WorldWideScience

Sample records for contextuality offers security

  1. Recommendations from Friends Anytime and Anywhere: Toward a Model of Contextual Offer and Consumption Values

    Science.gov (United States)

    Shen, Xiao-Liang; Wang, Nan

    2013-01-01

    Abstract The ubiquity and portability of mobile devices provide additional opportunities for information retrieval. People can easily access mobile applications anytime and anywhere when they need to acquire specific context-aware recommendations (contextual offer) from their friends. This study, thus, represents an initial attempt to understand users' acceptance of a mobile-based social reviews platform, where recommendations from friends can be obtained with mobile devices. Based on the consumption value theory, a theoretical model is proposed and empirically examined using survey data from 218 mobile users. The findings demonstrate that contextual offers based on users' profiles, access time, and geographic positions significantly predict their value perceptions (utilitarian, hedonic, and social), which, in turn, affect their intention to use a mobile social reviews platform. This study is also believed to provide some useful insights to both research and practice. PMID:23530548

  2. 12 CFR 563g.16 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.16 Delayed or continuous offering and sale of securities. Any offer or...

  3. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Special offers for our members       Go Sport in Val Thoiry is offering 15% discount on all purchases made in the shop upon presentation of the Staff Association membership card (excluding promotions, sale items and bargain corner, and excluding purchases using Go Sport  and Kadéos gift cards. Only one discount can be applied to each purchase).  

  4. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    L'Occitane en Provence proposes the following offer: 10 % discount on all products in all L'Occitane shops in Metropolitan France upon presentation of your Staff Association membership card and a valid ID. This offer is valid only for one person, is non-transferable and cannot be combined with other promotions.

  5. International cooperation for food and nutrition security: Systematization of the participatory, contextualized, and intersectoral educational practices

    Directory of Open Access Journals (Sweden)

    Luciene BURLANDY

    Full Text Available ABSTRACT The present study systematized the experience gained with the project Construindo capacidades em segurança alimentar e nutricional no Brasil, Canadá e Angola (2004-2010, Building food and nutrition security skills in Brazil, Canada, and Angola, whose objective was to qualify actions that promote food and nutrition security in the three countries using different educational practices. The activities were organized in the following subprojects: (a online distance learning courses; (b workshops to train managers, government technicians, representatives of civil society organizations, and social subjects who offered to act as a link between communities; and (c local pilot projects. The present study reports this experience. The educational practices implemented in the municipalities of Araçuaí (MG, Juazeiro (BA, and Fortaleza (CE were analyzed based on systematized information in the project reports and activity records (texts and photographs. The analytical reference was based on the concept of food and nutrition education, guided by the fundamentals of Popular Education and Paulo Freire; on the concept of food and nutrition security; and on the following analytical dimensions: participation, contextualization of educational practices, and intersectoriality. The results evidenced how educational practices contributed to the construction of shared concepts of food and nutrition security from an intersectoral and participatory perspective that values the peculiarities of diet in different socioeconomic and cultural contexts, and highlights daily situations and local traditions. They also expose the limits and potentialities of an experience of this magnitude, conducted from an interdisciplinarity perspective and using participatory methods.

  6. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    New offers : Discover the theater Galpon in Geneva. The Staff Association is happy to offer to its members a discount of 8.00 CHF on a full-price ticket (tickets of 15.00 CHF instead of 22.00 CHF) so do not hesitate anymore (mandatory reservation by phone + 4122 321  21 76 as tickets are quickly sold out!). For further information, please see our website: http://staff-association.web.cern.ch/fr/content/th%C3%A9%C3%A2tre-du-galpon  

  7. Offer

    CERN Multimedia

    Staff Association

    2016-01-01

    CERN was selected and participated in the ranking "Best Employers" organized by the magazine Bilan. To thank CERN for its collaboration, the magazine offers a reduction to the subscription fee for all employed members of personnel. 25% off the annual subscription: CHF 149.25 instead of CHF 199 .— The subscription includes the magazine delivered to your home for a year, every other Wednesday, as well as special editions and access to the e-paper. To benefit from this offer, simply fill out the form provided for this purpose. To get the form, please contact the secretariat of the Staff Association (Staff.Association@cern.ch).

  8. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    SPECIAL OFFER FOR OUR MEMBERS Prices Spring and Summer 2013 Day ticket: same price weekends, public holidays and weekdays: Children from 5 to 15 years old: 30 CHF instead of 39 CHF Adults from 16 years old: 36 CHF instead of 49 CHF Bonus! Free for children under 5 Tickets available at the Staff Association Secretariat.

  9. Offers

    CERN Multimedia

    Association du personnel

    2013-01-01

    SPECIAL OFFER FOR OUR MEMBERS Prices Spring and Summer 2013 Day ticket: same price weekends, public holidays and weekdays: – Children from 5 to 15 years old: 30 CHF instead of 39 CHF – Adults from 16 years old: 36 CHF instead of 49 CHF – Bonus! Free for children under 5 Tickets available at the Staff Association Secretariat.

  10. Offers

    CERN Document Server

    Staff Association

    2015-01-01

    New offer for our members. The Staff Association CERN staff has recently concluded a framework agreement with AXA Insurance Ltd, General-Guisan-Strasse 40, 8401 Winterthur. This contract allows you to benefit from a preferential tariff and conditions for insurances: Motor vehicles for passenger cars and motorcycles of the product line STRADA: 10% discount Household insurance (personal liability and household contents) the product line BOX: 10% discount Travel insurance: 10% discount Buildings: 10% discount Legal protection: 10% discount AXA is number one on the Swiss insurance market. The product range encompasses all non-life insurance such as insurance of persons, property, civil liability, vehicles, credit and travel as well as innovative and comprehensive solutions in the field of occupational benefits insurance for individuals and businesses. Finally, the affiliate AXA-ARAG (legal expenses insurance) completes the offer. Armed with your staff association CERN card, you can always get the off...

  11. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    proposes the following offer: 15% discount for the Staff Association members who enroll their children in summer FUTUREKIDS activities. Extracurricular Activities For Your Children The FUTUREKIDS Geneva Learning Center is open 6 days a week and offers a selection of after-school extracurricular activities for children and teenagers (ages 5 to 16). In addition to teaching in its Learning Centers, Futurekids collaborates with many private schools in Suisse Romande (Florimont, Moser, Champittet, Ecole Nouvelle, etc.) and with the Département de l'Instruction Publique (DIP) Genève. Courses and camps are usually in French but English groups can be set up on demand. FUTUREKIDS Computer Camps (during school holidays) FUTUREKIDS Computer Camps are a way of having a great time during vacations while learning something useful, possibly discovering a new hobby or even, why not, a future profession. Our computer camps are at the forefront of technology. Themes are diverse and suit all ...

