86,983 research outputs found

    Denial of service attacks and challenges in broadband wireless networks

    Get PDF
    Broadband wireless networks are providing internet and related services to end users. The three most important broadband wireless technologies are IEEE 802.11, IEEE 802.16, and Wireless Mesh Network (WMN). Security attacks and vulnerabilities vary amongst these broadband wireless networks because of differences in topologies, network operations and physical setups. Amongst the various security risks, Denial of Service (DoS) attack is the most severe security threat, as DoS can compromise the availability and integrity of broadband wireless network. In this paper, we present DoS attack issues in broadband wireless networks, along with possible defenses and future directions

    Agricultural Growth in China and Sub-Saharan African Countries

    Get PDF
    Agriculture remains a dominant sector in the economies of most African and several Asian countries. However, the poor performance of agriculture in Africa stands in sharp contrast to the robust agricultural growth in many Asian countries.2 In this regard, the experience of China is perhaps as impressive as it is relevant to many countries in Sub-Saharan Africa. A general observation is that the productivity of land and labour has to rise through intensive agriculture, given the limited area of arable land (in China and Africa) and the high rates of growth of population (as in Africa). In many African countries, labour productivity has fallen and land productivity has not increased significantly. In China, productivities of both land and labour have increased significantly since at least the early 1980s. Agricultural output can increase in three ways: (i) get more from the same quantities of inputs through better utilisation of the existing capacity; (ii) use increased quantities of inputs; and (iii) use new techniques to raise the productivity of each input or raise the total product curve. All of these may require changes in tenurial arrangements, levels of investment in infrastructure and support services, and policies that affect the prices of outputs and inputs. A close examination of factors underlying the contrasting experiences in China and African countries reveals important differences in the institutional and policy environments affecting the individual behaviour with regard to the adoption and use of new (profitable) technologies to raise the land and labour productivities.

    Large-scale QRPA calculation of E1-strength and its impact on the neutron capture cross section

    Get PDF
    Large-scale QRPA calculations of the E1-strength are performed as a first attempt to microscopically derive the radiative neutron capture cross sections for the whole nuclear chart. A folding procedure is applied to the QRPA strength distribution to take the damping of the collective motion into account. It is shown that the resulting E1-strength function based on the SLy4 Skyrme force is in close agreement with photoabsorption data as well as the available experimental E1-strength at low energies. The increase of the E1-strength at low energies for neutron-rich nuclei is qualitatively analyzed and shown to affect the corresponding radiative neutron capture cross section significantly. A complete set of E1-strength function is made available for practical applications in a table format for all 7<Z<111 nuclei lying between the proton and the neutron drip lines.Comment: 17 pages, 8 figures, accepted for publication in Nucl. Phys.

    Real-time cross-layer design for large-scale flood detection and attack trace-back mechanism in IEEE 802.11 wireless mesh networks

    Get PDF
    IEEE 802.11 WMN is an emerging next generation low-cost multi-hop wireless broadband provisioning technology. It has the capability of integrating wired and wireless networks such as LANs, IEEE 802.11 WLANs, IEEE 802.16 WMANs, and sensor networks. This kind of integration: large-scale coverage, decentralised and multi-hop architecture, multi-radios, multi-channel assignments, ad hoc connectivity support the maximum freedom of users to join or leave the network from anywhere and at anytime has made the situation far more complex. As a result broadband resources are exposed to various kinds of security attacks, particularly DoS attacks
    • …
    corecore