Abstract: One of the leading problems in Cyber Security today
is the emergence of targeted attacks conducted by adversaries with
access to sophisticated tools. These attacks usually steal senior level
employee system privileges, in order to gain unauthorized access to
confidential knowledge and valuable intellectual property. Malware
used for initial compromise of the systems are sophisticated and
may target zero-day vulnerabilities. In this work we utilize common
behaviour of malware called ”beacon”, which implies that infected
hosts communicate to Command and Control servers at regular
intervals that have relatively small time variations. By analysing
such beacon activity through passive network monitoring, it is
possible to detect potential malware infections. So, we focus on
time gaps as indicators of possible C2 activity in targeted enterprise
networks. We represent DNS log files as a graph, whose vertices
are destination domains and edges are timestamps. Then by using
four periodicity detection algorithms for each pair of internal-external
communications, we check timestamp sequences to identify the
beacon activities. Finally, based on the graph structure, we infer the
existence of other infected hosts and malicious domains enrolled in
the attack activities.
Abstract: This study analyzes Americans’ views of four Atlantic Canadian provinces as travel destinations regarding specific destination attributes for a pleasure trip, awareness (heard) of the destinations, past visit to the destinations during the prior two years, and intention to visit in the next two years. Results indicate that American travellers perceived the four Atlantic Canadian provinces as separate and distinct when rating best-fit destination attributes to each destination. The results suggest that travel destinations, specifically the four selected destinations, must be prepared to differentiate their destination’s image and the range of experiences and services to appeal and attract more American travellers.
Abstract: This study extends technology acceptance model (TAM) to investigate the antecedents and consequences of social media adoption by tourists and travel agents. It compares their perceptions on social media adoption and its consequences. Online survey was addressed to tourists and travel agents for data collection purposes. Structural equation modelling was employed for analysis purposes. The findings revealed that the majority of tourists and travel agents involved in the study believe in the usefulness of social media adoption for travel planning and marketing purposes. They agree that adopting social media could change the attitude of tourists towards specific destination or attraction and influence their purchasing decisions. This study contributes to knowledge by extending TAM and provides some managerial implication to marketers.
Abstract: Human utilizes coastal resources as well as deteriorates them. Coastal tourism may degrade the environment if poorly managed. This research investigated the shoreline change at Koa Toa Island, one of the most famous tourist destinations. Aerial photographs and satellite images from three different periods were collected and analyzed. The results showed that the noticeable shoreline change before and after the tourism on the island had expanded. Between 1995 and 2002 when the tourism on Koh Toa Island was not intensive, sediment deposition occurred along most of the coastline. However, after the tourism had grown during 2002 to 2015, the coast evidently experienced less deposition and more erosion. The erosion resulted from less land-based sediment being provided to the littoral system. If the coastline of Koh Toa Island is not carefully sustained, the tourism will disappear along with the beautiful beach.
Abstract: The importance of culture and tourism in the attractiveness and competitiveness of the countries is central, and many regions are evidencing their cultural assets, tangible and intangible, as a means to create comparative advantages in tourism and produce a distinctive place in response to the pressures of globalization. Culture and tourism are interlinked because of their obvious combination and growth potential. Cultural tourism is a crucial global tourism market with fast growing. Regions can develop significant relations between culture and tourism to increase their attractiveness as places to visit, live and invest, increasing their competitiveness. Accordingly, having new and creative approach to historical areas as cultural value-based destinations can improve their conditions to promote tourism. Furthermore, in 21st century, media become the most important factor affecting the development of urban cities, including public places. As a result of the digital revolution, re-imaging and re-linkage public places by media are essential to create more interactions between public spaces and users, interaction media display, and urban screens, one of the most important defined media. This interaction can transform the urban space from being neglected to be more interactive space with users, especially the pedestrians. The paper focuses on The Walled City of Famagusta. As many other historic quarters elsewhere in the world, is in a process, of decay and deterioration, and its functionally distinctive areas are severely threatened by physical, functional, locational, and image obsolescence at varying degrees. So the focus on the future development of this area through tourism promotion can be an appropriate decision for the monument enhancement of the spatial quality in Walled City of Famagusta. In this paper, it is aimed to identify the effects of these new digital factors to transform public spaces especially in historic urban areas to promote creative tourism. Accordingly, two different analysis methods are used as well as a theoretical review. The first is case study on site and the second is Close ended questionnaire, test many concepts raised in this paper. The physical analysis on site carried out in order to evaluate the walled city restoration for touristic purpose. Besides, theoretical review is done in order to provide background to the subject and cleared Factors to attract tourists.