  12. Offer

    CERN Multimedia

    Staff Association

    2010-01-01

      Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 22th to 29th November 2010

  13. Offer

    CERN Multimedia

    Staff Association

    2011-01-01

      Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 25th to 27th March 2011  

  14. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    SPECIAL OFFER FOR OUR MEMBERS Single tariff Adulte/Enfant Tickets “Zone terrestre” 20 euros instead of 25 euros. Access to Aqualibi: 5 euros instead of 8 euros on presentation of your ticket SA member. Free for children under 3, with limited access to the attractions. More information on our website : http://association.web.cern.ch/association/en/OtherActivities/Walibi.html

  15. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    SPECIAL OFFER FOR OUR MEMBERS Prices Spring and Summer 2012 Half-day ticket: 5 hours, same price weekends, public holidays and weekdays. Children from 5 to 15 years old: 26 CHF instead of 35 CHF Adults from 16 years old: 32 CHF instead of 43 CHF Bonus! Free for children under 5. Aquaparc Les Caraïbes sur Léman 1807 Le Bouveret (VS)

  16. Offer

    CERN Multimedia

    CARLSON WAGONLIT TRAVEL

    2011-01-01

    Special offer   From 14th to 28th February 2011: no CWT service fee! For any new reservation of a holiday package (flight + hotel/apartment) from a catalog “summer 2011” For any additional information our staff is at your disposal from Monday – Friday, from 8h30 to 16h30. Phone number 72763 or 72797 Carlson Wagonlit Tavel, Agence du CERN  

  17. Offers

    CERN Document Server

    Staff Association

    2011-01-01

    Banque cantonale de Genève (BCGE) The BCGE Business partner programme devised for members of the CERN Staff Association offers personalized banking solutions with preferential conditions. The advantages are linked to salary accounts (free account keeping, internet banking, free Maestro and credit cards, etc.), mortgage lending, retirement planning, investment, credit, etc. The details of the programme and the preferential conditions are available on our website: http://association.web.cern.ch/association/en/OtherActivities/BCGE.html.  

  18. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    Special offer for members of the Staff Association and their families 10 % reduction on all products in the Sephora shop (sells perfume, beauty products etc.) in Val Thoiry all year round. Plus 20 % reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * next “vente privée” from 21st November to 1st December 2012 Please contact the Staff Association Secretariat to get the discount voucher.

  19. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 21st to 26th May 2012 Please contact the Staff Association Secretariat to get the discount voucher  

  20. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    The « Théâtre de Carouge » offers a 5.- CHF discount for all shows (30.- CHF instead of 35.- CHF) and for the season tickets "Premières représentations" (132.- CHF instead of 162.- CHF) and "Classique" (150.- CHF instead of 180.- CHF). Please send your reservation by email to smills@tcag.ch via your professional email address. Please indicate the date of your reservation, your name and firstname and your telephone number A confirmation will be sent by email. Your membership card will be asked when you collect the tickets. More information on www.tcag.ch and www.tcag.ch/blog/

  1. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Special offer for members of the Staff Association and their families 10 % reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20 % reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 11th to 23rd November 2013 Please contact the Staff Association Secretariat to get the discount voucher.  

  2. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    Special offer for members of the Staff Association and their families 10 % reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Simply present your Staff Association membership card when you make your purchase. Plus 20 % reduction during their “vente privée”* three or four times a year. * Next “vente privée” from 24th September to 6th November 2014 Please contact the Staff Association Secretariat to get the discount voucher.  

  3. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    Passeport Gourmand   Are you dying for a nice meal? The “Passeport Gourmand” offers discounted prices to the members of the Staff Association (available until April 2015 and on sale in the Staff Association Secretariat): Passeport gourmand Ain / Savoie/ Haute Savoie: 56 CHF instead of 79 CHF. Passeport gourmand Geneva / neighbouring France:72 CHF instead of 95 CHF. To the members of the Staff Association: Benefit of reduced tickets: CHF 10 (instead of  18 CHF at the desk) on sale to the secretariat of the Staff Association, Building 510-R010 (in front of the Printshop).

  4. Offers

    CERN Multimedia

    Staff Association

    2015-01-01

    New season 2015-2016 The new season was revealed in May, and was warmly welcomed by the press, which is especially enthusiastic about the exceptional arrival of Fanny Ardand in September in the framework of Cassandre show. Discover the programme 2015-2016. The theatre La Comédie proposes different offers to our members Benefit from a reduction of 20 % on a full price ticket during all the season: from 38 CHF to 23 CHF ticket instead of 50 CHF to 30 CHF depending on the show. Buy two seasonal tickets at the price of one (offers valid upon availability, and until 30 september 2015) 2 Cards Libertà for 240 CHF instead of 480 CHF. Cruise freely through the season with 8 perfomances of your choice per season. These cards are transferrable, and can be shared with one or more accompanying persons. 2 Abo Piccolo for 120 CHF instead of 240 CHF. Let yourself be surprised a theatre performance with our discovery seasonal tickets, which includes 4 flagship perfomances for the season. ...

  5. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    At the UN Cultural kiosk (door C6) This offer is meant for international civil servants, members of diplomatic missions as well as official delegates under presentation of their accreditation card. Matthew Lee & 5 musiciens Du Blues, du Boogie, du Rock’n’Roll 28 octobre 2011 à 20h30 Théâtre du Léman Quai du Mont-Blanc 19 Hôtel Kempinski Genève Matthew Lee is an exciting pianist singer combining classic Rock’n’Roll with timeless ballads. He revisits the standards, being alternately Jerry Lee Lewis, Chuck Berry, Little Richards and many others... He is a showman with a soulful voice and displays virtuosity during his piano solos. Simply amazing! 20 % reduction Tickets from 32 to 68 CHF Kiosque Culturel ONU Palais des Nations Porte 6 Avenue de la Paix 8-14 1211 Genève 10 Tél. 022 917 11 11 info@kiosqueonu.ch

  6. Offers

    CERN Multimedia

    Association du personnel

    2010-01-01

    THEATRE FORUM DE MEYRIN 1, place des Cinq-Continents 1217 Meyrin    Special offer for members of the Staff Association: Reduced ticket prices for the play Love is my sin (in English) from 15 to 17 March at 8.30pm http://www.forum-meyrin.ch/main.php?page=119&s=12   First category: 37 CHF instead of 46 CHF Second category (seats towards the sides): 30 CHF instead of 38 CHF Please present your CERN card and your Staff Association membership card at the ticket office. Ticket reservation: tel. 022 989 34 34 (from Monday to Friday 2pm to 6pm) or e-mail : billetterie@forum-meyrin.ch  

  7. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    FUTUREKIDS proposes 15% discount for the Staff Association members who enroll their children in FUTUREKIDS activities. New workshop for 12-15 year olds, on how to develop applications for Android phones. Easter activities calendar Extracurricular Activities For Your Children The FUTUREKIDS Geneva Learning Center is open 6 days a week and offers a selection of after-school extracurricular activities for children and teenagers (ages 5 to 16). In addition to teaching in its Learning Centers, Futurekids collaborates with many private schools in Suisse Romande (Florimont, Moser, Champittet, Ecole Nouvelle, etc.) and with the Département de l'Instruction Publique (DIP) Genève. Courses and camps are usually in French but English groups can be set up on demand. FUTUREKIDS Computer Camps (during school holidays) FUTUREKIDS Computer Camps are a way of having a great time during vacations while learning something useful, possibly discovering a new hobby or even, why not, a fut...

