Search results for: malware infection propagating malicious code
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 2967

Search results for: malware infection propagating malicious code

2907 Risks beyond Cyber in IoT Infrastructure and Services

Authors: Mattias Bergstrom

Abstract:

Significance of the Study: This research will provide new insights into the risks with digital embedded infrastructure. Through this research, we will analyze each risk and its potential negation strategies, especially for AI and autonomous automation. Moreover, the analysis that is presented in this paper will convey valuable information for future research that can create more stable, secure, and efficient autonomous systems. To learn and understand the risks, a large IoT system was envisioned, and risks with hardware, tampering, and cyberattacks were collected, researched, and evaluated to create a comprehensive understanding of the potential risks. Potential solutions have then been evaluated on an open source IoT hardware setup. This list shows the identified passive and active risks evaluated in the research. Passive Risks: (1) Hardware failures- Critical Systems relying on high rate data and data quality are growing; SCADA systems for infrastructure are good examples of such systems. (2) Hardware delivers erroneous data- Sensors break, and when they do so, they don’t always go silent; they can keep going, just that the data they deliver is garbage, and if that data is not filtered out, it becomes disruptive noise in the system. (3) Bad Hardware injection- Erroneous generated sensor data can be pumped into a system by malicious actors with the intent to create disruptive noise in critical systems. (4) Data gravity- The weight of the data collected will affect Data-Mobility. (5) Cost inhibitors- Running services that need huge centralized computing is cost inhibiting. Large complex AI can be extremely expensive to run. Active Risks: Denial of Service- It is one of the most simple attacks, where an attacker just overloads the system with bogus requests so that valid requests disappear in the noise. Malware- Malware can be anything from simple viruses to complex botnets created with specific goals, where the creator is stealing computer power and bandwidth from you to attack someone else. Ransomware- It is a kind of malware, but it is so different in its implementation that it is worth its own mention. The goal with these pieces of software is to encrypt your system so that it can only be unlocked with a key that is held for ransom. DNS spoofing- By spoofing DNS calls, valid requests and data dumps can be sent to bad destinations, where the data can be extracted for extortion or to corrupt and re-inject into a running system creating a data echo noise loop. After testing multiple potential solutions. We found that the most prominent solution to these risks was to use a Peer 2 Peer consensus algorithm over a blockchain to validate the data and behavior of the devices (sensors, storage, and computing) in the system. By the devices autonomously policing themselves for deviant behavior, all risks listed above can be negated. In conclusion, an Internet middleware that provides these features would be an easy and secure solution to any future autonomous IoT deployments. As it provides separation from the open Internet, at the same time, it is accessible over the blockchain keys.

Keywords: IoT, security, infrastructure, SCADA, blockchain, AI

Procedia PDF Downloads 69
2906 Lowering Error Floors by Concatenation of Low-Density Parity-Check and Array Code

Authors: Cinna Soltanpur, Mohammad Ghamari, Behzad Momahed Heravi, Fatemeh Zare

Abstract:

Low-density parity-check (LDPC) codes have been shown to deliver capacity approaching performance; however, problematic graphical structures (e.g. trapping sets) in the Tanner graph of some LDPC codes can cause high error floors in bit-error-ratio (BER) performance under conventional sum-product algorithm (SPA). This paper presents a serial concatenation scheme to avoid the trapping sets and to lower the error floors of LDPC code. The outer code in the proposed concatenation is the LDPC, and the inner code is a high rate array code. This approach applies an interactive hybrid process between the BCJR decoding for the array code and the SPA for the LDPC code together with bit-pinning and bit-flipping techniques. Margulis code of size (2640, 1320) has been used for the simulation and it has been shown that the proposed concatenation and decoding scheme can considerably improve the error floor performance with minimal rate loss.

Keywords: concatenated coding, low–density parity–check codes, array code, error floors

Procedia PDF Downloads 329
2905 Solar Wind Turbulence and the Role of Circularly Polarized Dispersive Alfvén Wave

Authors: Swati Sharma, R. P. Sharma

Abstract:

We intend to study the nonlinear evolution of the parallel propagating finite frequency Alfvén wave (also called Dispersive Alfvén wave/Hall MHD wave) propagating in the solar wind regime of the solar region when a perpendicularly propagating magnetosonic wave is present in the background. The finite frequency Alfvén wave behaves differently from the usual non-dispersive behavior of the Alfvén wave. To study the nonlinear processes (such as filamentation) taking place in the solar regions such as solar wind, the dynamical equation of both the waves are derived. Numerical simulation involving finite difference method for the time domain and pseudo spectral method for the spatial domain is then performed to analyze the transient evolution of these waves. The power spectra of the Dispersive Alfvén wave is also investigated. The power spectra shows the distribution of the magnetic field intensity of the Dispersive Alfvén wave over different wave numbers. For DAW the spectra shows a steepening for scales larger than the proton inertial length. This means that the wave energy gets transferred to the solar wind particles as the wave reaches higher wave numbers. This steepening of the power spectra can be explained on account of the finite frequency of the Alfvén wave. The obtained results are consistent with the observations made by CLUSTER spacecraft.

