Sericin Film: Influence of Concentration on its Physical Properties

Silk sericin (SS) is a glue-like protein from silkworm cocoon. With its outstanding moisturization and activation collagen synthesis properties, silk protein is applied for wound healing. Since wound dressing in film preparation can facilitate patients- convenience and reduce risk of wound contraction, SS and polyvinyl alcohol (PVA) films were prepared with various concentrations of SS. Their physical properties such as surface density, light transmission, protein dissolution and tensile modulus were investigated. The results presented that 3% SS with 2% PVA is the best ingredient for SS film forming.

Wormhole Attack Detection in Wireless Sensor Networks

The nature of wireless ad hoc and sensor networks make them very attractive to attackers. One of the most popular and serious attacks in wireless ad hoc networks is wormhole attack and most proposed protocols to defend against this attack used positioning devices, synchronized clocks, or directional antennas. This paper analyzes the nature of wormhole attack and existing methods of defending mechanism and then proposes round trip time (RTT) and neighbor numbers based wormhole detection mechanism. The consideration of proposed mechanism is the RTT between two successive nodes and those nodes- neighbor number which is needed to compare those values of other successive nodes. The identification of wormhole attacks is based on the two faces. The first consideration is that the transmission time between two wormhole attack affected nodes is considerable higher than that between two normal neighbor nodes. The second detection mechanism is based on the fact that by introducing new links into the network, the adversary increases the number of neighbors of the nodes within its radius. This system does not require any specific hardware, has good performance and little overhead and also does not consume extra energy. The proposed system is designed in ad hoc on-demand distance vector (AODV) routing protocol and analysis and simulations of the proposed system are performed in network simulator (ns-2).

Comparison of Vermicompost and Vermiwash Bio-Fertilizers from Vermicomposting Waste Corn Pulp

Vermicomposting is the conversion of organic waste into bio-fertilizers through the action of earthworm. This technology is widely used for organic solid waste management. Waste corn pulp blended with cow dung manure was vermicomposted over 30 days using Eisenia fetida earthworms species. pH, temperature, moisture content, and electrical conductivity were daily monitored. The feedstock, vermicompost and vermiwash were analyzed for nutrient composition. The average temperature and moisture content in the vermi-reactor was 22.5°C and 42.5% respectively. The vermicompost and vermiwash had an almost neutral pH whilst the electrical conductivity was 21% higher in the vermicompost. The nitrogen and potassium content was 57% and 79.6% richer in the vermicompost respectively compared to the vermiwash. However, the vermiwash was 84% richer in phosphorous as compared to vermicompost. Furthermore, the vermiwash was 89.1% and 97.6% richer in Ca and Mg respectively and was 97.8% richer in Na salts compared to the vermicompost. The vermiwash also indicated a significantly higher amount of micronutrients. Both bio-fertilizers were rich in nutrients specification for fertilizers.

The Micro Ecosystem Restoration Mechanism Applied for Feasible Research of Lakes Eutrophication Enhancement

The technique of inducing micro ecosystem restoration is one of aquatic ecology engineering methods used to retrieve the polluted water. Batch scale study, pilot plant study, and field study were carried out to observe the eutrophication using the Inducing Ecology Restorative Symbiosis Agent (IERSA) consisting mainly degraded products by using lactobacillus, saccharomycete, and phycomycete. The results obtained from the experiments of the batch scale and pilot plant study allowed us to development the parameters for the field study. A pond, 5 m to the outlet of a lake, with an area of 500 m2 and depth of 0.6-1.2 m containing about 500 tons of water was selected as a model. After the treatment with 10 mg IERSA/L water twice a week for 70 days, the micro restoration mechanisms consisted of three stages (i.e., restoration, impact maintenance, and ecology recovery experiment after impact). The COD, TN, TKN, and chlorophyll a were reduced significantly in the first week. Although the unexpected heavy rain and contaminate from sewage system might slow the ecology restoration. However, the self-cleaning function continued and the chlorophyll a reduced for 50% in one month. In the 4th week, amoeba, paramecium, rotifer, and red wriggle worm reappeared, and the number of fish flies appeared up to1000 fish fries/m3. Those results proved that inducing restorative mechanism can be applied to improve the eutrophication and to control the growth of algae in the lakes by gaining the selfcleaning through inducing and competition of microbes. The situation for growth of fishes also can reach an excellent result due to the improvement of water quality.

