Search results for: general attacks
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5493

Search results for: general attacks

5223 SISSLE in Consensus-Based Ripple: Some Improvements in Speed, Security, Last Mile Connectivity and Ease of Use

Authors: Mayank Mundhra, Chester Rebeiro

Abstract:

Cryptocurrencies are rapidly finding wide application in areas such as Real Time Gross Settlements and Payments Systems. Ripple is a cryptocurrency that has gained prominence with banks and payment providers. It solves the Byzantine General’s Problem with its Ripple Protocol Consensus Algorithm (RPCA), where each server maintains a list of servers, called Unique Node List (UNL) that represents the network for the server, and will not collectively defraud it. The server believes that the network has come to a consensus when members of the UNL come to a consensus on a transaction. In this paper we improve Ripple to achieve better speed, security, last mile connectivity and ease of use. We implement guidelines and automated systems for building and maintaining UNLs for resilience, robustness, improved security, and efficient information propagation. We enhance the system so as to ensure that each server receives information from across the whole network rather than just from the UNL members. We also introduce the paradigm of UNL overlap as a function of information propagation and the trust a server assigns to its own UNL. Our design not only reduces vulnerabilities such as eclipse attacks, but also makes it easier to identify malicious behaviour and entities attempting to fraudulently Double Spend or stall the system. We provide experimental evidence of the benefits of our approach over the current Ripple scheme. We observe ≥ 4.97x and 98.22x in speedup and success rate for information propagation respectively, and ≥ 3.16x and 51.70x in speedup and success rate in consensus.

Keywords: Ripple, Kelips, unique node list, consensus, information propagation

Procedia PDF Downloads 122
5222 Importance of Human Factors on Cybersecurity within Organizations: A Study of Attitudes and Behaviours

Authors: Elham Rajabian

Abstract:

The ascent of cybersecurity incidents is a rising threat to most organisations in general, while the impact of the incidents is unique to each of the organizations. It is a need for behavioural sciences to concentrate on employees’ behaviour in order to prepare key security mitigation opinions versus cybersecurity incidents. There are noticeable differences among users of a computer system in terms of complying with security behaviours. We can discuss the people's differences under several subjects such as delaying tactics on something that must be done, the tendency to act without thinking, future thinking about unexpected implications of present-day issues, and risk-taking behaviours in security policies compliance. In this article, we introduce high-profile cyber-attacks and their impacts on weakening cyber resiliency in organizations. We also give attention to human errors that influence network security. Human errors are discussed as a part of psychological matters to enhance compliance with the security policies. The organizational challenges are studied in order to shape a sustainable cyber risks management approach in the related work section. Insiders’ behaviours are viewed as a cyber security gap to draw proper cyber resiliency in section 3. We carry out the best cybersecurity practices by discussing four CIS challenges in section 4. In this regard, we provide a guideline and metrics to measure cyber resilience in organizations in section 5. In the end, we give some recommendations in order to build a cybersecurity culture based on individual behaviours.

Keywords: cyber resilience, human factors, cybersecurity behavior, attitude, usability, security culture

Procedia PDF Downloads 74
5221 Progressive Collapse of Cooling Towers

Authors: Esmaeil Asadzadeh, Mehtab Alam

Abstract:

Well documented records of the past failures of the structures reveals that the progressive collapse of structures is one of the major reasons for dramatic human loss and economical consequences. Progressive collapse is the failure mechanism in which the structure fails gradually due to the sudden removal of the structural elements. The sudden removal of some structural elements results in the excessive redistributed loads on the others. This sudden removal may be caused by any sudden loading resulted from local explosion, impact loading and terrorist attacks. Hyperbolic thin walled concrete shell structures being an important part of nuclear and thermal power plants are always prone to such terrorist attacks. In concrete structures, the gradual failure would take place by generation of initial cracks and its propagation in the supporting columns along with the tower shell leading to the collapse of the entire structure. In this study the mechanism of progressive collapse for such high raised towers would be simulated employing the finite element method. The aim of this study would be providing clear conceptual step-by-step descriptions of various procedures for progressive collapse analysis using commercially available finite element structural analysis software’s, with the aim that the explanations would be clear enough that they will be readily understandable and will be used by practicing engineers. The study would be carried out in the following procedures: 1. Provide explanations of modeling, simulation and analysis procedures including input screen snapshots; 2. Interpretation of the results and discussions; 3. Conclusions and recommendations.

Keywords: progressive collapse, cooling towers, finite element analysis, crack generation, reinforced concrete

Procedia PDF Downloads 457
5220 Local Differential Privacy-Based Data-Sharing Scheme for Smart Utilities

Authors: Veniamin Boiarkin, Bruno Bogaz Zarpelão, Muttukrishnan Rajarajan

Abstract:

The manufacturing sector is a vital component of most economies, which leads to a large number of cyberattacks on organisations, whereas disruption in operation may lead to significant economic consequences. Adversaries aim to disrupt the production processes of manufacturing companies, gain financial advantages, and steal intellectual property by getting unauthorised access to sensitive data. Access to sensitive data helps organisations to enhance the production and management processes. However, the majority of the existing data-sharing mechanisms are either susceptible to different cyber attacks or heavy in terms of computation overhead. In this paper, a privacy-preserving data-sharing scheme for smart utilities is proposed. First, a customer’s privacy adjustment mechanism is proposed to make sure that end-users have control over their privacy, which is required by the latest government regulations, such as the General Data Protection Regulation. Secondly, a local differential privacy-based mechanism is proposed to ensure the privacy of the end-users by hiding real data based on the end-user preferences. The proposed scheme may be applied to different industrial control systems, whereas in this study, it is validated for energy utility use cases consisting of smart, intelligent devices. The results show that the proposed scheme may guarantee the required level of privacy with an expected relative error in utility.

