Search results for: World Trade Center Attack
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10704

Search results for: World Trade Center Attack

10134 USBware: A Trusted and Multidisciplinary Framework for Enhanced Detection of USB-Based Attacks

Authors: Nir Nissim, Ran Yahalom, Tomer Lancewiki, Yuval Elovici, Boaz Lerner

Abstract:

Background: Attackers increasingly take advantage of innocent users who tend to use USB devices casually, assuming these devices benign when in fact they may carry an embedded malicious behavior or hidden malware. USB devices have many properties and capabilities that have become the subject of malicious operations. Many of the recent attacks targeting individuals, and especially organizations, utilize popular and widely used USB devices, such as mice, keyboards, flash drives, printers, and smartphones. However, current detection tools, techniques, and solutions generally fail to detect both the known and unknown attacks launched via USB devices. Significance: We propose USBWARE, a project that focuses on the vulnerabilities of USB devices and centers on the development of a comprehensive detection framework that relies upon a crucial attack repository. USBWARE will allow researchers and companies to better understand the vulnerabilities and attacks associated with USB devices as well as providing a comprehensive platform for developing detection solutions. Methodology: The framework of USBWARE is aimed at accurate detection of both known and unknown USB-based attacks by a process that efficiently enhances the framework's detection capabilities over time. The framework will integrate two main security approaches in order to enhance the detection of USB-based attacks associated with a variety of USB devices. The first approach is aimed at the detection of known attacks and their variants, whereas the second approach focuses on the detection of unknown attacks. USBWARE will consist of six independent but complimentary detection modules, each detecting attacks based on a different approach or discipline. These modules include novel ideas and algorithms inspired from or already developed within our team's domains of expertise, including cyber security, electrical and signal processing, machine learning, and computational biology. The establishment and maintenance of the USBWARE’s dynamic and up-to-date attack repository will strengthen the capabilities of the USBWARE detection framework. The attack repository’s infrastructure will enable researchers to record, document, create, and simulate existing and new USB-based attacks. This data will be used to maintain the detection framework’s updatability by incorporating knowledge regarding new attacks. Based on our experience in the cyber security domain, we aim to design the USBWARE framework so that it will have several characteristics that are crucial for this type of cyber-security detection solution. Specifically, the USBWARE framework should be: Novel, Multidisciplinary, Trusted, Lightweight, Extendable, Modular and Updatable and Adaptable. Major Findings: Based on our initial survey, we have already found more than 23 types of USB-based attacks, divided into six major categories. Our preliminary evaluation and proof of concepts showed that our detection modules can be used for efficient detection of several basic known USB attacks. Further research, development, and enhancements are required so that USBWARE will be capable to cover all of the major known USB attacks and to detect unknown attacks. Conclusion: USBWARE is a crucial detection framework that must be further enhanced and developed.

Keywords: USB, device, cyber security, attack, detection

Procedia PDF Downloads 391
10133 Inter Religion Harmony and World Peace: Theory from Shah Wali Ullah's Philosophy

Authors: Muhammad Usman Ghani

Abstract:

Religious tolerance is essential for the establishment of peace in the world. In the system created by Almighty Allah where a lot of diversity is found, still, this world holds unity itself. In today's world, human beings have been divided into clashes of civilizations or divided on the basis of religions or lingual differences. A religious scholar of Indo- Pak subcontinent describes four ethics, on the basis of which all religions of the world can unite. He says in his philosophy of religion that, there is a number of elements common in all religions but four are very common and they are: cleanliness, nobel deeds, relation to Almighty (existence of Almighty) and justice. He says that this universe also holds its integrity in itself. All humans are different in their attributes but to be a human being is common in them. Similarly, all species of the universe are different in their nature, but to be the creature of God is commonly shared by all of them.

Keywords: inter-religious relation, peace and harmony, unity, four common ethics/virtues

Procedia PDF Downloads 339
10132 Linguistics and Islamic Studies in Historical Perspective: The Case of Interdisciplinary Communication

Authors: Olga Bernikova, Oleg Redkin

Abstract:

Islamic Studies and the Arabic language are indivisible from each other starting from the appearance of Islam and formation of the Classical language. The present paper demonstrates correlation among linguistics and religion in historical perspective with regard to peculiarities of the Arabic language which distinguish it from the other prophetic languages. Islamic Studies and Linguistics are indivisible from each other starting from the invent of Islam and formation of the Classical language. In historical perspective, the Arabic language has been and remains a tool for the expression of Islamic rhetoric being a prophetic language. No other language in the world has preserved its stability for more than 14 centuries. Islam is considered to be one of the most important factors which secure this stability. The analysis and study of the text of Qurʾān are of special importance for those who study Islamic civilization, its role in the destinies of the mankind, its values and virtues. Without understanding of the polyphony of this sacred text, indivisible unity of its form and content it is impossible to understand social developments both in the present and the past. Since the first years of Islam Qurʾān had been in the center of attention of Muslim scholars, and in the center of attention of theologians, historians, philologists, jurists, mathematicians. Only quite recently it has become an object of analysis of the specialists of computer technologies. In Arabic and Islamic studies mediaeval texts i.e. textual documents are considered the main source of information. Hence the analysis of the multiplicity of various texts and finding of interconnections between them help to set scattered fragments of the riddle into a common and eloquent picture of the past, which reflects the state of the society on certain stages of its development. The text of the Qurʾān like any other phenomenon is a multifaceted object that should be studied from different points of view. As a result, this complex study will allow obtaining a three-dimensional image rather than a flat picture alone.

