Search results for: defense/attack strategies
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 5966

Search results for: defense/attack strategies

5846 Detecting and Thwarting Interest Flooding Attack in Information Centric Network

Authors: Vimala Rani P, Narasimha Malikarjunan, Mercy Shalinie S

Abstract:

Data Networking was brought forth as an instantiation of information-centric networking. The attackers can send a colossal number of spoofs to take hold of the Pending Interest Table (PIT) named an Interest Flooding attack (IFA) since the in- interests are recorded in the PITs of the intermediate routers until they receive corresponding Data Packets are go beyond the time limit. These attacks can be detrimental to network performance. PIT expiration rate or the Interest satisfaction rate, which cannot differentiate the IFA from attacks, is the criterion Traditional IFA detection techniques are concerned with. Threshold values can casually affect Threshold-based traditional methods. This article proposes an accurate IFA detection mechanism based on a Multiple Feature-based Extreme Learning Machine (MF-ELM). Accuracy of the attack detection can be increased by presenting the entropy of Internet names, Interest satisfaction rate and PIT usage as features extracted in the MF-ELM classifier. Furthermore, we deploy a queue-based hostile Interest prefix mitigation mechanism. The inference of this real-time test bed is that the mechanism can help the network to resist IFA with higher accuracy and efficiency.

Keywords: information-centric network, pending interest table, interest flooding attack, MF-ELM classifier, queue-based mitigation strategy

Procedia PDF Downloads 177
5845 Using Metacognitive Strategies in Reading Comprehension by EFL Students

Authors: Simin Sadeghi-Saeb

Abstract:

Metacognitive strategies consistently play important roles in reading comprehension. The metacognitive strategies involve the active monitoring and consequent regulation and orchestration of the cognitive processes in relation to the cognitive objects or data on which they bear. In this paper, the effect of instruction in using metacognitive strategies on reading academic materials, type of metacognitive strategies were mostly used by college university students before and after the instruction and the level they use those strategies before and after the instruction were studied. For these aims, 50 female college students were chosen. Then, they were divided randomly into two groups, experimental and control groups. At first session, students in both groups took the standard TOFEL exam. After the pre-test had been administered, the instruction began. After treatment, a post-test was taken. It is useful to state that after pre-test and post-test the same questionnaire was handed to the students of experimental group. The results of this research show that the instruction of metacognitive strategies has positive effect on the students' scores in reading comprehension tests. Furthermore, it showed that before and after the instruction, the students' usage of metacognitive strategies changed. Also, it demonstrated that the instruction affected the students' level of metacognitive strategies' usage.

Keywords: EFL students, English reading comprehension, instruction, metacognitive strategies

Procedia PDF Downloads 271
5844 Student Perceptions of Defense Acquisition University Courses: An Explanatory Data Collection Approach

Authors: Melissa C. LaDuke

Abstract:

The overarching purpose of this study was to determine the relationship between the current format of online delivery for Defense Acquisition University (DAU) courses and Air Force Acquisition (AFA) personnel participation. AFA personnel (hereafter named “student”) were particularly of interest, as they have been mandated to take anywhere from 3 to 30 online courses to earn various DAU specialization certifications. Participants in this qualitative case study were AFA personnel who pursued DAU certifications in science and technology management, program/contract management, and other related fields. Air Force personnel were interviewed about their experiences with online courses. The data gathered were analyzed and grouped into 12 major themes. The themes tied into the theoretical framework and spoke to either teacher-centered or student-centered educational practices within Defense Acquisitions University. Based on the results of the data analysis, various factors contributed to student perceptions of DAU courses, including the online course construct and relevance to their job. The analysis also found students want to learn the information presented but would like to be able to apply the information learned in meaningful ways.

Keywords: educational theory, computer-based training, interview, student perceptions, online course design, teacher positionality

Procedia PDF Downloads 77
5843 Effects of Teaching Strategies on Students Academic Achievement in Secondary Physics Education for Quality Assurance

Authors: Collins Molua

Abstract:

This paper investigated the effect of Teaching Strategies on Academic Achievement in Secondary Physics Education as a quality assurance process for the teaching and learning of the subject. Teaching strategies investigated were the interactive, independent and dependent strategies. Three null hypotheses were tested at p< 0.05 using one instrument, physics achievement test(PAT).The data were analyzed using analysis of covariance (ANCOVA).Results showed that teaching strategies have significant effect on students achievement; the joint effect of the teaching strategies was also significant on students achievement in Physics. The interactive teaching strategies was recommended for teaching the subject and the students should be exposed to practical, computer literacy to stimulate interest and curiosity to enhance quality.

