Abstract: Cloud Computing refers to applications delivered as
services over the internet, and the datacenters that provide those
services with hardware and systems software. These were earlier
referred to as Software as a Service (SaaS). Scheduling is justified by
job components (called tasks), lack of information. In fact, in a large
fraction of jobs from machine learning, bio-computing, and image
processing domains, it is possible to estimate the maximum time
required for a task in the job. This study focuses on Trust based
scheduling to improve cloud security by modifying Heterogeneous
Earliest Finish Time (HEFT) algorithm. It also proposes TR-HEFT
(Trust Reputation HEFT) which is then compared to Dynamic Load
Scheduling.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: The Gezi Park protests of 2013 have significantly changed the Turkish agenda and its effects have been felt historically. The protests, which rapidly spread throughout the country, were triggered by the proposal to recreate the Ottoman Army Barracks to function as a shopping mall on Gezi Park located in Istanbul’s Taksim neighbourhood despite the oppositions of several NGOs and when trees were cut in the park for this purpose. Once the news that the construction vehicles entered the park on May 27 spread on social media, activists moved into the park to stop the demolition, against whom the police used disproportioned force. With this police intervention and the then prime-minister Tayyip Erdoğan's insistent statements about the construction plans, the protests turned into anti- government demonstrations, which then spread to the rest of the country, mainly in big cities like Ankara and Izmir. According to the Ministry of Internal Affairs’ June 23rd reports, 2.5 million people joined the demonstrations in 79 provinces, that is all of them, except for the provinces of Bayburt and Bingöl, while even more people shared their opinions via social networks. As a result of these events, 8 civilians and 2 security personnel lost their lives, namely police chief Mustafa Sarı, police officer Ahmet Küçükdağ, citizens Mehmet Ayvalıtaş, Abdullah Cömert, Ethem Sarısülük, Ali İsmail Korkmaz, Ahmet Atakan, Berkin Elvan, Burak Can Karamanoğlu, Mehmet İstif, and Elif Çermik, and 8163 more were injured. Besides being a turning point in Turkish history, the Gezi Park protests also had broad repercussions in both in Turkish and in global media, which focused on Turkey throughout the events. Our study conducts content analysis of three Turkish reporting newspapers with varying ideological standpoints, Hürriyet, Cumhuriyet ve Yeni Şafak, in order to reveal their basic approach to news casting in context of the Gezi Park protests. Headlines, news segments, and news content relating to the Gezi protests were treated and analysed for this purpose. The aim of this study is to understand the social effects of the Gezi Park protests through media samples with varying political attitudes towards news casting.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Abstract: This study was undertaken at four different sites
(north polluted, south polluted, south healthy and north healthy) in
Tehran, in order to examine whether there was a relationship between
publicly available air quality data and the public’s perception of air
quality and to suggest some guidelines for reducing air pollution. A
total of 200 people were accidentally filled out the research
questionnaires at mentioned sites and air quality data were obtained
simultaneously from the Air Quality Control Department. Data was
analyzed in Excel and SPSS software’s. Clean air and job security
were of great importance to people comparing to other pleasant
aspect of life. Also air pollution and serious diseases were the most
important of people concerns. Street monitors and news paper
services on air quality were little used by the public as a means of
obtaining information on air pollution. Using public transportation
and avoiding inevitable journeys are the most important ways for
reducing air pollution. The results reveal that the public’s perception
of air quality is not a reliable indicator of the actual levels of air
pollution.
Abstract: Second generation military Filipino Amerasians
comprise a formidable contemporary segment of the estimated
250,000-plus biracial Amerasians in the Philippines today. Overall,
they are a stigmatized and socioeconomically marginalized diaspora;
historically, they were abandoned or estranged by U.S. military
personnel fathers assigned during the century-long Colonial, Post-
World War II and Cold War Era of permanent military basing (1898-
1992). Indeed, U.S. military personnel are assigned in smaller
numbers in the Philippines today. This inquiry is an outgrowth of two
recent small sample studies. The first surfaced the impact of the U.S.
