31 research outputs found

    Patterns of language choice and use among undergraduates of different ethnic groups in a malaysian public university

    Get PDF
    Language choice and use are sociolinguistic phenomena. The choice and use of language refers to selecting languages for different purposes in different contexts. In a bi-/multilingual society, these phenomena are very important issues. Fishman’s (1972) domain analysis is used to investigate the choice of language in a multilingual context in this study. The analysis answers questions directed at ‘who speaks what language to whom, when, where and even why’. In answering these questions, a host of variables come into play. These variables are language planning and policy, language user’s social background, linguistic profile, profession, educational background, and social domains. The objectives of this study were to identify UPM undergraduates’ patterns of language choice and use in the domains of family, friendship, neighborhood, transaction, education, office, religion and media; and to investigate the effect of ethnicity, gender, discipline of study and proficiency on their patterns of language choice and use. Data for the study were collected through a questionnaire survey administered to 300 UPM undergraduates. The analysis of data was done both quantitatively and qualitatively. SPSS was used to get percentage values and frequencies through descriptive statistics and correlations between variables were obtained through Chi-square tests. The strength of relationship was measured using Contingency Coefficient and the relationship was interpreted with reference to Guilford’s rule of thumb. Findings of the study indicate that the informants chose and used different languages in different domains with consideration to the status of the domains. They were found to use ethnic languages in those domains which were more informal and intimate such as family, religion and media. Bahasa Melayu and English were chosen in more formal domains such as education and office. In the patterns of language choice among the informants, the study found the influence of ethnicity and language proficiency in all the domains investigated. The discipline of study was also found to influence language choice partially, while the influence of gender was not found. In short, this study found variation of choice of languages to be constrained and influenced by different factors

    Using Vibrational Infrared Biomolecular Spectroscopy to Detect Heat-Induced Changes of Molecular Structure in Relation to Nutrient Availability of Prairie Whole Oat Grains on a Molecular Basis

    Get PDF
    BACKGROUND: To our knowledge, there is little study on the interaction between nutrient availability and molecular structure changes induced by different processing methods in dairy cattle. The objective of this study was to investigate the effect of heat processing methods on interaction between nutrient availability and molecular structure in terms of functional groups that are related to protein and starch inherent structure of oat grains with two continued years and three replication of each year. METHOD: The oat grains were kept as raw (control) or heated in an air-draft oven (dry roasting: DO) at 120 °C for 60 min and under microwave irradiation (MIO) for 6 min. The molecular structure features were revealed by vibrational infrared molecular spectroscopy. RESULTS: The results showed that rumen degradability of dry matter, protein and starch was significantly lower (P <0.05) for MIO compared to control and DO treatments. A higher protein α-helix to β-sheet and a lower amide I to starch area ratio were observed for MIO compared to DO and/or raw treatment. A negative correlation (−0.99, P < 0.01) was observed between α-helix or amide I to starch area ratio and dry matter. A positive correlation (0.99, P < 0.01) was found between protein β-sheet and crude protein. CONCLUSION: The results reveal that oat grains are more sensitive to microwave irradiation than dry heating in terms of protein and starch molecular profile and nutrient availability in ruminants

    Grover on Present: Quantum Resource Estimation

    Get PDF
    In this work, we present cost analysis for mounting Grover\u27s key search on Present block cipher. Reversible quantum circuits for Present are designed taking into consideration several decompositions of toffoli gate. This designs are then used to produce Grover oracle for Present and their implementations cost is compared using several metrics. Resource estimation for Grover\u27s search is conducted by employing these Grover oracles. Finally, gate cost for these designs are estimated considering NIST\u27s depth restrictions

    Key Committing Security Analysis of AEGIS

    Get PDF
    Recently, there has been a surge of interest in the security of authenticated encryption with associated data (AEAD) within the context of key commitment frameworks. Security within this framework ensures that a ciphertext chosen by an adversary does not decrypt to two different sets of key, nonce, and associated data. Despite this increasing interest, the security of several widely deployed AEAD schemes has not been thoroughly examined within this framework. In this work, we assess the key committing security of AEGIS, which emerged as a winner in the Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR). A recent assertion has been made suggesting that there are no known attacks on AEGIS in the key committing settings and AEGIS qualifies as a fully committing AEAD scheme in IETF document. However, contrary to this claim, we propose a novel O(1) attack applicable to all variants of AEGIS. This demonstrates the ability to execute a key committing attack within the FROB game setting, which is known to be one of the most stringent key committing frameworks. This implies that our attacks also hold validity in other, more relaxed frameworks, such as CMT-1, CMT-4, and so forth

    Quantum Attacks on HCTR and its Variants

    Get PDF
    Recently, in Asiacrypt 2019, Bonnetain et. al have shown attacks by quantum adversaries on FX construction and Even-Mansour Cipher without using superposition queries to the encryption oracle. In this work, we use a similar approach to mount new attacks on HCTR and HCH construction. In addition, we mount attacks on HCTR, Tweakable-HCTR and HCH using the superposition queries to the encryption oracle using strategies proposed by Leander and May in Asiacrypt 2017 and Kaplan et. al in Crypto 2016

    What determines the choice of language with friends and neighbors? the case of Malaysian university undergraduates.