Keywords: Arabic, Islamic studies, linguistics, religion

Procedia PDF Downloads 218
10131 Economic Valuation of Environmental Services Sustained by Flamboyant Park in Goiania-Go, Brazil

Authors: Brenda R. Berca, Jessica S. Vieira, Lucas G. Candido, Matheus C. Ferreira, Paulo S. A. Lopes Filho, Rafaella O. Baracho

Abstract:

This study aims to estimate the economic value environmental services sustained by Flamboyant Lourival Louza Municipal Park in Goiânia, Goiás, Brazil. The Flamboyant Park is one of the most relevant urban parks, and it is located near a stadium, a shopping center, and two supercenters. In order to define the methods used for the valuation of Flamboyant Park, the first step was carrying out bibliographical research with the view to better understand which method is most feasible to valuate the Park. Thus, the following direct methods were selected: travel cost, hedonic pricing, and contingent valuation. In addition, an indirect method (replacement cost) was applied at Flamboyant Park. The second step was creating and applying two surveys. The first survey aimed at the visitors of the park, addressing socio-economic issues, the use of the Park, as well as its importance and the willingness the visitors, had to pay for its existence. The second survey was destined to the existing trade in the Park, in order to collect data regarding the profits obtained by them. In the end, the characterization of the profile of the visitors and the application of the methods of contingent valuation, travel cost, replacement cost and hedonic pricing were obtained, thus monetarily valuing the various ecosystem services sustained by the park. Some services were not valued due to difficulties encountered during the process.

Keywords: contingent valuation, ecosystem services, economic environmental valuation, hedonic pricing, travel cost

Procedia PDF Downloads 225
10130 Proposal of Optimality Evaluation for Quantum Secure Communication Protocols by Taking the Average of the Main Protocol Parameters: Efficiency, Security and Practicality

Authors: Georgi Bebrov, Rozalina Dimova

Abstract:

In the field of quantum secure communication, there is no evaluation that characterizes quantum secure communication (QSC) protocols in a complete, general manner. The current paper addresses the problem concerning the lack of such an evaluation for QSC protocols by introducing an optimality evaluation, which is expressed as the average over the three main parameters of QSC protocols: efficiency, security, and practicality. For the efficiency evaluation, the common expression of this parameter is used, which incorporates all the classical and quantum resources (bits and qubits) utilized for transferring a certain amount of information (bits) in a secure manner. By using criteria approach whether or not certain criteria are met, an expression for the practicality evaluation is presented, which accounts for the complexity of the QSC practical realization. Based on the error rates that the common quantum attacks (Measurement and resend, Intercept and resend, probe attack, and entanglement swapping attack) induce, the security evaluation for a QSC protocol is proposed as the minimum function taken over the error rates of the mentioned quantum attacks. For the sake of clarity, an example is presented in order to show how the optimality is calculated.

Keywords: quantum cryptography, quantum secure communcation, quantum secure direct communcation security, quantum secure direct communcation efficiency, quantum secure direct communcation practicality

Procedia PDF Downloads 179
10129 Africatown Ancestors’ Discourse Analysis: Unveiling Narratives of Identity Heritage

Authors: Maxime Vignon

Abstract:

This study delves into the discourse surrounding Africatown ancestors’ will, through a rigorous discourse analysis, to reveal the intricate narratives shaping heritage and identity within this unique community. Situated near Mobile, Alabama, Africatown traces its origins to the Clotilda, the last known slave ship to bring captives from Africa to the United States. Through a meticulous examination of Africatown ancestors posthumous will, this analysis aims to uncover the spiritual linguistic nuances which will contribute to the preservation of Africatown's ancestral heritage and the construction of individual self and collective empowerment. This research will be grounded in Michel Foucault discourse. In its attempt to analyze the four core elements of discourse, this study explores the role of rituals and spiritual discourses within the will of Africatown ancestors. Additionally, it delves into the descendants’ public appearance scrutinizing the use of ancestral names and identities. Ultimately, this discourse analysis contributes to a nuanced understanding of how language and narrative from the ancestors would shape unity, a valuable insight into the complexities of identity formation and the enduring impact of the transatlantic slave trade on this resilient community.

