Abstract: Freeze-thaw cycles are one of the greatest threats to concrete durability. Lately, protection against this threat excites scientists’ attention. Air-entraining admixtures have been widely used to produce freeze-thaw resistant at concretes. The use of air-entraining agents (AEAs) enhances not only freeze-thaw endurance but also the properties of fresh concrete such as segregation, bleeding and flow ability. This paper examines the effects of air-entraining on compressive strength of concrete. Air-entraining is used between 0.05% and 0.4% by weight of cement. One control and four fiber reinforced concrete mixes are prepared and three specimens are tested for each mix. It is concluded from the test results that when air entraining is increased the compressive strength of concrete reduces for all mixes with AEAs.
Abstract: More and more businesses and services are depending on software to run their daily operations and business services. At the same time, cyber-attacks are becoming more covert and sophisticated, posing threats to software. Vulnerabilities exist in the software due to the lack of security practices during the phases of software development. Implementation of secure software development practices can improve the resistance to attacks. Many methods, models and standards for secure software development have been developed. However, despite the efforts, they still come up against difficulties in their deployment and the processes are not institutionalized. There is a set of factors that influence the successful deployment of secure software development processes. In this study, the methodology and results from a systematic literature review of factors influencing the implementation of secure software development practices is described. A total of 44 primary studies were analysed as a result of the systematic review. As a result of the study, a list of twenty factors has been identified. Some of factors that affect implementation of secure software development practices are: Involvement of the security expert, integration between security and development team, developer’s skill and expertise, development time and communication between stakeholders. The factors were further classified into four categories which are institutional context, people and action, project content and system development process. The results obtained show that it is important to take into account organizational, technical and people issues in order to implement secure software development initiatives.
Abstract: In this paper, we investigate security issues and challenges facing researchers in wireless sensor networks and countermeasures to resolve them. The broadcast nature of wireless communication makes Wireless Sensor Networks prone to various attacks. Due to resources limitation constraint in terms of limited energy, computation power and memory, security in wireless sensor networks creates different challenges than wired network security. We will discuss several attempts at addressing the issues of security in wireless sensor networks in an attempt to encourage more research into this area.
Abstract: The present study was aimed in assessing the heavy metal pollution of the soils around Agarak copper-molybdenum mine complex and related environmental risks. This mine complex is located in the south-east part of Armenia, and the present study was conducted in 2013. The soils of the five riskiest sites of this region were studied: surroundings of the open mine, the sites adjacent to processing plant of Agarak copper-molybdenum mine complex, surroundings of Darazam active tailing dump, the recultivated tailing dump of “ravine - 2”, and the recultivated tailing dump of “ravine - 3”. The mountain cambisol was the main soil type in the study sites. The level of soil contamination by heavy metals was assessed by Contamination factors (Cf), Degree of contamination (Cd), Geoaccumulation index (I-geo) and Enrichment factor (EF). The distribution pattern of trace metals in the soil profile according to Cf, Cd, I-geo and EF values shows that the soil is much polluted. Almost in all studied sites, Cu, Mo, Pb, and Cd were the main polluting heavy metals, and this was conditioned by Agarak copper-molybdenum mine complex activity. It is necessary to state that the pollution problem becomes pressing as some parts of these highly polluted region are inhabited by population, and agriculture is highly developed there; therefore, heavy metals can be transferred into human bodies through food chains and have direct influence on public health. Since the induced pollution can pose serious threats to public health, further investigations on soil and vegetation pollution are recommended. Finally, Cf calculating based on distance from the pollution source and the wind direction can provide more reasonable results.