Keywords: quality, assurance, secondary education, strategies, physics

Procedia PDF Downloads 284
5842 Thrust Enhancement on a Two Dimensional Elliptic Airfoil in a Forward Flight

Authors: S. M. Dash, K. B. Lua, T. T. Lim

Abstract:

This paper presents results of numerical and experimental studies on a two-dimensional (2D) flapping elliptic airfoil in a forward flight condition at Reynolds number of 5000. The study is motivated from an earlier investigation which shows that the deterioration in thrust performance of a sinusoidal heaving and pitching 2D (NACA0012) airfoil at high flapping frequency can be recovered by changing the effective angle of attack profile to square wave, sawtooth, or cosine wave shape. To better understand why such modifications lead to superior thrust performance, we take a closer look at the transient aerodynamic force behavior of an airfoil when the effective angle of attack profile changes gradually from a generic smooth trapezoidal profile to a sinusoid shape by modifying the base length of the trapezoid. The choice of using a smooth trapezoidal profile is to avoid the infinite acceleration condition encountered in the square wave profile. Our results show that the enhancement in the time-averaged thrust performance at high flapping frequency can be attributed to the delay and reduction in the drag producing valley region in the transient thrust force coefficient when the effective angle of attack profile changes from sinusoidal to trapezoidal.

Keywords: two-dimensional flapping airfoil, thrust performance, effective angle of attack, CFD, experiments

Procedia PDF Downloads 327
5841 Tag Impersonation Attack on Ultra-lightweight Radio Frequency Identification Authentication Scheme (ESRAS)

Authors: Reham Al-Zahrani, Noura Aleisa

Abstract:

The proliferation of Radio Frequency Identification (RFID) technology has raised concerns about system security, particularly regarding tag impersonation attacks. Regarding RFID systems, an appropriate authentication protocol must resist active and passive attacks. A tag impersonation occurs when an adversary's tag is used to fool an authenticating reader into believing it is a legitimate tag. This paper analyzed the security of the efficient, secure, and practical ultra-lightweight RFID Authentication Scheme (ESRAS). Then, the paper presents a comprehensive analysis of the Efficient, Secure, and Practical Ultra-Lightweight RFID Authentication Scheme (ESRAS) in the context of radio frequency identification (RFID) systems that employed the Scyther tool to examine the protocol's security against a tag impersonation attack.

Keywords: RFID, impersonation attack, authentication, ultra-lightweight protocols

Procedia PDF Downloads 32
5840 Sulfate Attack on Pastes Made with Different C3A and C4AF Contents and Stored at 5°C

Authors: Konstantinos Sotiriadis, Radosław Mróz

Abstract:

In the present work the internal sulfate attack on pastes made from pure clinker phases was studied. Two binders were produced: (a) a binder with 2% C3A and 18% C4AF content; (b) a binder with 10% C3A and C4AF content each. Gypsum was used as the sulfate bearing compound, while calcium carbonate added to differentiate the binders produced. The phases formed were identified by XRD analysis. The results showed that ettringite was the deterioration phase detected in the case of the low C3A content binder. Carbonation occurred in the specimen without calcium carbonate addition, while portlandite was observed in the one containing calcium carbonate. In the case of the high C3A content binder, traces of thaumasite were detected when calcium carbonate was not incorporated in the binder. A solid solution of thaumasite and ettringite was found when calcium carbonate was added. The amount of C3A had not fully reacted with sulfates, since its corresponding peaks were detected.

Keywords: tricalcium aluminate, calcium aluminate ferrite, sulfate attack, calcium carbonate, low temperature

Procedia PDF Downloads 303
5839 FLEX: A Backdoor Detection and Elimination Method in Federated Scenario

Authors: Shuqi Zhang

Abstract:

Federated learning allows users to participate in collaborative model training without sending data to third-party servers, reducing the risk of user data privacy leakage, and is widely used in smart finance and smart healthcare. However, the distributed architecture design of federation learning itself and the existence of secure aggregation protocols make it inherently vulnerable to backdoor attacks. To solve this problem, the federated learning backdoor defense framework FLEX based on group aggregation, cluster analysis, and neuron pruning is proposed, and inter-compatibility with secure aggregation protocols is achieved. The good performance of FLEX is verified by building a horizontal federated learning framework on the CIFAR-10 dataset for experiments, which achieves 98% success rate of backdoor detection and reduces the success rate of backdoor tasks to 0% ~ 10%.

Keywords: federated learning, secure aggregation, backdoor attack, cluster analysis, neuron pruning

Procedia PDF Downloads 62
5838 Quick Reference: Cyber Attacks Awareness and Prevention Method for Home Users

Authors: Haydar Teymourlouei

Abstract:

It is important to take security measures to protect your computer information, reduce identify theft, and prevent from malicious cyber-attacks. With cyber-attacks on the continuous rise, people need to understand and learn ways to prevent from these attacks. Cyber-attack is an important factor to be considered if one is to be able to protect oneself from malicious attacks. Without proper security measures, most computer technology would hinder home users more than such technologies would help. Knowledge of how cyber-attacks operate and protective steps that can be taken to reduce chances of its occurrence are key to increasing these security measures. The purpose of this paper is to inform home users on the importance of identifying and taking preventive steps to avoid cyberattacks. Throughout this paper, many aspects of cyber-attacks will be discuss: what a cyber-attack is, the affects of cyber-attack for home users, different types of cyber-attacks, methodology to prevent such attacks; home users can take to fortify security of their computer.