  8. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Do not hesitate to benefit of our offers in our partners: Théâtre de Carouge Discount of 5 CHF for all shows (30 CHF instead of 35 CHF) and on season tickets « first performance » ( 132 CHF instead 162 CHF) and also on « classical » ( 150 CHF instead of 180 CHF) upon presentation of your Staff Association membership card before payment. Théâtre La Comédie de Genève  20% off on tickets (full price – also available for partner): from 24 to 32 CHF a ticket instead of 30 to 40 CHF depending on the shows. 40% off on annual subscriptions (access to the best seats, pick up tickets at the last minute): 200 CHF for 9 shows (about 22 CHF a ticket instead of 30 to 40 CHF. Discounted card: 60 CHF and single price ticket of 16 CHF.

  9. Offer

    CERN Multimedia

    Staff Association

    2015-01-01

    RRP Communication organizes cultural events such as concerts, shows, sporting events. The members of the Staff Association profits from a reduction of 10 CHF per ticket. How to proceed: The ticket reservation is made by mail info@rrp.ch. You need to give the following information: Name of the show, and which date chosen Number of tickets, and category Name and surname Address Telephone number Mention “offer CERN”, and attach a photocopy of your Staff Association member card. After your reservation, you will be sent a copy with a payslip to the address mentioned above. Once paid, the members have the possibility to: pick up their ticket(s) from the cash register the evening of the show (opens 1 hour before the show) by showing their member card; receive the ticket(s) to the address indicated above, by registered mail, subject to an extra cost of 10CHF. Next show : More information at http://www.rrp.ch/

  10. Offer

    CERN Document Server

    Staff Association

    2011-01-01

    DETAILS OF THE AGREEMENT WITH BCGE The BCGE Business partner programme devised for members of the CERN Staff Association offers personalized banking solutions with preferential conditions. The advantages are linked to salary accounts (free account keeping, internet banking, free Maestro and credit cards, etc.), mortgage lending, retirement planning, investment, credit, etc. The details of the programme and the preferential conditions are available on the Staff Association web site and from the secretariat (http://cern.ch/association/en/OtherActivities/BCGE.html). To benefit from these advantages, you will need to fill in the form available on our site, which must then be stamped by the Staff Association as proof that you are a paid-up member.  

  11. Offer

    CERN Multimedia

    Staff Association

    2016-01-01

    The “La Comédie” theatre unveiled its programme for the season 2016–2017 in late May, and it was met with great enthusiasm by the press. Leading names of the European and Swiss theatre scenes, such as director Joël Pommerat who recently won four Molière awards, will make an appearance! We are delighted to share this brand new, rich and varied programme with you. The “La Comédie” theatre has various discounts for our members Buy 2 subscriptions for the price of 1 : 2 cards “Libertà” for CHF 240.- instead of CHF 480.- Cruise freely through the season with an 8-entry card valid for the shows of your choice. These cards are transferable and can be shared with one or more accompanying persons. 2 cards “Piccolo” for CHF 120 instead of CHF 240.- This card lets you discover 4 shows which are suitable for all audiences (offers valid while stock lasts and until October 31, 20...

  12. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * Next “vente privée” from 21st to 26th November 2011 New BCGE Business partner benefits As you may remember thanks to our BCGE business partner agreement you benefit from various advantages such as free annual subscription on your Silver or Gold credit card both for yourself and your partner (joint account). Please be informed that as of October 1st  2011 the below mentioned features will be added to your annual credit card subscription : MasterCard/Visa Silver and Gold: travel cancellation as well as related services such as holiday interruption best guaranteed price Only for Ma...

  13. 17 CFR 230.415 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-04-01

    ... majority-owned subsidiary; or (xi) Shares of common stock which are to be offered and sold on a delayed or... an existing trading market for outstanding shares of the same class at other than a fixed price. (5... and sale of securities. 230.415 Section 230.415 Commodity and Securities Exchanges SECURITIES AND...

  14. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  15. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  16. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  17. CERN to offer secure grid, published in itWorldCanada

    CERN Multimedia

    Broersma, Matthew

    2006-01-01

    CERN, the Geneva-based nuclear physics research center, has launched a collaborative effort with some of the biggest name in IT to tighten up security on its landmark Large Hadron Collider (LHC) project, as well as working on platform virtualization and the interoperability of grid software (1 page)

  18. 17 CFR 230.463 - Report of offering of securities and use of proceeds therefrom.

    Science.gov (United States)

    2010-04-01

    ... effective registration statement for securities to be issued: (1) In a business combination described in Rule 145(a) (§ 230.145(a)); (2) By an issuer which pursuant to a business combination described in Rule 145(a) has succeeded to another issuer that prior to such business combination had a registration...

  19. 17 CFR 230.903 - Offers or sales of securities by the issuer, a distributor, any of their respective affiliates...

    Science.gov (United States)

    2010-04-01

    ... applicable) are denominated in a currency other than U.S. dollars and such securities are neither convertible into U.S. dollar-denominated securities nor linked to U.S. dollars (other than through related currency or interest rate swap transactions that are commercial in nature) in a manner that in effect converts...

  20. 17 CFR 230.504 - Exemption for limited offerings and sales of securities not exceeding $1,000,000.

    Science.gov (United States)

    2010-04-01

    ... require the public filing and delivery to investors of a substantive disclosure document before sale, and... only to “accredited investors” as defined in § 230.501(a). (2) The aggregate offering price for an... § 230.504 fails to meet the limitation on the aggregate offering price, it does not affect the...

  1. On Contextuality.

    Science.gov (United States)

    Thayer-Bacon, Barbara J.

    This exploration of what feminism has to contribute to pragmatism, and vice versa, considers the idea of contextuality through an examination of the role of current pragmatists, such as Cornel West and Richard Rorty, and current feminists, including Charlene Haddock Siegfried, Maxine Greene, and Seyla Benhabib. To set the stage historically for…

  2. Contextual Autism

    DEFF Research Database (Denmark)

    Raahauge, Kirsten Marie

    2009-01-01

    This project deals with the notion of ghost anthropologically and artistic. The contextual autism of ghosting reveals itself as a sensation of in-betweeness in art as well as in everyday life. The ghost is not easily defined; as Jacques Derrida states in Spectres of Marx (1993/1994) about...

  3. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Walibi Rhône-Alpes is open until 31 October. Reduced prices for children and adults at this French attraction park in Les Avenières. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  4. Special offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  5. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. Walibi: reduced prices for children and adults at this French attraction park in Les Avenières. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  6. Contextual sensitivity in scientific reproducibility.