Abstract: Recently developed cooperative diversity scheme
enables a terminal to get transmit diversity through the support of other
terminals. However, most of the introduced cooperative schemes have
a common fault of decreased transmission rate because the destination
should receive the decodable compositions of symbols from the source
and the relay. In order to achieve high data rate, we propose a
cooperative scheme that employs hierarchical modulation. This
scheme is free from the rate loss and allows seamless cooperative
communication.
Abstract: Tourism can do a great deal of good in destinations,
whether it be by bringing economic benefits to local communities,
helping with conservation efforts or in placing a value on aspects of
cultural heritage. As responsive travelers, we must all try to do more
of the good and less of the negative. This is simply description of the
sustainable tourism. This paper aims to set some criteria of successful
sustainable tourism development and then through these criteria
analyzing the development of some resorts in Egypt known as
sustainable resorts. Hence, a comprehensive improvement of the
touristic areas is certainly needed to ensure a successful sustainable
tourism development radiated the sense of uniformity and coherence.
Egypt can benefit from these criteria to develop its resorts in order to
preserve and revitalize its unique natural character and achieve mixed
uses and tourism development.
Abstract: Many cluster based routing protocols have been
proposed in the field of wireless sensor networks, in which a group of
nodes are formed as clusters. A cluster head is selected from one
among those nodes based on residual energy, coverage area, number
of hops and that cluster-head will perform data gathering from
various sensor nodes and forwards aggregated data to the base station
or to a relay node (another cluster-head), which will forward the
packet along with its own data packet to the base station. Here a
Game Theory based Diligent Energy Utilization Algorithm (GTDEA)
for routing is proposed. In GTDEA, the cluster head selection is done
with the help of game theory, a decision making process, that selects
a cluster-head based on three parameters such as residual energy
(RE), Received Signal Strength Index (RSSI) and Packet Reception
Rate (PRR). Finding a feasible path to the destination with minimum
utilization of available energy improves the network lifetime and is
achieved by the proposed approach. In GTDEA, the packets are
forwarded to the base station using inter-cluster routing technique,
which will further forward it to the base station. Simulation results
reveal that GTDEA improves the network performance in terms of
throughput, lifetime, and power consumption.
Abstract: We investigate the large scale of networks in the
context of network survivability under attack. We use appropriate
techniques to evaluate and the attacker-based- and the defenderbased-
network survivability. The attacker is unaware of the operated
links by the defender. Each attacked link has some pre-specified
probability to be disconnected. The defender choice is so that to
maximize the chance of successfully sending the flow to the
destination node. The attacker however will select the cut-set with
the highest chance to be disabled in order to partition the network.
Moreover, we extend the problem to the case of selecting the best p
paths to operate by the defender and the best k cut-sets to target by
the attacker, for arbitrary integers p,k>1. We investigate some
variations of the problem and suggest polynomial-time solutions.
Abstract: Lagos urban mini bus drivers play a critical role in the
transportation sector. The current major mode of transportation
within Lagos metropolis remains road transportation and this
confirms the relevance of urban mini-bus drivers in transporting the
populace to their various destinations. Other modes of transportation
such as the train and waterways are currently inadequate. Various
threats to the well-being of urban bus drivers include congested
traffic typical of modern day lifestyles, dwindling financial returns
due to long hours in traffic, fewer hours of sleep, inadequate diet,
time pressure, and assaults related to fare disputes. Several healthrelated
problems have been documented to be associated with urban
bus driving. For instance, greater rates of hypertension, obesity and
cholesterol level have been reported. Research studies are yet to
identify the influence of age and marital status on the well-being of
urban mini-bus drivers in Lagos metropolis. A study of this nature is
necessary as it is culturally perceived in Nigeria that older and
married people are especially influenced by family affiliation and
would behave in ways that would project positive outcomes. The
study sample consisted of 150 urban mini-bus drivers who were
conveniently sampled from six (6) different terminuses where their
journey begins and terminates. The well-being questionnaire was
administered to participants. The criteria for inclusion in the study
included the ability to read in English language and the confirmation
that interested participants were on duty and suited to be driving
mini-buses. Due to the nature of the job of bus driving, the researcher
administered the questionnaires on participants who were free and
willing to respond to the survey. All participants were males of
various age groups and of different marital statuses. Results of
analyses conducted revealed no significant influence of age and
marital status on the well-being of urban mini-bus drivers. This
indicates that the well-being of urban mini bus drivers is not
influenced by age or marital status. The findings of this study have
cultural implications. It negates the popularly held belief that older
and married people care more about their well-being than younger
and single people. It brings to fore the need to also identify and
consider other factors when certifying people for the job of urban bus
driving.