military prostitution system on formation of the ‘Derivative
Amerasian Family Construct’ on first generation Amerasians; a
second, qualitative case study suggested the continued effect of the
prostitution systems' destructive impetuous on second generation
Amerasians. The intent of this current qualitative, multiple-case study
was to actively seek out second generation sex industry toilers. The
purpose was to focus further on this human phenomenon in the postbasing
and post-military prostitution system eras. As background, the
former military prostitution apparatus has transformed into a modern
dynamic of rampant sex tourism and prostitution nationwide. This is
characterized by hotel and resorts offering unrestricted carnal access,
urban and provincial brothels (casas), discos, bars and pickup clubs,
massage parlors, local barrio karaoke bars and street prostitution. A
small case study sample (N = 4) of female and male second
generation Amerasians were selected. Sample formation employed a
non-probability ‘snowball’ technique drawing respondents from the
notorious Angeles, Metro Manila, Olongapo City ‘AMO Amerasian
Triangle’ where most former U.S. military installations were sited
and modern sex tourism thrives. A six-month study and analysis of
in-depth interviews of female and male sex laborers, their families
and peers revealed a litany of disturbing, and troublesome
experiences. Results showed profiles of debilitating human poverty,
history of family disorganization, stigmatization, social
marginalization and the ghost of the military prostitution system and
its harmful legacy on Amerasian family units. Emerging were testimonials of wayward young people ensnared in a maelstrom of
deep economic deprivation, familial dysfunction, psychological
desperation and societal indifference. The paper recommends that
more study is needed and implications of unstudied psychosocial and
socioeconomic experiences of distressed younger generations of
military Amerasians require specific research. Heretofore apathetic or
disengaged U.S. institutions need to confront the issue and formulate
activist and solution-oriented social welfare, human services and
immigration easement policies and alternatives. These institutions
specifically include academic and social science research agencies,
corporate foundations, the U.S. Congress, and Departments of State,
Defense and Health and Human Services, and Homeland Security
(i.e. Citizen and Immigration Services) It is them who continue to
endorse a laissez-faire policy of non-involvement over the entire
Filipino Amerasian question. Such apathy, the paper concludes,
relegates this consequential but neglected blood progeny to the status
of humiliating destitution and exploitation. Amerasians; thus, remain
entrapped in their former colonial, and neo-colonial habitat.
Ironically, they are unwitting victims of a U.S. American homeland
that fancies itself geo-politically as a strong and strategic military
treaty ally of the Philippines in the Western Pacific.
Abstract: Current transformers are an integral part of power
system because it provides a proportional safe amount of current for
protection and measurement applications. However, when the power
system experiences an abnormal situation leading to huge current
flow, then this huge current is proportionally injected to the
protection and metering circuit. Since the protection and metering
equipment’s are designed to withstand only certain amount of current
with respect to time, these high currents pose a risk to man and
equipment. Therefore, during such instances, the CT saturation
characteristics have a huge influence on the safety of both man and
equipment and on the reliability of the protection and metering
system. This paper shows the effect of burden on the Accuracy Limiting
factor/ Instrument security factor of current transformers and the
change in saturation characteristics of the CT’s. The response of the
CT to varying levels of overcurrent at different connected burden will
be captured using the data acquisition software LabVIEW. Analysis
is done on the real time data gathered using LabVIEW. Variation of
current transformer saturation characteristics with changes in burden
will be discussed.
Abstract: As a basic physiology need, threat to sufficient food
production is threat to human survival. Food security has been an
issue that has gained global concern. This paper looks at the food
security in Nigeria by assessing the availability of food and
accessibility of the available food. The paper employed multiple
linear regression technique and graphic trends of growth rates of
relevant variables to show the situation of food security in Nigeria.
Results of the tests revealed that population growth rate was higher
than the growth rate of food availability in Nigeria for the earlier
period of the study. Commercial bank credit to agricultural sector,
foreign exchange utilization for food and the Agricultural Credit
Guarantee Scheme Fund (ACGSF) contributed significantly to food
availability in Nigeria. Food prices grew at a faster rate than the
average income level, making it difficult to access sufficient food. It
implies that prior to the year 2012; there was insufficient food to feed
the Nigerian populace. However, continued credit to the food and
agricultural sector will ensure sustained and sufficient production of
food in Nigeria. Microfinance banks should make sufficient credit
available to smallholder farmer. Government should further control
and subsidize the rising price of food to make it more accessible by
the people.