Keywords: applied linguistics, culture, discourse analysis, identity, spirituality, transatlantic slave trade

Procedia PDF Downloads 58
10128 Anomaly Detection in a Data Center with a Reconstruction Method Using a Multi-Autoencoders Model

Authors: Victor Breux, Jérôme Boutet, Alain Goret, Viviane Cattin

Abstract:

Early detection of anomalies in data centers is important to reduce downtimes and the costs of periodic maintenance. However, there is little research on this topic and even fewer on the fusion of sensor data for the detection of abnormal events. The goal of this paper is to propose a method for anomaly detection in data centers by combining sensor data (temperature, humidity, power) and deep learning models. The model described in the paper uses one autoencoder per sensor to reconstruct the inputs. The auto-encoders contain Long-Short Term Memory (LSTM) layers and are trained using the normal samples of the relevant sensors selected by correlation analysis. The difference signal between the input and its reconstruction is then used to classify the samples using feature extraction and a random forest classifier. The data measured by the sensors of a data center between January 2019 and May 2020 are used to train the model, while the data between June 2020 and May 2021 are used to assess it. Performances of the model are assessed a posteriori through F1-score by comparing detected anomalies with the data center’s history. The proposed model outperforms the state-of-the-art reconstruction method, which uses only one autoencoder taking multivariate sequences and detects an anomaly with a threshold on the reconstruction error, with an F1-score of 83.60% compared to 24.16%.

Keywords: anomaly detection, autoencoder, data centers, deep learning

Procedia PDF Downloads 188
10127 On the Design of a Secure Two-Party Authentication Scheme for Internet of Things Using Cancelable Biometrics and Physically Unclonable Functions

Authors: Behnam Zahednejad, Saeed Kosari

Abstract:

Widespread deployment of Internet of Things (IoT) has raised security and privacy issues in this environment. Designing a secure two-factor authentication scheme between the user and server is still a challenging task. In this paper, we focus on Cancelable Biometric (CB) as an authentication factor in IoT. We show that previous CB-based scheme fail to provide real two-factor security, Perfect Forward Secrecy (PFS) and suffer database attacks and traceability of the user. Then we propose our improved scheme based on CB and Physically Unclonable Functions (PUF), which can provide real two-factor security, PFS, user’s unlinkability, and resistance to database attack. In addition, Key Compromise Impersonation (KCI) resilience is achieved in our scheme. We also prove the security of our proposed scheme formally using both Real-Or-Random (RoR) model and the ProVerif analysis tool. For the usability of our scheme, we conducted a performance analysis and showed that our scheme has the least communication cost compared to the previous CB-based scheme. The computational cost of our scheme is also acceptable for the IoT environment.

Keywords: IoT, two-factor security, cancelable biometric, key compromise impersonation resilience, perfect forward secrecy, database attack, real-or-random model, ProVerif

Procedia PDF Downloads 93
10126 Integrating Cooperative Education Experience into Engineering Curriculum: An Approach

Authors: Robin Lok-Wang Ma

Abstract:

The Center/Unit for Industry Engagement and Collaboration, as well as Internship, play a significant role at university. In general, the Center serves as the official interface between the industry and the School or Department to cultivate students’ early exposure to professional experience. The missions of the Center are not limited to provide a communication channel and collaborative platform for the industries and the university but also to assist students to build up their career paths early while still in the university. In recent years, a cooperative education experience (commonly known as a co-op) has been strongly advocated for students to make the school-to-work transition. The nature of the co-op program is not only consistent with the internships/final year design projects, but it is also more industrial-oriented with academic support from faculty at the university. The purpose of this paper is to describe an approach to how cooperative education experience can be integrated into Engineering Curriculum. It provides a mutual understanding and exchange of ideas for the approach between the university and the industry. A suggested format in terms of timeline, duration, selection of candidates, students, and companies’ expectations for the co-op program is described. Also, feedbacks from employers/industries show that a longer-term co-op program is well suited for students compared with a short-term internship. To this end, it provides a new insight into collaboration and/or partnership between the university and the industries to prepare professional work-ready graduates.

Keywords: cooperative education, industry, engagement, collaboration

Procedia PDF Downloads 92
10125 Mapping the Metamorphosis of the Nigerian Female: A Womanist Approach to the Novels of Chimamanda Ngozi Adichie

Authors: Vidhya R

Abstract:

The claim of feminists that women are made and not born is neither to set women on par with men nor to discriminate one from the other, but to establish and reiterate the fact that both the sexes have to understand, recognize and appreciate each other’s ability and responsibility thus to contribute to the peaceful co-existence of both, leading to the creation of a better and brave new world, which is neither patriarchal nor matriarchal. But history has repeatedly recorded the relegation of women to the secondary position consummated through the highly biased cultural, ritualistic and customary practices across the globe. In Africa, bracing herself against many odds through generations, the African woman who has been facing multiple jeopardy promulgated by racial, cultural, economic and gender discrimination has slowly started moving from the margins towards the center. The African woman was able to undertake the journey from the margins to the center bravely only because of her grit, grace, courage, confidence, and spirituality. This journey has resulted in the metamorphosis of the African woman’s psyche. Economic independence fortified with education has empowered the African woman. The various stages of metamorphosis are well delineated in the works of the contemporary Nigerian writer Chimamanda Ngozi Adichie. The objective of this research paper is to study the above said metamorphosis, the female protagonists undergo in Adichie’s novels. The approaches on which the study is based on are the Africana Womanist theory propounded by Clenora Hudson –Weems and African feminism of Carole Boyce Davies. The findings of this study lead towards establishing the proposition that the emergence and evolution of the Nigerian woman has resulted in the birth of a new breed of women – the Emphatic Female, manifested in the power packed portrayal of the female protagonists of Purple Hibiscus, Half of a Yellow Sun and Americanah by Chimamanda Ngozi Adichie.

