10 research outputs found

    Practice of Robots Exclusion Protocol in Bhutan

    Get PDF
    Most of the search engines rely on the web robots to collect information from the web. The web is open access and unregulated which makes it easier for the robots to crawl and index all the contents of websites so easily. But not all wish to get their websites and web pages indexed by web crawlers. The diverse crawling activities can be regulated and managed by deploying the Robots Exclusion Protocol (REP) in a file called robots.txt in the server. The method used is a de-facto standard and most of the ethical robots will follow the rules specified in the file. In Bhutan, there are many websites and in order to regulate those bots, the usage of the robots.txt file in the websites are not known since no study has been carried out till date. The main aim of the paper is to investigate the use of robots.txt files in various organizations’ websites in Bhutan. And further, to analyze its content present in the file if it exist. A total of 50 websites from various sectors like colleges, government ministries, autonomous agencies, corporations and newspaper agencies were selected for the investigation to check the usage of the file. Moreover, the files were further studied and analyzed for its file size, types of robots specified, and correct use of the file. The result showed that that almost 70% of the websites investigated are using the default robots.txt file generally created by the Joomla and Word press Content Management Systems (CMS) which ultimately specifies that there is a usage of the file. But on the other hand, the file is not really taken into seriously and almost 70% of it lacks major and best protocols defined in it that will help define the access and denial to various resources to various types of robots available on the web. Approximately 30% of the URLs adopted for the study show that the REP file is not added in their web server, thus providing unregulated access of resources to all types of web robots. Keywords: Crawler, robots.txt, search engines, robots exclusion protocol, indexing DOI: 10.7176/JEP/11-35-01 Publication date: December 31st 202

    Verses of Zhugdrel Phunsum Tshogpa, Tea and Food Offering

    Get PDF
    The most venerable Zhabdrung Ngawang Namgyal alias Pelden Drukpa Rinpoche of the glorious Drukpa Kagyud Tradition, journeyed towards the direction of the southern valleys (Bhutan) and when he arrived at Thang-dzong Nang, in 1637, the Bhutanese people, hailing from all walks of life, and also from neighboring countries (today India and Nepal) greeted him with a grand reception. During this event, inconceivable amount of material riches were piled up before him in offering, and taking this as an auspicious event, Zhabdrung Rinpoche significantly renamed the place as Pungthangkha meaning "the Mouth of the Plains to Heaps [of Riches]." Then he had everyone present there to sit in rows and recite the lineage-supplication to his successive re-incarnations, which was indeed the beginning of the present-day "Zhugdrel Phunsum Tshogpa" (rows of auspicious sitting) ceremony. Since then, as all forms of noble activities were ventured with the preceding of this ceremony, it served the purpose of accomplishing all endeavors free of obstacles. As such, although we may lack physically displayed offering, yet through our mental visualization, we must always offer any food or drinks before partaking them to the objects of our refuge, the Three Jewels and the local protectors and gods with utmost faith while reciting the following offering verses. Doing this will not only enable us to receive blessings of the material energy but also serve as a method to accumulating merits. For this reason, the offering verses of Zhugdrel Phunsum Tshogpa, food and tea are translated into English

    A systematic review on Android Malware Detection

    No full text
    Android malware is growing at alarming rate and spreading rapidly despite on-going mitigating efforts. This brings  a  necessity  to  find  more  effective  solutions  to  detect those malwares and prevent users from any malicious threats. The aim of the systematic review is to summarize the situation that existed from 2010 to 2015 with regards to various android malware analysis approaches and detection methods. A total of 58  selected  papers  met  the  inclusion  criteria  based  on  title  of articles, exclusion criteria, reading abstract and content of the selected  58  papers.  Different  data  are  extracted  from  these articles  and  recorded  in  an  excel  sheet  for  further  analysis. Most of the paper discussed about the use of dynamic analysis approach to analyze malware and signature-based method for malware detection.  The  systematic  review  carried  out  would provide information to all researchers and further inform the requirements  for  future  development  of  enhanced  malware analysis and detection methods

    Intrusion Detection System in Cloud Computing: A Literature Review

    Get PDF
    Cloud computing provide users a convenient, ubiquitous and on-demand network access to a shared pool of computing resources over an Internet. On the other aspect, due to its distributed and complex architectures, it possess many security risks and become one of the attractive targets for the cyber-attacks by the intruders. With the growing popularity of cloud computing, the importance to provide reliable and secure services assurance remains one of the major issues. Intrusion Detection Systems (IDS) have been widely used as one of the mechanism to detect attacks on cloud. Different authors have proposed various IDS that can be used in cloud computing in an attempt to provide secure services. This paper surveys different methods and approaches applied in intrusions detection systems (IDS) of cloud environment by various authors. The paper is organized as follows. Section 1 discusses about the different kinds of attacks or intrusions found in cloud. Section 2 discusses and demonstrates different IDS used in cloud that have been proposed by various authors in their research. Section 3 concludes the review with references at the end. Keywords: Cloud computing, IDS, NIDS, HIDS, DIDS DOI: 10.7176/NCS/12-05 Publication date: January 31st 202

    Assessment of exposure to pesticides and the knowledge, attitude and practice among farmers of western Bhutan.