Abstract: The availability to deploy mobile applications for
health care is increasing daily thru different mobile app stores. But
within these capabilities the number of hacking attacks has also
increased, in particular into medical mobile applications. The security
vulnerabilities in medical mobile apps can be triggered by errors in
code, incorrect logic, poor design, among other parameters. This is
usually used by malicious attackers to steal or modify the users’
information. The aim of this research is to analyze the vulnerabilities
detected in mobile medical apps according to risk factor standards
defined by OWASP in 2014.
Abstract: Damaturu is the capital of Yobe State in northeastern
Nigeria where civic amenities and facilities are not adequate even
after 24 years of its existence. The volatile security and political
situations are most significant causes for the same. The basic facility
for the citizens in terms of drinking water and electricity are not
available. For the drinking water, they have to rely on personal
boreholes or the filtered borehole waters available in packaged
sachets in market. The present study is concerned with environmental
impact of indiscriminate disposal of drinking synthetic polythene
water sachets in Damaturu. The sachet water is popularly called as
“pure water”, but its purity is questionable. Increased production and
consumption of sachet water has led to indiscriminate dumping and
disposal of empty sachets leading to serious environmental threat.
The evidence of this is seen for sachets littering the streets and the
drainages blocked by ‘blocks’ of water sachet waste. Sachet water
gained much popularity in Nigeria because the product is convenient
for use, affordable and economically viable. The present study aims
to find out the solution to this environmental problem. The fieldbased
study has found some significant factors that cause
environmental and socio economic effect due to this. Some
recommendations have been made based on research findings
regarding sustainable waste management, recycling and re-use of the
non-biodegradable products in society.
Abstract: E-retailing is the sale of goods online that takes place
over the Internet. The Internet has shrunk the entire World. World eretailing
is growing at an exponential rate in the Americas, Europe
and Asia. However, e-retailing costs require expensive investment,
such as hardware, software, and security systems. Cloud computing
technology is internet-based computing for the management and
delivery of applications and services. Cloud-based e-retailing
application models allow enterprises to lower their costs with their
effective implementation of e-retailing activities. In this paper, we
describe the concept of cloud computing and present the architecture
of cloud computing, combining the features of e-retailing. In
addition, we propose a strategy for implementing cloud computing
with e-retailing. Finally, we explain the benefits from the
architecture.
Abstract: Elliptic curve discrete logarithm problem(ECDLP) is
one of problems on which the security of pairing-based cryptography
is based. This paper considers Pollard’s rho method to evaluate
the security of ECDLP on Barreto-Naehrig(BN) curve that is an
efficient pairing-friendly curve. Some techniques are proposed to
make the rho method efficient. Especially, the group structure on
BN curve, distinguished point method, and Montgomery trick are
well-known techniques. This paper applies these techniques and
shows its optimization. According to the experimental results for
which a large-scale parallel system with MySQL is applied, 94-bit
ECDLP was solved about 28 hours by parallelizing 71 computers.