Keywords: data-sharing, local differential privacy, manufacturing, privacy-preserving mechanism, smart utility

Procedia PDF Downloads 54
5219 Youth Voter Turnout in Jamaica: A Case Study of the 2016 General Election

Authors: Tracy-Ann Johnson-Myers

Abstract:

Since the early 1990’s voter turnout in Jamaica has been abysmal. More troubling, the group less interested in voting are the ‘articulate minority’ (educated youths, aged 18-35). Using surveys, media commentaries and data from the Electoral Commission of Jamaica, this study explores the relationship between educated youths and traditional politics in Jamaica. Specifically, it raises questions about why the ‘articulate minority’ did not vote in the 2016 general election. This will be done by highlighting the political and socio-economic reasons affecting their participation in the electoral process, their opinions of who is responsible for low voter turnout in Jamaica, and what they think needs to be done to encourage people in general to vote. The findings reveal that lack of interest in the democratic and electoral process by the ‘articulate minority’ is due to their growing distrust of politicians and political parties, and lack of confidence in the political process.

Keywords: articulate minority, Jamaica, voter apathy, voter turnout

Procedia PDF Downloads 213
5218 The Examination of Organizational DNA of General Directorate of Youth and Sport Organization of Fars Province Based on Hnald Model

Authors: Mehdi Rastegari Ghiri, Mohammad Reza Baradaran, Zahra Mirsanjari

Abstract:

The aim of the present study was the investigation of DNA Corporate General Administration of Sports and Youth in Fars province. The descriptive research method is a survey that was conducted by field survey. For data collection, questionnaires were used that designed based on Hnald and Silverman model. In this model the organizational DNA model is stated in four types: objective, individualistic, field-oriented and Spiritual. The reliability of the questionnaire by the researcher obtained by using Cronbach's alpha equal to 89/0 respectively. The statistical population includes all managers and specialists of Fars Province Directorate of Youth and Sport that 48 of them were selected as the samples of the research. The results showed the organizational DNA Directorate General for Youth and Sports Organization of Fars province has a field –oriented and nearly field-oriented DNA.

Keywords: organizational, DNA, Hnald, Silverman model

Procedia PDF Downloads 423
5217 Universal Design for Learning: Its Impact for Enhanced Performance in General Psychology

Authors: Jose Gay D. Gallego

Abstract:

This study examined the learning performance in General Psychology of 297 freshmen of the CPSU-Main through the Pre and Post Tests. The instructional intervention via Universal Design for Learning (UDL) was applied to 33% (97 out of 297) of these freshmen as the Treatment Group while the 67% (200) belonged to the Control Group for traditional instructions. Statistical inferences utilized one-way Analysis of Variance for mean differences; Pearson R Correlations for bivariate relationships, and; Factor Analysis for significant components that contributed most to the Universal Design for Learning instructions. Findings showed very high levels of students’ acquired UDL skills. Results in the pre test in General Psychology, respectively, were low and average when grouped into low and high achievers. There was no significant mean difference in the acquired nine UDL components when categorized into seven colleges to generalize that between colleges they were on the same very high levels. Significant differences were found in three test areas in General Psychology in eight colleges whose students in College of teacher education taking the lead in the learning performance. Significant differences were also traced in the post test in favor of the students in the treatment group. This proved that UDL really impacted the learning performance of the low achieving students. Significant correlations were revealed between the components of UDL and General Psychology. There were twenty four significant itemized components that contributed most to UDL instructional interventions. Implications were emphasized to maximizing the principles of UDL with the contention of thoughtful planning related to the four curricular pillars of UDL: (a) instructional goals, (b) instructional delivery methods, (c) instructional materials, and (d) student assessments.