Keywords: solar wind, turbulence, dispersive alfven wave

Procedia PDF Downloads 574
2904 UNIX Source Code Leak: Evaluation and Feasible Solutions

Authors: Gu Dongxing, Li Yuxuan, Nong Tengxiao, Burra Venkata Durga Kumar

Abstract:

Since computers are widely used in business models, more and more companies choose to store important information in computers to improve productivity. However, this information can be compromised in many cases, such as when it is stored locally on the company's computers or when it is transferred between servers and clients. Of these important information leaks, source code leaks are probably the most costly. Because the source code often represents the core technology of the company, especially for the Internet companies, source code leakage may even lead to the company's core products lose market competitiveness, and then lead to the bankruptcy of the company. In recent years, such as Microsoft, AMD and other large companies have occurred source code leakage events, suffered a huge loss. This reveals to us the importance and necessity of preventing source code leakage. This paper aims to find ways to prevent source code leakage based on the direction of operating system, and based on the fact that most companies use Linux or Linux-like system to realize the interconnection between server and client, to discuss how to reduce the possibility of source code leakage during data transmission.

Keywords: data transmission, Linux, source code, operating system

Procedia PDF Downloads 217
2903 Rumour Containment Using Monitor Placement and Truth Propagation

Authors: Amrah Maryam

Abstract:

The emergence of online social networks (OSNs) has transformed the way we pursue and share information. On the one hand, OSNs provide great ease for the spreading of positive information while, on the other hand, they may also become a channel for the spreading of malicious rumors and misinformation throughout the social network. Thus, to assure the trustworthiness of OSNs to its users, it is of vital importance to detect the misinformation propagation in the network by placing network monitors. In this paper, we aim to place monitors near the suspected nodes with the intent to limit the diffusion of misinformation in the social network, and then we also detect the most significant nodes in the network for propagating true information in order to minimize the effect of already diffused misinformation. Thus, we initiate two heuristic monitor placement using articulation points and truth propagation using eigenvector centrality. Furthermore, to provide real-time workings of the system, we integrate both the monitor placement and truth propagation entities as well. To signify the effectiveness of the approaches, we have carried out the experiment and evaluation of Stanford datasets of online social networks.

Keywords: online social networks, monitor placement, independent cascade model, spread of misinformation

Procedia PDF Downloads 133
2902 Code Refactoring Using Slice-Based Cohesion Metrics and AOP

Authors: Jagannath Singh, Durga Prasad Mohapatra

Abstract:

Software refactoring is very essential for maintaining the software quality. It is an usual practice that we first design the software and then go for coding. But after coding is completed, if the requirement changes slightly or our expected output is not achieved, then we change the codes. For each small code change, we cannot change the design. In course of time, due to these small changes made to the code, the software design decays. Software refactoring is used to restructure the code in order to improve the design and quality of the software. In this paper, we propose an approach for performing code refactoring. We use slice-based cohesion metrics to identify the target methods which requires refactoring. After identifying the target methods, we use program slicing to divide the target method into two parts. Finally, we have used the concepts of Aspects to adjust the code structure so that the external behaviour of the original module does not change.

Keywords: software refactoring, program slicing, AOP, cohesion metrics, code restructure, AspectJ

Procedia PDF Downloads 476
2901 Maximum Distance Separable b-Symbol Repeated-Root γ-Constacylic Codes over a Finite Chain Ring of Length 2

Authors: Jamal Laaouine, Mohammed Elhassani Charkani

Abstract:

Let p be a prime and let b be an integer. MDS b-symbol codes are a direct generalization of MDS codes. The γ-constacyclic codes of length pˢ over the finite commutative chain ring Fₚm [u]/ < u² > had been classified into four distinct types, where is a nonzero element of the field Fₚm. Let C₃ be a code of Type 3. In this paper, we obtain the b-symbol distance db(C₃) of the code C₃. Using this result, necessary and sufficient conditions under which C₃ is an MDS b-symbol code are given.

Keywords: constacyclic code, repeated-root code, maximum distance separable, MDS codes, b-symbol distance, finite chain rings

Procedia PDF Downloads 106
2900 Plasmodium falciparum and Scistosoma haematobium Co-infection in School Aged Children in Jinduut, Shendam Local Government Area of Plateau State, North Central Nigeria

Authors: D. A. Dakul, T. M. Akindigh, B. J. Dogonyaro, O. J. Abba, K. T. Tangtur, N. Sambo, J. A. E. Okopi, J. A. Yohanna, G. E. Imade, G. S. Mwansat, S. Oguche

Abstract:

Malaria and urinary Schistosomaisis are both endemic in Nigeria and pose a serious health challenge in rural areas where co-infections are common. This descriptive cross sectional study was carried out to determine the prevalence of co-infection and the impact of concurrent infection on haemoglobin concentration, Eosinophil and CD4+ T-lymphocyte counts. Plasmodium falciparum and Schistosoma haematobium infection were determined by Malaria Rapid Diagnostic Test (MRDT) kits and the presence of visible haematuria respectively and confirmed by conventional Polymerase Chain Reaction (cPCR). P values < 0.05 were considered statistically significant. Of the 110 children examined, 13 (11.8%) had concurrent infection with Schistosoma haematobium falciparum, 46(41.8%) had Plasmodium falciparum infection while 16(14.5%) had Schistosoma haematobium infection. A strong association between co-infection and the ages of 10-15 years with a 36.4% prevalence of anaemia was observed. Malaria was significantly associated with anaemia than with concurrent infections or schistomiasis alone. Co-infection with both pathogens and a high prevalence of anaemia was observed in Jinduut community. Although the causes of anaemia are multi-factorial, further investigation into the extent to which malaria and urinary schistosomiasis contribute to anaemia is needed. Also, integrated control efforts must be strengthened to mitigate the impact of concurrent infection in this group of vulnerable members in the community. The results can be applied to other communities during control.