Keywords: cyber-attacks, home user, prevention, security, technology

Procedia PDF Downloads 364
5837 Effects of Ascophyllum nodosum in Tomato in the Tropical Caribbean Climate: Effects and Molecular Insights into Mechanisms

Authors: Omar Ali, Adesh Ramsubhag, Jayaraj Jayaraman

Abstract:

Seaweed extracts have been reported as plant biostimulants which could be a safer, organic alternative to harsh pesticides. The incentive to use seaweed-based biostimulants is becoming paramount in sustainable agriculture. The current study, therefore, screened a commercial extract of A. nodosum in tomatoes, cultivated in Trinidad to showcase the multiple beneficial effects. Foliar treatment with an A. nodosum commercial extract led to significant increases in fruit yield and a significant reduction of incidence of bacterial spots and early blight diseases under both greenhouse and field conditions. Investigations were carried out to reveal the possible mechanisms of action of this biostimulant through defense enzyme assays and transcriptome profiling via RNA sequencing of tomato. Studies into disease control mechanisms by A. nodosum showed that the extract stimulated the activity of enzymes such as peroxidase, phenylalanine ammonia-lyase, chitinase, polyphenol oxidase, and β-1,3-glucanase. Additionally, the transcriptome survey revealed the upregulation and enrichment of genes responsible for the biosynthesis of growth hormones, defense enzymes, PR proteins and defense-related secondary metabolites, as well as genes involved in the nutrient mobilization, photosynthesis and primary and secondary metabolic pathways. The results of the transcriptome study also demonstrated the cross-talks between growth and defense responses, confirming the bioelicitor and biostimulant value of seaweed extracts in plants. These effects could potentially implicate the benefits of seaweed extract and validate its usage in sustainable crop production.

Keywords: A. nodosum, biostimulants, elicitor, enzymes, growth responses, seaweeds, tomato, transcriptome analysis

Procedia PDF Downloads 137
5836 A Study of Transferable Strategies in Multilanguage Learning

Authors: Zixi You

Abstract:

With the demand of multilingual speakers increasing in the job market, multi-language learning programs have become more and more popular among undergraduate students. A study on multi-language learning strategies is therefore highly demanded on both practical and theoretical levels. Based on previous classification of learning strategies in SLA, and an investigation of BA Modern Language program students (with post-A level L2 and ab initio L3 learning experience from year one), this study explores and compares different types of learning strategies used by multi-language speakers and learners, transferable learning strategies between L2 and L3, and factors affecting the transfer. The results indicate that all the 23 types of learning strategies of L2 are employed when learning L3 from ab initio level, yet with different tendencies. Learning strategy transfer from L2 to L3 (i.e., the learners attribute the applying of these L3 learning strategies to be a direct result of their L2 learning experience) are observed in all 23 types of learning strategies. Comparatively, six types of “cognitive strategies” have higher transfer tendency than others. With regard to the failure of the transfer of some particular L2 strategies and the development of independent L3 strategies of individual learners, factors such as language proficiency, language typology and learning environment have played important roles among others. The presentation of this study will provide audiences with detailed data, insightful analysis and discussion on both theoretical and practical aspects of multi-language learning that will benefit both students and educators.

Keywords: learning strategy, multi-language acquisition, second language acquisition, strategy transfer

Procedia PDF Downloads 543
5835 Minimization of Denial of Services Attacks in Vehicular Adhoc Networking by Applying Different Constraints

Authors: Amjad Khan

Abstract:

The security of Vehicular ad hoc networking is of great importance as it involves serious life threats. Thus to provide secure communication amongst Vehicles on road, the conventional security system is not enough. It is necessary to prevent the network resources from wastage and give them protection against malicious nodes so that to ensure the data bandwidth availability to the legitimate nodes of the network. This work is related to provide a non conventional security system by introducing some constraints to minimize the DoS (Denial of services) especially data and bandwidth. The data packets received by a node in the network will pass through a number of tests and if any of the test fails, the node will drop those data packets and will not forward it anymore. Also if a node claims to be the nearest node for forwarding emergency messages then the sender can effectively identify the true or false status of the claim by using these constraints. Consequently the DoS(Denial of Services) attack is minimized by the instant availability of data without wasting the network resources.

Keywords: black hole attack, grey hole attack, intransient traffic tempering, networking

Procedia PDF Downloads 258
5834 Politicizing Literature: Henry Fielding’s the Authors Farce and George II’s Policies of Nonsense and Ignorance

Authors: Samia Al-Shayban

Abstract:

Conventionally, Fielding Author’s Farce is read as an attack on literary and theatrical establishment. This paper attempt to read it as a disguised scathing political attack upon, King George II, his court and administration. Fielding achieves his design through complex dramatization based on implicit connections between King George II and the poor poet Luckless who shifts his stand from defending the liberties of the authors into becoming one of their oppressors. Through the same connection, the king is accused of being the originator and protector of literary corruption. To strengthen the attack against the king, the court of nonsense which appeared in Luckless’ play is connected to George II’s court through the presence of opera and ignorance. Thus, Fielding’s literary dramatization is used as a medium to expose the corrupting influence of the ruling elite. The King, his court and administration are all complacent in devaluing the English theatre and turning it into a circus that generate nothing but ignorance and poverty. This practice is deliberately designed to keep people ignorant and authors poor so they remain unable to challenge their corrupt politics.

