The widespread use of the Internet and the convenient mechanism it provides, such as easy access, easy downloads, and easy copy and paste functions have made many types of unethical behaviors easier, particularly those involving students in academic settings. Among the issues in ethics within the academic environment that can be triggered by the Internet are fraudulence, plagiarism, falsification, delinquency, unauthorized help, and facility misuse. Given these issues, the study seeks to investigate the extent to which students at a public university in Malaysia engage in such unethical behavior and their relationship with the big five personality model. This study was conducted using a survey method of 252 students in three different academic faculties. The results of factor analyses confirm and refine the reliability of the scales for both big five personality variables and unethical Internet behaviors as conceptualized through Internet triggered academic dishonesty (ITADS). The findings indicate that personality traits such as (1) agreeableness, (2) conscientiousness and (3) emotional stability are significantly and negatively correlated with unethical Internet behavior in university students. Significant differences in facility misuse are also observed between the three academic faculties investigated. This research should provide significant contributions to educators in designing the computer ethics curriculum and in allowing for educational institutions as well as other organizations in developing relevant policies and guidelines on matters pertaining to academic conduct, utilization of computers and Internet, and recruitment exercises. 相似文献
Determination of the thermo-mechanical structure of the crust for seismically active regions using available geophysical and geological data is of great importance. The most important feature of the intraplate earthquakes in the Indian region are that the seismicity occurs within the entire crust. In Latur region of India an earthquake occurred in the upper crust. In such situations, quantifying the uncertainties in seismogenic depths becomes very important. The stochastic heat conduction equation has been solved for different sets of boundary conditions, an exponentially decreasing radiogenic heat generation and randomness in thermal conductivity. Closed form analytical expressions for mean and variance in the temperature depth distribution have been used and an automatic formulation has been developed in Matlab for computing and plotting the thermal structure. The Matlab toolbox presented allows us to display the controlling thermal parameters on the screen directly, and plot the subsurface thermal structure along with its error bounds. The software can be used to quantify the thermal structure for any given region and is applied here to the Latur earthquake region of India. 相似文献
Mn doped ZnO nanostructures have been prepared using low temperature simple, quick, and versatile synthesis approach. The structural, microstructural, and vibrational investigations reveal that as prepared nanostructures with low Mn doping concentration have single hexagonal phase and are grown along the preferred c-axis. The X-rays photoelectron spectroscopy demonstrates that the Mn ions are in mixed oxidation states for high doping concentration of Mn, while are in 2+ oxidation state for low concentration into ZnO lattice. The photoluminescence spectrum (PL) exhibits a significant red-shift of 22 nm in the optical band gap of doped ZnO and shows the improved luminescence properties, which makes it potential for its use in the photocatalyst, optoelectronics and solar cell nanodevices. Furthermore, the magnetic measurement of Mn doped ZnO nanostructures exhibits the ferromagnetism at room temperature. 相似文献
The effect of Ag on the stationary and non-stationary anodic corrosion rates of PbSbCd and PbSb alloys in H2SO4 has been studied. Anodic polarization curves were constructed under galvanostatic and potentiostatic conditions. Optical microscopic examination and microprobe analysis of the alloys were conducted. The beneficial effect of Ag was ascribed to a delay in closure of pores in the initial PbSO4 film. The leaching out of Sb from the outermost layers and the simultaneous nucleation of PbSO4 and Ag2SO4 from supersaturated solutions in the pores is thus made possible. 相似文献
Global rise of infections and deaths caused by drug-resistant bacterial pathogens are among the unmet medical needs. In an age of drying pipeline of novel antibiotics to treat bacterial infections, antimicrobial peptides (AMPs) are proven to be valid therapeutics modalities. Direct in vivo applications of many AMPs could be challenging; however, works are demonstrating encouraging results for some of them. In this review article, we discussed 3-D structures of potent AMPs e.g., polymyxin, thanatin, MSI, protegrin, OMPTA in complex with bacterial targets and their mode of actions. Studies on human peptide LL37 and de novo-designed peptides are also discussed. We have focused on AMPs which are effective against drug-resistant Gram-negative bacteria. Since treatment options for the infections caused by super bugs of Gram-negative bacteria are now extremely limited. We also summarize some of the pertinent challenges in the field of clinical trials of AMPs. 相似文献