    Science.gov (United States)

    Van Bavel, Jay J; Mende-Siedlecki, Peter; Brady, William J; Reinero, Diego A

    2016-06-07

    In recent years, scientists have paid increasing attention to reproducibility. For example, the Reproducibility Project, a large-scale replication attempt of 100 studies published in top psychology journals found that only 39% could be unambiguously reproduced. There is a growing consensus among scientists that the lack of reproducibility in psychology and other fields stems from various methodological factors, including low statistical power, researcher's degrees of freedom, and an emphasis on publishing surprising positive results. However, there is a contentious debate about the extent to which failures to reproduce certain results might also reflect contextual differences (often termed "hidden moderators") between the original research and the replication attempt. Although psychologists have found extensive evidence that contextual factors alter behavior, some have argued that context is unlikely to influence the results of direct replications precisely because these studies use the same methods as those used in the original research. To help resolve this debate, we recoded the 100 original studies from the Reproducibility Project on the extent to which the research topic of each study was contextually sensitive. Results suggested that the contextual sensitivity of the research topic was associated with replication success, even after statistically adjusting for several methodological characteristics (e.g., statistical power, effect size). The association between contextual sensitivity and replication success did not differ across psychological subdisciplines. These results suggest that researchers, replicators, and consumers should be mindful of contextual factors that might influence a psychological process. We offer several guidelines for dealing with contextual sensitivity in reproducibility.

  7. Offers INTERSOCCER

    CERN Multimedia

    Staff Association

    2014-01-01

      Summer Football camps   New offer to the members of the Staff Association – INTERSOCCER: 12% discount on summer football camps and courses for children (bilingual) so do not hesitate anymore!    

  8. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  9. Special Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for all active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  10. Special offer

    CERN Multimedia

    Staff Association

    2010-01-01

    Special offer for members of the Staff Association and their families 10% reduction on all products in the SEPHORA shop (sells perfume, beauty products etc.) in Val Thoiry ALL YEAR ROUND. Plus 20% reduction during their “vente privée”* three or four times a year. Simply present your Staff Association membership card when you make your purchase. * next “vente privée” from 24th to 29th May 2010  

  11. Special offer

    CERN Multimedia

    Staff Association

    2011-01-01

    SPECIAL OFFER FOR OUR MEMBERS Tarif unique Adulte/Enfant Entrée Zone terrestre 19 euros instead of 23 euros Entrée “Zone terrestre + aquatique” 24 euros instead of 31 euros Free for children under 3, with limited access to the attractions. Walibi Rhône-Alpes is open daily from 22 June to 31 August, and every week end from 3 September until 31 October. Closing of the “zone aquatique” 11 September.

  12. Templates and Queries in Contextual Hypermedia

    DEFF Research Database (Denmark)

    Anderson, Kenneth Mark; Hansen, Frank Allan; Bouvin, Niels Olof

    2006-01-01

    discuss a framework, HyConSC, that implements this model and describe how it can be used to build new contextual hypermedia systems. Our framework aids the developer in the iterative development of contextual queries (via a dynamic query browser) and offers support for con-text matching, a key feature...... of contextual hypermedia. We have tested the framework with data and sensors taken from the HyCon contextual hypermedia system and are now migrating HyCon to this new framework....

  13. Contextual Education

    Directory of Open Access Journals (Sweden)

    Janani Harish

    2015-10-01

    Full Text Available When the knowledge gained over centuries has to be presented to students through a 12-15 year study, it has to be abridged and organized elaborately. This process of encapsulating all knowledge into an educational course often results in fragmentation of knowledge and a mental divorce from life. Life knowledge that is reduced to objective principles may be intelligible to the intellect, but is incomprehensible to the imagination, creativity and emotional intelligence, all of which are important to the full development of personality. A study of Economics without the human and social dimensions, industrialization detached from ecology, or science devoid of moral accountability results in problems. Education of each part must be in the context of the whole. Knowing the whole context helps one get the right perspective to address the issue effectively. In the education of the future, the gap between abstract concept and social relevance must be bridged. The following article explores the need for contextual education and the ways in which it can be implemented.

  14. Contextual sensitivity in scientific reproducibility

    Science.gov (United States)

    Van Bavel, Jay J.; Mende-Siedlecki, Peter; Brady, William J.; Reinero, Diego A.

    2016-01-01

    In recent years, scientists have paid increasing attention to reproducibility. For example, the Reproducibility Project, a large-scale replication attempt of 100 studies published in top psychology journals found that only 39% could be unambiguously reproduced. There is a growing consensus among scientists that the lack of reproducibility in psychology and other fields stems from various methodological factors, including low statistical power, researcher’s degrees of freedom, and an emphasis on publishing surprising positive results. However, there is a contentious debate about the extent to which failures to reproduce certain results might also reflect contextual differences (often termed “hidden moderators”) between the original research and the replication attempt. Although psychologists have found extensive evidence that contextual factors alter behavior, some have argued that context is unlikely to influence the results of direct replications precisely because these studies use the same methods as those used in the original research. To help resolve this debate, we recoded the 100 original studies from the Reproducibility Project on the extent to which the research topic of each study was contextually sensitive. Results suggested that the contextual sensitivity of the research topic was associated with replication success, even after statistically adjusting for several methodological characteristics (e.g., statistical power, effect size). The association between contextual sensitivity and replication success did not differ across psychological subdisciplines. These results suggest that researchers, replicators, and consumers should be mindful of contextual factors that might influence a psychological process. We offer several guidelines for dealing with contextual sensitivity in reproducibility. PMID:27217556

  15. 17 CFR 240.13e-102 - Schedule 13E-4F. Tender offer statement pursuant to section 13(e) (1) of the Securities Exchange...

    Science.gov (United States)

    2010-04-01

    ... enforcement by investors of civil liabilities under the federal securities laws may be affected adversely by... disclosure requirements of the country in which the issuer is incorporated or organized, investors should be... directors are residents of a foreign country. “Investors should be aware that the issuer or its affiliates...

  16. Contextual Fraction as a Measure of Contextuality

    Science.gov (United States)

    Abramsky, Samson; Barbosa, Rui Soares; Mansfield, Shane

    2017-08-01

    We consider the contextual fraction as a quantitative measure of contextuality of empirical models, i.e., tables of probabilities of measurement outcomes in an experimental scenario. It provides a general way to compare the degree of contextuality across measurement scenarios; it bears a precise relationship to violations of Bell inequalities; its value, and a witnessing inequality, can be computed using linear programing; it is monotonic with respect to the "free" operations of a resource theory for contextuality; and it measures quantifiable advantages in informatic tasks, such as games and a form of measurement-based quantum computing.

  17. Action Centered Contextual Bandits.

    Science.gov (United States)

    Greenewald, Kristjan; Tewari, Ambuj; Klasnja, Predrag; Murphy, Susan

    2017-12-01

    Contextual bandits have become popular as they offer a middle ground between very simple approaches based on multi-armed bandits and very complex approaches using the full power of reinforcement learning. They have demonstrated success in web applications and have a rich body of associated theoretical guarantees. Linear models are well understood theoretically and preferred by practitioners because they are not only easily interpretable but also simple to implement and debug. Furthermore, if the linear model is true, we get very strong performance guarantees. Unfortunately, in emerging applications in mobile health, the time-invariant linear model assumption is untenable. We provide an extension of the linear model for contextual bandits that has two parts: baseline reward and treatment effect. We allow the former to be complex but keep the latter simple. We argue that this model is plausible for mobile health applications. At the same time, it leads to algorithms with strong performance guarantees as in the linear model setting, while still allowing for complex nonlinear baseline modeling. Our theory is supported by experiments on data gathered in a recently concluded mobile health study.