Keywords: fielding, King George II, ignorance, theatre, plays

Procedia PDF Downloads 544
5833 From Knives to Kites: Developments and Dilemmas around the Use of Force in the Israeli–Palestinian Conflict since "Protective Edge"

Authors: Hilly Moodrick-Even Khen

Abstract:

This study analyzes the legal regulation of the use of force in international law in the context of three emerging Palestinian forms of struggle against Israeli occupation: the Knife Intifada, Gaza border disturbances, and the launching of incendiary kites. It discusses what legal paradigms or concepts should regulate the type and level of force used in each situation—a question that is complicated by various dilemmas—and appraises the Israel Defence Forces policies tailored in response. Methodologically, the study is based on analysis of scholarship on the conceptual legal issues as well as dicta of the courts. It evaluates the applicability of two legal paradigms regulating the use of force in military operations—(i) the conduct of hostilities and (ii) law enforcement—as well as the concept of self-defense in international law and the escalation of force procedure. While the “Knife Intifada” clearly falls under the law enforcement paradigm, the disturbances at the border and the launching of incendiary kites raise more difficult questions, as applying law enforcement, especially in the latter case, can have undesirable ramifications for safeguarding humanitarian interests. The use of force in the cases of the border disturbances and the incendiary kites should thus be regulated, mutatis mutandis, by the concept of self-defense and escalation of force procedures; and in the latter case, the hostilities paradigm can also be applied. The study provides a factual description and analysis of the background and nature of the forms of struggle in Gaza and the West Bank—in each case surveying the geo-political developments since operation Protective Edge, contextualizing how the organized and unorganized violent activities evolved, and analyzing them in terms of level of organization and intensity. It then presents the two paradigms of the use of force—law enforcement and conduct of hostilities—and the concept of self-defense. Lastly, it uses the factual findings as the basis for legally analyzing which paradigm or concept regulating the use of force applies for each form of struggle. The study concludes that in most cases, the concept of self-defense is preferable to the hostilities or the law enforcement paradigms, as it best safeguards humanitarian interests and ensures the least loss of civilian lives.

Keywords: Israeli-Palestinian conflict, self defense, terrorism, use of force

Procedia PDF Downloads 89
5832 Secure Network Coding against Content Pollution Attacks in Named Data Network

Authors: Tao Feng, Xiaomei Ma, Xian Guo, Jing Wang

Abstract:

Named Data Network (NDN) is one of the future Internet architecture, all nodes (i.e., hosts, routers) are allowed to have a local cache, used to satisfy incoming requests for content. However, depending on caching allows an adversary to perform attacks that are very effective and relatively easy to implement, such as content pollution attack. In this paper, we use a method of secure network coding based on homomorphic signature system to solve this problem. Firstly ,we use a dynamic public key technique, our scheme for each generation authentication without updating the initial secret key used. Secondly, employing the homomorphism of hash function, intermediate node and destination node verify the signature of the received message. In addition, when the network topology of NDN is simple and fixed, the code coefficients in our scheme are generated in a pseudorandom number generator in each node, so the distribution of the coefficients is also avoided. In short, our scheme not only can efficiently prevent against Intra/Inter-GPAs, but also can against the content poisoning attack in NDN.

Keywords: named data networking, content polloution attack, network coding signature, internet architecture

Procedia PDF Downloads 302
5831 “Japan’s New Security Outlook: Implications for the US-Japan Alliance”

Authors: Agustin Maciel-Padilla

Abstract:

This paper explores the most significant change to Japan’s security strategy since the end of World War II, in particular Prime Minister Fumio Kishida’s government publication, in late 2022, of 3 policy documents (the National Security Strategy [NSS], the National Defense Strategy and the Defense Buildup Program) that basically propose to expand the country’s military capabilities and to increase military spending over a 5-year period. These policies represent a remarkable transformation of Japan’s defense-oriented policy followed since 1946. These proposals have been under analysis and debate since they were announced, as it was also Japan’s historic ambition to strengthening its deterrence capabilities in the context of a more complex regional security environment. Even though this new defense posture has attracted significant international attention, it is far from representing a done deal because of the fact that there is still a long way to go to implement this vision because of a wide variety of political and economic issues. Japan is currently experiencing the most dangerous security environment since the end of World War II, and this situation led Japan to intensify its dialogue with the United States to reflect a re-evaluation of deterrence in the face of a rapidly worsening security environment, a changing balance of power in East Asia, and the arrival of a new era of “great power competition”. Japan’s new documents, for instance, identify China and North Korea’s as posing, respectively, a strategic challenge and an imminent threat. Japan has also noted that Russia’s invasion of Ukraine has contributed to erode the foundation of the international order. It is considered that Russia’s aggression was possible because Ukraine’s defense capability was not enough for effective deterrence. Moreover, Japan’s call for “counterstrike capabilities” results from a recognition that China and North Korea’s ballistic and cruise missiles could overwhelm Japan’s air and missile defense systems, and therefore there is an urgent need to strengthen deterrence and resilience. In this context, this paper will focus on the impact of these changes on the US-Japan alliance. Adapting this alliance to Tokyo’s new ambitions and capabilities could be critical in terms of updating their traditional protection/access to bases arrangement, interoperability and joint command and control issues, as well as regarding the security–economy nexus. While China is Japan’s largest trading partner, and trade between the two has been growing, US-Japan economic relationship has been slower, notwithstanding the fact that US-Japan security cooperation has strengthened significantly in recent years.

