Identification of Non-Lexicon Non-Slang Unigrams in Body-enhancement Medicinal UBE

Email has become a fast and cheap means of online communication. The main threat to email is Unsolicited Bulk Email (UBE), commonly called spam email. The current work aims at identification of unigrams in more than 2700 UBE that advertise body-enhancement drugs. The identification is based on the requirement that the unigram is neither present in dictionary, nor is a slang term. The motives of the paper are many fold. This is an attempt to analyze spamming behaviour and employment of wordmutation technique. On the side-lines of the paper, we have attempted to better understand the spam, the slang and their interplay. The problem has been addressed by employing Tokenization technique and Unigram BOW model. We found that the non-lexicon words constitute nearly 66% of total number of lexis of corpus whereas non-slang words constitute nearly 2.4% of non-lexicon words. Further, non-lexicon non-slang unigrams composed of 2 lexicon words, form more than 71% of the total number of such unigrams. To the best of our knowledge, this is the first attempt to analyze usage of non-lexicon non-slang unigrams in any kind of UBE.

The National Security Assurance of the Republic of Kazakhstan

the article analyzes the national security as a scientific and practical problem, characterized by the state's political institutions to ensure effective action to maintain optimal conditions for the existence and development of the individual and society. National security, as a category of political science reflects the relationship between the security to the nation, including public relations and social consciousness, social institutions and their activities, ensuring the realization of national interests in a particular historical situation. In national security are three security levels: individual, society and state. Their role and place determined by the nature of social relations, political systems, the presence of internal and external threats. In terms of content in the concept of national security is taken to provide political, economic, military, environmental, information security and safety of the cultural development of the nation.

Tag Broker Model for Protecting Privacy in RFID Environment

RFID system, in which we give identification number to each item and detect it with radio frequency, supports more variable service than barcode system can do. For example, a refrigerator with RFID reader and internet connection will automatically notify expiration of food validity to us. But, in spite of its convenience, RFID system has some security threats, because anybody can get ID information of item easily. One of most critical threats is privacy invasion. Existing privacy protection schemes or systems have been proposed, and these schemes or systems defend normal users from attempts that any attacker tries to get information using RFID tag value. But, these systems still have weakness that attacker can get information using analogous value instead of original tag value. In this paper, we mention this type of attack more precisely and suggest 'Tag Broker Model', which can defend it. Tag broker in this model translates original tag value to random value, and user can only get random value. Attacker can not use analogous tag value, because he/she is not able to know original one from it.

Layout Based Spam Filtering

Due to the constant increase in the volume of information available to applications in fields varying from medical diagnosis to web search engines, accurate support of similarity becomes an important task. This is also the case of spam filtering techniques where the similarities between the known and incoming messages are the fundaments of making the spam/not spam decision. We present a novel approach to filtering based solely on layout, whose goal is not only to correctly identify spam, but also warn about major emerging threats. We propose a mathematical formulation of the email message layout and based on it we elaborate an algorithm to separate different types of emails and find the new, numerically relevant spam types.

Landowers' Participation Behavior on the Payment for Environmental Service (PES): Evidences from Taiwan