Keywords: co-Infection, plasmodium falciparum and scistosoma haematobium, Jinduut, Nigeria

Procedia PDF Downloads 303
2899 The Development, Validation, and Evaluation of the Code Blue Simulation Module in Improving the Code Blue Response Time among Nurses

Authors: Siti Rajaah Binti Sayed Sultan

Abstract:

Managing the code blue event is stressful for nurses, the patient, and the patient's families. The rapid response from the first and second responders in the code blue event will improve patient outcomes and prevent tissue hypoxia that leads to brain injury and other organ failures. Providing 1 minute for the cardiac massage and 2 minutes for defibrillation will significantly improve patient outcomes. As we know, the American Heart Association came out with guidelines for managing cardiac arrest patients. The hospital must provide competent staff to manage this situation. It can be achieved when the staff is well equipped with the skill, attitude, and knowledge to manage this situation with well-planned strategies, i.e., clear guidelines for managing the code blue event, competent staff, and functional equipment. The code blue simulation (CBS) was chosen in the training program for code blue management because it can mimic real scenarios. Having the code blue simulation module will allow the staff to appreciate what they will face during the code blue event, especially since it rarely happens in that area. This CBS module training will help the staff familiarize themselves with the activities that happened during actual events and be able to operate the equipment accordingly. Being challenged and independent in managing the code blue in the early phase gives the patient a better outcome. The CBS module will help the assessor and the hospital management team with the proper tools and guidelines for managing the code blue drill accordingly. As we know, prompt action will benefit the patient and their family. It also indirectly increases the confidence and job satisfaction among the nurses, increasing the standard of care, reducing the complication and hospital burden, and enhancing cost-effective care.

Keywords: code blue simulation module, development of code blue simulation module, code blue response time, code blue drill, cardiorespiratory arrest, managing code blue

Procedia PDF Downloads 24
2898 Epidemiology of Bone Hydatidosis in Eastern Libya from 1995 to 2013

Authors: Sadek A. Makhlouf, Hassan M. Nouh

Abstract:

Bone hydatidosis is an infection in worldwide distribution. Although there is no evidence in literature on Bone Hydatid disease in Libya, we tried to present the first epidemiological study of this disease in Eastern Libya through retrospective study from 1995 to 2013. Our data were collected from 3 hospitals in Eastern Libya particularly the sheep-raising areas with total number of musculoskeletal infection cases of two thousand one hundred ninety-four (2,194). There were five (5) five cases of bone infection, four (4) of it have been diagnosed after more than three (3) months. Our study is comparable to other international study but this type of bone infection need further studies for effective control strategies for all dogs to avoid serious complications that might happened from the delay in diagnosing this type of disease.

Keywords: bone infection, hydatidosis, Eastern Libya, sheep-raising areas

Procedia PDF Downloads 382
2897 The Road Ahead: Merging Human Cyber Security Expertise with Generative AI

Authors: Brennan Lodge

Abstract:

Cybersecurity professionals have long been embroiled in a digital arms race, confronting increasingly sophisticated threats with innovative solutions. The field of cybersecurity is in an unending race against malicious adversaries. As threats evolve in complexity, the tools used to defend against them need to advance even faster. Burdened with a vast arsenal of tools and an expansive scope of threat intelligence, analysts frequently navigate a complex web, trying to discern patterns amidst information overload. Herein lies the potential of Retrieval Augmented Generation (RAG). By combining the capabilities of Large Language Models (LLMs) with a generative AI facet, RAG brings to the table an unparalleled ability for real-time cross-referencing, bridging the gap between raw data and actionable insights. Imagine an analyst named Sarah working at a global Fortune 500 company. Every day, Sarah navigates a maze of diverse knowledge bases, real-time threat intelligence, and her company's vast proprietary data, from network specifics to intricate technical blueprints. One day, she's challenged by a potential breach through a personal device due to the company's global "Bring Your Own Device" policy. With the clock ticking, Sarah has mere minutes to trace the malware's origin, all while considering complex regional regulations. As she races against the benchmark of Mean Time To Resolution (MTTR), she wonders: Could "Cozy Bear" with its notorious malware tactic, HAMMERTOSS, be behind this? Balancing policy intricacies, global network considerations, and ever-emerging cyber threats, Sarah's role epitomizes the intense challenges faced by today's cybersecurity analysts. While analysts grapple with this array of intricate, time-sensitive challenges, the necessity for precision and efficiency is key. RAG technology—a cutting-edge advancement in Gen AI—is a promising solution. Designed to assimilate diverse data sources such as cyber advisory notices, phishing email sentiment, secure and insecure code examples, information security policy documentation, and the MITRE ATT&CK framework, RAG equips analysts with real-time querying capabilities through a vector database and a cross referenced concise response from a Gen AI model. Traditional relational databases often necessitate a tedious process of filtering through numerous entries. Now, with the synergy of vector databases and Gen AI models, analysts can rapidly access both contextually or semantically akin data points. This augmented approach equips analysts with a comprehensive understanding of the prevailing cyber threats, elevating the robustness of cybersecurity defenses and upskilling the analyst and team, too. Vector databases underpin the knowledge translation in Gen AI. They bridge the gap between raw data and translation into meaningful insights, ensuring that analysts are equipped with comprehensive and relevant information. This superior capability of the RAG framework, with its impressive depth and precision, finds application across a broad spectrum of cybersecurity challenges. Let's delve into some use cases where its potential becomes particularly evident: Phishing Email Sentiment Analysis: Phishing remains a predominant vector for cybersecurity breaches. Leveraging RAG's capabilities, analysts can not only assess the potential malevolence of an email but can also understand the context behind it. By cross-referencing patterns from varied data sources in real-time, the detection process evolves from a mere content evaluation to a holistic understanding of attacker tactics, behaviors, and evolving profiles. This allows for the identification of nuanced phishing strategies that might otherwise go undetected. Insecure Code Analysis: Software vulnerabilities form a critical entry point for cyber adversaries. With RAG, the process of code evaluation undergoes a transformation. Instead of manual code reviews, the system pulls insights from vector databases and historical code snippets marked as insecure, enabling detection of vulnerabilities based on historical patterns, emerging threat vectors, and even predictive threat modeling. This ensures that even the most obfuscated or embedded vulnerabilities are identified, and corrective measures can be promptly implemented. Vulnerability and Upskill Advisory: In the fast-paced world of cybersecurity, staying updated is paramount. Through RAG's capabilities, analysts are not only made aware of real-time vulnerabilities but are also guided on the necessary skills and tools needed to combat them. By dynamically sourcing data through vulnerability advisories, news on advanced persistent threats, and tactics to defend, RAG ensures that analysts are not only reactive to threats but are also proactively upskilled, thereby bolstering their defense mechanisms. Information Security Policies for Compliance Teams: Compliance remains at the heart of many organizational cybersecurity strategies. However, with ever-shifting regulatory landscapes, staying compliant becomes a moving target. RAG's ability to source real-time data ensures that compliance teams always have access to the latest policy changes, guidelines, and best practices. This not only facilitates adherence to current standards but also anticipates future shifts, assists with audits, and ensures that organizations remain ahead of the compliance curve. Fusing a RAG architecture with platforms like Slack amplifies its practical utility. Slack, known for its real-time communication prowess, seamlessly evolves into more than just a messaging platform in this context. Cybersecurity analysts can pose intricate queries within Slack and, almost instantaneously, receive comprehensive feedback powered by the harmonious interplay of RAG and Gen AI. This integration effectively transforms Slack into an AI-augmented chatbot-like assistant for cybersecurity professionals, always ready to provide informed insights on-demand, making it an indispensable ally in the ever-evolving cyber battlefield. Navigating the vast landscape of cybersecurity, analysts often encounter unfamiliar terminologies and techniques., analysts require tools that not only detect or inform them of threats, like CISA (U.S Cybersecurity Infrastructure Security Agency) Advisories, but also interpret and communicate them effectively. Consider a junior cybersecurity analyst named Alex, who comes across the term "Kerberoasting" while reviewing a network log. Unfamiliar with its intricacies, Alex turns to Slack to pose a query: "chat explain is Kerberoasting, using CISA." Almost instantaneously, Slack, powered by the harmonious interplay of RAG and Gen AI, provides a detailed response, cross-referencing a recent cyber advisory on the technique. It explains how attackers can exploit the Kerberos Ticket Granting Service to decipher service account passwords, potentially compromising a network. In this dynamic realm of cybersecurity, the blend of RAG and Generative AI represents more than just a technological leap. It embodies a paradigm shift, promising a future where human expertise and AI-driven precision join forces. As cyber threats continue their relentless advance, this synergy ensures that defenders are equipped with an arsenal that's not just reactive, but also profoundly insightful. No longer should analysts be submerged in a deluge of data without direction. Instead, they should be empowered, to discern, act, and preempt with unparalleled clarity and confidence. By harmoniously intertwining human discernment with AI capabilities, we should chart a path towards a future where cybersecurity is not just about defense, but about achieving a strategic advantage, paving the way for a safer, informed and a more secure digital horizon.

Keywords: cybersecurity, gen AI, retrieval augmented generation, cybersecurity defense strategies

Procedia PDF Downloads 49
2896 Electromagnetic Radiation Generation by Two-Color Sinusoidal Laser Pulses Propagating in Plasma

Authors: Nirmal Kumar Verma, Pallavi Jha

Abstract:

Generation of the electromagnetic radiation oscillating at the frequencies in the terahertz range by propagation of two-color laser pulses in plasma is an active area of research due to its potential applications in various areas, including security screening, material characterization, and spectroscopic techniques. Due to nonionizing nature and the ability to penetrate several millimeters, THz radiation is suitable for diagnosis of cancerous cells. Traditional THz emitters like optically active crystals, when irradiated with high power laser radiation, are subject to material breakdown and hence low conversion efficiencies. This problem is not encountered in laser-plasma based THz radiation sources. The present paper is devoted to the study of the enhanced electromagnetic radiation generation by propagation of two-color, linearly polarized laser pulses through the magnetized plasma. The two lasers pulse orthogonally polarized are co-propagating along the same direction. The direction of the external magnetic field is such that one of the two laser pulses propagates in the ordinary mode, while the other pulse propagates in the extraordinary mode through the homogeneous plasma. A transverse electromagnetic wave with frequency in the THz range is generated due to the presence of the static magnetic field. It is observed that larger amplitude terahertz can be generated by mixing of ordinary and extraordinary modes of two-color laser pulses as compared with a single laser pulse propagating in the extraordinary mode.