Keywords: universal design for learning, enhanced performance, teaching innovation, technology in education, social science area

Procedia PDF Downloads 249
5216 A Case-Study Analysis on the Necessity of Testing for Cyber Risk Mitigation on Maritime Transport

Authors: Polychronis Kapalidis

Abstract:

In recent years, researchers have started to turn their attention to cyber security and maritime security independently, neglecting, in most cases, to examine the areas where these two critical issues are intertwined. The impact of cybersecurity issues on the maritime economy is emerging dramatically. Maritime transport and all related activities are conducted by technology-intensive platforms, which today rely heavily on information systems. The paper’s argument is that when no defense is completely effective against cyber attacks, it is vital to test responses to the inevitable incursions. Hence, preparedness in the form of testing existing cybersecurity structure via different tools for potential attacks is vital for minimizing risks. Traditional criminal activities may further be facilitated and evolved through the misuse of cyberspace. Kidnap, piracy, fraud, theft of cargo and imposition of ransomware are the major of these activities that mainly target the industry’s most valuable asset; the ship. The paper, adopting a case-study analysis, based on stakeholder consultation and secondary data analysis, namely policy and strategic-related documentation, presents the importance of holistic testing in the sector. Arguing that poor understanding of the issue leads to the adoption of ineffective policies the paper will present the level of awareness within the industry and assess the risks and vulnerabilities of ships to these cybercriminal activities. It will conclude by suggesting that testing procedures must be focused on three main pillars within the maritime transport sector: the human factor, the infrastructure, and the procedures.

Keywords: cybercrime, cybersecurity, organized crime, risk mitigation

Procedia PDF Downloads 135
5215 A Transfer Function Representation of Thermo-Acoustic Dynamics for Combustors

Authors: Myunggon Yoon, Jung-Ho Moon

Abstract:

In this paper, we present a transfer function representation of a general one-dimensional combustor. The input of the transfer function is a heat rate perturbation of a burner and the output is a flow velocity perturbation at the burner. This paper considers a general combustor model composed of multiple cans with different cross sectional areas, along with a non-zero flow rate.

Keywords: combustor, dynamics, thermoacoustics, transfer function

Procedia PDF Downloads 361
5214 The Algorithm to Solve the Extend General Malfatti’s Problem in a Convex Circular Triangle

Authors: Ching-Shoei Chiang

Abstract:

The Malfatti’s Problem solves the problem of fitting 3 circles into a right triangle such that these 3 circles are tangent to each other, and each circle is also tangent to a pair of the triangle’s sides. This problem has been extended to any triangle (called general Malfatti’s Problem). Furthermore, the problem has been extended to have 1+2+…+n circles inside the triangle with special tangency properties among circles and triangle sides; we call it extended general Malfatti’s problem. In the extended general Malfatti’s problem, call it Tri(Tn), where Tn is the triangle number, there are closed-form solutions for Tri(T₁) (inscribed circle) problem and Tri(T₂) (3 Malfatti’s circles) problem. These problems become more complex when n is greater than 2. In solving Tri(Tn) problem, n>2, algorithms have been proposed to solve these problems numerically. With a similar idea, this paper proposed an algorithm to find the radii of circles with the same tangency properties. Instead of the boundary of the triangle being a straight line, we use a convex circular arc as the boundary and try to find Tn circles inside this convex circular triangle with the same tangency properties among circles and boundary Carc. We call these problems the Carc(Tn) problems. The CPU time it takes for Carc(T16) problem, which finds 136 circles inside a convex circular triangle with specified tangency properties, is less than one second.

Keywords: circle packing, computer-aided geometric design, geometric constraint solver, Malfatti’s problem

Procedia PDF Downloads 88
5213 Moving Target Defense against Various Attack Models in Time Sensitive Networks

Authors: Johannes Günther

Abstract:

Time Sensitive Networking (TSN), standardized in the IEEE 802.1 standard, has been lent increasing attention in the context of mission critical systems. Such mission critical systems, e.g., in the automotive domain, aviation, industrial, and smart factory domain, are responsible for coordinating complex functionalities in real time. In many of these contexts, a reliable data exchange fulfilling hard time constraints and quality of service (QoS) conditions is of critical importance. TSN standards are able to provide guarantees for deterministic communication behaviour, which is in contrast to common best-effort approaches. Therefore, the superior QoS guarantees of TSN may aid in the development of new technologies, which rely on low latencies and specific bandwidth demands being fulfilled. TSN extends existing Ethernet protocols with numerous standards, providing means for synchronization, management, and overall real-time focussed capabilities. These additional QoS guarantees, as well as management mechanisms, lead to an increased attack surface for potential malicious attackers. As TSN guarantees certain deadlines for priority traffic, an attacker may degrade the QoS by delaying a packet beyond its deadline or even execute a denial of service (DoS) attack if the delays lead to packets being dropped. However, thus far, security concerns have not played a major role in the design of such standards. Thus, while TSN does provide valuable additional characteristics to existing common Ethernet protocols, it leads to new attack vectors on networks and allows for a range of potential attacks. One answer to these security risks is to deploy defense mechanisms according to a moving target defense (MTD) strategy. The core idea relies on the reduction of the attackers' knowledge about the network. Typically, mission-critical systems suffer from an asymmetric disadvantage. DoS or QoS-degradation attacks may be preceded by long periods of reconnaissance, during which the attacker may learn about the network topology, its characteristics, traffic patterns, priorities, bandwidth demands, periodic characteristics on links and switches, and so on. Here, we implemented and tested several MTD-like defense strategies against different attacker models of varying capabilities and budgets, as well as collaborative attacks of multiple attackers within a network, all within the context of TSN networks. We modelled the networks and tested our defense strategies on an OMNET++ testbench, with networks of different sizes and topologies, ranging from a couple dozen hosts and switches to significantly larger set-ups.

