5 research outputs found

    The analysis and symbolization of Jibran Khalil Jibran’s The Prophet according to the archetypes discussed in Jung’s psychology

    No full text
    The Prophet, written by Jibran Khalil Jibran, is a thin book but full of mystical, religious, ethical, and philosophical concepts. Although this book seems at the first sight a simple and easy-to-handle one, it has very rich and archetypal motifs. The Prophet tells the story of one of the archetypes of our unconscious. The recluse Prophet , as a kind sage of our inner world, is waiting for the conscious “I” so that by help of “Anima” it can assist the “I” in going through the path of perfection and show it the green path to individuation and psychical (psychological) integrity. This work represents the stages which the people of Urphaliz pass through by help of the prophet and Anima’s intermediacy called “Mitra” and hence are united with themselves. What constitutes the motif of this work is an inner travel; a mystical inquiry which has set the ground for the presence and function of many archetypes and symbols concerning this inner procedure. “I”, “ego”, “shadow”, “The sage”, “Anima”, and the symbolical image of “Mandela” are of the most outstanding symbols and archetypes existing in this seminal work by Jibran Khalil Jibran

    SCEMA:an SDN-oriented cost-effective edge-based MTD approach

    No full text
    Abstract Protecting large-scale networks, especially Software-Defined Networks (SDNs), against distributed attacks in a cost-effective manner plays a prominent role in cybersecurity. One of the pervasive approaches to plug security holes and prevent vulnerabilities from being exploited is Moving Target Defense (MTD), which can be efficiently implemented in SDN as it needs comprehensive and proactive network monitoring. The critical key in MTD is to shuffle the least number of hosts with an acceptable security impact and keep the shuffling frequency low. In this paper, we have proposed an SDN-oriented Cost-effective Edge-based MTD Approach (SCEMA) to mitigate Distributed Denial of Service (DDoS) attacks at a lower cost by shuffling an optimized set of hosts that have the highest number of connections to the critical servers. These connections are named edges from a graph-theoretical point of view. We have proposed a three-layer mathematical model for the network that can easily calculate the attack cost. We have also designed a system based on SCEMA and simulated it in Mininet. The results show that SCEMA has lower complexity than the previous related MTD field with acceptable performance

    Antifungal Activity of Citrus Essential Oils

    No full text
    corecore