To respond to the Kyoto Protocol, the policy of Payment for Environmental Service (PES), which was entitled “Plain Landscape Afforestation Program (PLAP)", was certified by Executive Yuan in Taiwan on 31 August 2001 and has been implementing for six years since 1 January 2002. Although the PLAP has received a lot of positive comments, there are still many difficulties during the process of implementation, such as insufficient technology for afforestation, private landowners- low interests in participating in PLAP, insufficient subsidies, and so on, which are potential threats that hinder the PLAP from moving forward in future. In this paper, selecting Ping-Tung County in Taiwan as a sample region and targeting those private landowners with and without intention to participate in the PLAP, respectively, we conduct an empirical analysis based on the Logit model to investigate the factors that determine whether those private landowners join the PLAP, so as to realize the incentive effects of the PLAP upon the personal decision on afforestation. The possible factors that might determine private landowner-s participation in the PLAP include landowner-s characteristics, cropland characteristics, as well as policy factors. Among them, the policy factors include afforestation subsidy amount (+), duration of afforestation subsidy (+), the rules on adjoining and adjacent areas (+), and so on, which do not reach the remarkable level in statistics though, but the directions of variable signs are consistent with the intuition behind the policy. As for the landowners- characteristics, each of age (+), education level (–), and annual household income (+) variables reaches 10% of the remarkable level in statistics; as for the cropland characteristics, each of cropland area (+), cropland price (–), and the number of cropland parcels (–) reaches 1% of the remarkable level in statistics. In light of the above, the cropland characteristics are the dominate factor that determines the probability of landowner-s participation in the PLAP. In the Logit model established by this paper, the probability of correctly estimating nonparticipants is 98%, the probability of correctly estimating the participants is 71.8%, and the probability for the overall estimation is 95%. In addition, Hosmer-Lemeshow test and omnibus test also revealed that the Logit model in this paper may provide fine goodness of fit and good predictive power in forecasting private landowners- participation in this program. The empirical result of this paper expects to help the implementation of the afforestation programs in Taiwan.

Study on the Atomic-Oxygen-Protection Film Preparation of Organic Silicon and Its Properties

Materials used on exterior spacecraft surfaces are subjected to many environmental threats which can cause degradation, atomic oxygen is one of the most threats. We prepared organic silicon atomic-oxygen-protection film using method of polymerization. This paper presented the effects on the film structure and its durability of the preparation processing, and analyzed the polymerization theory, the film structure and composition of the film. At last, we tested the film in our ground based atomic oxygen simulator, and indicated that the film worked well.

An Efficient Spam Mail Detection by Counter Technique

Spam mails are unwanted mails sent to large number of users. Spam mails not only consume the network resources, but cause security threats as well. This paper proposes an efficient technique to detect, and to prevent spam mail in the sender side rather than the receiver side. This technique is based on a counter set on the sender server. When a mail is transmitted to the server, the mail server checks the number of the recipients based on its counter policy. The counter policy performed by the mail server is based on some pre-defined criteria. When the number of recipients exceeds the counter policy, the mail server discontinues the rest of the process, and sends a failure mail to sender of the mail; otherwise the mail is transmitted through the network. By using this technique, the usage of network resources such as bandwidth, and memory is preserved. The simulation results in real network show that when the counter is set on the sender side, the time required for spam mail detection is 100 times faster than the time the counter is set on the receiver side, and the network resources are preserved largely compared with other anti-spam mail techniques in the receiver side.

State Economic Safety in the Conditions of Innovative Economy Formation

Innovations and innovative activity get the increasing value for successful financial and economic activity of the countries and regions. The level of innovative sphere development determines place of a country or a region in world economy and forms a basis of steady economic growth. This article is devoted to different aspects of organization of the national economic safety in the conditions of innovative development, its problems, risks and threats. Economy can be considered as aspiring for transition to innovative way only with finding of economic safety: financial independence, power stability and technological progress. There are statistical indicators, defining the level of economic security and factors, threatening economic safety of the state. The research is based on the analysis of factors and indicators in conditions of innovative development. The paper is illustrated by the examples of possible estimated system of the economic safety level.

Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)

As the information age matures, major social infrastructures such as communication, finance, military and energy, have become ever more dependent on information communication systems. And since these infrastructures are connected to the Internet, electronic intrusions such as hacking and viruses have become a new security threat. Especially, disturbance or neutralization of a major social infrastructure can result in extensive material damage and social disorder. To address this issue, many nations around the world are researching and developing various techniques and information security policies as a government-wide effort to protect their infrastructures from newly emerging threats. This paper proposes an evaluation method for information security levels of CIIP (Critical Information Infrastructure Protection), which can enhance the security level of critical information infrastructure by checking the current security status and establish security measures accordingly to protect infrastructures effectively.