    No full text
    An estimated 69% of the population of Bhutan is engaged in agriculture. Farmers are exposed to a wide variety of pesticides during the preparation, transport, storage, mixing and application of pesticides posing a significant health risk. A controlled cross-sectional study of farmers in selected sites of Bhutan was conducted to characterize the level of exposure to pesticides and assess their knowledge attitude and practice on the safe handling of pesticides. A total of 399 participants were enrolled in the study comprising of 295 exposed farmers and 104 healthy and unexposed controls. A structured investigator administered questionaries was used to assess their Knowledge, Attitude and practice, and their blood samples were taken for measuring Acetyl Cholinesterase enzyme activity level. There was a significant difference between the Acetyl Cholinesterase enzyme inhibition of exposed and non-exposed control groups observed in the study (P 30% as compared to the unexposed group. Safety practices of handling pesticides were low. The most common symptoms self-reported were headache (OR 1.08, 0.60-1.93) and neurological problems like forgetfulness, lack of concentration (OR 1.12, 0.50-2.48) and increased tiredness (OR 1.075, 0.52-2.19) that were significantly associated with the enzyme inhibition. In addition, we record a very low level of knowledge (17.0%), a fair attitude (63.0%) and poor practice (35.0%) on the safe handling and management of pesticides. This pilot study provides indication of exposure to pesticides in the selected sites of the country. Furthermore, it provides evidence for public health interventions by identifying the exposure patterns and pathways of individuals most at risk in the farming communities of the country. Surveillance and bio-monitoring programs are deemed necessary

    Asymmetrical trusted technology networks in developing economies: A case study on critical infrastructure in Bhutan

    Get PDF
    Developing Nations are subject to amplified challenges in terms of the integration of technology, and the exposure to non-domestic opportunism from larger neighboring economies. These challenges are recognizable as asymmetrical differences between what is seen as the normative list of critical infrastructures, and the specialisms that can dominate an emerging economy with early maturity technology networks. This paper discusses the case of Bhutan and demonstrates the need for strengthened approaches to trusted networks to ensure the reliability and continuity of the Nation\u27s critical infrastructures. The paper also links the importance of trusted information sharing networks as part of an overarching technology strategy that protects the Gross National Happiness of the nation

    Awareness and practice of medical waste management among healthcare providers in National Referral Hospital.

    No full text
    IntroductionThe management and treatment of Medical Waste (MW) are of great concern owing to its potential hazard to human health and the environment, particularly in developing countries. In Bhutan, although guidelines exist on the prevention and management of wastes, the implementation is still hampered by technological, economic, social difficulties and inadequate training of staff responsible for handling these waste. The study aimed at assessing the awareness and practice of medical waste management among health care providers and support staff at the National Referral Hospital and its compliance with the existing National guidelines and policies.Materials and methodsAn observational cross-sectional study was conducted from March to April 2019. Three research instruments were developed and used; (i) Demographic questionnaire, (ii) Awareness questions, and (iii) the Observational checklist. The data was coded and double entered into Epi data version 3.1 and SPSS version 18 was used for analysis. Descriptive statistics were used to present the findings of the study.ResultsThe majority of the respondents were female (54.1%) with a mean age of 32.2 (±7.67) years, most of whom have not received any waste management related training/education (56.8%). About 74.4% are aware of medical waste management and 98.2% are aware on the importance of using proper personal protective equipment. Only 37.6% knew about the maximum time limit for medical waste to be kept in hospital premises is 48 hours. About 61.3% of the observed units/wards/departments correctly segregated the waste in accordance to the national guidelines. However, half of the Hospital wastes are not being correctly transported based on correct segregation process with 58% of waste not segregated into infectious and general wastes.ConclusionThe awareness and practice of medical waste management among healthcare workers is often limited with inadequate sensitization and lack of proper implementation of the existing National guidelines at the study site. Therefore, timely and effective monitoring is required with regular training for healthcare workers and support staff. Furthermore, strengthening the waste management system at National Referral Hospital would provide beneficial impact in enhancing safety measures of patients
    corecore