Keywords: two-color laser pulses, electromagnetic radiation, magnetized plasma, ordinary and extraordinary modes

Procedia PDF Downloads 258
2895 A Characterization of Skew Cyclic Code with Complementary Dual

Authors: Eusebio Jr. Lina, Ederlina Nocon

Abstract:

Cyclic codes are a fundamental subclass of linear codes that enjoy a very interesting algebraic structure. The class of skew cyclic codes (or θ-cyclic codes) is a generalization of the notion of cyclic codes. This a very large class of linear codes which can be used to systematically search for codes with good properties. A linear code with complementary dual (LCD code) is a linear code C satisfying C ∩ C^⊥ = {0}. This subclass of linear codes provides an optimum linear coding solution for a two-user binary adder channel and plays an important role in countermeasures to passive and active side-channel analyses on embedded cryptosystems. This paper aims to identify LCD codes from the class of skew cyclic codes. Let F_q be a finite field of order q, and θ be an automorphism of F_q. Some conditions for a skew cyclic code to be LCD were given. To this end, the properties of a noncommutative skew polynomial ring F_q[x, θ] of automorphism type were revisited, and the algebraic structure of skew cyclic code using its skew polynomial representation was examined. Using the result that skew cyclic codes are left ideals of the ring F_q[x, θ]/〈x^n-1〉, a characterization of a skew cyclic LCD code of length n was derived. A necessary condition for a skew cyclic code to be LCD was also given.

Keywords: LCD cyclic codes, skew cyclic LCD codes, skew cyclic complementary dual codes, theta-cyclic codes with complementary duals

Procedia PDF Downloads 305
2894 Performance Analysis and Comparison of Various 1-D and 2-D Prime Codes for OCDMA Systems

Authors: Gurjit Kaur, Shashank Johri, Arpit Mehrotra

Abstract:

In this paper we have analyzed and compared the performance of various coding schemes. The basic ID prime sequence codes are unique in only dimension i.e. time slots whereas 2D coding techniques are not unique by their time slots but with their wavelengths also. In this research we have evaluated and compared the performance of 1D and 2D coding techniques constructed using prime sequence coding pattern for OCDMA system on a single platform. Results shows that 1D Extended Prime Code (EPC) can support more number of active users compared to other codes but at the expense of larger code length which further increases the complexity of the code. Modified Prime Code (MPC) supports lesser number of active users at λc=2 but it has a lesser code length as compared to 1D prime code. Analysis shows that 2D prime code supports lesser number of active users than 1D codes but they are having large code family and are the most secure codes compared to other codes. The performance of all these codes is analyzed on basis of number of active users supported at a Bit Error Rate (BER) of 10-9.

Keywords: CDMA, OCDMA, BER, OOC, PC, EPC, MPC, 2-D PC/PC, λc, λa

Procedia PDF Downloads 479
2893 The Effect of the 2015 Revision to the Corporate Governance Code on Japanese Listed Firms

Authors: Tomotaka Yanagida

Abstract:

The Corporate Governance Code, revised in 2015, requires firms listed within the first and second sections of Japan’s Tokyo stock exchange to select two or more independent outside directors (the Corporate Governance Code4-8). Therefore, Japanese listed firms must do this or explain the reason why they are not able to do so. This study investigates how the Corporate Governance Code affects Japanese listed firms. We find that the Corporate Governance Code increases the ratio of outside directors by nearly 8.8% for a sample of Japanese firms comprising nearly 4,200 firm-year observations from 2014 to 2015 using a difference-in-differences approach. This implies that they felt it would have been difficult to explain why it was not appropriate to have an outside director at the annual shareholders' meeting. Moreover, this suggests that they appoint outside directors as defined by the Corporate Governance Code, but maintain board size. This situation shows that compliance in Japan may simply be 'window dressing,' that is, more form than substance.

Keywords: board structure, comply or explain, corporate governance code, soft law

Procedia PDF Downloads 144
2892 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code switching literature reveals that mostly code switching has been studied in classroom in learning and teaching context while code switching outside classroom in settings such as café, hostel and so on have been the least explored areas. Current research investigated the reasons for code switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different class room situations. In Pakistani classrooms where Multilingual are in abundance i.e. they can speak two or more than two languages at the same time, the code switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the class rooms. This phenomenon has not been explored in the Sialkot’s teaching context. In Sialkot private educational institutes does not encourage code-switching whereas the public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code switching by taking its users in consideration. Survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, bilingual context, L1, L2

Procedia PDF Downloads 22
2891 Primary Cryptococcal Pneumonia in an HIV Positive Filipino Patient

Authors: Mark Andrew Tu, Raymond Olazo, Cybele Abad

Abstract:

Cryptococcosis is an invasive infection most commonly found in patients who are immuno compromised. However, patients with this infection usually present with meningitis and rarely pulmonary infection in isolation. We present a case of a Filipino HIV patient who developed cryptococcal pneumonia without meningitis.