In classical public‐key infrastructure (PKI), the certificate authorities (CAs) are fully trusted, and the security of the PKI relies on the trustworthiness of the CAs. However, recent failures and compromises of CAs showed that if a CA is corrupted, fake certificates may be issued, and the security of clients will be at risk. As emerging solutions, blockchain‐ and log‐based PKI proposals potentially solved the shortcomings of the PKI, in particular, eliminating the weakest link security and providing a rapid remedy to CAs' problems. Nevertheless, log‐based PKIs are still exposed to split‐world attacks if the attacker is capable of presenting two distinct signed versions of the log to the targeted victim(s), while the blockchain‐based PKIs have scaling and high‐cost issues to be overcome. To address these problems, this paper presents a secure and accountable transport layer security (TLS) certificate management (SCM), which is a next‐generation PKI framework. It combines the two emerging architectures, introducing novel mechanisms, and makes CAs and log servers accountable to domain owners. In SCM, CA‐signed domain certificates are stored in log servers, while the management of CAs and log servers is handed over to a group of domain owners, which is conducted on the blockchain platform. Different from existing blockchain‐based PKI proposals, SCM decreases the storage cost of blockchain from several hundreds of GB to only hundreds of megabytes. Finally, we analyze the security and performance of SCM and compare SCM with previous blockchain‐ and log‐based PKI schemes. 相似文献
Wireless body area network (WBAN) has witnessed significant attentions in the healthcare domain using biomedical sensor-based monitoring of heterogeneous nature of vital signs of a patient’s body. The design of frequency band, MAC superframe structure, and slots allocation to the heterogeneous nature of the patient’s packets have become the challenging problems in WBAN due to the diverse QoS requirements. In this context, this paper proposes an Energy Efficient Traffic Prioritization for Medium Access Control (EETP-MAC) protocol, which provides sufficient slots with higher bandwidth and guard bands to avoid channels interference causing longer delay. Specifically, the design of EETP-MAC is broadly divided in to four folds. Firstly, patient data traffic prioritization is presented with broad categorization including Non-Constrained Data (NCD), Delay-Constrained Data (DCD), Reliability-Constrained Data (RCD) and Critical Data (CD). Secondly, a modified superframe structure design is proposed for effectively handling the traffic prioritization. Thirdly, threshold based slot allocation technique is developed to reduce contention by effectively quantifying criticality on patient data. Forth, an energy efficient frame design is presented focusing on beacon interval, superframe duration, and packet size and inactive period. Simulations are performed to comparatively evaluate the performance of the proposed EETP-MAC with the state-of-the-art MAC protocols. The comparative evaluation attests the benefit of EETP-MAC in terms of efficient slot allocation resulting in lower delay and energy consumption.
Wireless Personal Communications - Current research in wireless communication undoubtedly points towards the tremendous advantages of using visible light as a spectrum for significantly boosting... 相似文献
Base station's location privacy in a wireless sensor network (WSN) is critical for information security and operational availability of the network. A key part of securing the base station from potential compromise is to secure the information about its physical location. This paper proposes a technique called base station location privacy via software-defined networking (SDN) in wireless sensor networks (BSLPSDN). The inspiration comes from the architecture of SDN, where the control plane is separated from the data plane, and where control plane decides the policy for the data plane. BSLPSDN uses three categories of nodes, namely, a main controller to instruct the overall operations, a dedicated node to buffer and forward data, and lastly, a common node to sense and forward the packet. We employ three kinds of nodes to collaborate and achieve stealth for the base station and thus protecting it against the traffic-analysis attacks. Different traits of the WSN including energy status and traffic density can actively be monitored by BSLPSDN, which positively affects the energy goals, expected life of the network, load on common nodes, and the possibility of creating diversion in the wake of an attack on the base station. We incorporated multiple experiments to analyze and evaluate the performance of our proposed algorithm. We use single controller with multiple sensor nodes and multiple controllers with multiple sensor nodes to show the level of anonymity of BS. Experiments show that providing BS anonymity via multiple controllers is the best method both in terms of energy and privacy. 相似文献
Mechanisms governing the aluminum-mediated solid-phase epitaxy of Si on patterned crystalline Si substrates have been identified
by studying the deposited material as a function of growth conditions when varying parameters such as temperature, growth
time, and layer-stack properties. Early growth stages can be discerned as first formation of “free” Si at the Al/α-Si interface,
then diffusion of Si along the Al grain boundaries, nucleation at the Si substrate surface, nuclei rearrangement, and finally
crystal growth. The acquired understanding is applied to control the selectivity and completeness of single-crystal growth
in various sizes of contact windows to the Si substrate. 相似文献