  18. White paper for a competitive energy offer at the service of an achieved energy transition and of a guaranteed security of supply

    International Nuclear Information System (INIS)

    2017-02-01

    Published by a professional body (AFIEG, Independent French Association of Electricity and Gas)), this white paper first gives an overview and some critics on the French energy policy, and then aims at outlining and discussing three main objectives of an energy policy: security of supply, energy competitiveness, and a realistic and successful energy transition. It proposes measures to reach these objectives while taking regulatory stability, and equal treatment of operators in terms of regulation into account. Recommendations are stated regarding these objectives and requirements

  19. Using contextual advertising in Internet marketing

    Directory of Open Access Journals (Sweden)

    Тетяна Олександрівна Левицька

    2017-07-01

    Full Text Available This article is devoted to the substantiation of the use of contextual advertising in Internet marketing as one of the most universal and expedient tools of modern advertising, applied for the first time in 1994, describing the principles of its implementation and the prospects for using it. The shortcomings and advantages of Internet marketing and contextual advertising in particular, its types and technologies, on which it is implemented, the possibilities, as well as the purposes of application, are considered. The main characteristics of contextual advertising, namely its characteristic properties as compared to the other types of Internet marketing, were highlighted. The use of contextual advertising in the search, on partner sites of the advertising network and an example of the report that was received by means of the Yandex.Metrika service have been shown. On the basis of the analysis the use of contextual advertising has been proved and its basic types and methods of measuring the effectiveness of advertising campaigns using deep analytics services have been demonstrated. The factor of the complexity of the configuration process has been singled out, and in this connection, a variant of professional intervention in setting up contextual advertising by specialized agencies has been offered. In the long term, the tools of contextual advertising are to expand. Every year, more and more services are being created for a deeper analysis of statistics, end-to-end analytics, and the improvement of the campaign management interface

  20. 17 CFR 230.253 - Offering circular.

    Science.gov (United States)

    2010-04-01

    .... Repetition of information should be avoided; cross-referencing of information within the document is... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...

  1. Using mobile phone contextual information to facilitate managing image collections

    DEFF Research Database (Denmark)

    Larsen, Jakob Eg; Luniewski, Maciej

    2009-01-01

    In this paper, we describe a prototype application that utilizes the embedded sensors in advanced mobile phones to infer meaningful contextual information, with the potential to support the users in managing their personal information. Contextual information such as time, location, movement...... in personal information management. We hypothesize that information inferred from embedded mobile phone sensors can offer useful contextual information for managing personal information, including the domain of interest here, namely image collections. This has potential for individuals as well as groups...

  2. Multiculturalism and contextualism

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2015-01-01

    Many political theorists of multiculturalism (e.g. Joseph Carens, Bhikhu Parekh, James Tully) describe their theories as “contextualist.” But it is unclear what “contextualism” means and what difference it makes for political theory. I use a specific prominent example of a multiculturalist...... discussion, namely Tariq Modood’s argument about “moderate secularism,” as a test case and distinguish between different senses of contextualism. I discuss whether the claim that political theory is contextual in each sense is novel and interesting, and whether contextualism is a distinct feature...... of political theory of multiculturalism. I argue that the forms of contextualism which concern the scope and methodology of political theory are sensible, but not novel or distinctive of multiculturalism. I then discuss the more controversial forms of contextualism, which I call political and theoretical...

  3. 75 FR 32840 - Securities Offering Disclosures

    Science.gov (United States)

    2010-06-09

    ... make an informed investment decision regarding a possible purchase or sale of a savings association's... control number. As part of the approval process, we invite comments on the following information...

  4. Accident prevention in a contextual approach

    DEFF Research Database (Denmark)

    Dyhrberg, Mette Bang

    2003-01-01

    of such a contextual approach is shortly described and demonstrated in relation to a Danish case on accident prevention. It is concluded that the approach presently offers a post-ante, descriptive analytical understanding, and it is argued that it can be developed to a frame of reference for planning actions...

  5. 17 CFR 230.802 - Exemption for offerings in connection with an exchange offer or business combination for the...

    Science.gov (United States)

    2010-04-01

    ... connection with an exchange offer or business combination for the securities of foreign private issuers. 230... Offers and Business Combinations § 230.802 Exemption for offerings in connection with an exchange offer or business combination for the securities of foreign private issuers. Offers and sales in any...

  6. 17 CFR 230.419 - Offerings by blank check companies.

    Science.gov (United States)

    2010-04-01

    ... derivative securities relating to securities held in the escrow or trust account may be exercised or... other derivative securities issued in the initial offering are exercisable, there is a continuous... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offerings by blank check...

  7. 12 CFR 563g.21 - Filing of copies of offering circulars in certain exempt offerings.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Filing of copies of offering circulars in certain exempt offerings. 563g.21 Section 563g.21 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.21 Filing of copies of offering circulars in certain...

  8. Contextual risk and child psychopathology.

    Science.gov (United States)

    Flouri, Eirini

    2008-10-01

    In developmental psychopathology it almost goes without saying that contextual risk factors do not occur in isolation and that it is the combination of various risk factors that portends numerous negative child outcomes. Despite this, the body of literature that examines the relation between multiple risk exposure and child psychopathology using a cumulative risk approach is still relatively small. Even when studies use a cumulative risk approach they rarely test properly whether the relation between cumulative risk and child psychopathology is linear or nonlinear, with consequences for both theory development and intervention design: if cumulative risk impacts problem behavior in a positively accelerated exponential manner, for instance, it means that exposure to multiple risk is especially difficult to manage as problem behavior accelerates at a critical level of risk. Furthermore, few studies have actually examined factors that protect from negative outcomes in those exposed to cumulative risk and even fewer have explored cumulative protection in relation to cumulative risk. On the other hand, there is the view that a cumulative risk approach at least implicitly assumes that risk factors are, in essence, interchangeable. According to this view, the importance of testing for specificity should not be underestimated. Finally, the renewed interest in the role of neighborhood risk in child development has initiated a lively debate as to whether contextual risk should be operationalized at the family or the area level. In this letter I discuss these issues, and offer some suggestions as to how future research can address them.

  9. Brogaard's Moral Contextualism

    DEFF Research Database (Denmark)

    Binderup, Lars Grassme

    2008-01-01

    Brogaard's non-indexical version of moral contextualism has two related problems. It is unable to account for the function of truth-governed assertoric moral discourse, since it leaves two (semantically clearheaded) disputants without any incentive to resolve seemingly contradictory moral claims....... The moral contextualist could explain why people do feel such an incentive by ascribing false beliefs about the semantic workings of their own language. But, secondly, this leaves Brogaard's moral contextualism looking weaker than a Mackie-style invariantist error theory about morals. The latter is equally...