Keywords: Cryptococcal Pneumonia, HIV, Filipino, immune system

Procedia PDF Downloads 415
2890 Code Embedding for Software Vulnerability Discovery Based on Semantic Information

Authors: Joseph Gear, Yue Xu, Ernest Foo, Praveen Gauravaran, Zahra Jadidi, Leonie Simpson

Abstract:

Deep learning methods have been seeing an increasing application to the long-standing security research goal of automatic vulnerability detection for source code. Attention, however, must still be paid to the task of producing vector representations for source code (code embeddings) as input for these deep learning models. Graphical representations of code, most predominantly Abstract Syntax Trees and Code Property Graphs, have received some use in this task of late; however, for very large graphs representing very large code snip- pets, learning becomes prohibitively computationally expensive. This expense may be reduced by intelligently pruning this input to only vulnerability-relevant information; however, little research in this area has been performed. Additionally, most existing work comprehends code based solely on the structure of the graph at the expense of the information contained by the node in the graph. This paper proposes Semantic-enhanced Code Embedding for Vulnerability Discovery (SCEVD), a deep learning model which uses semantic-based feature selection for its vulnerability classification model. It uses information from the nodes as well as the structure of the code graph in order to select features which are most indicative of the presence or absence of vulnerabilities. This model is implemented and experimentally tested using the SARD Juliet vulnerability test suite to determine its efficacy. It is able to improve on existing code graph feature selection methods, as demonstrated by its improved ability to discover vulnerabilities.

Keywords: code representation, deep learning, source code semantics, vulnerability discovery

Procedia PDF Downloads 128
2889 A Sociolinguistic Investigation of Code-Switching Practices of ESL Students Outside EFL Classrooms

Authors: Shehroz Mukhtar, Maqsood Ahmed, Abdullah Mukhtar, Choudhry Shahid, Waqar Javaid

Abstract:

Code switching is a common phenomenon, generally observed in multilingual communities across the globe. A critical look at code-switching literature reveals that mostly code-switching has been studied in the classrooms in learning and teaching contexts, while code-switching outside the classroom in settings such as café, hostels and so on has been the least explored areas. The current research investigated the reasons for code-switching in the interactive practices of students and their perceptions regarding the same outside the classroom settings. This paper is the study of the common practice that prevails in the Universities of Sialkot that bilinguals mix two languages when they speak in different classroom situations. In Pakistani classrooms where Multilingual is in abundance, i.e. they can speak two or more two languages at the same time, code-switching or language combination is very common. The teachers of Sialkot switch from one language to another consciously or unconsciously while teaching English in the classrooms. This phenomenon has not been explored in Sialkot’s teaching context. In Sialkot, private educational institutes do not encourage code-switching, whereas public or government institutes use it frequently. The crux of this research is to investigate and identify the importance of code-switching by taking its users into consideration. The survey research method and survey questionnaire will be used to get exact data from teachers and students. We will try to highlight the functions and importance of code switching in foreign language classrooms of Sialkot and will explore why this trend is emerging in Sialkot.

Keywords: code switching, foreign language classrooms, bilingual context, use of L1, importance of L2.

Procedia PDF Downloads 22
2888 Code – Switching in a Flipped Classroom for Foreign Students

Authors: E. Tutova, Y. Ebzeeva, L. Gishkaeva, Y.Smirnova, N. Dubinina

Abstract:

We have been working with students from different countries and found it crucial to switch the languages to explain something. Whether it is Russian, or Chinese, explaining in a different language plays an important role for students’ cognitive abilities. In this work we are going to explore how code switching may impact the student’s perception of information. Code-switching is a tool defined by linguists as a switch from one language to another for convenience, explanation of terms unavailable in an initial language or sometimes prestige. In our case, we are going to consider code-switching from the function of convenience. As a rule, students who come to study Russian in a language environment, lack many skills in speaking the language. Thus, it is made harder to explain the rules for them of another language, which is English. That is why switching between English, Russian and Mandarin is crucial for their better understanding. In this work we are going to explore the code-switching as a tool which can help a teacher in a flipped classroom.

Keywords: bilingualism, psychological linguistics, code-switching, social linguistics

Procedia PDF Downloads 47
2887 Using Social Network Analysis for Cyber Threat Intelligence

Authors: Vasileios Anastopoulos

Abstract:

Cyber threat intelligence assists organizations in understanding the threats they face and helps them make educated decisions on preparing their defenses. Sharing of threat intelligence and threat information is increasingly leveraged by organizations and enterprises, and various software solutions are already available, with the open-source malware information sharing platform (MISP) being a popular one. In this work, a methodology for the production of cyber threat intelligence using the threat information stored in MISP is proposed. The methodology leverages the discipline of social network analysis and the diamond model, a model used for intrusion analysis, to produce cyber threat intelligence. The workings are demonstrated with a case study on a production MISP instance of a real organization. The paper concluded with a discussion on the proposed methodology and possible directions for further research.

Keywords: cyber threat intelligence, diamond model, malware information sharing platform, social network analysis

Procedia PDF Downloads 126
2886 Soil Transmitted Helminth Infection and Associated Risk Factors among School Children in a Selected Barangay in the Philippines

Authors: Gil Soriano, Aubreyrose Casilang

Abstract:

Soil-transmitted helminth infection remains to be one of the leading public health problem worldwide, which is common in the rural developing regions especially among children. This study aimed to detect the presence of soil transmitted helminths among children and its associated transmission factors. Descriptive cross sectional research was the design used in the study and questionnaires were administered. Stool samples were collected among the samples (n=108) and were analyzed using kato thick method. Results showed that 61 out of 108 respondents are infected by soil transmitted helminth infection with A. lumbricoides the highest, followed by hookworm and T. trichuria. Parent's educational attainment, hand washing practices, and water sources were found to be associated with presence of Soil Transmitted Helminth infection.