Abstract: The growing number of computer viruses and the
detection of zero day malware have been the concern for security
researchers for a large period of time. Existing antivirus products
(AVs) rely on detecting virus signatures which do not provide a full
solution to the problems associated with these viruses. The use of
logic formulae to model the behaviour of viruses is one of the most
encouraging recent developments in virus research, which provides
alternatives to classic virus detection methods. In this paper, we
proposed a comparative study about different virus detection
techniques. This paper provides the advantages and drawbacks of
different detection techniques. Different techniques will be used in
this paper to provide a discussion about what technique is more
effective to detect computer viruses.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: The increasing volume of solid waste generated,
collected and disposed daily complicate adequate management of
solid waste by relevant agency like Niger State Environmental
Protection Agency (NISEPA). In addition, the impacts of solid waste
on the natural environment and human livelihood require
identification of cost-effective ways for sustainable municipal waste
management in Nigeria. These signal the need for identifying
environment-friendly initiative and local solution to address the
problem of municipal solid waste. A research field was secured at
Pago, Minna, Niger State which is located in the guinea savanna belt
of Nigeria, within longitude 60 361 4311 - 4511 and latitude 90 291
37.6111 - .6211 N. Poultry droppings, decomposed household waste
manure and NPK treatments were used. The experimental field was
divided into three replications and four (4) treatments on each
replication making a total of twelve (12) plots. The treatments were
allotted using Randomized Complete Block Design (RCBD) and
Data collected was analyzed using SPSS software and RCBD. The
result depicts variation in plant height and number of leaves at 50%
flowering; Poultry dropping records the highest height while the
number of leaves for waste manure competes fairly well with NPK
treatment. Similarly, the varying treatments significantly increase
vegetable yield, as the control (non-treatment) records the least yield
for the three vegetable samples. Adoption of this organic manure for
cultivation does not only enhance environment quality and attainment
of food security but will contribute to local economic development,
poverty alleviation as well as social inclusion.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: The purpose of this article is to make an approach to
the Security Studies, exposing their theories and concepts to
understand the role that they have had in the interpretation of the
changes and continuities of the world order and their impact on
policies in facing the problems of the 21st century. The aim is to
build a bridge between the security studies as a subfield and the
meaning that has been given to the world order. The idea of epistemic
communities serves as a methodological proposal for the different
programs of research in security studies, showing their influence in
the realities of States, intergovernmental organizations and
transnational forces, moving to implement, perpetuate and project a
vision of the world order.
Abstract: In this paper, the secure BioSemantic Scheme is
presented to bridge biological/biomedical research problems and
computational solutions via semantic computing. Due to the diversity
of problems in various research fields, the semantic capability
description language (SCDL) plays and important role as a common
language and generic form for problem formalization. SCDL is
expected the essential for future semantic and logical computing in
Biosemantic field. We show several example to Biomedical problems
in this paper. Moreover, in the coming age of cloud computing, the
security problem is considered to be crucial issue and we presented a
practical scheme to cope with this problem.
Abstract: Most of the existing video streaming protocols
provide video services without considering security aspects in
decentralized mobile ad-hoc networks. The security policies adapted
to the currently existing non-streaming protocols, do not comply with
the live video streaming protocols resulting in considerable
vulnerability, high bandwidth consumption and unreliability which
cause severe security threats, low bandwidth and error prone
transmission respectively in video streaming applications. Therefore
a synergized methodology is required to reduce vulnerability and
bandwidth consumption, and enhance reliability in the video
streaming applications in MANET. To ensure the security measures
with reduced bandwidth consumption and improve reliability of the
video streaming applications, a Secure Low-bandwidth Video
Streaming through Reliable Multipath Propagation (SLVRMP)
protocol architecture has been proposed by incorporating the two
algorithms namely Secure Low-bandwidth Video Streaming
Algorithm and Reliable Secure Multipath Propagation Algorithm
using Layered Video Coding in non-overlapping zone routing
network topology. The performances of the proposed system are
compared to those of the other existing secure multipath protocols
Sec-MR, SPREAD using NS 2.34 and the simulation results show
that the performances of the proposed system get considerably
improved.
Abstract: The rapid growth of multimedia technology demands
the secure and efficient access to information. This fast growing lose
the confidence of unauthorized duplication. Henceforth the protection
of multimedia content is becoming more important. Watermarking
solves the issue of unlawful copy of advanced data. In this paper,
blind video watermarking technique has been proposed. A luminance
layer of selected frames is interlaced into two even and odd rows of
an image, further it is deinterlaced and equalizes the coefficients of
the two shares. Color watermark is split into different blocks, and the
pieces of block are concealed in one of the share under the wavelet
transform. Stack the two images into a single image by introducing
interlaced even and odd rows in the two shares. Finally, chrominance
bands are concatenated with the watermarked luminance band. The
safeguard level of the secret information is high, and it is
undetectable. Results show that the quality of the video is not
changed also yields the better PSNR values.