, a predictive model is generated to guide all stakeholders in the industry. Thirty quoted banks that had published Annual Reports for the year preceding the consolidation i.e. year 2004 were selected. They were examined for distress using the Multilayer Perceptron Neural Network Analysis. The model was used to analyze further reforms by the Central Bank of Nigeria using published Annual Reports of twenty quoted banks for the year 2008 and 2011. The model can thus be used for future prediction of failure in the Nigerian banking system.