Hybrid Honeypot System for Network Security

Nowadays, we are facing with network threats that cause enormous damage to the Internet community day by day. In this situation, more and more people try to prevent their network security using some traditional mechanisms including firewall, Intrusion Detection System, etc. Among them honeypot is a versatile tool for a security practitioner, of course, they are tools that are meant to be attacked or interacted with to more information about attackers, their motives and tools. In this paper, we will describe usefulness of low-interaction honeypot and high-interaction honeypot and comparison between them. And then we propose hybrid honeypot architecture that combines low and high -interaction honeypot to mitigate the drawback. In this architecture, low-interaction honeypot is used as a traffic filter. Activities like port scanning can be effectively detected by low-interaction honeypot and stop there. Traffic that cannot be handled by low-interaction honeypot is handed over to high-interaction honeypot. In this case, low-interaction honeypot is used as proxy whereas high-interaction honeypot offers the optimal level realism. To prevent the high-interaction honeypot from infections, containment environment (VMware) is used.

Reducing Stock-out Incidents at a Hospital Using Six Sigma

In managing healthcare logistics, cost is not the only factor to be considered. The level of items- criticality used in patient care services plays an important role as well. A stock-out incident of a high critical item could threaten a patient's life. In this paper, the DMAIC (Define-Measure-Analyze-Improve-Control) methodology is used to drive improvement projects based on customer driven critical to quality characteristics at a Jordanian hospital. This paper shows how the application of Six Sigma improves the performance of the case hospital logistics system by reducing the number of stock-out incidents.

Knowledge Continuity as a Part of Business Continuity Management

Today the intangible assets are the capital of knowledge and are the most important and the most valuable resource for organizations. All employees have knowledge independently of the kind of jobs they do. Knowledge is thus an asset, which influences business operations. The objective of this article is to identify knowledge continuity as an objective of business continuity management. The article has been prepared based on the analysis of secondary sources and the evaluation of primary sources of data by means of a quantitative survey conducted in the Czech Republic. The conclusion of the article is that organizations that apply business continuity management do not focus on the preservation of the knowledge of key employees. Organizations ensure knowledge continuity only intuitively, on a random basis, non-systematically and discontinuously. The non-ensuring of knowledge continuity represents a threat of loss of key knowledge for organizations and can also negatively affect business continuity.

Increase of Heat Index over Bangladesh: Impact of Climate Change

Heat Index describes the combined effect of temperature and humidity on human body. This combined effect is causing a serious threat to the health of people because of the changing climate. With climate change, climate variability and thus the occurrence of heat waves is likely to increase. Evidence is emerging from the analysis of long-term climate records of an increase in the frequency and duration of extreme temperature events in all over Bangladesh particularly during summer. Summer season has prolonged while winters have become short in Bangladesh. Summers have become hotter and thus affecting the lives of the people engaged in outdoor activities during scorching sun hours. In 2003 around 62 people died due to heat wave across the country. In this paper Bangladesh is divided in four regions and heat index has been calculated from 1960 to 2010 in these regions of the country. The aim of this paper is to identify the spots most vulnerable to heat strokes and heat waves due to high heat index. The results show upward trend of heat index in almost all the regions of Bangladesh. The highest increase in heat index value has been observed in areas of South-west region and North-west Region. The highest change in average heat index has been found in Jessore by almost 5.50C.

Review Risk and Threats Due to Dam Break

The one of most important objects in implementation of damage analysis observations is manner of dam break wave propagation. In this paper velocity and wave height due dam break in with and without tailwater states for appointment hazardous lands and flood radius are investigate. In order to modeling above phenomenon finite volume method of Roe type for solving shallow water equations is used. Results indicated that in the dry bed state risk radius due to dam break is too high. While in the wet bed risk radius has a less wide. Therefore in the first state constructions and storage facilities are encountered with destruction risk. Further velocity due to dam break in the second state is more comparing to the first state. Hence erosion and scour the river bed in the dry bed is too more compare to the wet bed.

Terrorism's Fear : Perceived Personal and National Threats

Terrorism represents an unexpected and unwanted change which challenges one-s social identity. We carried out a study to explore the demographic variables- role on the perception of personal and national threat, and to investigate the effects of perceived terrorist threat on people-s ways of life, moods, opinions and hopes. 313 residents of Palermo (Italy) were interviewed. The results pointed out that the fear of terrorism affects three areas: the cognitive, the emotional and the behavioural one.