Keywords: network security, time sensitive networking, moving target defense, cyber security

Procedia PDF Downloads 49
5212 Counter-Terrorism and De-Radicalization as Soft Strategies in Combating Terrorism in Indonesia: A Critical Review

Authors: Tjipta Lesmana

Abstract:

Terrorist attacks quickly penetrated Indonesia following the downfall of Soeharto regime in May 1998. Reform era was officially proclaimed. Indonesia turned to 'heaven state' from 'authoritarian state'. For the first time since 1966, the country experienced a full-scale freedom of expression, including freedom of the press, and heavy acknowledgement of human rights practice. Some religious extremists previously run away to neighbor countries to escape from security apparatus secretly backed home. Quickly they consolidated the power to continue their long aspiration and dream to establish 'Shariah Indonesia', Indonesia based on Khilafah ideology. Bali bombings I which shocked world community occurred on 12 October 2002 in the famous tourist district of Kuta on the Indonesian island of Bali, killing 202 people (including 88 Australians, 38 Indonesians, and people from more than 20 other nationalities). In the capital, Jakarta, successive bombings were blasted in Marriott hotel, Australian Embassy, residence of the Philippine Ambassador and stock exchange office. A 'drunken Indonesia' is far from ready to combat nationwide sudden and massive terrorist attacks. Police Detachment 88 (Densus 88) Indonesian counter-terrorism squad, was quickly formed following 2002 Bali Bombing. Anti-terrorism Provisional Act was immediately erected, as well, due to urgent need to fight terrorism. Some Bali bombings criminals were deadly executed after sentenced by the court. But a series of terrorist suicide attacks and another Bali bombings (the second one) in Bali, again, shocked world community. Terrorism network is undoubtedly spreading nationwide. Suspicion is high that they had close connection with Al Qaeda’s groups. Even 'Afghanistan alumni' and 'Syria alumni' returned to Indonesia to back up the local mujahidins in their fights to topple Indonesia constitutional government and set up Islamic state (Khilafah). Supported by massive aids from friendly nations, especially Australia and United States, Indonesia launched large scale operations to crush terrorism consisted of various radical groups such as JAD, JAS, and JAADI. Huge energy, money, and souls were dedicated. Terrorism is, however, persistently entrenched. High ranking officials from Detachment 88 squad and military intelligence believe that terrorism is still one the most deadly enemy of Indonesia.

Keywords: counter-radicalization, de-radicalization, Khalifah, Union State, Al Qaedah, ISIS

Procedia PDF Downloads 159
5211 Cybersecurity Challenges in the Era of Open Banking

Authors: Krish Batra

Abstract:

The advent of open banking has revolutionized the financial services industry by fostering innovation, enhancing customer experience, and promoting competition. However, this paradigm shift towards more open and interconnected banking ecosystems has introduced complex cybersecurity challenges. This research paper delves into the multifaceted cybersecurity landscape of open banking, highlighting the vulnerabilities and threats inherent in sharing financial data across a network of banks and third-party providers. Through a detailed analysis of recent data breaches, phishing attacks, and other cyber incidents, the paper assesses the current state of cybersecurity within the open banking framework. It examines the effectiveness of existing security measures, such as encryption, API security protocols, and authentication mechanisms, in protecting sensitive financial information. Furthermore, the paper explores the regulatory response to these challenges, including the implementation of standards such as PSD2 in Europe and similar initiatives globally. By identifying gaps in current cybersecurity practices, the research aims to propose a set of robust, forward-looking strategies that can enhance the security and resilience of open banking systems. This includes recommendations for banks, third-party providers, regulators, and consumers on how to mitigate risks and ensure a secure open banking environment. The ultimate goal is to provide stakeholders with a comprehensive understanding of the cybersecurity implications of open banking and to outline actionable steps for safeguarding the financial ecosystem in an increasingly interconnected world.

Keywords: open banking, financial services industry, cybersecurity challenges, data breaches, phishing attacks, encryption, API security protocols, authentication mechanisms, regulatory response, PSD2, cybersecurity practices

Procedia PDF Downloads 33
5210 Building Collapse: Factors and Resisting Mechanisms: A Review of Case Studies

Authors: Genevieve D. Fernandes, Nisha P. Naik

Abstract:

All through the ages in all human civilizations, men have been engaged in construction activity, not only to build their dwellings and house their activities, but also roads, bridges to facilitate means of transport, and communication etc. The main concern in this activity was to ensure safety and reduce the collapse of the buildings and other structures. But even after taking all precautions, it is impossible to guarantee safety and collapse because of several unforeseen reasons like faulty constructions, design errors, overloading, soil liquefaction, gas explosion, material degradation, terrorist attacks and economic factors also contributing to the collapse. It is also uneconomical to design the structure for unforeseen events unless they have a reasonable chance of occurrence. In order to ensure safety and prevent collapse, many guidelines have been framed by local bodies and government authorities in many countries like the United States Department of Defence (DOD), United States General Service Administration (GSA) and Euro-Codes in European Nations. Some other practices are followed to incorporate redundancies in the structure like detailing, ductile designs, tying of elements at particular locations, and provision of hinges and interconnections. It is also to be admitted that a full-proof safe design structure for accidental events cannot be prepared and implemented as it is uneconomical and the chances of such occurrences are less. This paper reviews past case studies of the collapse of structures with the aim of developing an understanding of the collapse mechanism. This study will definitely help to bring about a detailed improvement in the design to maximise the quality of the construction at a minimal cost.

