4,652 research outputs found

    Suggestopedic mobile language learning

    Get PDF
    The use of suggestopedic teaching methods has been shown to be effective in the domain of language learning. Suggestopaedia is a classroom teaching method that employs certain strategies to enable learners to relax in order to enable more effective learning both consciously and subconsciously. The use of mobile technologies to support language learning has also become very useful and popular. This paper proposes the amalgamation of the two approaches to enable a mobile suggestopedic platform and demonstrates empirical evidence linked to the success of this approach on languge learning. The design of a Suggestopedic mobile language learning app is discussed together with different target groups of learners that can benefit from this type of teaching. Design, development and evaluation of this app forms our future work

    The Hoop Conjecture in Spherically Symmetric Spacetimes

    Full text link
    We give general sufficient conditions for the existence of trapped surfaces due to concentration of matter in spherically symmetric initial data sets satisfying the dominant energy condition. These results are novel in that they apply and are meaningful for arbitrary spacelike slices, that is they do not require any auxiliary assumptions such as maximality, time-symmetry, or special extrinsic foliations, and most importantly they can easily be generalized to the nonspherical case once an existence theory for a modified version of the Jang equation is developed. Moreover, our methods also yield positivity and monotonicity properties of the Misner-Sharp energy

    Hom-quantum groups I: quasi-triangular Hom-bialgebras

    Full text link
    We introduce a Hom-type generalization of quantum groups, called quasi-triangular Hom-bialgebras. They are non-associative and non-coassociative analogues of Drinfel'd's quasi-triangular bialgebras, in which the non-(co)associativity is controlled by a twisting map. A family of quasi-triangular Hom-bialgebras can be constructed from any quasi-triangular bialgebra, such as Drinfel'd's quantum enveloping algebras. Each quasi-triangular Hom-bialgebra comes with a solution of the quantum Hom-Yang-Baxter equation, which is a non-associative version of the quantum Yang-Baxter equation. Solutions of the Hom-Yang-Baxter equation can be obtained from modules of suitable quasi-triangular Hom-bialgebras.Comment: 21 page

    Optimal Attack against Cyber-Physical Control Systems with Reactive Attack Mitigation

    Full text link
    This paper studies the performance and resilience of a cyber-physical control system (CPCS) with attack detection and reactive attack mitigation. It addresses the problem of deriving an optimal sequence of false data injection attacks that maximizes the state estimation error of the system. The results provide basic understanding about the limit of the attack impact. The design of the optimal attack is based on a Markov decision process (MDP) formulation, which is solved efficiently using the value iteration method. Using the proposed framework, we quantify the effect of false positives and mis-detections on the system performance, which can help the joint design of the attack detection and mitigation. To demonstrate the use of the proposed framework in a real-world CPCS, we consider the voltage control system of power grids, and run extensive simulations using PowerWorld, a high-fidelity power system simulator, to validate our analysis. The results show that by carefully designing the attack sequence using our proposed approach, the attacker can cause a large deviation of the bus voltages from the desired setpoint. Further, the results verify the optimality of the derived attack sequence and show that, to cause maximum impact, the attacker must carefully craft his attack to strike a balance between the attack magnitude and stealthiness, due to the simultaneous presence of attack detection and mitigation

    Modeling and Detecting False Data Injection Attacks against Railway Traction Power Systems

    Get PDF
    Modern urban railways extensively use computerized sensing and control technologies to achieve safe, reliable, and well-timed operations. However, the use of these technologies may provide a convenient leverage to cyber-attackers who have bypassed the air gaps and aim at causing safety incidents and service disruptions. In this paper, we study false data injection (FDI) attacks against railways' traction power systems (TPSes). Specifically, we analyze two types of FDI attacks on the train-borne voltage, current, and position sensor measurements - which we call efficiency attack and safety attack -- that (i) maximize the system's total power consumption and (ii) mislead trains' local voltages to exceed given safety-critical thresholds, respectively. To counteract, we develop a global attack detection (GAD) system that serializes a bad data detector and a novel secondary attack detector designed based on unique TPS characteristics. With intact position data of trains, our detection system can effectively detect the FDI attacks on trains' voltage and current measurements even if the attacker has full and accurate knowledge of the TPS, attack detection, and real-time system state. In particular, the GAD system features an adaptive mechanism that ensures low false positive and negative rates in detecting the attacks under noisy system measurements. Extensive simulations driven by realistic running profiles of trains verify that a TPS setup is vulnerable to the FDI attacks, but these attacks can be detected effectively by the proposed GAD while ensuring a low false positive rate.Comment: IEEE/IFIP DSN-2016 and ACM Trans. on Cyber-Physical System
    • …
    corecore