2,791 research outputs found

    Education, Religion and the Creation of Subject: Different Educational Systems of Pakistan

    Get PDF
    Educational systems have assumed great sociological significance in modern nation states because education is the only instrument which provides the possibilities to progress and prosper in the world today. It has put a lot of power in the designers of education systems. This paper argues that the three different educational systems of Pakistan have very different historical origins, pedagogical style and curriculum. Therefore, the students of these schools develop totally different worldviews. I argue that this difference in basic outlook towards life among different subgroups of population is one of the major reasons for the religious violence and terrorism in Pakistan

    Lead Removal from Agricultural Soil of Kurdistan Region by Fe3O4 Nanoparticles

    Get PDF
    Lead toxicity became a major concern worldwide and it is one of the most harmful pollutants in soil and groundwater. Hence, to remove lead from the soil, a high efficient technology with improved materials and system is required. This paper is a study shows removing of lead ions from soil samples, which have been taken from different sites in the Kurdistan Region, and investigated the adsorption of lead ions on high efficient adsorbent Fe3O4 nanoparticles. The magnetite nanoparticles of 27nm were synthesized by using a co-precipitation method and characterized by X-ray diffraction (XRD), Fourier Transform Infrared Spectroscopy (FTIR) and scanning electron microscopy (SEM) equipped with energy dispersive X-ray spectroscopy (EDX). The adsorption experiments occurred at pH 8.0 under room temperature (25 °C) and the adsorption capacity was 22.8 mg/g which is 4 times higher than that of coarse particles. The correlation is measured between pH and absorbance, pH and concentration, electrical conductivity and concentration of lead ions in agricultural soil. These relationships indicate that the correlation coefficient values of (r = - 0.68, – 0.70 and + 0.83) are statistically significant at (ɑ= 0.05). The limit of detection (LOD) and limit of quantification (LOQ) were found to be 0.73 mg/L and 2.44 mg/L, respectively

    A Concise Study of Web Filtering

    Get PDF
    Cybercriminals are constantly developing techniques to infect computers by embedding malicious code on innocent websites and luring victims to them. To prevent data loss in a mobile connected world, corporations are employing a variety of techniques. These include filters, anti-virus software, encryption and firewalls, access control, written policies and improved employee training. This paper conducts a concise study of web filtering vis-Ã -vis their installed positions, deployment layers, employed filter technologies and comparison between Web Filters that are in place in Canada, United Kingdom, and China

    Drag and Drop Image CAPTCHA

    Get PDF
    The massive and automated access to Web resources through robots has made it essential for Web service providers to make some conclusion about whether a user is human or robot. A Human Interaction Proof (HIP) like Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) offers a way to make such a distinction. CAPTCHA is essentially a modern implementation of Turing test, which carries out its job through a particular text based, image based or audio based challenge response system. In this paper we present a new image based CAPTCHA technique. Properties of the proposed technique offer all of the benefits of image based CAPTCHAs; grant an improved security control over the usual text based techniques and at the same time improve the user-friendliness of the Web page. Further, the paper briefly reviews various other existing CAPTCHA techniques

    System Analysis of SPAM

    Get PDF
    Increasing reliance on the electronic mail (e-mail) has attracted spammers to send more and more spam e-mails in order to maximizing their financial gains. These unwanted e-mails are not only clogging the Internet traffic but are also causing storage problems at the receiving servers. Besides these, spam e-mails also serve as a vehicle to a variety of online crimes and abuses. Although several anti-spam procedures are currently employed to distinguish spam e-mails from the legitimate e-mails yet spammers and phishes obfuscate their e-mail content to circumvent anti-spam procedures. Efficiency of anti-spam procedures to combat spam entry into the system greatly depend on their level of operation and a clear insight of various possible modes of spamming. In this paper we investigate directed graph model of Internet e-mail infrastructure and spamming modes used by spammers to inject spam into the system. The paper outlines the routes, system components, devices and protocols exploited by each spamming mode

    LpL_{p} inequalities for the growth of polynomials with restricted zeros

    Get PDF
    summary:Let P(z)=∑ν=0naνzνP(z)=\sum _{\nu =0}^{n}a_{\nu }z^{\nu } be a polynomial of degree at most nn which does not vanish in the disk ∣z∣1|z|1, Boas and Rahman proved ∥P(Rz)∥p≤(∥Rn+z∥p/∥1+z∥p)∥P∥p.\left\Vert P(Rz)\right\Vert _{p}\le \big (\left\Vert R^{n}+z\right\Vert_{p}/\left\Vert1+z\right\Vert_{p}\big )\left\Vert P\right\Vert _{p}. In this paper, we improve the above inequality for 0≤p10\le p 1 is also given
    • …
    corecore