Keywords: Africana womanism, African feminism, chimamanda ngozi adichie, metamorphosis, the emphatic female

Procedia PDF Downloads 344
10124 Phishing Detection: Comparison between Uniform Resource Locator and Content-Based Detection

Authors: Nuur Ezaini Akmar Ismail, Norbazilah Rahim, Norul Huda Md Rasdi, Maslina Daud

Abstract:

A web application is the most targeted by the attacker because the web application is accessible by the end users. It has become more advantageous to the attacker since not all the end users aware of what kind of sensitive data already leaked by them through the Internet especially via social network in shake on ‘sharing’. The attacker can use this information such as personal details, a favourite of artists, a favourite of actors or actress, music, politics, and medical records to customize phishing attack thus trick the user to click on malware-laced attachments. The Phishing attack is one of the most popular attacks for social engineering technique against web applications. There are several methods to detect phishing websites such as Blacklist/Whitelist based detection, heuristic-based, and visual similarity-based detection. This paper illustrated a comparison between the heuristic-based technique using features of a uniform resource locator (URL) and visual similarity-based detection techniques that compares the content of a suspected phishing page with the legitimate one in order to detect new phishing sites based on the paper reviewed from the past few years. The comparison focuses on three indicators which are false positive and negative, accuracy of the method, and time consumed to detect phishing website.

Keywords: heuristic-based technique, phishing detection, social engineering and visual similarity-based technique

Procedia PDF Downloads 171
10123 A Wideband Low-Profile Circularly-Polarized Slotted Patch Antenna

Authors: Sai Radavaram

Abstract:

A wideband low-profile circularly-polarized antenna, consisting of 2×2 sequentially-rotated, differentially-fed, slotted rectangular patch elements, is proposed. To realize the right-hand circular polarization, an anti-clockwise phase rotation of 0o, -90o, -180o and -270o is applied between the antenna elements. The proposed antenna, with a height of only 0.02lambda (where lambda is the wavelength of the antenna at the center frequency of the antenna), exhibits a 68% impedance bandwidth from 2 to 4.05 GHz with a 3dB axial ratio bandwidth in the order of 56% from 2.25 to 4.05 GHz. Moreover, a wide 3dB axial ratio beamwidth of 140o is obtained at the center frequency of 3 GHz, along with symmetrical radiation patterns over the operating frequency band.

Keywords: circular polarization, sequentially rotated, slotted patch antennas, wideband

Procedia PDF Downloads 77
10122 Assessment of Vocational Rehabilitation of Visually Impaired Persons in Poultry Farming at Blind Center, Ogbomoso

Authors: Modupe C. Alasa

Abstract:

One of the major parameters for ensuring a country’s economic growth and development is the extent to which the citizens are involved in agriculture. The general objective of this study is to determine the assessment of vocational rehabilitation of visually impaired persons in poultry farming at blind center, Ogbomoso, Nigeria. A total number of 70 students will be selected randomly through the use of structured questionnaire out of the total number of students which is 120. Data will be collected from the farmers’ personal characteristics and other specific objectives related to the work. The results will be analyzed with the use of simple statistical tools as frequency, percentage, means and standard deviations. Conclusion and recommendations will be suggested based on result findings of the study.

Keywords: assessment, impair, poultry, rehabilitation, vocational

Procedia PDF Downloads 250
10121 Environmental, Climate Change, and Health Outcomes in the World

Authors: Felix Aberu

Abstract:

The high rate of greenhouse gas (CO₂) emission and increased concentration of Carbon Dioxide in the atmosphere are not unconnected to both human and natural activities. This has caused climate change and global warming in the world. The adverse effect of these climatic changes has no doubt threatened human existence. Hence, this study examined the effects of environmental and climate influence on mortality and morbidity rates, with particular reference to the world’s leading CO₂ emission countries, using both the pre-estimation, estimation, and post-estimation techniques for more dependable outcomes. Hence, the System Generalized Method of Moments (SGMM) was adopted as the main estimation technique for the data analysis from 1996 to 2023. The coefficient of carbon emissions confirmed a positive and significant relationship among CO₂ emission, mortality, and morbidity rates in the world’s leading CO₂ emissions countries, which implies that carbon emission has contributed to mortality and morbidity rates in the world. Therefore, significant action should be taken to facilitate the expansion of environmental protection and sustainability initiatives in any CO₂ emissions nations of the world.