  10. Tools of Contextualization

    DEFF Research Database (Denmark)

    Bouvin, Niels Olof; Brodersen, Ann Christina; Hansen, Frank Allan

    2005-01-01

    Project based education is growing in importance in elementary schools though it is still quite poorly technologically supported, particularly with respect to actively taking advantage of contextual information. Based on an empirical study of teaching and in particular project based education...... in Danish elementary schools, we present the HyConExplorer, a geospatial hypermedia system supporting project based education and learning outside of the classroom through contextualization of information. More specifically, the HyCon-Explorer provides means for: browsing with your feet, annotating...

  11. 12 CFR 563g.4 - Non-public offering.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Non-public offering. 563g.4 Section 563g.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.4 Non-public offering. Offers and sales of securities by an issuer that satisfy the conditions of...

  12. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  13. Contextual Text Mining

    Science.gov (United States)

    Mei, Qiaozhu

    2009-01-01

    With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the…

  14. Structuring mobile and contextual learning

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2011-01-01

    Glahn, C., & Specht, M. (2011). Structuring mobile and contextual learning. In Proceedings of the 10th World Conference on Mobile and Contextual Learning (pp. 188-195). October, 18-21, 2011, Beijing, China.

  15. Contextual Variability in Free Recall

    Science.gov (United States)

    Lohnas, Lynn J.; Polyn, Sean M.; Kahana, Michael J.

    2011-01-01

    According to contextual-variability theory, experiences encoded at different times tend to be associated with different contextual states. The gradual evolution of context implies that spaced items will be associated with more distinct contextual states, and thus have more unique retrieval cues, than items presented in proximity. Ross and Landauer…

  16. Innovative gas offers

    International Nuclear Information System (INIS)

    Sala, O.; Mela, P.; Chatelain, F.

    2007-01-01

    New energy offers are progressively made available as the opening of gas market to competition becomes broader. How are organized the combined offers: gas, electricity, renewable energies and energy services? What are the marketing strategies implemented? Three participants at this round table present their offer and answer these questions. (J.S.)

  17. Contextuality under weak assumptions

    International Nuclear Information System (INIS)

    Simmons, Andrew W; Rudolph, Terry; Wallman, Joel J; Pashayan, Hakop; Bartlett, Stephen D

    2017-01-01

    The presence of contextuality in quantum theory was first highlighted by Bell, Kochen and Specker, who discovered that for quantum systems of three or more dimensions, measurements could not be viewed as deterministically revealing pre-existing properties of the system. More precisely, no model can assign deterministic outcomes to the projectors of a quantum measurement in a way that depends only on the projector and not the context (the full set of projectors) in which it appeared, despite the fact that the Born rule probabilities associated with projectors are independent of the context. A more general, operational definition of contextuality introduced by Spekkens, which we will term ‘probabilistic contextuality’, drops the assumption of determinism and allows for operations other than measurements to be considered contextual. Even two-dimensional quantum mechanics can be shown to be contextual under this generalised notion. Probabilistic noncontextuality represents the postulate that elements of an operational theory that cannot be distinguished from each other based on the statistics of arbitrarily many repeated experiments (they give rise to the same operational probabilities) are ontologically identical. In this paper, we introduce a framework that enables us to distinguish between different noncontextuality assumptions in terms of the relationships between the ontological representations of objects in the theory given a certain relation between their operational representations. This framework can be used to motivate and define a ‘possibilistic’ analogue, encapsulating the idea that elements of an operational theory that cannot be unambiguously distinguished operationally can also not be unambiguously distinguished ontologically. We then prove that possibilistic noncontextuality is equivalent to an alternative notion of noncontextuality proposed by Hardy. Finally, we demonstrate that these weaker noncontextuality assumptions are sufficient to prove

  18. 12 CFR 335.501 - Tender offers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Tender offers. 335.501 Section 335.501 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY SECURITIES OF NONMEMBER INSURED BANKS § 335.501 Tender offers. The provisions of the applicable and currently...

  19. Contextualism in Normative Political Theory

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    Contextualism denotes a set of ideas about the importance of attention to context. The topic of the article is contextualism in normative political theory/philosophy, in relation to the part of political theory concerned with systematic political argument for normative claims—evaluative claims...... that can be invoked to contextualize a specific object of political discussion such as a law, an institution, or the like. Contextualism denotes any view that political theory should take context into account, but there are many different views about what this means. Contextualism can be characterized...... by way of different contrasts, which imply that the resulting conceptions of contextualism are views about different things, such as justification, the nature of political theory, or methodology. Here the focus is on characterizations of contextualism in terms of methodology and justification...

  20. Contextualizing symbol, symbolizing context

    Science.gov (United States)

    Maudy, Septiani Yugni; Suryadi, Didi; Mulyana, Endang

    2017-08-01

    When students learn algebra for the first time, inevitably they are experiencing transition from arithmetic to algebraic thinking. Once students could apprehend this essential mathematical knowledge, they are cultivating their ability in solving daily life problems by applying algebra. However, as we dig into this transitional stage, we identified possible students' learning obstacles to be dealt with seriously in order to forestall subsequent hindrance in studying more advance algebra. We come to realize this recurring problem as we undertook the processes of re-personalization and re-contextualization in which we scrutinize the very basic questions: 1) what is variable, linear equation with one variable and their relationship with the arithmetic-algebraic thinking? 2) Why student should learn such concepts? 3) How to teach those concepts to students? By positioning ourselves as a seventh grade student, we address the possibility of children to think arithmetically when confronted with the problems of linear equation with one variable. To help them thinking algebraically, Bruner's modes of representation developed contextually from concrete to abstract were delivered to enhance their interpretation toward the idea of variables. Hence, from the outset we designed the context for student to think symbolically initiated by exploring various symbols that could be contextualized in order to bridge student traversing the arithmetic-algebraic fruitfully.

  1. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  2. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  3. Postgraduates courses offered to nursing

    Directory of Open Access Journals (Sweden)

    Pedro Jorge Araujo

    2011-07-01

    Full Text Available Aim: To know the official masters that the Spanish Universities have offered during the academic course 2010/2011.Material and methods: Descriptive observational and transversal court study, in which it has analysed 170 university official masters and in which it has used a questionnaire with a total of 15 questions elaborated for this work.Results: 52 Spanish Universities of the 75 that there is have offered during the academic course 2010/2011 official masters that can realise for graduated in infirmary. By areas, the official masters more offered have been the ones of nutrition and alimentary security. 76,33% of the official masters have a length of 1 academic year. Almost the half of the official masters have an orientation researcher-professional and almost 40% researcher. 62,65% of the masters give of face-to-face way. In 52,1% of the official masters do not realise external practices and 86,2% has continuity with the doctorate.Conclusions: It has seen that it is necessary that expand the number of masters including other fields of study that contribute to a main specialisation of the professionals of the infirmary. An important percentage of official masters give in face-to-face modality, and there is very few offered on-line or to distance.

  4. Contextualizing aquired brain damage

    DEFF Research Database (Denmark)

    Nielsen, Charlotte Marie Bisgaard

    2014-01-01

    Contextualizing aquired brain damage Traditional approaches study ’communicational problems’ often in a discourse of disabledness or deficitness. With an ontology of communcation as something unique and a presupposed uniqueness of each one of us, how could an integrational approach (Integrational...... for people with aquired brain injuries will be presented and comparatively discussed in a traditional versus an integrational perspective. Preliminary results and considerations on ”methods” and ”participation” from this study will be presented along with an overview of the project's empirical data....