Abstract: The article analyzes problems of improving the management systems of the ownership risks in the conditions of the transformation of the Russian economy. Among the main sources of threats business owners should highlight is the inefficiency of the implementation of business models and interaction with hired managers. In this context, it is particularly important to analyze the relationship of business models and ownership risks. The analysis of this problem appears to be relevant for a number of reasons: Firstly, the increased risk appetite of the owner directly affects the business model and the composition of his holdings; secondly, owners with significant stakes in the company are factors in the formation of particular types of risks for owners, for which relations have a significant influence on a firm's competitiveness and ultimately determines its survival; and thirdly, inefficient system of management ownership of risk is one of the main causes of mass bankruptcies, which significantly affects the stable operation of the economy as a whole. The separation of the processes of possession, disposal and use in modern organizations is the cause of not only problems in the process of interaction between the owner and managers in managing the organization as a whole, but also the asymmetric information about the kinds and forms of the main risks. Managers tend to avoid risky projects, inhibit the diversification of the organization's assets, while owners can insist on the development of such projects, with the aim not only of creating new values for themselves and consumers, but also increasing the value of the company as a result of increasing capital. In terms of separating ownership and management, evaluation of projects by the ratio of risk-yield requires preservation of the influence of the owner on the process of development and making management decisions. It is obvious that without a clearly structured system of participation of the owner in managing the risks of their business, further development is hopeless. In modern conditions of forming a risk management system, owners are compelled to compromise between the desire to increase the organization's ability to produce new value, and, consequently, increase its cost due to the implementation of risky projects and the need to tolerate the cost of lost opportunities of risk diversification. Improving the effectiveness of the management of ownership risks may also contribute to the revitalization of creditors on implementation claims to inefficient owners, which ultimately will contribute to the efficiency models of ownership control to exclude variants of insolvency. It is obvious that in modern conditions, the success of the model of the ownership of risk management and audit is largely determined by the ability and willingness of the owner to find a compromise between potential opportunities for expanding the firm's ability to create new value through risk and maintaining the current level of new value creation and an acceptable level of risk through the use of models of diversification.
Abstract: As transition to widespread use of IPv6 addresses has gained momentum, it has been shown to be vulnerable to certain security attacks such as those targeting Neighbor Discovery Protocol (NDP) which provides the address resolution functionality in IPv6. To protect this protocol, Secure Neighbor Discovery (SEND) is introduced. This protocol uses Cryptographically Generated Address (CGA) and asymmetric cryptography as a defense against threats on integrity and identity of NDP. Although SEND protects NDP against attacks, it is computationally intensive due to Hash2 condition in CGA. To improve the CGA computation speed, we parallelized CGA generation process and used the available resources in a trusted network. Furthermore, we focused on the influence of the existence of malicious nodes on the overall load of un-malicious ones in the network. According to the evaluation results, malicious nodes have adverse impacts on the average CGA generation time and on the average number of tries. We utilized a Trust Management that is capable of detecting and isolating the malicious node to remove possible incentives for malicious behavior. We have demonstrated the effectiveness of the Trust Management System in detecting the malicious nodes and hence improving the overall system performance.
Abstract: Due to shortage in IPv4 addresses, transition to IPv6 has gained significant momentum in recent years. Like Address Resolution Protocol (ARP) in IPv4, Neighbor Discovery Protocol (NDP) provides some functions like address resolution in IPv6. Besides functionality of NDP, it is vulnerable to some attacks. To mitigate these attacks, Internet Protocol Security (IPsec) was introduced, but it was not efficient due to its limitation. Therefore, SEND protocol is proposed to automatic protection of auto-configuration process. It is secure neighbor discovery and address resolution process. To defend against threats on NDP’s integrity and identity, Cryptographically Generated Address (CGA) and asymmetric cryptography are used by SEND. Besides advantages of SEND, its disadvantages like the computation process of CGA algorithm and sequentially of CGA generation algorithm are considerable. In this paper, we parallel this process between network resources in order to improve it. In addition, we compare the CGA generation time in self-computing and distributed-computing process. We focus on the impact of the malicious nodes on the CGA generation time in the network. According to the result, although malicious nodes participate in the generation process, CGA generation time is less than when it is computed in a one-way. By Trust Management System, detecting and insulating malicious nodes is easier.
Abstract: In the recent years, a fundamental revolution in the Mobile Phone technology from just being able to provide voice and short message services to becoming the most essential part of our lives by connecting to network and various app stores for downloading software apps of almost every activity related to our life from finding location to banking from getting news updates to downloading HD videos and so on. This progress in Smart Phone industry has modernized and transformed our way of living into a trouble-free world. The smart phone has become our personal computers with the addition of significant features such as multi core processors, multi-tasking, large storage space, bluetooth, WiFi, including large screen and cameras. With this evolution, the rise in the security threats have also been amplified. In Literature, different threats related to smart phones have been highlighted and various precautions and solutions have been proposed to keep the smart phone safe which carries all the private data of a user. In this paper, a survey has been carried out to find out the most secure and the most unsecure smart phone operating system among the most popular smart phones in use today.