Keywords: environmental, mortality, morbidity, health outcomes, carbon emissions

Procedia PDF Downloads 49
10120 Numerical Approach for Solving the Hyper Singular Integral Equation in the Analysis of a Central Symmetrical Crack within an Infinite Strip

Authors: Ikram Slamani, Hicheme Ferdjani

Abstract:

This study focuses on analyzing a Griffith crack situated at the center of an infinite strip. The problem is reformulated as a hyper-singular integral equation and solved numerically using second-order Chebyshev polynomials. The primary objective is to calculate the stress intensity factor in mode 1, denoted as K1. The obtained results reveal the influence of the strip width and crack length on the stress intensity factor, assuming stress-free edges. Additionally, a comparison is made with relevant literature to validate the findings.

Keywords: center crack, Chebyshev polynomial, hyper singular integral equation, Griffith, infinite strip, stress intensity factor

Procedia PDF Downloads 140
10119 The Role of Validity and Reliability in the Development of Online Testing

Authors: Ani Demetrashvili

Abstract:

The purpose of this paper is to show how students trust online tests and determine validity and reliability in the development of online testing. The pandemic situation changed every field in the world, and it changed education as well. Educational institutions moved into the online space, which was the only decision they were able to make at that time. Online assessment through online proctoring was a totally new challenge for educational institutions, and they needed to deal with it successfully. Participants were chosen from the English language center. The validity of the questionnaire was identified according to the Likert scale and Cronbach’s alpha; later, data from the participants was analyzed as well. The article summarizes literature that is available about online assessment and is interesting for people who are interested in this kind of assessment. Based on the research findings, students favor in-person testing over online assessment due to their lack of experience and skills in the latter.

Keywords: online assessment, online proctoring

Procedia PDF Downloads 37
10118 The Possibility of Solving a 3x3 Rubik’s Cube under 3 Seconds

Authors: Chung To Kong, Siu Ming Yiu

Abstract:

Rubik's cube was invented in 1974. Since then, speedcubers all over the world try their best to break the world record again and again. The newest record is 3.47 seconds. There are many factors that affect the timing, including turns per second (tps), algorithm, finger trick, hardware of the cube. In this paper, the lower bound of the cube solving time will be discussed using convex optimization. Extended analysis of the world records will be used to understand how to improve the timing. With the understanding of each part of the solving step, the paper suggests a list of speed improvement techniques. Based on the analysis of the world record, there is a high possibility that the 3 seconds mark will be broken soon.

Keywords: Rubik's Cube, speed, finger trick, optimization

Procedia PDF Downloads 203
10117 The Approach to Develop Value Chain to Enhance the Management Efficiency of Thai Tour Operators in Order to Support Free Trade within the Framework of ASEAN Cooperation

Authors: Yalisa Tonsorn

Abstract:

The objectives of this study are 1) to study the readiness of Thai tour operators in order to prepare for being ASEAN members, 2) to study opportunity and obstacles of the management of Thai tour operators, and 3) to find approach for developing value chain in order to enhance the management efficiency of Thai tour operators in order to support free trade within the framework of ASEAN cooperation. The research methodology is mixed between qualitative method and quantitative method. In-depth interview was done with key informants, including management supervisors, medium managers, and officers of the travel agencies. The questionnaire was conducted with 300 sampling. According to the study, it was found that the approach for developing value chain to enhance the management efficiency of Thai travel agencies in order to support free trade within the framework of ASEAN cooperation, the tour operators must give priority to the customer and deliver the service exceeding the customer’s expectation. There are 2 groups of customers: 1) external customers referring to tourist, and 2) internal customers referring to staff who deliver the service to the customers, including supervisors, colleagues, or subordinates. There are 2 issues which need to be developed: 1) human resource development in order to cultivate the working concept by focusing on importance of customers, and excellent service providing, and 2) working system development by building value and innovation in operational process including services to the company in order to deliver the highest impressive service to both internal and external customers. Moreover, the tour operators could support the increased number of tourists significantly. This could enhance the capacity of the business and affect the increase of competition capability in the economic dimension of the country.

Keywords: AEC (ASEAN Economic Eommunity), core activities, support activities, values chain

Procedia PDF Downloads 351
10116 Estimation of Pressure Profile and Boundary Layer Characteristics over NACA 4412 Airfoil

Authors: Anwar Ul Haque, Waqar Asrar, Erwin Sulaeman, Jaffar S. M. Ali

Abstract:

Pressure distribution data of the standard airfoils is usually used for the calibration purposes in subsonic wind tunnels. Results of such experiments are quite old and obtained by using the model in the spanwise direction. In this manuscript, pressure distribution over NACA 4412 airfoil model was presented by placing the 3D model in the lateral direction. The model is made of metal with pressure ports distributed longitudinally as well as in the lateral direction. The pressure model was attached to the floor of the tunnel with the help of the base plate to give the specified angle of attack to the model. Before the start of the experiments, the pressure tubes of the respective ports of the 128 ports pressure scanner are checked for leakage, and the losses due to the length of the pipes were also incorporated in the results for the specified pressure range. Growth rate maps of the boundary layer thickness were also plotted. It was found that with the increase in the velocity, the dynamic pressure distribution was also increased for the alpha seep. Plots of pressure distribution so obtained were overlapped with those obtained by using XFLR software, a low fidelity tool. It was found that at moderate and high angles of attack, the distribution of the pressure coefficients obtained from the experiments is high when compared with the XFLR ® results obtained along with the span of the wing. This under-prediction by XFLR ® is more obvious on the windward than on the leeward side.

