53 research outputs found

    Event Based Rumor Detection on Social Media for Digital Forensics and Information Security

    Get PDF
    Advancement in information technology such as social networking is on one side is powerful source of news and information and on other side have posed new challenges for those policing cybercrime. Cybercriminals and terrorists are spreading rumors that is unreal or even malicious information on social network which can bring massive panic and social unrest to our community. The rumor detection problem on social network has attracted considerable attention in recent years. A different type of rumors has different characteristics and need different techniques and approaches to detect. In this paper, we proposed an efficient approach to detect event based rumor on social media like Twitter. Experiment illustrates that our event based rumor detection method obtain significant improvement compared with the previous work

    Effect of Blast Load on Soft Storey Building

    Get PDF
    The number of terrorist activity have increased concern about safety of building. So, it’s became need to design building for blast load. This study compares the response of 3 dimensional soft storey building with Bare frame under blast loading. To design and analyse a structure for blast loading require a deep understanding of blast phenomena. The blast load was calculated by using IS code. This paper present numerical example of fictive structure exposed to blast load. Effect of variable blast source weight is calculated for 30m standoff distance. The blast load is analytically determined as pressure-time history and numerical model was created in SAP2000 for frame and soft storey building. The result shows that due to infill there is significant reduction in displacement, velocity and acceleration. The influence of blast load in terms of peak deflection, velocity and acceleration is determined and compared

    Architecture for a Distributed, Sharable Information Security Threat Management

    No full text
    Universities and colleges are rapidly getting dependent on their Campus Networks for their routine functioning. These networks are almost identical in their nature of operation, users, security threats being faced and potential vulnerabilities. Most of the educational institutes do not have adequate resources to identify and respond to these threats. Therefore, a distributed & sharable approach is required where information related to these incidents, attack pattern and actions taken are shared. The key benefit of a distributed collaborative approach is a global view of the malicious activities. Supplementing the information gathered locally with relevant information gathered across the globe can provide a more precise model of an attacker's behavior and activity pattern. It is proposed that every educational institute maintains its own incident database using a common protocol, where security incidents, its analysis and solutions are recorded. The proposed architecture allows institutes of higher education to collaborate and cooperate with each other on security issues in key areas including incident response, attack mitigation, and preventive measures. This would also avoid duplication of efforts and an early solution can be found, based on past experience. The proposed architecture improves response time in handling the information security incidents. In addition, it decreases the risk of attack through collaborative projects, customized to meet each participant's Information Security needs. It is also proposed that based on continuous analysis of available data by experts, warning alerts or preventive measures will be communicated to the member institutions proactively to mitigate existing or future threats

    Differences in job satisfaction of nurses based on type of hospital: An analytical study from India

    No full text
    Introduction: The purpose of this study is to carry out a comparative analysis of the job satisfaction of nurses working in India based on the different types of the hospital they are working with. The study tests the null hypothesis that the job satisfaction of nurses from India across different types of hospitals is the same. Methods: Four hundred nurses divided into 100 each for four popular types of hospitals – (1) Educational; (2) Government; (3) Charitable Trust; and (4) Private, from all over India were surveyed. Two ANOVA tests were performed. The first one was performed, taking overall job satisfaction as the dependent variable. The second ANOVA was performed by taking the monetary and compensation factors, work environment and management support, and job-related factors as the dependent variables. Results: The overall mean of job satisfaction was -0.73 (SD 0.60). Overall, 65 percent of the variability of the dependent variable, job satisfaction, is explained by the type of hospital and is statistically significant (p<0.0001). Conclusion: Monetary and compensation factors, work environment and management support, and job-related factors impact nurses' job satisfaction. These factors vary with the type of hospital, and hence it can be concluded that due to variation in these factors depending on the type of hospital, the job satisfaction of nurses varies. Implications of our study are for the educational, government, and charitable trust hospitals to improve their work culture, management, and work environment so that nurses will have higher job satisfaction
    • …
    corecore