Keywords: unforeseen factors, progressive collapse, collapse resisting mechanisms, column removal scenario

Procedia PDF Downloads 102
5209 Palliative Performance Scale Differences between Patients Referred by Specialized Cancer Center and General Hospitals to the Palliative Care Center in Kuwait

Authors: Khalid Al Saleh, Najlaa AlSayed

Abstract:

Background: Palliative care is changing from just ‘end of life care’ to care delivered earlier in the disease course. Metanalysis showed that Palliative Performance Scale (PPS) is associated with increased length of survival. The Palliative Care Center (PCC) in Kuwait is the only stand-alone center in Eastern Mediterranean Region with a capacity of 92 beds. We compared clinical characteristics between patients referred from the Specialized Cancer Center and general hospitals in Kuwait to PCC. Method: A cross Sectional survey was conducted since the opening of PCC in January 2011 to June 2013. Patients’ data on demographics, type of the cancer, PPS score and referring hospital were collected and analyzed. Results: Total number of the patients was 142. Mean age was 61.05±14.79 years, 66 patients (47.1%) were males and 74 (52.9%) were females. The most common cancers in males were lung (n=18, 27.3%) followed by head and neck cancers (n=8, 12.1%) and brain tumors (n=7, 10.6%) while in females, the most common cancers were breast cancer (n=12, 16.7%) followed by ovarian cancer (n=10, 13.9%) and Cancer Colon (n=8, 11.1%). Patients with PPS score 30% were 27.9% (n=39), 40% in 40.7% (n=57), and 50% in 17.1% (n=24) respectively. Patients referred from the Specialized Cancer Center had significantly higher portion of patients with PPS score > 30% (73.4%, n=94), compared to patients coming from general hospitals (33.3%, n=4), P value= 0.007. Conclusion: There is significant difference in PPS scores between patients referred from the Specialized Cancer Center compared to patients referred from general hospitals. We encourage that all cancer patients should be treated in Specialized Cancer Centers and earlier involvement of Palliative Care Centers to achieve better survival. Training workshops are needed for health care professionals working in general hospitals to raise awareness about earlier referral of patients to palliative care services.

Keywords: palliative care, kuwait, performance scale differences, pps score, specialized hospitals

Procedia PDF Downloads 277
5208 Gravitational Frequency Shifts for Photons and Particles

Authors: Jing-Gang Xie

Abstract:

The research, in this case, considers the integration of the Quantum Field Theory and the General Relativity Theory. As two successful models in explaining behaviors of particles, they are incompatible since they work at different masses and scales of energy, with the evidence that regards the description of black holes and universe formation. It is so considering previous efforts in merging the two theories, including the likes of the String Theory, Quantum Gravity models, and others. In a bid to prove an actionable experiment, the paper’s approach starts with the derivations of the existing theories at present. It goes on to test the derivations by applying the same initial assumptions, coupled with several deviations. The resulting equations get similar results to those of classical Newton model, quantum mechanics, and general relativity as long as conditions are normal. However, outcomes are different when conditions are extreme, specifically with no breakdowns even for less than Schwarzschild radius, or at Planck length cases. Even so, it proves the possibilities of integrating the two theories.

Keywords: general relativity theory, particles, photons, Quantum Gravity Model, gravitational frequency shift

Procedia PDF Downloads 339
5207 Phase II Monitoring of First-Order Autocorrelated General Linear Profiles

Authors: Yihua Wang, Yunru Lai

Abstract:

Statistical process control has been successfully applied in a variety of industries. In some applications, the quality of a process or product is better characterized and summarized by a functional relationship between a response variable and one or more explanatory variables. A collection of this type of data is called a profile. Profile monitoring is used to understand and check the stability of this relationship or curve over time. The independent assumption for the error term is commonly used in the existing profile monitoring studies. However, in many applications, the profile data show correlations over time. Therefore, we focus on a general linear regression model with a first-order autocorrelation between profiles in this study. We propose an exponentially weighted moving average charting scheme to monitor this type of profile. The simulation study shows that our proposed methods outperform the existing schemes based on the average run length criterion.