Keywords: us-japan alliance, japan security, great power competition, interoperability

Procedia PDF Downloads 37
5830 Create a Model of Production and Marketing Strategies in Alignment with Business Strategy Using QFD Approach

Authors: Hamed Saremi, Shahla Saremi

Abstract:

In today's competitive world, organizations are expected to surpass the competitors and benefit from the resources and benefits. Therefore, organizations need to improve the current performance is felt more than ever that this requires to identify organizational optimal strategies, and consider all strategies simultaneously. In this study, to enhance competitive advantage and according to customer requirements, alignment between business, production and marketing strategies, House of Quality (QFD) approach has been used and zero-one linear programming model has been studied. First, the alignment between production and marketing strategies with business strategy, independent weights of these strategies is calculated. Then with using QFD approach the aligned weights of optimal strategies in each production and marketing field will be obtained and finally the aligned marketing strategies selection with the purpose of allocating budget and specialist human resource to marketing functions will be done that lead to increasing competitive advantage and benefit.

Keywords: marketing strategy, business strategy, strategy alignment, house of quality deployment, production strategy

Procedia PDF Downloads 569
5829 The Role of the Defense and Future War in Ukraine

Authors: Matthew J. Flynn

Abstract:

In early 2022, a thirty-mile column of Russian armor and assault vehicles sat poised to move south on the road to Kiev. That force has withdrawn as the Russians concentrate on attacking eastern Ukraine. Vladimir Putin’s armies appear content to destroy cities in an effort to attrit the Ukrainian will to continue fighting. That pivot signifies the acceptance of the ascendancy of the defense that now dictates any battlefield world-wide. To defeat what military theorist Carl von Clausewitz labeled “the stronger form of war” with a successful offensive requires an exercise in future war. In the past, the ascendancy of the defense has been overcome by a number of things including the application of superior leadership, better technology, organizational adaptation, and surpassing environmental limitations. A look at how each of these factors came to impact battle can tell us a great deal about what Ukraine means to tomorrow’s fight, and where the focus should lie to win the next war. Civilians presently secure the defensive ascendancy impacting warfare by dominating the shifts from domain to domain thanks to controlling access to cyberspace. That mandate will be tested and eventually falter. This paper tests the desirability of that proposition, as well as hoping for something more from humanity other than repeated and frequent wars making future war look much like past wars. As nations struggle to control cyberspace, a referendum on war as part of the human condition comes into focus.

Keywords: cyber, domains, future war, Putin, Ukraine

Procedia PDF Downloads 76
5828 Model of Production and Marketing Strategies in Alignment with Business Strategy using QFD Approach

Authors: Hamed Saremi, Suzan Taghavy, Shahla Saremi

Abstract:

In today's competitive world, organizations are expected to surpass the competitors and benefit from the resources and benefits. Therefore, organizations need to improve the current performance is felt more than ever that this requires to identify organizational optimal strategies, and consider all strategies simultaneously. In this study, to enhance competitive advantage and according to customer requirements, alignment between business, production and marketing strategies, House of Quality (QFD) approach has been used and zero-one linear programming model has been studied. First, the alignment between production and marketing strategies with business strategy, independent weights of these strategies is calculated. Then with using QFD approach the aligned weights of optimal strategies in each production and marketing field will be obtained and finally the aligned marketing strategies selection with the purpose of allocating budget and specialist human resource to marketing functions will be done that lead to increasing competitive advantage and benefit.