Abstract: At a global level, water stewardship, water stress and
water security are crucial factors in tourism planning and
development considerations. Challenges associated with water is of
particular concern to the Maldives as there is limited availability of
freshwater, high dependency on desalinated water, and high unit cost
associated with desalinating water. While the Maldives is promoted
as an example of sustainable tourism, a key sustainability challenge
facing tourism dependent communities is the efficient use and
management of available water resources. A water crisis event in the
capital island of Maldives highlighted how precarious water related
issues are in this tourism dependent destination. Applying
netnography, the focus of this working paper is to present community
perceptions of how government policies addressed Malé Water and
Sewerage Company (MWSC) water crisis event.
Abstract: This paper addresses the problem of offline path
planning for Unmanned Aerial Vehicles (UAVs) in complex threedimensional
environment with obstacles, which is modelled by 3D
Cartesian grid system. Path planning for UAVs require the
computational intelligence methods to move aerial vehicles along the
flight path effectively to target while avoiding obstacles. In this paper
Modified Particle Swarm Optimization (MPSO) algorithm is applied
to generate the optimal collision free 3D flight path for UAV. The
simulations results clearly demonstrate effectiveness of the proposed
algorithm in guiding UAV to the final destination by providing
optimal feasible path quickly and effectively.
Abstract: A Mobile Adhoc Network (MANET) is a collection of mobile nodes that communicate with each other with wireless links and without pre-existing communication infrastructure. Routing is an important issue which impacts network performance. As MANETs lack central administration and prior organization, their security concerns are different from those of conventional networks. Wireless links make MANETs susceptible to attacks. This study proposes a new trust mechanism to mitigate wormhole attack in MANETs. Different optimization techniques find available optimal path from source to destination. This study extends trust and reputation to an improved link quality and channel utilization based Adhoc Ondemand Multipath Distance Vector (AOMDV). Differential Evolution (DE) is used for optimization.
Abstract: In order to achieve high data rate and increase the
spectral efficiency, multiple input multiple output (MIMO) system has
been proposed. However, multiple antennas are limited by size and
cost. Therefore, recently developed cooperative diversity scheme,
which profits the transmit diversity only with the existing hardware by
constituting a virtual antenna array, can be a solution. However, most
of the introduced cooperative techniques have a common fault of
decreased transmission rate because the destination should receive the
decodable compositions of symbols from the source and the relay. In
this paper, we propose a cooperative cyclic delay diversity (CDD)
scheme that use hierarchical modulation. This scheme is free from the
rate loss and allows seamless cooperative communication.
Abstract: The aim of this study is to investigate the relationship
between expectation, satisfaction and loyalty of South Korean
tourists visiting Turkey. In the research, a questionnaire was used as a
data collecting tool. The questionnaires are filled by South Korean
tourists coming to Turkey through package tours and individual. The
survey was conducted in 2014 in Nevsehir (Cappadocia Region) and
Istanbul. Tourist guides and agency staff have helped the
implementation of surveys. The survey questions are composed of 4
parts, which are “demographic characteristics of tourists”, “travel
behavior characteristics”, “perception of expectations on destination
attributes” and “perception of destination loyalty”. 5-point Likert
type scale including 28 destination attributes was used to measure the
expectations of South Korean tourists coming to Turkey. Questions
were directed to the tourists to measure the destination loyalty. The
questions relating to destination loyalty are “Talking about Turkey to
others”, “Recommendation Turkey to others” and “Tourists’
intentions to revisit Turkey”. The basic hypothesis of the research is
that there is a statistically significant relationship among
expectations, satisfactions and destination loyalty of South Korean
tourists coming to Turkey. The results indicated that the expectation
had a significant effect on overall satisfaction. In addition it was seen
that between overall satisfaction of tourists and destination loyalty
had a significant relationship. Based on findings, some suggestions
for tour operators and travel agencies were made.