Keywords: autocorrelation, EWMA control chart, general linear regression model, profile monitoring

Procedia PDF Downloads 438
5206 English for Specific Purposes: Its Definition, Characteristics, and the Role of Needs Analysis

Authors: Karima Tayaa, Amina Bouaziz

Abstract:

The rapid expansion in the scientific fields and the growth of communication technology increased the use of English as international language in the world. Hence, over the past few decades, many researchers have been emphasizing on how the teaching and learning of English as a foreign or as an additional language can best help students to perform successfully. English for specific purpose is today quite literally regarded as the most global language discipline which existed practically in every country in the world. ESP (English for Specific Purposes) involves teaching and learning the specific skills and language needed by particular learners for a particular purpose. The P in ESP is always a professional purpose which is a set of skills that learners currently need in their work or will need in their professional careers. It has had an early origin since 1960’s and has grown to become one of the most prominent of English language teaching today. Moreover, ESP learners are usually adults who have some quittances with English and learn the language so as to communicate and perform particular profession. Related activities are based on specific purposes and needs. They are integrated into subject matter area important to the learners. Unlike general English which focuses on teaching general language courses and all four language skills are equally stressed, ESP and practically needs analysis determine which language skills are the most needed by the learners and syllabus designed accordingly. This paper looked into the origin, characteristics, development of ESP, the difference between ESP and general English. Finally, the paper critically reviews the role of needs analysis in the ESP.

Keywords: English language teaching, English for general purposes, English for specific purposes, needs analysis

Procedia PDF Downloads 380
5205 The Malfatti’s Problem in Reuleaux Triangle

Authors: Ching-Shoei Chiang

Abstract:

The Malfatti’s Problem is to ask for fitting 3 circles into a right triangle such that they are tangent to each other, and each circle is also tangent to a pair of the triangle’s side. This problem has been extended to any triangle (called general Malfatti’s Problem). Furthermore, the problem has been extended to have 1+2+…+n circles, we call it extended general Malfatti’s problem, these circles whose tangency graph, using the center of circles as vertices and the edge connect two circles center if these two circles tangent to each other, has the structure as Pascal’s triangle, and the exterior circles of these circles tangent to three sides of the triangle. In the extended general Malfatti’s problem, there are closed-form solutions for n=1, 2, and the problem becomes complex when n is greater than 2. In solving extended general Malfatti’s problem (n>2), we initially give values to the radii of all circles. From the tangency graph and current radii, we can compute angle value between two vectors. These vectors are from the center of the circle to the tangency points with surrounding elements, and these surrounding elements can be the boundary of the triangle or other circles. For each circle C, there are vectors from its center c to its tangency point with its neighbors (count clockwise) pi, i=0, 1,2,..,n. We add all angles between cpi to cp(i+1) mod (n+1), i=0,1,..,n, call it sumangle(C) for circle C. Using sumangle(C), we can reduce/enlarge the radii for all circles in next iteration, until sumangle(C) is equal to 2πfor all circles. With a similar idea, this paper proposed an algorithm to find the radii of circles whose tangency has the structure of Pascal’s triangle, and the exterior circles of these circles are tangent to the unit Realeaux Triangle.

Keywords: Malfatti’s problem, geometric constraint solver, computer-aided geometric design, circle packing, data visualization

Procedia PDF Downloads 104
5204 Social Media or Television as Cure for Political Apathy among Nigerian Youths during Nigeria’s 2023 General Elections

Authors: Igbozuruike Chigozie Jude, Agwu Agwu Ejem

Abstract:

This research examines the comparative influence of social media and TV campaigns on youth participation in the 2023 general elections in Nigeria. It interrogates the roles played by these two media in influencing youth participation, especially youths in Nigeria, while revealing the factors that influenced their exposure to the media and their participation. The study employed a survey design of quantitative research method to gather the data for this study. Data was collected through a questionnaire from 300 youths in Lagos. The sample size was selected using a multi-stage cluster sampling technique. Social media was the most media that was rated to have had the most impact on youth participation during the election period with its political campaigns. The elaborate likelihood model was used to underpin the study. The study concluded that social media campaigns played a major role in political participation among the youth during the 2023 general election. It revealed how social media contributed to the youths' participation and influenced them to engage in common forms of political participation. The main recommendation of this study is that since the majority of the youths are between the ages of 18 to 35, the media should work on coming up with more content around the year to sensitize them about their political rights and enlighten them socio-politically so that they grow up to become responsible citizens in the country both politically and socially.

Keywords: social media, general election, Nigeria, political apathy, youth

Procedia PDF Downloads 53
5203 Proof of Concept Design and Development of a Computer-Aided Medical Evaluation of Symptoms Web App: An Expert System for Medical Diagnosis in General Practice

Authors: Ananda Perera

Abstract:

Computer-Assisted Medical Evaluation of Symptoms (CAMEOS) is a medical expert system designed to help General Practices (GPs) make an accurate diagnosis. CAMEOS comprises a knowledge base, user input, inference engine, reasoning module, and output statement. The knowledge base was developed by the author. User input is an Html file. The physician user collects data in the consultation. Data is sent to the inference engine at servers. CAMEOS uses set theory to simulate diagnostic reasoning. The program output is a list of differential diagnoses, the most probable diagnosis, and the diagnostic reasoning.

