Abstract: Silk sericin (SS) is a glue-like protein from silkworm
cocoon. With its outstanding moisturization and activation collagen
synthesis properties, silk protein is applied for wound healing. Since
wound dressing in film preparation can facilitate patients-
convenience and reduce risk of wound contraction, SS and polyvinyl
alcohol (PVA) films were prepared with various concentrations of
SS. Their physical properties such as surface density, light
transmission, protein dissolution and tensile modulus were
investigated. The results presented that 3% SS with 2% PVA is the
best ingredient for SS film forming.
Abstract: The nature of wireless ad hoc and sensor networks
make them very attractive to attackers. One of the most popular and
serious attacks in wireless ad hoc networks is wormhole attack and
most proposed protocols to defend against this attack used
positioning devices, synchronized clocks, or directional antennas.
This paper analyzes the nature of wormhole attack and existing
methods of defending mechanism and then proposes round trip time
(RTT) and neighbor numbers based wormhole detection mechanism.
The consideration of proposed mechanism is the RTT between two
successive nodes and those nodes- neighbor number which is needed
to compare those values of other successive nodes. The identification
of wormhole attacks is based on the two faces. The first consideration
is that the transmission time between two wormhole attack affected
nodes is considerable higher than that between two normal neighbor
nodes. The second detection mechanism is based on the fact that by
introducing new links into the network, the adversary increases the
number of neighbors of the nodes within its radius. This system does
not require any specific hardware, has good performance and little
overhead and also does not consume extra energy. The proposed
system is designed in ad hoc on-demand distance vector (AODV)
routing protocol and analysis and simulations of the proposed system
are performed in network simulator (ns-2).
Abstract: Vermicomposting is the conversion of organic waste
into bio-fertilizers through the action of earthworm. This technology
is widely used for organic solid waste management. Waste corn pulp
blended with cow dung manure was vermicomposted over 30 days
using Eisenia fetida earthworms species. pH, temperature, moisture
content, and electrical conductivity were daily monitored. The
feedstock, vermicompost and vermiwash were analyzed for nutrient
composition. The average temperature and moisture content in the
vermi-reactor was 22.5°C and 42.5% respectively. The vermicompost
and vermiwash had an almost neutral pH whilst the electrical
conductivity was 21% higher in the vermicompost. The nitrogen and
potassium content was 57% and 79.6% richer in the vermicompost
respectively compared to the vermiwash. However, the vermiwash
was 84% richer in phosphorous as compared to vermicompost.
Furthermore, the vermiwash was 89.1% and 97.6% richer in Ca and
Mg respectively and was 97.8% richer in Na salts compared to the
vermicompost. The vermiwash also indicated a significantly higher
amount of micronutrients. Both bio-fertilizers were rich in nutrients
specification for fertilizers.
Abstract: The technique of inducing micro ecosystem
restoration is one of aquatic ecology engineering methods used to
retrieve the polluted water. Batch scale study, pilot plant study, and
field study were carried out to observe the eutrophication using the
Inducing Ecology Restorative Symbiosis Agent (IERSA) consisting
mainly degraded products by using lactobacillus, saccharomycete,
and phycomycete. The results obtained from the experiments of the
batch scale and pilot plant study allowed us to development the
parameters for the field study. A pond, 5 m to the outlet of a lake,
with an area of 500 m2 and depth of 0.6-1.2 m containing about 500
tons of water was selected as a model. After the treatment with 10
mg IERSA/L water twice a week for 70 days, the micro restoration
mechanisms consisted of three stages (i.e., restoration, impact
maintenance, and ecology recovery experiment after impact). The
COD, TN, TKN, and chlorophyll a were reduced significantly in the
first week. Although the unexpected heavy rain and contaminate
from sewage system might slow the ecology restoration. However,
the self-cleaning function continued and the chlorophyll a reduced
for 50% in one month. In the 4th week, amoeba, paramecium, rotifer,
and red wriggle worm reappeared, and the number of fish flies
appeared up to1000 fish fries/m3. Those results proved that inducing
restorative mechanism can be applied to improve the eutrophication
and to control the growth of algae in the lakes by gaining the selfcleaning
through inducing and competition of microbes. The
situation for growth of fishes also can reach an excellent result due to
the improvement of water quality.
Abstract: Wastages such as grated coconut meat, spent tea and used sugarcane had contributed negative impacts to the environment. Vermicomposting method is fully utilized to manage the wastes towards a more sustainable approach. The worms that are used in the vermicomposting are Eisenia foetida and Eudrillus euginae. This research shows that the vermicompost of wastages has voltage of electrical energy and is able to light up the Light-Emitting Diode (LED) device. Based on the experiment, the use of replicated and double compartments of the component will produce double of voltage. Hence, for conclusion, this harmless and low cost technology of vermicompost can act as a dry cell in order to reduce the usage of hazardous chemicals that can contaminate the environment.
Abstract: Despite the recent surge of research in control of
worm propagation, currently, there is no effective defense system
against such cyber attacks. We first design a distributed detection
architecture called Detection via Distributed Blackholes (DDBH).
Our novel detection mechanism could be implemented via virtual
honeypots or honeynets. Simulation results show that a worm can be
detected with virtual honeypots on only 3% of the nodes. Moreover,
the worm is detected when less than 1.5% of the nodes are infected.