Natural Discovery: Electricity Potential from Vermicompost (Waste to Energy)

Wastages such as grated coconut meat, spent tea and used sugarcane had contributed negative impacts to the environment. Vermicomposting method is fully utilized to manage the wastes towards a more sustainable approach. The worms that are used in the vermicomposting are Eisenia foetida and Eudrillus euginae. This research shows that the vermicompost of wastages has voltage of electrical energy and is able to light up the Light-Emitting Diode (LED) device. Based on the experiment, the use of replicated and double compartments of the component will produce double of voltage. Hence, for conclusion, this harmless and low cost technology of vermicompost can act as a dry cell in order to reduce the usage of hazardous chemicals that can contaminate the environment.

Distributed Detection and Optimal Traffic-blocking of Network Worms

Despite the recent surge of research in control of worm propagation, currently, there is no effective defense system against such cyber attacks. We first design a distributed detection architecture called Detection via Distributed Blackholes (DDBH). Our novel detection mechanism could be implemented via virtual honeypots or honeynets. Simulation results show that a worm can be detected with virtual honeypots on only 3% of the nodes. Moreover, the worm is detected when less than 1.5% of the nodes are infected. We then develop two control strategies: (1) optimal dynamic trafficblocking, for which we determine the condition that guarantees minimum number of removed nodes when the worm is contained and (2) predictive dynamic traffic-blocking–a realistic deployment of the optimal strategy on scale-free graphs. The predictive dynamic traffic-blocking, coupled with the DDBH, ensures that more than 40% of the network is unaffected by the propagation at the time when the worm is contained.

Efficient STAKCERT KDD Processes in Worm Detection

This paper presents a new STAKCERT KDD processes for worm detection. The enhancement introduced in the data-preprocessing resulted in the formation of a new STAKCERT model for worm detection. In this paper we explained in detail how all the processes involved in the STAKCERT KDD processes are applied within the STAKCERT model for worm detection. Based on the experiment conducted, the STAKCERT model yielded a 98.13% accuracy rate for worm detection by integrating the STAKCERT KDD processes.

A Report on Occurrence and Parasite-Host of Ligula intestinalis in Sattarkhan Lake(East Azerbaijan-Iran)

Ligula intestinalis is a three-host life-cycle Pseudophyllidean Cestode which in its plerocercoid stage infests a range of fresh water species. The objective of the present study was the worm occurrence within planctonic copepods, fishes and piscivorous birds and examine of parasite-hosts samples in the Lake of Sattarkhan Dam (near the city of Ahar, East Azerbaijan, Iran). Fish sample were collected with fyke and gill nets and the abdominal cavity was examined for the presence of ligula. Zooplanktons were captured using a planktonic net and occurrence of parasitic larval form in the body cavity was determined. Piscivorous birds were selected by telescope, they hunted and dissected for presence of parasite eggs in their gut. Results indicated that prevalence of infection was 16% for cyclopid copepoda and majority of infected cyclopid were female Cyclops. Investigation of 310 fishes specimens were indicated to infection of five species of cyprinid fishes. In addition, results indicated to manipulation of six species of migratory aquatic and semi aquatic birds by ligula. Obtained results are in agreement by previous studies. Its definite in this study that all of fishes in Sattarkhan Lake capable to infection, its important for health because they capture by native people and it is documented that ligula can be introduce as a zoonose. It's seemed that to prevent from disperses of parasite and restricted of infection, biological elimination can be effective and it's necessary to inform native people about sanitation.

Detecting and Locating Wormhole Attacks in Wireless Sensor Networks Using Beacon Nodes

This paper focuses on wormhole attacks detection in wireless sensor networks. The wormhole attack is particularly challenging to deal with since the adversary does not need to compromise any nodes and can use laptops or other wireless devices to send the packets on a low latency channel. This paper introduces an easy and effective method to detect and locate the wormholes: Since beacon nodes are assumed to know their coordinates, the straight line distance between each pair of them can be calculated and then compared with the corresponding hop distance, which in this paper equals hop counts × node-s transmission range R. Dramatic difference may emerge because of an existing wormhole. Our detection mechanism is based on this. The approximate location of the wormhole can also be derived in further steps based on this information. To the best of our knowledge, our method is much easier than other wormhole detecting schemes which also use beacon nodes, and to those have special requirements on each nodes (e.g., GPS receivers or tightly synchronized clocks or directional antennas), ours is more economical. Simulation results show that the algorithm is successful in detecting and locating wormholes when the density of beacon nodes reaches 0.008 per m2.