Keywords: CDSS, computerized decision support systems, expert systems, general practice, diagnosis, diagnostic systems, primary care diagnostic system, artificial intelligence in medicine

Procedia PDF Downloads 136
5202 Violence in the School Environment: When the Teenager Encounters the Threat of Depression

Authors: Ndje Ndje Mireille

Abstract:

For some years in Cameroon, there has been an increase in violence in schools. This violence has gone from verbal to physical, sometimes going as far as murder. At the centre of this violence, we find the student who is a teenager in the midst of both physical and psychological changes. The unpredictable transformations of his body, the unexpected emotions arrouse when he encouters someonelse, intrusion, shortcomings, boredom, loneliness and self-deception are the threats to which the teenager faces daily. From the psychopathological point of view, the greatest threat in adolesence is probably the depresive threat. During adolescence and for several resons, the subject is confronted with the self image. He displays certantity which sometimes hides great uncertaintity about what leads him to manifest some particular behaviours or undertake certain actions. Faced with aggressiveness twards those he confronts, he feels more or less guilt. This can lead a certain number of adolescents to feel heplessness faced to their vis-à-vis, faced to life. This helplessness is sometimes reinforced by the social, cultural and economic context in which they are. The teeneger then feels threatens by this depression which, when it reaches its extreme, it is manifested by the feeling that he can no longer do anything. Generally, the depressive threats manifest itself in defensive forms vis-à-vis with the depression itself. Reason why, it is indeed a threat and not a threshold already crossed. This threat often manifests itself in inappropriate forms of attack on one’s own body as seen in a number of repetitive risky behaviours. We also see teenegers confront peers and even adults through physical attacks and often go as far as murder. All these behaviours appears as an absurd way of attacking and at the same time confronting the feeling of remaining alive. This depressive threats can also be expressed in forms of attacks on an individual’s thinking abilities or more explicitely in the form of accademic downfall. The depressive threats does not sum up all the problems of adolescence, but, undoubtly represents currently, one of the deepest form of unease adolescents face.

Keywords: violence, school, depression threats, adolescent, behavior

Procedia PDF Downloads 65
5201 OAS and Interstate Dispute Resolution at the Beginning of the 21st Century: General Pattern and Peculiarities

Authors: Victor Jeifets, Liliia Khadorich

Abstract:

The paper describes the OAS role in dispute resolution. The authors make an attempt to identify a general pattern of the OAS activities within the peaceful settlement of interstate conflicts, in the beginning of 21st century, as well as to analyze some features of Honduras–Belize, Nicaragua–Honduras, Honduras–El Salvador, Costa-Rica–Nicaragua, Colombia–Ecuador cases.

Keywords: OAS, peace maintenance, border dispute, dispute resolution, peaceful settlement

Procedia PDF Downloads 473
5200 Total Parenteral Nutrition Wastage: A Retrospective Cohort Study in a Small District General Hospital

Authors: Muhammad Faizan Butt, Maria Ambreen Tahir, Joshua James Pilkington, A. A. Warsi

Abstract:

Background: Total parenteral nutrition (TPN) use within the NHS is crucial in the prevention of malnourishment. TPN prescriptions are tailored to an individual patient’s needs. TPN bags come in fixed sizes, and minimizing wastage has financial and sustainability implications for the health service. The aim of the study is to assess current prescribing practices, look at the volume of TPN wastage and identify reasons for it. Methodology: A retrospective cohort study on TPN prescriptions over a period of 1 year (Jan-Dec 2022) was performed. All patients prescribed TPN that had been admitted under a general surgery consultant in a small district hospital were included. Data were extracted from hospital electronic records and dietician charts. Data were described, and reasons for TPN wastage were explored. Results: 49 patients were identified. The average length of TPN prescription was 8 days (median). This totaled 608 prescriptions. Of the bags prescribed, 258, 169, and 181 were 10g (2500ml), 14g (2000ml), and 18g (2000ml), respectively. The mean volume wasted from each type of bag was 634ml, 634ml, and 648ml, respectively. Reasons for TPN wastage identified were: no loss (25%), smaller bags not available (53.6%), step-down regime (8.1%), and other (12.2%). Conclusion: This study has identified that the current stocking and prescribing of TPN within a district general hospital leads to a significant wastage of 638.2ml (average). The commonest reason for wastage is the non-availability of a more appropriate sized bag.

Keywords: general surgery, TPN, sustainability, wastage

Procedia PDF Downloads 47
5199 Characterization of Probability Distributions through Conditional Expectation of Pair of Generalized Order Statistics

Authors: Zubdahe Noor, Haseeb Athar

Abstract:

In this article, first a relation for conditional expectation is developed and then is used to characterize a general class of distributions F(x) = 1-e^(-ah(x)) through conditional expectation of difference of pair of generalized order statistics. Some results are reduced for particular cases. In the end, a list of distributions is presented in the form of table that are compatible with the given general class.

Keywords: generalized order statistics, order statistics, record values, conditional expectation, characterization

Procedia PDF Downloads 442
5198 The Lexical Eidos as an Invariant of a Polysemantic Word

Authors: S. Pesina, T. Solonchak

Abstract:

Phenomenological analysis is not based on natural language, but ideal language which is able to be a carrier of ideal meanings – eidos representing typical structures or essences. For this purpose, it’s necessary to release from the spatio-temporal definiteness of a subject and then state its noetic essence (eidos) by means of free fantasy generation. Herewith, as if a totally new objectness is created - the universal, confirming the thesis that thinking process takes place in generalizations passing by numerous means through the specific to the general and from the general through the specific to the singular.