We then develop two control strategies: (1) optimal dynamic trafficblocking,
for which we determine the condition that guarantees
minimum number of removed nodes when the worm is contained and
(2) predictive dynamic traffic-blocking–a realistic deployment of
the optimal strategy on scale-free graphs. The predictive dynamic
traffic-blocking, coupled with the DDBH, ensures that more than
40% of the network is unaffected by the propagation at the time
when the worm is contained.
Abstract: This paper presents a new STAKCERT KDD
processes for worm detection. The enhancement introduced in the
data-preprocessing resulted in the formation of a new STAKCERT
model for worm detection. In this paper we explained in detail how
all the processes involved in the STAKCERT KDD processes are
applied within the STAKCERT model for worm detection. Based on
the experiment conducted, the STAKCERT model yielded a 98.13%
accuracy rate for worm detection by integrating the STAKCERT
KDD processes.
Abstract: Ligula intestinalis is a three-host life-cycle
Pseudophyllidean Cestode which in its plerocercoid stage infests a
range of fresh water species. The objective of the present study was
the worm occurrence within planctonic copepods, fishes and
piscivorous birds and examine of parasite-hosts samples in the Lake
of Sattarkhan Dam (near the city of Ahar, East Azerbaijan, Iran).
Fish sample were collected with fyke and gill nets and the abdominal
cavity was examined for the presence of ligula. Zooplanktons were
captured using a planktonic net and occurrence of parasitic larval
form in the body cavity was determined. Piscivorous birds were
selected by telescope, they hunted and dissected for presence of
parasite eggs in their gut. Results indicated that prevalence of
infection was 16% for cyclopid copepoda and majority of infected
cyclopid were female Cyclops. Investigation of 310 fishes specimens
were indicated to infection of five species of cyprinid fishes. In
addition, results indicated to manipulation of six species of migratory
aquatic and semi aquatic birds by ligula. Obtained results are in
agreement by previous studies. Its definite in this study that all of
fishes in Sattarkhan Lake capable to infection, its important for
health because they capture by native people and it is documented
that ligula can be introduce as a zoonose. It's seemed that to prevent
from disperses of parasite and restricted of infection, biological
elimination can be effective and it's necessary to inform native
people about sanitation.
Abstract: This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.
Abstract: Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.
Abstract: The error diffusion method generates worm artifacts,
and weakens the edge of the halftone image when the continuous gray
scale image is reproduced by a binary image. First, to enhance the
edges, we propose the edge-enhancing filter by considering the
quantization error information and gradient of the neighboring pixels.
Furthermore, to remove worm artifacts often appearing in a halftone
image, we add adaptively random noise into the weights of an error
filter.
Abstract: Mass-mail type worms have threatened to become a large problem for the Internet. Although many researchers have analyzed such worms, there are few studies that consider worm propagation via mailing lists. In this paper, we present a mass-mailing type worm propagation model including the mailing list effect on the propagation. We study its propagation by simulation with a real e¬mail social network model. We show that the impact of the mailing list on the mass-mail worm propagation is significant, even if the mailing list is not large.
Abstract: Computer worm detection is commonly performed by
antivirus software tools that rely on prior explicit knowledge of the
worm-s code (detection based on code signatures). We present an
approach for detection of the presence of computer worms based on
Artificial Neural Networks (ANN) using the computer's behavioral
measures. Identification of significant features, which describe the
activity of a worm within a host, is commonly acquired from security
experts. We suggest acquiring these features by applying feature
selection methods. We compare three different feature selection
techniques for the dimensionality reduction and identification of the
most prominent features to capture efficiently the computer behavior
in the context of worm activity. Additionally, we explore three
different temporal representation techniques for the most prominent
features. In order to evaluate the different techniques, several
computers were infected with five different worms and 323 different
features of the infected computers were measured. We evaluated
each technique by preprocessing the dataset according to each one
and training the ANN model with the preprocessed data. We then
evaluated the ability of the model to detect the presence of a new
computer worm, in particular, during heavy user activity on the
infected computers.
Abstract: Waste corn pulp was investigated as a potential feedstock during vermicomposting using Eisenia fetida. Corn pulp is the major staple food in Southern Africa and constitutes about 25% of the total organic waste. Wastecooked corn pulp was blended with cow dung in the ratio 6:1 respectively to optimize the vermicomposting process. The feedstock was allowed to vermicompost for 30 days. The vermicomposting took place in a 3- tray plastic worm bin. Moisture content, temperature, pH, and electrical conductivity were monitoreddaily. The NPK content was determined at day 30. During vermicomposting, moisture content increased from 27.68% to 52.41%, temperature ranged between 19- 25◦C, pH increased from 5.5 to 7.7, and electrical conductivity decreased from 80000μS/cm to 60000μS/cm. The ash content increased from 11.40% to 28.15%; additionally the volatile matter increased from 1.45% to 10.02%. An odorless, dark brown vermicompost was obtained. The vermicompost NPK content was 4.19%, 1.15%, and 6.18% respectively.
Abstract: Internet security attack could endanger the privacy of
World Wide Web users and the integrity of their data. The attack can
be carried out on today's most secure systems- browsers, including
Netscape Navigator and Microsoft Internet Explorer. There are too
many types, methods and mechanisms of attack where new attack
techniques and exploits are constantly being developed and
discovered. In this paper, various types of internet security attack
mechanisms are explored and it is pointed out that when different
types of attacks are combined together, network security can suffer
disastrous consequences.