Abstract: The paper presents results of the project conducted in Poland devoted to study on bird strikes at military airfields. The main aim of this project was to develop methods of aircraft protection against threats from birds. The studies were carried out using two methods. One by transect and the other one by selected sector scanning. During the research, it was recorded, that 104 species of birds in the number about of 36000 were observed. The most frequent ones were starling Sturnus vulgaris (31.0%), jackdaw Corvus monedula (18.3%), rook Corvus frugilegus (15.9 %), lapwing Vanellus vanellus (6.2%). Moreover, it was found, that starlings constituted the most serious threat. It resulted from their relatively high attendance at the runway (about 300 individuals). Possible repellent techniques concerning of the Deblin military airfield were discussed. The analysis of the birds’ concentration depending on the altitude, part of the day, year, part of the airfield constituted a base to work out critical flight phase and appropriate procedures to prevent bird strikes.
Abstract: Increase of emergency incidents and crisis situations
requires proactive crisis management of authorities and for its
solution. Application Business Continuity Management helps the
crisis management authorities to quickly and responsibly respond to
threats. It also helps effectively and efficiently planning powers and
resources. The main goal of this article is describing Military
Continuity Management System (MCMS) based on the principles of
Business Continuity Management System (BCMS) for dealing with
floods in the territory of the selected municipalities. There are
explained steps of loading, running and evaluating activities in the
software application MCMS. Software MCMS provides complete
control over the tasks, contribute a comprehensive and responsible
approach solutions to solution floods in the municipality.
Abstract: Wireless networks are built upon the open shared
medium which makes easy for attackers to conduct malicious
activities. Jamming is one of the most serious security threats to
information economy and it must be dealt efficiently. Jammer
prevents legitimate data to reach the receiver side and also it
seriously degrades the network performance. The objective of this
paper is to provide a general overview of jamming in wireless
network. It covers relevant works, different jamming techniques,
various types of jammers and typical prevention techniques.
Challenges associated with comparing several anti-jamming
techniques are also highlighted.
Abstract: Lagos urban mini bus drivers play a critical role in the
transportation sector. The current major mode of transportation
within Lagos metropolis remains road transportation and this
confirms the relevance of urban mini-bus drivers in transporting the
populace to their various destinations. Other modes of transportation
such as the train and waterways are currently inadequate. Various
threats to the well-being of urban bus drivers include congested
traffic typical of modern day lifestyles, dwindling financial returns
due to long hours in traffic, fewer hours of sleep, inadequate diet,
time pressure, and assaults related to fare disputes. Several healthrelated
problems have been documented to be associated with urban
bus driving. For instance, greater rates of hypertension, obesity and
cholesterol level have been reported. Research studies are yet to
identify the influence of age and marital status on the well-being of
urban mini-bus drivers in Lagos metropolis. A study of this nature is
necessary as it is culturally perceived in Nigeria that older and
married people are especially influenced by family affiliation and
would behave in ways that would project positive outcomes. The
study sample consisted of 150 urban mini-bus drivers who were
conveniently sampled from six (6) different terminuses where their
journey begins and terminates. The well-being questionnaire was
administered to participants. The criteria for inclusion in the study
included the ability to read in English language and the confirmation
that interested participants were on duty and suited to be driving
mini-buses. Due to the nature of the job of bus driving, the researcher
administered the questionnaires on participants who were free and
willing to respond to the survey. All participants were males of
various age groups and of different marital statuses. Results of
analyses conducted revealed no significant influence of age and
marital status on the well-being of urban mini-bus drivers. This
indicates that the well-being of urban mini bus drivers is not
influenced by age or marital status. The findings of this study have
cultural implications. It negates the popularly held belief that older
and married people care more about their well-being than younger
and single people. It brings to fore the need to also identify and
consider other factors when certifying people for the job of urban bus
driving.
Abstract: The purpose of this paper is to contribute to the
enhancement of a hydroelectric plant protection by coordinating
protection measures / existing security and introducing new measures
under a risk management process. In addition, plan identifies key
critical elements of a hydroelectric plant, from its level vulnerabilities
and threats it is subjected to in order to achieve the necessary
protection measures to reduce the level of risk.