    Get PDF
    Bi-/multilingual people exercise choices of language among the languages of their linguistic repertoire for different purposes in different domains. The choice is determined by various factors such as ethnicity, proficiency, attitudes, socio-cultural background, language policy, and in particular, the domain itself.Malaysia being a multilingual country, what languages are chosen with friends and relatives, and what determines the choice constitute the main objectives of this paper.Data for this paper was collected through a questionnaire survey administered to a sample of university undergraduates and analyzed those using SPSS. The findings show that respondents from the major ethnic groups preferred their respective ethnic languages with friends and neighbours of the same ethnic backgrounds but choice of Bahasa Malaysia (BM) among the non-Malays and choice for English among respondents irrespective of ethnicity increase while the interlocutors belong to other ethnic backgrounds. Ethnicity, proficiency and domain of use were found to be contributing factors of language choice with friends and neighbours in Malaysia

    What languages are chosen in Malaysian family domain? The case of Malay, Chinese and Indian undergraduates.

    Get PDF
    People in multilingual societies choose and use language depending on the contexts, activities, role relationships, gender and other ethno-linguistic background. Malaysia being a multilingual and multicultural country, what languages are chosen in the family domain constitutes the focus and objectives of this paper. The patterns of language choice among the university undergraduates of Malay, Chinese and Indian ethnic groups in the family domain were obtained through a questionnaire survey administered in November and December, 2006 at the University Putra Malaysia and the data were analyzed using SPSS. It is found that ethnic languages were found to be preferred in the family domain. Bahasa, Melayu and English were also reported to be chosen in this domain which could be attributed to domain allocation of language use and role-relationships among the family members. Ethnicity and proficiency were also found to play important role in the choice of language

    DEEPAND: In-Depth Modeling of Correlated AND Gates for NLFSR-based Lightweight Block Ciphers

    Get PDF
    Automated cryptanalysis has taken center stage in the arena of cryptanalysis since the pioneering work by Mouha et al. which showcased the power of Mixed Integer Linear Programming (MILP) in solving cryptanalysis problems that otherwise, required significant effort. Since its inception, research in this area has moved in primarily two directions. One is to model more and more classical cryptanalysis tools as optimization problems to leverage the ease provided by state-of-the-art solvers. The other direction is to improve existing models to make them more efficient and/or accurate. The current work is an attempt to contribute to the latter. In this work, a general model referred to as DEEPAND has been devised to capture the correlation between AND gates in NLFSR-based lightweight block ciphers. DEEPAND builds upon and generalizes the idea of joint propagation of differences through AND gates captured using refined MILP modeling of TinyJAMBU by Saha et al. in FSE 2020. The proposed model has been applied to TinyJAMBU and KATAN and can detect correlations that were missed by earlier models. This leads to more accurate differential bounds for both ciphers. In particular, a 384-round (full-round as per earlier specification) Type-IV trail is found for TinyJAMBU with 14 active AND gates using the new model, while the refined model reported this figure to be 19. This also reaffirms the decision of the designers to increase the number of rounds from 384 to 640. Moreover, the model succeeds in searching a full round Type-IV trail of TinyJAMBU keyed permutation P1024\mathcal{P}_{1024} with probability 2108(2128)2^{-108} (\gg 2^{-128}). This reveals the non-random properties of P1024\mathcal{P}_{1024} thereby showing it to be non-ideal. Hence it cannot be expected to provide the same security levels as robust block ciphers. Further, the provable security of the TinyJAMBU AEAD scheme should be carefully revisited. Similarly, for KATAN 32, DEEPAND modeling improves the 42-round trail with 2112^{-11} probability to 272^{-7}. Also, for KATAN 48 and KATAN 64, this model respectively improves the designer\u27s claimed 43-round and 37-round trail probabilities. Moreover, in the related key setting, the DEEPAND model can make a better 140-round boomerang distinguisher (for both the data and time complexity) compared to the previous boomerang attack by Isobe et al. in ACISP 2013. In summary, DEEPAND seems to capture the underlying correlation better when multiple AND gates are at play and can be adapted to other classes of ciphers as well
    corecore