Keywords: associated risk factors, barangay, school children, soil transmitted helminth infection

Procedia PDF Downloads 176
2885 Two Strain Dengue Dynamics Incorporating Temporary Cross Immunity with ADE Effect

Authors: Sunita Gakkhar, Arti Mishra

Abstract:

In this paper, a nonlinear host vector model has been proposed and analyzed for the two strain dengue dynamics incorporating ADE effect. The model considers that the asymptomatic infected people are more responsible for secondary infection than that of symptomatic ones and differentiates between them. The existence conditions are obtained for various equilibrium points. Basic reproduction number has been computed and analyzed to explore the effect of secondary infection enhancement parameter on dengue infection. Stability analyses of various equilibrium states have been performed. Numerical simulation has been done for the stability of endemic state.

Keywords: dengue, ade, stability, threshold, asymptomatic, infection

Procedia PDF Downloads 399
2884 Antiviral Activity of Interleukin-11 in Response to Porcine Epidemic Diarrhea Virus Infection

Authors: Li Yuchen, Wu Qingxin, Jin Yuxing, Yang Qian

Abstract:

Interleukin-11 (IL-11), a well-known anti-inflammatory factor, helps to protect against intestinal epithelium damage caused by physical or chemical factors. However, little is known about the role of IL-11 during viral infection. Herein, high mRNA and protein levels of IL-11 were found in epithelial cells and jejunum of piglets during porcine epidemic diarrhea virus (PEDV) infection, and IL-11 expression was positively correlated with the level of viral infection. Pretreatment with recombinant porcine IL-11 (pIL-11) suppressed PEDV replication in Vero E6 cells, while IL-11 knockdown promoted viral infection. Furthermore, pIL-11 inhibited viral infection by preventing PEDV-mediated apoptosis of cells through activating the IL-11/STAT3 signal pathway. Conversely, application of a STAT3 phosphorylation inhibitor significantly antagonized the anti-apoptosis function of pIL-11 and counteracted its inhibition of PEDV. Our data suggested that that IL-11 is a novel PEDV-inducible cytokine, and its production enhances the anti-apoptosis ability of epithelial cells against PEDV infection. The potential uses of IL-11 as a novel therapeutic against devastating viral diarrhea in piglets deserves more attention and study.

Keywords: Interleukin-11, Porcine epidemic diarrhea virus, STAT3, anti-apoptosis

Procedia PDF Downloads 107
2883 Optimization of Steel Moment Frame Structures Using Genetic Algorithm

Authors: Mohammad Befkin, Alireza Momtaz

Abstract:

Structural design is the challenging aspect of every project due to limitations in dimensions, functionality of the structure, and more importantly, the allocated budget for construction. This research study aims to investigate the optimized design for three steel moment frame buildings with different number of stories using genetic algorithm code. The number and length of spans, and height of each floor were constant in all three buildings. The design of structures are carried out according to AISC code within the provisions of plastic design with allowable stress values. Genetic code for optimization is produced using MATLAB program, while buildings modeled in Opensees program and connected to the MATLAB code to perform iterations in optimization steps. In the end designs resulted from genetic algorithm code were compared with the analysis of buildings in ETABS program. The results demonstrated that suggested structural elements by the code utilize their full capacity, indicating the desirable efficiency of produced code.

Keywords: genetic algorithm, structural analysis, steel moment frame, structural design

Procedia PDF Downloads 83
2882 Colour Quick Response Code with High Damage Resistance Capability

Authors: Minh Nguyen

Abstract:

Today, QR or Quick Response Codes are prevalent, and mobile/smart devices can efficiently read and understand them. Therefore, we can see their appearance in many areas, such as storing web pages/websites, business phone numbers, redirecting to an app download, business location, social media. The popularity of the QR Code is mainly because of its many advantages, such as it can hold a good amount of information, is small, easy to scan and read by a general RGB camera, and it can still work with some damages on its surface. However, there are still some issues. For instance, some areas needed to be kept untouched for its successful decode (e.g., the “Finder Patterns,” the “Quiet Zone,” etc.), the capability of built-in auto-correction is not robust enough, and it is not flexible enough for many application such as Augment Reality (AR). We proposed a new Colour Quick Response Code that has several advantages over the original ones: (1) there is no untouchable area, (2) it allows up to 40% of the entire code area to be damaged, (3) it is more beneficial for Augmented Reality applications, and (4) it is back-compatible and readable by available QR Code scanners such as Pyzbar. From our experience, our Colour Quick Response Code is significantly more flexible on damage compared to the original QR Code. Our code is believed to be suitable in situations where standard 2D Barcodes fail to work, such as curved and shiny surfaces, for instance, medical blood test sample tubes and syringes.