Abstract: Mobile Ad hoc Network is a set of self-governing
nodes which communicate through wireless links. Dynamic topology
MANETs makes routing a challenging task. Various routing
protocols are there, but due to various fundamental characteristic
open medium, changing topology, distributed collaboration and
constrained capability, these protocols are tend to various types of
security attacks. Black hole is one among them. In this attack,
malicious node represents itself as having the shortest path to the
destination but that path not even exists. In this paper, we aim to
develop a routing protocol for detection and prevention of black hole
attack by modifying AODV routing protocol. This protocol is able to
detect and prevent the black hole attack. Simulation is done using
NS-2, which shows the improvement in network performance.
Abstract: The Trustworthy link failure recovery algorithm is
introduced in this paper, to provide the forwarding continuity even
with compound link failures. The ephemeral failures are common in
IP networks and it also has some proposals based on local rerouting.
To ensure forwarding continuity, we are introducing the compound
link failure recovery algorithm, even with compound link failures.
For forwarding the information, each packet carries a blacklist, which
is a min set of failed links encountered along its path, and the next
hop is chosen by excluding the blacklisted links. Our proposed
method describes how it can be applied to ensure forwarding to all
reachable destinations in case of any two or more link or node
failures in the network. After simulating with NS2 contains lot of
samples proved that the proposed protocol achieves exceptional
concert even under elevated node mobility using Trustworthy link
Failure Recovery Algorithm.
Abstract: This paper presents a novel algorithm for secure,
reliable and flexible transmission of big data in two hop wireless
networks using cooperative jamming scheme. Two hop wireless
networks consist of source, relay and destination nodes. Big data has
to transmit from source to relay and from relay to destination by
deploying security in physical layer. Cooperative jamming scheme
determines transmission of big data in more secure manner by
protecting it from eavesdroppers and malicious nodes of unknown
location. The novel algorithm that ensures secure and energy balance
transmission of big data, includes selection of data transmitting
region, segmenting the selected region, determining probability ratio
for each node (capture node, non-capture and eavesdropper node) in
every segment, evaluating the probability using binary based
evaluation. If it is secure transmission resume with the two- hop
transmission of big data, otherwise prevent the attackers by
cooperative jamming scheme and transmit the data in two-hop
transmission.
Abstract: The objectives of the study were to determine the
marketing mix factors that influencing tourist’s destination decision
making for cultural tourism in the Chonburi province. Both
quantitative and qualitative data were applied in this study. The
samples of 400 cases for quantitative analysis were tourists (both
Thai and foreign) who were interested in cultural tourism in the
Chonburi province, and traveled to cultural sites in Chonburi and 14
representatives from provincial tourism committee of Chonburi and
local tourism experts. Statistics utilized in this research included
frequency, percentage, mean, standard deviation, and multiple
regression analysis. The study found that Thai and foreign tourists
are influenced by different important marketing mix factors. The
important factors for Thai respondents were physical evidence, price,
people, and place at high importance level. For foreign respondents,
physical evidence, price, people, and process were high importance
level, whereas, product, place and promotion were moderate
importance level.
Abstract: IEEE 802.11a/b/g standards provide multiple
transmission rates, which can be changed dynamically according to the
channel condition. Cooperative communications were introduced to
improve the overall performance of wireless LANs with the help of
relay nodes with higher transmission rates. The cooperative
communications are based on the fact that the transmission is much
faster when sending data packets to a destination node through a relay
node with higher transmission rate, rather than sending data directly to
the destination node at low transmission rate. To apply the cooperative
communications in wireless LAN, several MAC protocols have been
proposed. Some of them can result in collisions among relay nodes in a
dense network. In order to solve this problem, we propose a new
protocol. Relay nodes are grouped based on their transmission rates.
And then, relay nodes only in the highest group try to get channel
access. Performance evaluation is conducted using simulation, and
shows that the proposed protocol significantly outperforms the
previous protocol in terms of throughput and collision probability.