  5. Against Contextualism: Belief, Evidence, & the Bank Cases

    Directory of Open Access Journals (Sweden)

    Logan Paul Gage

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2013v17n1p57 Contextualism (the view that ‘knowledge’ and its variants are context-sensitive has been supported in large part through appeal to intuitions about Keith DeRose’s Bank Cases. Recently, however, the contextualist construal of these cases has come under fire from Kent Bach and Jennifer Nagel who question whether the Bank Case subject’s confidence can remain constant in both low- and high-stakes cases. Having explained the Bank Cases and this challenge to them, I argue that DeRose has given a reasonable reply to this initial challenge. However, I proceed to argue that the current stalemate can be broken. Seeking to extend the Bach–Nagel critique, I offer a novel interpretation of the Bank Cases according to which the subject’s evidence changes between low- and high-stakes cases. If I am correct, then, given the amount of support the Bank Cases have been thought to lend contextualism, the case for contextualism is seriously weakened.

  6. Perspectives on contextual vulnerability in discourses of climate conflict

    Science.gov (United States)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  7. 12 CFR 563g.8 - Use of the offering circular.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Use of the offering circular. 563g.8 Section 563g.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.8 Use of the offering circular. (a) An offering circular or amendment declared effective by the...

  8. 12 CFR 563g.2 - Offering circular requirement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Offering circular requirement. 563g.2 Section 563g.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.2 Offering circular requirement. (a) General. No savings association shall offer or sell, directly...

  9. Global Repetition Influences Contextual Cueing

    Science.gov (United States)

    Zang, Xuelian; Zinchenko, Artyom; Jia, Lina; Li, Hong

    2018-01-01

    Our visual system has a striking ability to improve visual search based on the learning of repeated ambient regularities, an effect named contextual cueing. Whereas most of the previous studies investigated contextual cueing effect with the same number of repeated and non-repeated search displays per block, the current study focused on whether a global repetition frequency formed by different presentation ratios between the repeated and non-repeated configurations influence contextual cueing effect. Specifically, the number of repeated and non-repeated displays presented in each block was manipulated: 12:12, 20:4, 4:20, and 4:4 in Experiments 1–4, respectively. The results revealed a significant contextual cueing effect when the global repetition frequency is high (≥1:1 ratio) in Experiments 1, 2, and 4, given that processing of repeated displays was expedited relative to non-repeated displays. Nevertheless, the contextual cueing effect reduced to a non-significant level when the repetition frequency reduced to 4:20 in Experiment 3. These results suggested that the presentation frequency of repeated relative to the non-repeated displays could influence the strength of contextual cueing. In other words, global repetition statistics could be a crucial factor to mediate contextual cueing effect. PMID:29636716

  10. Widening Participation and Contextual Entry Policy in Accounting and Finance

    Science.gov (United States)

    Rowbottom, N.

    2017-01-01

    The paper examines the performance of accounting and finance students entering university via a "widening participation" scheme that seeks to attract students who have been historically under-represented in higher education. Focus is placed on the policy of providing contextual entry offers that recognise that academic qualifications be…

  11. Offers for our members

    CERN Multimedia

    Staff Association

    2013-01-01

    The Courir shops propose the following offer: 15% discount on all articles (not on sales) in the Courir shops (Val Thoiry, Annemasse and Neydens) and 5% discount on sales upon presentation of your Staff Association membership card and an identity card before payment. Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 21 € instead of 26 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 30 CHF instead of 39 CHF – Adults : 36 CHF instead of 49 CHF Bonus! Free for children under 5.

  12. Offers for our members

    CERN Multimedia

    Staff Association

    2018-01-01

    Summer is coming, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 25 € instead of 31 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your Staff Association member ticket. Free for children under 100 cm. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.  

  13. Offers for our members

    CERN Multimedia

    Staff Association

    2017-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 24 € instead of 30 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children under 100 cm. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  14. Offers for our members

    CERN Multimedia

    Staff Association

    2017-01-01

    Summer is coming, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 24 € instead of 30 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children under 100 cm. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  15. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  16. The offerings from the Hyperboreans.

    Science.gov (United States)

    Ruck, C A

    1983-08-01

    The ancient Greeks believed that the fruits of agriculture could be harvested only if one first appeased the spirit of the primitive avatars from which the edible crop had been evolved over the centuries through hybridization and cultivation. On occasion, this appeasement was secured through the sacrifice of a human victim, a person who for various reasons could be considered to represent a similar primitivism. By the classical age, this extreme form of sacrificial appeasement appears to have been reserved for times of unusual crisis, such as pestilence or natural disaster, for at such times, the resurgent forces of primitivism seemed to threaten the entire civilization with regression back to its wilder origins. Other forms of appeasement were ordinarily substituted for the actual offering of a human victim. Amongst these was the enactment of puberty rites, for the natural growth and maturation of an individual could be thought to symbolize this same evolutionary process. Each infant is born as a wild creature who must develop into a socialized adult through the metaphoric death of its former self as it assumes the responsibilities of civilized life in crossing the threshold to sexual maturity. A similar symbolic victim was customarily represented by the offering of first fruits. A portion of the cultivated crop was prematurely cut and consecrated to redeem and release the ripening harvest from the dangerous contamination with the spirits of its pre-agricultural precedents. On the island of Delos, a special version of this consecration was performed. Each year, the various Greek cities would send a sheaf of unripened grain to the sanctuary of the god Apollo and his twin sister Artemis. Amongst these annual offerings, there was one that was supposed to have originated from the Hyperboreans, a mythical people who were thought to live in the original homeland of the two gods. This special Hyperborean offering differed from the others, for it was said to contain a

  17. Offers for our members

    CERN Multimedia

    Staff Association

    2013-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 21 € instead of 26 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 30 CHF instead of 39 CHF – Adults : 36 CHF instead of 49 CHF Bonus! Free for children under 5.

  18. Offers for our members

    CERN Multimedia

    Staff Association

    2015-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 21,50 € instead of 27 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12:00 p.m. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  19. Offers for our members

    CERN Multimedia

    Staff Association

    2016-01-01

    Summer is here, enjoy our offers for the aquatic parcs! Walibi : Tickets "Zone terrestre": 23 € instead of 29 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12:00 p.m. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Day ticket: – Children: 33 CHF instead of 39 CHF – Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5.

  20. Offers for our members

    CERN Multimedia

    Staff Association

    2017-01-01

    Summer is here, enjoy our offers for the water parks! Walibi: Tickets "Zone terrestre": 24 € instead of 30 €. Access to Aqualibi: 5 € instead of 6 € on presentation of your ticket purchased at the Staff Association. Bonus! Free for children under 100 cm, with limited access to the attractions. Free car park. *  *  *  *  *  *  *  * Aquaparc: Day ticket: -  Children: 33 CHF instead of 39 CHF -  Adults : 33 CHF instead of 49 CHF Bonus! Free for children under 5 years old.