Keywords: subsonic flow, boundary layer, wind tunnel, pressure testing

Procedia PDF Downloads 317
10115 Tuberculosis Massive Active Case Discovery in East Jakarta 2016-2017: The Role of Ketuk Pintu Layani Dengan Hati and Juru Pemantau Batuk (Jumantuk) Cadre Programs

Authors: Ngabilas Salama

Abstract:

Background: Indonesia has the 2nd highest number of incidents of tuberculosis (TB). It accounts for 1.020.000 new cases per year, only 30% of which has been reported. To find the lost 70%, a massive active case discovery was conducted through two programs: Ketuk Pintu Layani Dengan Hati (KPLDH) and Kader Juru Pemantau Batuk (Jumantuk cadres), who also plays a role in child TB screening. Methods: Data was collected and analyzed through Tuberculosis Integrated Online System from 2014 to 2017 involving 129 DOTS facility with 86 primary health centers in East Jakarta. Results: East Jakarta consists of 2.900.722 people. KPLDH program started in February 2016 consisting of 84 teams (310 people). Jumantuk cadres was formed 4 months later (218 orang). The number of new TB cases in East Jakarta (primary health center) from 2014 to June 2017 respectively is as follows: 6.499 (2.637), 7.438 (2.651), 8.948 (3.211), 5.701 (1.830). Meanwhile, the percentage of child TB case discovery in primary health center was 8,5%, 9,8%, 12,1% from 2014 to 2016 respectively. In 2017, child TB case discovery was 13,1% for the first 3 months and 16,5% for the next 3 months. Discussion: Increased TB incidence rate from 2014 to 2017 was 14,4%, 20,3%, and 27,4% respectively in East Jakarta, and 0,5%, 21,1%, and 14% in primary health center. This reveals the positive role of KPLDH and Jumantuk in TB detection and reporting. Likewise, these programs were responsible for the increase in child TB case discovery, especially in the first 3 months of 2017 (Ketuk Pintu TB Day program) and the next 3 months (active TB screening). Conclusion: KPLDH dan Jumantuk are actively involved in increasing TB case discovery in both adults and children.

Keywords: tuberculosis, case discovery program, primary health center, cadre

Procedia PDF Downloads 328
10114 Electronic Commerce in Georgia: Problems and Development Perspectives

Authors: Nika GorgoShadze, Anri Shainidze, Bachuki Katamadze

Abstract:

In parallel to the development of the digital economy in the world, electronic commerce is also widely developing. Internet and ICT (information and communication technology) have created new business models as well as promoted to market consolidation, sustainability of the business environment, creation of digital economy, facilitation of business and trade, business dynamism, higher competitiveness, etc. Electronic commerce involves internet technology which is sold via the internet. Nowadays electronic commerce is a field of business which is used by leading world brands very effectively. After the research of internet market in Georgia, it was found out that quality of internet is high in Tbilisi and is low in the regions. The internet market of Tbilisi can be evaluated as high-speed internet service, competitive and cost effective internet market. Development of electronic commerce in Georgia is connected with organizational and methodological as well as legal problems. First of all, a legal framework should be developed which will regulate responsibilities of organizations. The Ministry of Economy and Sustainable Development will play a crucial role in creating legal framework. Ministry of Justice will also be involved in this process as well as agency for data exchange. Measures should be taken in order to make electronic commerce in Georgia easier. Business companies may be offered some model to get low-cost and complex service. A service centre should be created which will provide all kinds of online-shopping. This will be a rather interesting innovation which will facilitate online-shopping in Georgia. Development of electronic business in Georgia requires modernized infrastructure of telecommunications (especially in the regions) as well as solution of institutional and socio-economic problems. Issues concerning internet availability and computer skills are also important.

Keywords: electronic commerce, internet market, electronic business, information technology, information society, electronic systems

Procedia PDF Downloads 381
10113 Drugs, Silk Road, Bitcoins

Authors: Lali Khurtsia, Vano Tsertsvadze

Abstract:

Georgian drug policy is directed to reduce the supply of drugs. Retrospective analysis has shown that law enforcement activities have been followed by the expulsion of particular injecting drugs. The demand remains unchanged and drugs are substituted by the hand-made, even more dangerous homemade drugs entered the market. To find out expected new trends on the Georgian drug market, qualitative study was conducted with Georgian drug users to determine drug supply routes. It turned out that drug suppliers and consumers for safety reasons and to protect their anonymity, use Skype to make deals. IT in illegal drug trade is even more sophisticated in the worldwide. Trading with Bitcoins in the Darknet ensures high confidentiality of money transactions and the safe circulation of drugs. In 2014 largest Bitcoin mining enterprise in the world was built in Georgia. We argue that the use of Bitcoins and Darknet by Georgian drug consumers and suppliers will be an incentive to response adequately to the government's policy of restricting supply in order to satisfy market demand for drugs.