Abstract: The Radio Frequency Identification (RFID) technology
has a diverse base of applications, but it is also prone to security
threats. There are different types of security attacks which limit the
range of the RFID applications. For example, deploying the RFID
networks in insecure environments could make the RFID system
vulnerable to many types of attacks such as spoofing attack, location
traceability attack, physical attack and many more. Therefore, security
is often an important requirement for RFID systems. In this paper,
RFID mutual authentication protocol is implemented based on mobile
agent technology and timestamp, which are used to provide strong
authentication and integrity assurances to both the RFID readers and
their corresponding RFID tags. The integration of mobile agent
technology and timestamp provides promising results towards
achieving this goal and towards reducing the security threats in RFID
systems.
Abstract: Urinary Tract Infections are considered as one of the
most common bacterial infections with an estimated annual global
incidence of 150 million. Antimicrobial drug resistance is one of the
major threats due to wide spread usage of uncontrolled antibiotics. In
this study, a total number of 9149 urine samples were collected from
R.H Patiala and processed in the Department of Microbiology G. M.
C Patiala (January 2013 to December 2013). Urine samples were
inoculated on MacConkey’s and blood agar plates and incubated at
370C for 24 hrs. The organisms were identified by colony characters,
Gram’s staining, and biochemical reactions. Antimicrobial
susceptibility of the isolates was determined against various
antimicrobial agents (Hi – Media Mumbai India) by Kirby Bauer
DISK diffusion method on Muller Hinton agar plates. Maximum patients were in the age group of 21-30 yrs followed by
31-40 yrs. Males (34%) are less prone to urinary tract infections than
females (66%). Culture was positive in 25% of the samples.
Escherichia coli was the most common isolate 60.3% followed by
Klebsiella pneumoniae 13.5%, Proteus spp. 9% and Staphylococcus
aureus 7.6%. Most of the urinary isolates were sensitive to,
carbepenems, Aztreonam, Amikacin, and Piperacillin + Tazobactum.
All the isolates showed a good sensitivity towards Nitrofurantoin
(82%). ESBL production was found to be 70.6% in Escherichia coli
and 29.4% in Klebsiella pneumonia. Susceptibility of ESBL
producers to Imipenem, Nitrofurantoin and Amikacin were found to
be 100%, 76%, and 75% respectively. Uropathogens are increasingly
showing resistance to many antibiotics making empiric management
of outpatient UTIs challenging. Ampicillin, Cotrimoxazole and
Ciprofloxacin should not be used in empiric treatment. Nitrofurantoin
could be used in lower urinary tract infection. Knowledge of
uropathogens and their antimicrobial susceptibility pattern in a
geographical region will help in appropriate and judicious antibiotic
usage in a health care setup.
Abstract: A biosphere reserve is developed to create harmony
amongst economic development, community development, and
environmental protection, through partnership between human and
nature. Giam Siak Kecil Bukit Batu Biosphere Reserve (GSKBB BR)
in Riau Province, Indonesia, is unique in that it has peat soil
dominating the area, many springs essential for human livelihood,
high biodiversity. Furthermore, it is the only biosphere reserve
covering privately managed production forest areas. In this research, we aimed at analyzing the threat of deforestation
and forest fire, and the potential of CO2 emission at GSKBB BR. We
used Landsat image, arcView software, and ERDAS IMAGINE 8.5
Software to conduct spatial analysis of land cover and land use
changes, calculated CO2 emission based on emission potential from
each land cover and land use type, and exercised simple linear
regression to demonstrate the relation between CO2 emission
potential and deforestation. The result showed that, beside in the buffer zone and transition
area, deforestation also occurred in the core area. Spatial analysis of
land cover and land use changes from years 2010, 2012, and 2014
revealed that there were changes of land cover and land use from
natural forest and industrial plantation forest to other land use types,
such as garden, mixed garden, settlement, paddy fields, burnt areas,
and dry agricultural land. Deforestation in core area, particularly at
the Giam Siak Kecil Wildlife Reserve and Bukit Batu Wildlife
Reserve, occurred in the form of changes from natural forest in to
garden, mixed garden, shrubs, swamp shrubs, dry agricultural land,
open area, and burnt area. In the buffer zone and transition area,
changes also happened, what once swamp forest changed into garden,
mixed garden, open area, shrubs, swamp shrubs, and dry agricultural
land. Spatial analysis on land cover and land use changes indicated
that deforestation rate in the biosphere reserve from 2010 to 2014 had
reached 16 119 ha/year. Beside deforestation, threat toward the
biosphere reserve area also came from forest fire. The occurrence of forest fire in 2014 had burned 101 723 ha of the
area, in which 9 355 ha of core area, and 92 368 ha of buffer zone
and transition area. Deforestation and forest fire had increased CO2
emission as much as 24 903 855 ton/year.