Keywords: lexical eidos, phenomenology, noema, polysemantic word, semantic core

Procedia PDF Downloads 253
5197 Peer-Mediated Interventions as a High-Leverage Practice in Inclusive General Education Classrooms

Authors: Daniel Pyle, Nicole Pyle, Ben Lignugaris-Kraft, Lawrence Maheady

Abstract:

Students with disabilities are not included in general education at the same rate as their peers without disabilities. There are multiple reasons cited for why inclusion rates vary, such as teachers' lack of knowledge of the successful delivery of inclusive practices to students with the most extensive support needs. However, decades of research document effective inclusive practices associated with benefits across domains for students with disabilities. One effective inclusive practice that teachers use to improve outcomes for students with disabilities is flexible grouping. Teachers can use flexible grouping to facilitate students working collaboratively by using peer-mediated interventions (PMIs). This article describes PMIs as a flexible grouping of High Leverage Practices (HLP). There are variations of PMIs to select from when using flexible grouping. PMIs are described by varied grouping arrangements and different instructional procedures to clarify the flexibility of grouping students and students’ roles within those groupings. In support of teachers’ use of flexible grouping in inclusive general education classrooms, we identify different PMI formats teachers can use depending on the preferred grouping arrangement, explain the distinctive characteristics of PMI models to distinguish expected procedures with peers, highlight outcomes associated with PMIs, and provide an overview of evaluating PMIs effectiveness.

Keywords: peer-mediated interventions, high leverage practices, flexible grouping, general education, special education

Procedia PDF Downloads 58
5196 The Instruction of Imagination: A Theory of Language as a Social Communication Technology

Authors: Daniel Dor

Abstract:

The research presents a new general theory of language as a socially-constructed communication technology, designed by cultural evolution for a very specific function: the instruction of imagination. As opposed to all the other systems of intentional communication, which provide materials for the interlocutors to experience, language allows speakers to instruct their interlocutors in the process of imagining the intended meaning-instead of experiencing it. It is thus the only system that bridges the experiential gaps between speakers. This is the key to its enormous success.

Keywords: experience, general theory of language, imagination, language as technology, social essence of language

Procedia PDF Downloads 562
5195 Dissimilarity Measure for General Histogram Data and Its Application to Hierarchical Clustering

Authors: K. Umbleja, M. Ichino

Abstract:

Symbolic data mining has been developed to analyze data in very large datasets. It is also useful in cases when entry specific details should remain hidden. Symbolic data mining is quickly gaining popularity as datasets in need of analyzing are becoming ever larger. One type of such symbolic data is a histogram, which enables to save huge amounts of information into a single variable with high-level of granularity. Other types of symbolic data can also be described in histograms, therefore making histogram a very important and general symbolic data type - a method developed for histograms - can also be applied to other types of symbolic data. Due to its complex structure, analyzing histograms is complicated. This paper proposes a method, which allows to compare two histogram-valued variables and therefore find a dissimilarity between two histograms. Proposed method uses the Ichino-Yaguchi dissimilarity measure for mixed feature-type data analysis as a base and develops a dissimilarity measure specifically for histogram data, which allows to compare histograms with different number of bins and bin widths (so called general histogram). Proposed dissimilarity measure is then used as a measure for clustering. Furthermore, linkage method based on weighted averages is proposed with the concept of cluster compactness to measure the quality of clustering. The method is then validated with application on real datasets. As a result, the proposed dissimilarity measure is found producing adequate and comparable results with general histograms without the loss of detail or need to transform the data.

Keywords: dissimilarity measure, hierarchical clustering, histograms, symbolic data analysis

Procedia PDF Downloads 142
5194 Podcasting: A Tool for an Enhanced Learning Experience of Introductory Courses to Science and Engineering Students

Authors: Yaser E. Greish, Emad F. Hindawy, Maryam S. Al Nehayan

Abstract:

Introductory courses such as General Chemistry I, General Physics I and General Biology need special attention as students taking these courses are usually at their first year of the university. In addition to the language barrier for most of them, they also face other difficulties if these elementary courses are taught in the traditional way. Changing the routine method of teaching of these courses is therefore mandated. In this regard, podcasting of chemistry lectures was used as an add-on to the traditional and non-traditional methods of teaching chemistry to science and non-science students. Podcasts refer to video files that are distributed in a digital format through the Internet using personal computers or mobile devices. Pedagogical strategy is another way of identifying podcasts. Three distinct teaching approaches are evident in the current literature and include receptive viewing, problem-solving, and created video podcasts. The digital format and dispensing of video podcasts have stabilized over the past eight years, the type of podcasts vary considerably according to their purpose, degree of segmentation, pedagogical strategy, and academic focus. In this regard, the whole syllabus of 'General Chemistry I' course was developed as podcasts and were delivered to students throughout the semester. Students used the podcasted files extensively during their studies, especially as part of their preparations for exams. Feedback of students strongly supported the idea of using podcasting as it reflected its effect on the overall understanding of the subject, and a consequent improvement of their grades.

Keywords: podcasting, introductory course, interactivity, flipped classroom

Procedia PDF Downloads 246