Keywords: strategy alignment, house of quality deployment, production strategy, marketing strategy, business strategy

Procedia PDF Downloads 403
5827 Heroin and Opiates Metabolites Tracing by Gas-Chromatography Isotope Ratio Mass Spectrometry

Authors: Yao-Te Yen, Chao-Hsin Cheng, Meng-Shun Huang, Shan-Zong Cyue

Abstract:

'Poppy-seed defense' has been a serious problem all over the world, that is because the opiates metabolites in urine are difficult to distinguish where they come from precisely. In this research, a powerful analytic method has been developed to trace the opiates metabolites in urine by Gas-Chromatography Isotope Ratio Mass Spectrometry (GC-IRMS). In order to eliminate the interference of synthesis to heroin or metabolism through human body, opiates metabolites in urine and sized heroin were hydrolyzed to morphine. Morphine is the key compound for tracing between opiates metabolites and seized heroin in this research. By matching δ13C and δ15N values through morphine, it is successful to distinguish the opiates metabolites coming from heroin or medicine. We tested seven heroin abuser’s metabolites and seized heroin in crime sites, the result showed that opiates metabolites coming from seized heroin, the variation of δ13C and δ15N for morphine are within 0.2 and 2.5‰, respectively. The variation of δ13C and δ15N for morphine are reasonable with the result of matrix match experiments. Above all, the uncertainty of 'Poppy-seed defense' can be solved easily by this analytic method, it provides the direct evidence for judge to make accurate conviction without hesitation.

Keywords: poppy-seed defense, heroin, opiates metabolites, isotope ratio mass spectrometry

Procedia PDF Downloads 214
5826 Experience Level and Adoption of Interpretation Strategies by Iranian Interpreters

Authors: Niloofar Fathizaviyehkord

Abstract:

Just as two hands cannot make a good boxer, knowing two or more languages cannot make a skillful interpreter. Interpreting, either consecutive or simultaneous, is a cognitively demanding task requiring not only linguistic and discourse knowledge but also strategic competence. Moreover, experience level can play a very crucial role in the strategies interpreters may employ since translation and interpretation quality is a matter of experience, besides other factors, as well. With regard to the significance of strategic competence, this study investigated what strategies are mainly employed by interpreters, what strategies are employed more frequently, and whether experience level can affect the choice of strategies by interpreters or not. To collect the necessary data, the first retrospective interviews were held with 20 interpreters experienced more or less in simultaneous and consecutive interpretation to see what strategies other than those classified in the literature are employed by interpreters. Then, several classifications of strategies in literature were merged with those emerging from the retrospective interviews to come up with a comprehensive questionnaire on interpreting strategies. After seeking five experts’ opinions regarding the wording/content of the questionnaire, it was given to 60 interpreters. The statistical analysis of the questionnaire data and experience level through ANOVA showed experience level could affect the choice of strategies. This study closes with the theoretical/practical implications of the findings for interpreter training.

Keywords: experience level, consecutive and simultaneous, interpretation strategies, translation

Procedia PDF Downloads 110
5825 Language Learning Strategies to Improve English Speaking Skills among High School Students: A Case Study at Vo Minh Duc High School in Binh Duong Province, Viet Nam

Authors: Du T. Tran, Quyen T. L. Hoang

Abstract:

The role of language learning strategies in second language acquisition has received increased attention across several disciplines in recent years. Language learning strategies have been shown to occur in many studies over the passing years with the aim of improving the efficiency of language learning. Following previous studies, this study endeavors to scrutinize language learning strategies employed by the students at Vo Minh Duc high school and the effect of motivation on students’ learning strategy choices. The responses are examined quantitatively and qualitatively to enhance their validity and reliability. Data are collected from 342 students’ responses to the questionnaire, interviews with ten teachers and fifteen students, and classroom observations. The findings reveal that students’ motivation has an enormous impact on the choice of language learning strategies. The results simultaneously show that students use many language learning strategies to enhance their communicative competence, but the most frequently used ones are cognitive and affective ones. Significant correlations among types of learning strategies and the influence of motivation on the choices of language learning strategies were consistent with previous studies. The study’s results are expected to be beneficial to teachers of English and students in terms of narrowing the gap between the students' language learning strategies and their teaching methodologies preferences and sketching out the best strategies to enhance students’ speaking skills. The implications of these findings and the importance of viewing learners holistically are discussed, and recommendations are made for ongoing research.

Keywords: learning strategies, speaking skills, memorization strategies, cognitive strategies, affective strategies

Procedia PDF Downloads 61
5824 Cryptocurrency Crime: Behaviors of Malicious Smart Contracts in Blockchain

Authors: Malaw Ndiaye, Karim Konate

Abstract:

Blockchain and smart contracts can be used to facilitate almost any financial transaction. Thanks to these smart contracts, the settlement of dividends and coupons could be automated. The blockchain would allow all these transactions to be saved in a single ledger rather than in many databases through many organizations as is currently the case. Smart contracts have become lucrative and profitable targets for attackers because they can hold a large amount of money. This paper takes stock of cryptocurrency crime by assessing attacks due to smart contracts and the cost of losses. These losses are often the result of two types of malicious contracts: vulnerable contracts and criminal smart contracts. Studying the behavior of malicious contracts allows us to understand the root causes and consequences of attacks and the defense capabilities that exist although they do not definitively solve the crime problem. It makes it possible to approach new defense perspectives which will be concretized in future work.