Abstract: At the present time, awareness, education, computer
simulation and information systems protection are very serious and
relevant topics. The article deals with perspectives and possibilities of
implementation of emergence or natural hazard threats into the
system which is developed for communication among members of
crisis management staffs. The Czech Hydro-Meteorological Institute
with its System of Integrated Warning Service resents the largest
usable base of information. National information systems are connected to foreign systems,
especially to flooding emergency systems of neighboring countries,
systems of European Union and international organizations where the
Czech Republic is a member. Use of outputs of particular information
systems and computer simulations on a single communication
interface of information system for communication among members
of crisis management staff and setting the site interoperability in the
net will lead to time savings in decision-making processes in solving
extraordinary events and crisis situations. Faster managing of an
extraordinary event or a crisis situation will bring positive effects and
minimize the impact of negative effects on the environment.
Abstract: Mobile Ad Hoc Networks (MANETs) is a collection
of mobile devices forming a communication network without
infrastructure. MANET is vulnerable to security threats due to
network’s limited security, dynamic topology, scalability and the lack
of central management. The Quality of Service (QoS) routing in such
networks is limited by network breakage caused by node mobility or
nodes energy depletions. The impact of node mobility on trust
establishment is considered and its use to propagate trust through a
network is investigated in this paper. This work proposes an
enhanced Associativity Based Routing (ABR) with Fuzzy based
Trust (Fuzzy- ABR) routing protocol for MANET to improve QoS
and to mitigate network attacks.
Abstract: Most of the existing video streaming protocols
provide video services without considering security aspects in
decentralized mobile ad-hoc networks. The security policies adapted
to the currently existing non-streaming protocols, do not comply with
the live video streaming protocols resulting in considerable
vulnerability, high bandwidth consumption and unreliability which
cause severe security threats, low bandwidth and error prone
transmission respectively in video streaming applications. Therefore
a synergized methodology is required to reduce vulnerability and
bandwidth consumption, and enhance reliability in the video
streaming applications in MANET. To ensure the security measures
with reduced bandwidth consumption and improve reliability of the
video streaming applications, a Secure Low-bandwidth Video
Streaming through Reliable Multipath Propagation (SLVRMP)
protocol architecture has been proposed by incorporating the two
algorithms namely Secure Low-bandwidth Video Streaming
Algorithm and Reliable Secure Multipath Propagation Algorithm
using Layered Video Coding in non-overlapping zone routing
network topology. The performances of the proposed system are
compared to those of the other existing secure multipath protocols
Sec-MR, SPREAD using NS 2.34 and the simulation results show
that the performances of the proposed system get considerably
improved.
Abstract: It is a well-established fact that terrorism is one of the foremost threats to present-day international security. The creation of tools or mechanisms for confronting it in an effective and efficient manner will only be possible by way of an objective assessment of the phenomenon. In order to achieve this, this paper has the following three main objectives: Firstly, setting out to find the reasons that have prevented the establishment of a universally accepted definition of terrorism, and consequently trying to outline the main features defining the face of the terrorist threat in order to discover the fundamental goals of what is now a serious blight on world society. Secondly, trying to explain the differences between a terrorist movement and a terrorist organisation, and the reasons for which a terrorist movement can be led to transform itself into an organisation. After analysing these motivations and the characteristics of a terrorist organisation, an example of the latter will be succinctly analysed to help the reader understand the ideas expressed. Lastly, discovering and exposing the factors that can lead to the appearance of terrorist tendencies, and discussing the most efficient and effective responses that can be given to this global security threat.