6 research outputs found

    The supernatural characters and powers of sacred trees in the Holy Land

    Get PDF
    This article surveys the beliefs concerning the supernatural characteristics and powers of sacred trees in Israel; it is based on a field study as well as a survey of the literature and includes 118 interviews with Muslims and Druze. Both the Muslims and Druze in this study attribute supernatural dimensions to sacred trees which are directly related to ancient, deep-rooted pagan traditions. The Muslims attribute similar divine powers to sacred trees as they do to the graves of their saints; the graves and the trees are both considered to be the abode of the soul of a saint which is the source of their miraculous powers. Any violation of a sacred tree would be strictly punished while leaving the opportunity for atonement and forgiveness. The Druze, who believe in the transmigration of souls, have similar traditions concerning sacred trees but with a different religious background. In polytheistic religions the sacred grove/forest is a centre of the community's official worship; any violation of the trees is regarded as a threat to the well being of the community. Punishments may thus be collective. In the monotheistic world (including Christianity, Islam and Druze) the pagan worship of trees was converted into the worship/adoration of saints/prophets; it is not a part of the official religion but rather a personal act and the punishments are exerted only on the violating individual

    Naturally Occurring 2,5-Dioxopiperazines and Related Compounds

    No full text

    Botnet detection techniques: review, future trends, and issues

    No full text
    NoIn recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of malicious codes. The botnet phenomenon supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malware distribution, spam emails, and building machines for illegitimate exchange of information/materials. Therefore, it is imperative to design and develop a robust mechanism for improving the botnet detection, analysis, and removal process. Currently, botnet detection techniques have been reviewed in different ways; however, such studies are limited in scope and lack discussions on the latest botnet detection techniques. This paper presents a comprehensive review of the latest state-of-the-art techniques for botnet detection and figures out the trends of previous and current research. It provides a thematic taxonomy for the classification of botnet detection techniques and highlights the implications and critical aspects by qualitatively analyzing such techniques. Related to our comprehensive review, we highlight future directions for improving the schemes that broadly span the entire botnet detection research field and identify the persistent and prominent research challenges that remain open.University of Malaya, Malaysia (No. FP034-2012A
    corecore