Keywords: QR code, computer vision, image processing, 2D barcode

Procedia PDF Downloads 91
2881 Hepatitis B Prevalence in Institutionalized Intellectually Disabled Children

Authors: Maryam Vaezjalali, Foad Davoodbeglou, Mehrnaz Mesdaghi, Hossein Goudarzi, Fariba Shojaei, Hourieh Aram

Abstract:

Introduction: Hepatitis B virus (HBV) infection causes chronic infection in human population, with high mortality. Some people are more susceptible to this infection. One of the high risk communities is mentally retarded children, who are institutionalized. Special conditions in these centers predispose children for HBV infection and transmission to healthy people. In this study our objective was to determine the prevalence of HBV infection among institutionalized mentally retarded children and study its associated risk factors. Materials and methods: In this study, 250 mentally retarded children (younger than 14 years old) were included. They were living in 5 nursing institutions, located in different parts of Tehran. HBsAg was measured in the sera of these patients by ELISA method. Results: Among 250 children, 20 children (8%) were HBsAg positive. HBV infection in girls was more than boys (11% to 5.6%). Among the types of mental retardation, children with cerebral palsy had the highest positive result for HBsAg. The most HBV infection (28.5%) was seen in children with longest duration of being institutionalized (10 to 11 years). Vaccinated children were more HBsAg positive (8.7%) than non-vaccinated children (5.3%). However, no significant relationship was observed between any of these factors and HBsAg positivity. Conclusion: Despite improvement of people’s health condition and implementation of HBV vaccination, the prevalence of HBV infection is high in institutionalized mentally retarded children, which highlights the need for active measures to reduce this infection among this high risk population.

Keywords: hepatitis B virus, HBV vaccine, intellectually disabled children, mentally retarded

Procedia PDF Downloads 445
2880 Infection Profile of Patients Undergoing Autologous Bone Marrow Transplantation in Tabriz, Iran

Authors: Naser Shagerdi Esmaeli, Mohsen Hamidpour

Abstract:

Background and Objective: Hematopoietic stem cell transplantation (HSCT) has been widely used for treating oncological and hematological diseases. Although HSCT has helped to improve patient survival, the risk of developing an infection during hospitalization is an important cause of morbidity and mortality. This study aimed to analyze the infection profile during hospitalization and the associated risk factors among patients undergoing autologous HSCT at the University Hospital, Shahid Ghazi Tabatabaei Hospital, Tabriz, Iran. Subjects and Methods: This was a cross-sectional study on patients undergoing autologous HSCT at a public university hospital. Methods: Patients with febrile neutropenia between 2015 and 2018 were retrospectively evaluated regarding their infection profile and associated risk factors. This survey included: bacterial culture and blood culture on specific media. Results: Infection occurred in 57.2% of 56 patients with febrile neutropenia. The main source of infection was the central venous catheter (25.9%). Infection was chiefly due to Gram-positive bacteria, although Gram-negative-related infections were more severe and caused a higher death rate. Sex, age, skin color, nutritional status, and underlying disease were not associated with the development of infection. Patients with severe mucositis (Grades III and IV) had a higher infection rate (P < 0.001). Patients who developed pulmonary complications during hospitalization had higher infection rates (P = 0.002). Infection was the main cause of death (57.1%) in the study sample. Conclusion: Strategies aimed at reducing infection-related mortality rates among patients undergoing autologous HSCT are necessary.

Keywords: hematopoietic stem cell, autologous bone marrow transplantation, infection profile, tabriz, Iran

Procedia PDF Downloads 79
2879 Counterfeit Product Detection Using Block Chain

Authors: Sharanya C. H., Pragathi M., Vathsala R. S., Theja K. V., Yashaswini S.

Abstract:

Identifying counterfeit products have become increasingly important in the product manufacturing industries in recent decades. This current ongoing product issue of counterfeiting has an impact on company sales and profits. To address the aforementioned issue, a functional blockchain technology was implemented, which effectively prevents the product from being counterfeited. By utilizing the blockchain technology, consumers are no longer required to rely on third parties to determine the authenticity of the product being purchased. Blockchain is a distributed database that stores data records known as blocks and several databases known as chains across various networks. Counterfeit products are identified using a QR code reader, and the product's QR code is linked to the blockchain management system. It compares the unique code obtained from the customer to the stored unique code to determine whether or not the product is original.

Keywords: blockchain, ethereum, QR code

Procedia PDF Downloads 145
2878 On the Construction of Some Optimal Binary Linear Codes

Authors: Skezeer John B. Paz, Ederlina G. Nocon

Abstract:

Finding an optimal binary linear code is a central problem in coding theory. A binary linear code C = [n, k, d] is called optimal if there is no linear code with higher minimum distance d given the length n and the dimension k. There are bounds giving limits for the minimum distance d of a linear code of fixed length n and dimension k. The lower bound which can be taken by construction process tells that there is a known linear code having this minimum distance. The upper bound is given by theoretic results such as Griesmer bound. One way to find an optimal binary linear code is to make the lower bound of d equal to its higher bound. That is, to construct a binary linear code which achieves the highest possible value of its minimum distance d, given n and k. Some optimal binary linear codes were presented by Andries Brouwer in his published table on bounds of the minimum distance d of binary linear codes for 1 ≤ n ≤ 256 and k ≤ n. This was further improved by Markus Grassl by giving a detailed construction process for each code exhibiting the lower bound. In this paper, we construct new optimal binary linear codes by using some construction processes on existing binary linear codes. Particularly, we developed an algorithm applied to the codes already constructed to extend the list of optimal binary linear codes up to 257 ≤ n ≤ 300 for k ≤ 7.

Keywords: bounds of linear codes, Griesmer bound, construction of linear codes, optimal binary linear codes

Procedia PDF Downloads 719