Keywords: bitcoin, darknet, drugs, policy

Procedia PDF Downloads 435
10112 Numerical Investigation of the Flow Around Multi-Element Airfoils

Authors: Taylan Ozturk, Osama Maklad

Abstract:

This study examines the aerodynamic and flow properties of a multi-element airfoil using computational fluid dynamics (CFD) research. This computational analysis aims to optimize slat design concerning lift-drag coefficients and to determine the ideal gap size between the main airfoil and the front flap. It examines the influence of varying angles of attack and the effects of varied Reynolds numbers. A NACA 2412 airfoil, equipped with custom-designed front and rear flaps, was modeled in SolidWorks and simulated in ANSYS Fluent utilizing the k-ω SST turbulence model. This study quantifies lift and drag coefficients, turbulent kinetic energy, and vorticity magnitude across various configurations. The results clearly indicate that the slat-optimized design geometry featuring a 4 mm gap provides the best performance regarding both lift and drag, with maximum efficiency achieved at a 4-degree angle of attack. Furthermore, the results indicate the initiation of stall conditions beyond 20 degrees and demonstrate how an increase in Reynolds numbers influences flow separation and turbulence patterns. In addition, the maximum L/D ratio which is 36.18 achieved. These findings enhance the comprehension of multi-element airfoil behavior, directly impacting aircraft design and operation, particularly in high-lift situations.

Keywords: multi-element airfoil, CFD simulation, aerodynamic characteristics, Reynolds number analysis

Procedia PDF Downloads 12
10111 The Impact of Leadership Culture on Motivation, Efficiency, and Performance of Customs Employees: A Case Study of Iran Customs

Authors: Kazem Samadi

Abstract:

In today’s world, public agencies like customs have become vital institutions in international trade processes and in maintaining national economic security due to increasing economic and commercial complexities. In this regard, human resource management (HRM) is crucial to achieving organizational goals. This research employed a descriptive survey method, in which the statistical population consisted of all customs employees. Using Cochran's formula, 300 employees were selected from the central customs office. A researcher-made questionnaire was used as the data collection tool, with content validity and reliability confirmed using Cronbach's alpha coefficient. The collected data were analyzed through structural modeling using SPSS and AMOS 24. The results indicated that leadership culture significantly affected employee motivation, efficiency, and performance in customs. Customs managers and leaders in Iran can improve organizational productivity by fostering this culture, thereby facilitating individual and organizational development for their staff.

Keywords: leadership culture, organizational culture, employee performance, customs

Procedia PDF Downloads 3
10110 China Global Policy through the Shanghai Cooperation Organization

Authors: Enayatollah Yazdani

Abstract:

In the post-Cold War era, the world is facing a new emerging global order with the rise of multiple actors in the international arena. China, as a rising global power, has great leverage in internal relations. In particular, during the last two decades, China has rapidly transformed its economy into a global leader in advanced technologies. As a rising power and as one of the two major founding members of the Shanghai Cooperation Organization (SCO), China has tried to use this regional organization, which has the potential to become an important political and security organization of the major states located in the vast Eurasian landmass, for its “go global” strategy. In fact, for Beijing, the SCO represents a new and unique cooperation model, reflecting its vision of a multipolar world order. China has used the SCO umbrella as a multilateral platform to address external threats posed by non-state actors on its vulnerable western border; to gain a strong economic and political foothold in Central Asia without putting the Sino-Russian strategic partnership at risk; and to enhance its energy security through large-scale infrastructure investment in, and trade with, the Central Asian member states. In other words, the SCO is one of the successful outcomes of Chines foreign policy in the post-Cold War era. The expansion of multilateral ties all over the world by dint of pursuing institutional strategies as SCO identifies China as a more constructive power. SCO became a new model of cooperation that was formed on the remains of collapsed Soviet system and predetermined China's geopolitical role in the region. As the fast developing effective regional mechanism, SCO now has more of an external impact on the international system and forms a new type of interaction for promoting China's grand strategy of 'peaceful rise.' This paper aims to answer this major question: How the Chinese government has manipulated the SCO for its foreign policy and global and regional influence? To answer this question, the main discussion is that with regard to the SCO capabilities and politico-economic potential, this organization has been used by China as a platform to expand influence beyond its borders.

Keywords: China, the Shanghai Cooperation Organization (SCO), Central Asia, global policy, foreign policy

Procedia PDF Downloads 63
10109 Theory about the Gebel El-Arak Knife: Egyptian Knife with Canaanite Relief

Authors: Doaa El-Shereef

Abstract:

This paper will focus on proving a theory that it is an Egyptian knife with Canaanite relief and will discuss the nature of the Gebel el-Arak Knife and the civilization to which it belongs and the relationship of the Canaanite deity with Mount Abydos in Egypt, and the influence between the ancient Egyptian religion and the Canaanite religion and their effect on each other. Finally, the paper will discuss in full detail the engraving of the two faces of the knife handle and analyze the register on the front face, which is the scene of the two lions engraved, and between them, an old man symbolized as the deity in the middle and compared it with other drawings similar in the Egyptian civilization. The paper will also discuss the registers on the back face, which are the engravings of a battle, soldiers, uniforms, and boats, and how the back face describes a water battle between three Egyptian boats and two foreign ships. In addition, it will prove that those foreign ships were not Mesopotamian ships because, in the period to which the knife of Gebel Al-Arak belongs, between 3300-3100 BC, there were no battles or trade exchanges between Egypt and Mesopotamia on sea routes. However, there was already a strong land and sea trade between Canaan and Egypt during Chalcolithic Age (4500-3500 BC), as described in many primary sources.