Keywords: blockchain, malicious smart contracts, crypto-currency, crimes, attacks

Procedia PDF Downloads 237
5823 Compare Online Metacognitive Reading Strategies Used by Iranian Postgraduate Students with Internal and External Locus of Control

Authors: Mitra Mesgar

Abstract:

Online learning environment is becoming more popular among learners because of their multiple information representations. Despite the growing importance of online reading strategies among adult learners, little attention has been carried out to postgraduate EFL learners. This study is quantitative research designed and aimed to investigate metacognitive reading strategies employed by Iranian postgraduate learners to read online academic texts. This study is conducted by over 50 Iranian postgraduate students studying in different Malaysian universities. This study used two different survey questionnaires, namely, 1) background questionnaire and 2) OSORS questionnaire. The collected data were analyzed using SPSS. The findings of the study emphasized metacognitive reading strategies used by different aged adult learners. The results of the survey questionnaires revealed that adult learners use global reading strategies as well as problem-solving strategies and support reading strategies. Also, through one-way analysis of variance toward age factor revealed that it has no meaningful changes on metacognitive reading strategy usage. This means that metacognitive reading strategies used by adult learners are independent of age variable. Drawing from findings, adult learners have learning goals, and since they have more exposure to online academic texts, they are able to use different metacognitive online reading strategies that affect their understanding of academic texts.

Keywords: online reading strategies, metacognitive strategies, online learning, independent students, locus of control

Procedia PDF Downloads 53
5822 Direct and Indirect Impacts of Predator Conflict in Kanha National Park, India

Authors: Diane H. Dotson, Shari L. Rodriguez

Abstract:

Habitat for predators is on the decline worldwide, which often brings humans and predators into conflict over remaining shared space and common resources. While the direct impacts of human predator conflict on humans (i.e., attacks on livestock or humans resulting in injury or death) are well documented, the indirect impacts of conflict on humans (i.e., downstream effects such as fear, stress, opportunity costs, PTSD) have not been addressed. We interviewed 437 people living in 54 villages on the periphery of Kanha National Park, India, to assess the amount and severity of direct and indirect impacts of predator conflict. ​While 58% of livestock owners believed that predator attacks on livestock guards occurred frequently and 62% of those who collect forest products believed that predator attacks on those collecting occurred frequently, less than 20% of all participants knew of someone who had experienced an attack. Data related to indirect impacts suggest that such impacts are common; 76% of participants indicated they were afraid a predator will physically injure them. Livestock owners reported that livestock guarding took time away from their primary job (61%) and getting enough sleep (73%), and believed that it increased their vulnerability to illnesses (80%). These results suggest that the perceptions of risk of predator attack are likely inflated, yet the costs of human predator impacts may be substantially higher than previously estimated, particularly related to human well-being, making the implementation of appropriate and effective conservation and conflict mitigation strategies and policies increasingly urgent.

Keywords: direct impacts, indirect impacts, human-predator conflict, India

Procedia PDF Downloads 125
5821 Adoption of Proactive and Reactive Supply Chain Resilience Strategies: A Comparison between Apparel and Construction Industries in Sri Lanka

Authors: Anuradha Ranawakage, Chathurani Silva

Abstract:

With the growing expansion of global businesses, supply chains are increasingly exposed to numerous disruptions. Organizations adopt various strategies to mitigate the impact of these disruptions. Depending on the variations in the conditions and characteristics of supply chains, the adoption of resilience strategies may vary across industries. However, these differences are largely unexplored in the existing literature. Hence, this study aims to evaluate the adoption of three proactive strategies: proactive collaboration, digital connectivity, integrated SC risk management, and three reactive strategies: reactive collaboration, inventory and reserve capacity, and lifeline maintenance in the apparel and construction industries in Sri Lanka. An online questionnaire was used to collect data on the implementation of resilience strategies from a sample of 162 apparel and 185 construction companies operating in Sri Lanka. This research makes a significant contribution to the field of supply chain management by assessing the extent to which different resilience strategies are functioned within the apparel and construction industries in Sri Lanka, particularly in an era after a global pandemic that significantly disrupted supply chains all around the world.

Keywords: apparel, construction, proactive strategies, reactive strategies, supply chain resilience

Procedia PDF Downloads 17
5820 Use of Oral Communication Strategies: A Study of Bangladeshi EFL Learners at the Graduate Level

Authors: Afroza Akhter Tina

Abstract:

This paper reports on an investigation into the use of specific types of oral communication strategies, namely ‘topic avoidance’, ‘message abandonment’, ‘code-switching’, ‘paraphrasing’, ‘restructuring’, and ‘stalling’ by Bangladeshi EFL learners at the graduate level. It chiefly considers the frequency of using these strategies as well as the students and teachers attitudes toward such uses. The participants of this study are 66 EFL students and 12 EFL teachers of Jahangirnagar University. Data was collected through questionnaire, oral interview, and classroom observation form. The findings reveal that the EFL students tried to employ all the strategies to various extents due to the language difficulties they encountered in their oral English performance. Among them, the mostly used strategy was ‘stalling’ or the use of fillers, followed by ‘code-switching’. The least used strategies were ‘topic avoidance’, ‘restructuring’, and ‘paraphrasing’. The findings indicate that the use of such strategies was related to the contexts of situation and data-elicitation tasks. It also reveals that the students were not formally trained to use the strategies though the majority of the teachers and students acknowledge them as helpful in communication. Finally the study suggests that an awareness of the nature and functions of these strategies can contribute to the overall improvement of the learners’ communicative competence in spoken English.

