924 research outputs found

    The Architectural Dynamics of Encapsulated Botnet Detection (EDM)

    Full text link
    Botnet is one of the numerous attacks ravaging the networking environment. Its approach is said to be brutal and dangerous to network infrastructures as well as client systems. Since the introduction of botnet, different design methods have been employed to solve the divergent approach but the method of taking over servers and client systems is unabated. To solve this, we first identify Mpack, ICEpack and Fiesta as enhanced IRC tool. The analysis of its role in data exchange using OSI model was carried out. This further gave the needed proposal to the development of a High level architecture representing the structural mechanism and the defensive mechanism within network server so as to control the botnet trend. Finally, the architecture was designed to respond in a proactive state when scanning and synergizing the double data verification modules in an encapsulation manner within server system

    More Than Love: Eugenics and the Future of Loving v. Virginia

    Get PDF
    This Symposium is dedicated to celebrating how Loving v. Virginia paved the way for greater acceptance of multiracial families and interracial intimacy. Loving is largely understood as a case that rejected the bigotry and hatred experienced by interracial couples and affirmed the idea that law supports love across racial lines. With this narrative comes the popular understanding that Loving stands for the notion that love conquers all. This idea has shaped other legal strategies and social movements, such as the effort to have same-sex marriage legally recognized. Thus, Loving is thought of as drawing attention to the importance of romantic notions of love in creating a more inclusive society. But, in this brief Essay, allow me to explore one simple provocation: Loving was not simply about love

    A Bit of Hacking Techniques for Vulnerable Subdomain

    Get PDF
    Hacking as it is popularly called is an official phrase for unauthorised access to a network/data. However, there are different methods used in gaining access to a designated network; hence, this paper explained a few hacker’s intent using classified commercially available tools and techniques to expose the vulnerability of data and applications within networks. It also explained few simple ways of gaining access to a network without really having the key technical ability

    Evaluation of Emissions of 2-Amino-2-Methyl-1-Propanol Degradation Products by adding Degradation Reactions to the Carbon Dioxide Capture Unit

    Get PDF
    Degradation is a major problem which poses lots of emission risk during chemical absorption process with amine solvents. Degradation occurs through irreversible side reactions with CO2 and other flue gas components, forming into products that cannot easily regenerate. The degradation products then react with amines to form thermally stable salts, which accumulate in the system over time. The problems associated with degradation include decreased plant equipment life, foaming, corrosion, high solution viscosity, and increased operating cost. Amines capture about 70 90% CO2 from commercial power stations. These high removal rates have many environmental impacts due to their degradation products. Researchers have therefore shown interest in characterising and quantifying atmospheric emissions of amines and their degradation products. In this study, 2-Amino-2-Methyl-1-Propanol (AMP) degradation reactions were included into a largescale capture plant model to evaluate the influence of process variables, the emissions of AMP and its degradation products. Steadystate simulations were performed using Aspen Plus® V8.4 software to provide a full assessment of the degradation products and their impact on the capture process. This assessment is important because it identifies and quantifies all pollutants emitted from the process plant. The results of the simulation indicate that AMP emissions are 3.04E+03mg/Nm3 of CO2 lean flue gas, while the quantity of AMP lost due to degradation was 37.88kg/s for the largescale capture plant. The results further showed that among the gases emitted, ammonia was highest, while acetone was the highest gas formed. In this study, 2-amino-2-methyl-1-propanol (AMP) degradation reactions were included into a largescale carbon dioxide (CO2) capture plant model to evaluate the influence of process variables, AMP emissions and its degradation products. Steadystate simulations were performed using Aspen Plus® V8.4 software to provide a full assessment of the degradation products and their impact on the largescale AMP capture process. The results of the equilibrium model developed in this study revealed that AMP emissions are 3.04E+03mg/Nm3 of CO2 lean flue gas, while the quantity of AMP lost due to degradation was 37.88kg/s for the largescale capture plant. More importantly, the emissions obtained from the PWOD and PWD are 7.80E+03 mg/Nm3 and 9.82E+03 mg/Nm3 of CO2 respectively. Keywords: oxidative degradation, 2amino2methyl1 propanol, emissions, modellin

    Bhutan: Human Trafficking

    Get PDF
    Human trafficking has been present in Bhutan for many years but has continued to increase along Bhutan’s borders. The reason for this increase can be contributed to the rise of vulnerable citizens. In particular, women and children are extremely susceptible to forced labor and sex trafficking. This brief further details the challenges, political structure, epidemiology, and also the intervention and identification of human trafficking in Bhutan. The increase of human trafficking can also be correlated to the rise in HIV/AIDS in Bhutan. The challenges that has stopped any progress in reducing human trafficking, is the government of Bhutan’s continuous denial of any evidence of human trafficking and the lack of training and awareness

    The Structure of Economic Community of West African States (ECOWAS) Peace-Keeping Agreements

    Get PDF
    This paper investigates the intersections of language, graphological structure and peacekeeping agreements. It analyses the language use in Economic Community of West African States (ECOWAS) peacekeeping agreement texts (EPKA) and thereby enriches the theoretical and analytical body of knowledge on the discourse of peace negotiation in contemporary English. It is hoped that the findings of this research sheds light on how the discourse features of the language of peacekeeping documents are organized to which will provide materials for ESP materials production and curricula design. Furthermore, this article contributes to existent scholarship on structural constructions of peace negotiation and on the dynamics of contemporary ECOWAS peacekeeping agreement discourse
    • …
    corecore