Keywords: Canaan, Egypt, Gebel el-Arak Knife, Louvre

Procedia PDF Downloads 170
10108 Evaluation and New Modeling Improvement of Water Quality

Authors: Sebahat Seker

Abstract:

Since there is a parallel connection between drinking water quality and public health, studies on drinking and domestic water are of vital importance. Ardahan Province is one of the provinces located in the Northeast Anatolian Region, where animal husbandry and agriculture are carried out economically. City mains water uses underground spring water as a source and is chlorinated and given to the city center by gravity. However, mains water cannot be used outside the central district of the city, and the majority of the people meet their drinking and utility water needs from the wells they have opened individually. The water element, which is vital for all living things, is the most important substance that sustains life for humans. Under normal conditions, a healthy person consumes approximately 1.8-2 liters of water. The quality and use of potable water is one of the most important issues in terms of health. The quality parameters of drinking and utility water have been revealed by the scientific world. Scientific studies on drinking water quality in the world and its impact on public health are among the most popular topics. Although our country is surrounded by water on three sides, potable water resources are very few. In the Eastern Anatolia Region, it is difficult for the public to access drinking and utility water due to the difficult conditions both climatically and geographically. In this study, samples taken from drinking and utility water at certain intervals from the stations determined, and water quality parameters will be determined. The fact that such a study has not been carried out in the region before and the knowledge of the local people about water quality is very important in terms of its original and widespread effect.

Keywords: water quality, modelling, evaluation, northeastern anatolia

Procedia PDF Downloads 201
10107 Concentric Circle Detection based on Edge Pre-Classification and Extended RANSAC

Authors: Zhongjie Yu, Hancheng Yu

Abstract:

In this paper, we propose an effective method to detect concentric circles with imperfect edges. First, the gradient of edge pixel is coded and a 2-D lookup table is built to speed up normal generation. Then we take an accumulator to estimate the rough center and collect plausible edges of concentric circles through gradient and distance. Later, we take the contour-based method, which takes the contour and edge intersection, to pre-classify the edges. Finally, we use the extended RANSAC method to find all the candidate circles. The center of concentric circles is determined by the two circles with the highest concentricity. Experimental results demonstrate that the proposed method has both good performance and accuracy for the detection of concentric circles.

Keywords: concentric circle detection, gradient, contour, edge pre-classification, RANSAC

Procedia PDF Downloads 128
10106 Community Based Tourism and Development in Third World Countries: The Case of the Bamileke Region of Cameroon

Authors: Ngono Mindzeng Terencia

Abstract:

Community based tourism, as a sustainable tourism approach, has been adopted as a tool for development among local communities in third world countries with income generation as the main driver. However, an analysis of community based tourism and development brings to light another driving force which is paramount to development strategies in the difficult conditions of third world countries: this driving force is “place revitalization”. This paper seeks to assess the relevance of “place revitalization” to the enhancement of development within the challenging context of developing countries. The research provides a community based tourism model to development in third world countries through a three step process based on awareness, mentoring and empowerment at the local level. It also tries to examine how effectively this model can address the development problems faced by the local communities of third world countries. The case study for this research is the Bamiléké region of Cameroon, the breeding ground of community based tourism initiatives and a region facing the difficulties of third world countries that are great impediments to community based tourism.

Keywords: awareness, empowerment, local communities, mentoring, place revitalization, third world countries

Procedia PDF Downloads 314
10105 Green Supply Chain Design: A Mathematical Modeling Approach

Authors: Nusrat T. Chowdhury

Abstract:

Green Supply Chain Management (GSCM) is becoming a key to success for profitable businesses. The various activities contributing to carbon emissions in a supply chain are transportation, ordering and holding of inventory. This research work develops a mixed-integer nonlinear programming (MINLP) model that considers the scenario of a supply chain with multiple periods, multiple products and multiple suppliers. The model assumes that the demand is deterministic, the buyer has a limited storage space in each period, the buyer is responsible for the transportation cost, a supplier-dependent ordering cost applies for each period in which an order is placed on a supplier and inventory shortage is permissible. The model provides an optimal decision regarding what products to order, in what quantities, with which suppliers, and in which periods in order to maximize the profit. For the purpose of evaluating the carbon emissions, three different carbon regulating policies i.e., carbon cap-and-trade, the strict cap on carbon emission and carbon tax on emissions, have been considered. The proposed MINLP has been validated using a randomly generated data set.

Keywords: green supply chain, carbon emission, mixed integer non-linear program, inventory shortage, carbon cap-and-trade

Procedia PDF Downloads 234