Keywords: communicative strategies, competency, attitude, frequency

Procedia PDF Downloads 382
5819 An Analytical Metric and Process for Critical Infrastructure Architecture System Availability Determination in Distributed Computing Environments under Infrastructure Attack

Authors: Vincent Andrew Cappellano

Abstract:

In the early phases of critical infrastructure system design, translating distributed computing requirements to an architecture has risk given the multitude of approaches (e.g., cloud, edge, fog). In many systems, a single requirement for system uptime / availability is used to encompass the system’s intended operations. However, when architected systems may perform to those availability requirements only during normal operations and not during component failure, or during outages caused by adversary attacks on critical infrastructure (e.g., physical, cyber). System designers lack a structured method to evaluate availability requirements against candidate system architectures through deep degradation scenarios (i.e., normal ops all the way down to significant damage of communications or physical nodes). This increases risk of poor selection of a candidate architecture due to the absence of insight into true performance for systems that must operate as a piece of critical infrastructure. This research effort proposes a process to analyze critical infrastructure system availability requirements and a candidate set of systems architectures, producing a metric assessing these architectures over a spectrum of degradations to aid in selecting appropriate resilient architectures. To accomplish this effort, a set of simulation and evaluation efforts are undertaken that will process, in an automated way, a set of sample requirements into a set of potential architectures where system functions and capabilities are distributed across nodes. Nodes and links will have specific characteristics and based on sampled requirements, contribute to the overall system functionality, such that as they are impacted/degraded, the impacted functional availability of a system can be determined. A machine learning reinforcement-based agent will structurally impact the nodes, links, and characteristics (e.g., bandwidth, latency) of a given architecture to provide an assessment of system functional uptime/availability under these scenarios. By varying the intensity of the attack and related aspects, we can create a structured method of evaluating the performance of candidate architectures against each other to create a metric rating its resilience to these attack types/strategies. Through multiple simulation iterations, sufficient data will exist to compare this availability metric, and an architectural recommendation against the baseline requirements, in comparison to existing multi-factor computing architectural selection processes. It is intended that this additional data will create an improvement in the matching of resilient critical infrastructure system requirements to the correct architectures and implementations that will support improved operation during times of system degradation due to failures and infrastructure attacks.

Keywords: architecture, resiliency, availability, cyber-attack

Procedia PDF Downloads 70
5818 Effect of Adverse Pressure Gradient on a Fluctuating Velocity over the Co-Flow Jet Airfoil

Authors: Morteza Mirhosseini, Amir B. Khoshnevis

Abstract:

The boundary layer separation and new active flow control of a NACA 0025 airfoil were studied experimentally. This new flow control is sometimes known as a co-flow jet (cfj) airfoil. This paper presents the fluctuating velocity in a wall jet over the co-flow jet airfoil subjected to an adverse pressure gradient and a curved surface. In these results, the fluctuating velocity at the inner part increasing by increased the angle of attack up to 12o and this has due to the jet energized, while the angle of attack 20o has different. The airfoil cord based Reynolds number has 105.

Keywords: adverse pressure gradient, fluctuating velocity, wall jet, co-flow jet airfoil

Procedia PDF Downloads 459
5817 Indonesia’s Defense Diplomacy Strength Towards China’s Aggressive Maritime Policy

Authors: Pangihutan Panjaitan, Helda Risman, Devindra Oktaviano

Abstract:

This research is departed from the security issues generated from China’s unilateral claims in the South China Sea conflict. The diplomacy challenges come from Indonesia’s relations with China as well as with ASEAN-member countries involved in the conflict. It is estimated that the conflict in the South China Sea region will become an endless conflict. Comprehensively, Indonesia is implementing a gradual shift in diplomatic approach in creating positive and constructive ties among Indonesia, China, and ASEAN. In line with the rapid-changing world order, the conventional military approach becomes less significant in today’s modern inter-state interactions. This research is conducted in a qualitative literature review to explain how Indonesia’s recent soft diplomacy approach applied in the South China Sea conflict. This type of diplomacy theoretically assumed as one of the most preferred ways to establish mutual trust and confidence among conflicting parties. Maritime issues found its significance in contemporary foreign policy since the world’s most dynamic region has moved to the archipelagic Asia-Pacific. As mentioned by rationalists, every country, including Indonesia, has surely formulated its own prominent national interest, such as the defense aspect. Finally, this research will provide a deep analysis on Indonesia’s centrality in ASEAN as an effective way to ensure Indonesia’s strategic policy in the region well accommodated.

Keywords: soft diplomacy, south China sea, national defense, China

Procedia PDF Downloads 132