Improvising Intrusion Detection for Malware Activities on Dual-Stack Network Environment

Malware is software which was invented and meant for doing harms on computers. Malware is becoming a significant threat in computer network nowadays. Malware attack is not just only involving financial lost but it can also cause fatal errors which may cost lives in some cases. As new Internet Protocol version 6 (IPv6) emerged, many people believe this protocol could solve most malware propagation issues due to its broader addressing scheme. As IPv6 is still new compares to native IPv4, some transition mechanisms have been introduced to promote smoother migration. Unfortunately, these transition mechanisms allow some malwares to propagate its attack from IPv4 to IPv6 network environment. In this paper, a proof of concept shall be presented in order to show that some existing IPv4 malware detection technique need to be improvised in order to detect malware attack in dual-stack network more efficiently. A testbed of dual-stack network environment has been deployed and some genuine malware have been released to observe their behaviors. The results between these different scenarios will be analyzed and discussed further in term of their behaviors and propagation methods. The results show that malware behave differently on IPv6 from the IPv4 network protocol on the dual-stack network environment. A new detection technique is called for in order to cater this problem in the near future.

Dispersed Error Control based on Error Filter Design for Improving Halftone Image Quality

The error diffusion method generates worm artifacts, and weakens the edge of the halftone image when the continuous gray scale image is reproduced by a binary image. First, to enhance the edges, we propose the edge-enhancing filter by considering the quantization error information and gradient of the neighboring pixels. Furthermore, to remove worm artifacts often appearing in a halftone image, we add adaptively random noise into the weights of an error filter.

Propagation Model for a Mass-Mailing Worm with Mailing List

Mass-mail type worms have threatened to become a large problem for the Internet. Although many researchers have analyzed such worms, there are few studies that consider worm propagation via mailing lists. In this paper, we present a mass-mailing type worm propagation model including the mailing list effect on the propagation. We study its propagation by simulation with a real e¬mail social network model. We show that the impact of the mailing list on the mass-mail worm propagation is significant, even if the mailing list is not large.

Improving Worm Detection with Artificial Neural Networks through Feature Selection and Temporal Analysis Techniques

Computer worm detection is commonly performed by antivirus software tools that rely on prior explicit knowledge of the worm-s code (detection based on code signatures). We present an approach for detection of the presence of computer worms based on Artificial Neural Networks (ANN) using the computer's behavioral measures. Identification of significant features, which describe the activity of a worm within a host, is commonly acquired from security experts. We suggest acquiring these features by applying feature selection methods. We compare three different feature selection techniques for the dimensionality reduction and identification of the most prominent features to capture efficiently the computer behavior in the context of worm activity. Additionally, we explore three different temporal representation techniques for the most prominent features. In order to evaluate the different techniques, several computers were infected with five different worms and 323 different features of the infected computers were measured. We evaluated each technique by preprocessing the dataset according to each one and training the ANN model with the preprocessed data. We then evaluated the ability of the model to detect the presence of a new computer worm, in particular, during heavy user activity on the infected computers.

Vermicomposting of Waste Corn Pulp Blended with Cow Dung Manure using Eisenia Fetida

Waste corn pulp was investigated as a potential feedstock during vermicomposting using Eisenia fetida. Corn pulp is the major staple food in Southern Africa and constitutes about 25% of the total organic waste. Wastecooked corn pulp was blended with cow dung in the ratio 6:1 respectively to optimize the vermicomposting process. The feedstock was allowed to vermicompost for 30 days. The vermicomposting took place in a 3- tray plastic worm bin. Moisture content, temperature, pH, and electrical conductivity were monitoreddaily. The NPK content was determined at day 30. During vermicomposting, moisture content increased from 27.68% to 52.41%, temperature ranged between 19- 25◦C, pH increased from 5.5 to 7.7, and electrical conductivity decreased from 80000μS/cm to 60000μS/cm. The ash content increased from 11.40% to 28.15%; additionally the volatile matter increased from 1.45% to 10.02%. An odorless, dark brown vermicompost was obtained. The vermicompost NPK content was 4.19%, 1.15%, and 6.18% respectively.

Mechanisms of Internet Security Attacks

Internet security attack could endanger the privacy of World Wide Web users and the integrity of their data. The attack can be carried out on today's most secure systems- browsers, including Netscape Navigator and Microsoft Internet Explorer. There are too many types, methods and mechanisms of attack where new attack techniques and exploits are constantly being developed and discovered. In this paper, various types of internet security attack mechanisms are explored and it is pointed out that when different types of attacks are combined together, network security can suffer disastrous consequences.