Succesful Companies- Immunization to Global Economic Crisis: Understanding Strategic Role of NGOs

One of the most important secrets of succesful companies is the fact that cooperation with NGOs will create a good reputation for them so that they can be immunized to economic crisis. The performance of the most admired companies in the world based on the ratings of Forbes and Fortune show us that most of these firms also have close relationships with their NGOs. Today, if companies do something wrong this information spreads very quickly to do the society. If people do not like the activities of a company, it can find itself in public relations nightmare that can threaten its repuation. Since the cost of communication has dropped dramatically due to the vast use of internet, the increase in communication among stakeholders via internet makes companies more visible. These multiple and interdependent interactions among the network of stakeholders is called as the network relationships. NGOs play the role of catalyst among the stakeholders of a firm to enhance the awareness. Succesful firms are aware of this fact that NGOs have a central role in today-s business world. Firms are also aware of the fact that they can enhance their corporate reputation via cooperation with the NGOs. This fact will be illustrated in this paper by examining some of the actions of the most succesful companies in terms of their cooperations with the NGOs.

Researches on Simulation and Validation of Airborne Enhanced Ground Proximity Warning System

In this paper, enhanced ground proximity warning simulation and validation system is designed and implemented. First, based on square grid and sub-grid structure, the global digital terrain database is designed and constructed. Terrain data searching is implemented through querying the latitude and longitude bands and separated zones of global terrain database with the current aircraft position. A combination of dynamic scheduling and hierarchical scheduling is adopted to schedule the terrain data, and the terrain data can be read and delete dynamically in the memory. Secondly, according to the scope, distance, approach speed information etc. to the dangerous terrain in front, and using security profiles calculating method, collision threat detection is executed in real-time, and provides caution and warning alarm. According to this scheme, the implementation of the enhanced ground proximity warning simulation system is realized. Simulations are carried out to verify a good real-time in terrain display and alarm trigger, and the results show simulation system is realized correctly, reasonably and stable.

Abnormal IP Packets on 3G Mobile Data Networks

As the mobile Internet has become widespread in recent years, communication based on mobile networks is increasing. As a result, security threats have been posed with regard to the abnormal traffic of mobile networks, but mobile security has been handled with focus on threats posed by mobile malicious codes, and researches on security threats to the mobile network itself have not attracted much attention. In mobile networks, the IP address of the data packet is a very important factor for billing purposes. If one mobile terminal use an incorrect IP address that either does not exist or could be assigned to another mobile terminal, billing policy will cause problems. We monitor and analyze 3G mobile data networks traffics for a period of time and finds some abnormal IP packets. In this paper, we analyze the reason for abnormal IP packets on 3G Mobile Data Networks. And we also propose an algorithm based on IP address table that contains addresses currently in use within the mobile data network to detect abnormal IP packets.

Security Risk Analysis Based on the Policy Formalization and the Modeling of Big Systems

Security risk models have been successful in estimating the likelihood of attack for simple security threats. However, modeling complex system and their security risk is even a challenge. Many methods have been proposed to face this problem. Often difficult to manipulate, and not enough all-embracing they are not as famous as they should with administrators and deciders. We propose in this paper a new tool to model big systems on purpose. The software, takes into account attack threats and security strength.

The Role of State in Combating Religious Extremism and Terrorism

terrorism and extremism are among the most dangerous and difficult to forecast the phenomena of our time, which are becoming more diverse forms and rampant. Terrorist attacks often produce mass casualties, involve the destruction of material and spiritual values, beyond the recovery times, sow hatred among nations, provoke war, mistrust and hatred between the social and national groups, which sometimes can not be overcome within a generation. Currently, the countries of Central Asia are a topical issue – the threat of terrorism and religious extremism, which grow not only in our area, but throughout the world. Of course, in each of the terrorist threat is assessed differently. In our country the problem of terrorism should not be acutely. Thus, after independence and sovereignty of Kazakhstan has chosen the path of democracy, progress and free economy. With the policy of the President of Kazakhstan Nursultan Nazarbayev and well-organized political and economic reforms, there has been economic growth and rising living standards, socio-political stability, ensured civil peace and accord in society [1].