  1. Offer for our members

    CERN Document Server

    Staff Association

    2017-01-01

    The Staff Association CERN staff has recently concluded a framework agreement with AXA Insurance Ltd, General-Guisan-Strasse 40, 8401 Winterthur. This contract allows you to benefit from a preferential tariff and conditions for insurances: Motor vehicles for passenger cars and motorcycles of the product line STRADA: 10% discount Household insurance (personal liability and household contents) the product line BOX: 10% discount Travel insurance: 10% discount Buildings: 10% discount Legal protection: 10% discount AXA is number one on the Swiss insurance market. The product range encompasses all non-life insurance such as insurance of persons, property, civil liability, vehicles, credit and travel as well as innovative and comprehensive solutions in the field of occupational benefits insurance for individuals and businesses. Finally, the affiliate AXA-ARAG (legal expenses insurance) completes the offer. For those of you already insured with the company, contact your current advisor. Others may contact a counsel...

  2. Offers for our members

    CERN Multimedia

    Association du personnel

    2013-01-01

    La banque LCL propose aux membres de l’Association du personnel les avantages suivants : – Un barème Privilège sur le Prêt immobilier – Des avantages tarifaires sur l’épargne, notamment l’assurance-vie. – Un taux préférentiel de prêt à la consommation. En outre, jusqu’au 30 septembre 2013, elle offre 50€ à tous les nouveaux clients, membres de l'Association du personnel. Summer is here, enjoy our offers for the aquatic parcs! Tickets "Zone terrestre" : 21 € instead of de 26 €. Access to Aqualibi : 5 euros instead of 8 euros on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Free car park. * * * * * * * Full day ticket: – Children : 30 CHF instead of 39 CHF &...

  3. Offers for our members

    CERN Multimedia

    Staff Association

    2013-01-01

    The warm weather arrives, it's time to take advantage of our offers Walibi and Aquapark! Walibi : Tickets "Zone terrestre": 21 € instead of 26 € Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free. * * * * * Aquaparc : Half-day ticket (5 hours): – Children: 26 CHF instead of 35 CHF – Adults : 32 CHF instead of 43 CHF Day ticket: – Children: 30 CHF instead of 39 CHF – Adults : 36 CHF instead of 49 CHF Free for children under 5.

  4. Contextual Treatment of Dissociative Identity Disorder.

    Science.gov (United States)

    Gold, Steven N; Elhai, Jon D; Rea, Bayard D; Weiss, Donna; Masino, Theodore; Morris, Staci Leon; McIninch, Jessica

    2001-01-01

    Evidence for the effectiveness of contextual therapy, a new approach for treating adult survivors of prolonged child abuse (PCA), is provided via case studies of three women with Dissociative Identity Disorder (DID). Contextual therapy is based on the premise that it is not only traumatic experiences that account for PCA survivors' psychological difficulties. Even more fundamentally, many survivors grow up in an interpersonal context in which adequate resources for secure attachment and acquisition of adaptive living skills are not available. As a result, they are left with lasting deficits that undermine not only their current functioning, but also their ability to cope with reliving their traumatic memories in therapy. The primary focus of this treatment approach, therefore, is on developing capacities for feeling and functioning better in the present, rather than on extensive exploration and processing of the client's trauma history or, in the case of DID, of identity fragments. Treatment of the three cases presented ranged from eight months to two and one-half years' duration, and culminated in very positive outcomes. The women's reports of achievements, such as obtaining and maintaining gainful employment, greater self-sufficiency, and the establishment of more intimate and gratifying relationships, indicated marked improvements in daily functioning. Objective test data obtained at admission and discharge, and in one case, at follow-up, documented substantial reductions in dissociative, posttraumatic stress, depressive, and other symptoms.

  5. 19 CFR 172.32 - Authority to accept offers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Authority to accept offers. 172.32 Section 172.32 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE....32 Authority to accept offers. The authority to accept offers in compromise, subject to the...

  6. Empathy and contextual social cognition.

    Science.gov (United States)

    Melloni, Margherita; Lopez, Vladimir; Ibanez, Agustin

    2014-03-01

    Empathy is a highly flexible and adaptive process that allows for the interplay of prosocial behavior in many different social contexts. Empathy appears to be a very situated cognitive process, embedded with specific contextual cues that trigger different automatic and controlled responses. In this review, we summarize relevant evidence regarding social context modulation of empathy for pain. Several contextual factors, such as stimulus reality and personal experience, affectively link with other factors, emotional cues, threat information, group membership, and attitudes toward others to influence the affective, sensorimotor, and cognitive processing of empathy. Thus, we propose that the frontoinsular-temporal network, the so-called social context network model (SCNM), is recruited during the contextual processing of empathy. This network would (1) update the contextual cues and use them to construct fast predictions (frontal regions), (2) coordinate the internal (body) and external milieus (insula), and (3) consolidate the context-target associative learning of empathic processes (temporal sites). Furthermore, we propose these context-dependent effects of empathy in the framework of the frontoinsular-temporal network and examine the behavioral and neural evidence of three neuropsychiatric conditions (Asperger syndrome, schizophrenia, and the behavioral variant of frontotemporal dementia), which simultaneously present with empathy and contextual integration impairments. We suggest potential advantages of a situated approach to empathy in the assessment of these neuropsychiatric disorders, as well as their relationship with the SCNM.

  7. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  8. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  9. Negative Social Contextual Stressors and Somatic Symptoms Among Young Black Males: An Exploratory Study

    OpenAIRE

    Scott, Lionel D.; McCoy, Henrika

    2015-01-01

    This study examines whether negative social contextual stressors were associated with somatic symptoms among young Black males (N = 74) after accounting for background and psychological characteristics. Using Cunningham and Spencer’s Black Male Experiences Measure, negative social contextual stressors connoted those experiences connected to the personal attributes, devaluation, and negative imagery of young Black males, such as being followed when entering a store or police or security guards...

  10. Communication Games Reveal Preparation Contextuality

    Science.gov (United States)

    Hameedi, Alley; Tavakoli, Armin; Marques, Breno; Bourennane, Mohamed

    2017-12-01

    A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Here, we show that communication games performed in operational theories reveal the preparation contextuality of that theory. For statistics obtained in a particular family of communication games, we show a direct correspondence with correlations in spacelike separated events obeying the no-signaling principle. Using this, we prove that all mixed quantum states of any finite dimension are preparation contextual. We report on an experimental realization of a communication game involving three-level quantum systems from which we observe a strong violation of the constraints of preparation noncontextuality.

  11. Contextual Validity in Hybrid Logic

    DEFF Research Database (Denmark)

    Blackburn, Patrick Rowan; Jørgensen, Klaus Frovin

    2013-01-01

    interpretations. Moreover, such indexicals give rise to a special kind of validity—contextual validity—that interacts with ordinary logi- cal validity in interesting and often unexpected ways. In this paper we model these interactions by combining standard techniques from hybrid logic with insights from the work...... of Hans Kamp and David Kaplan. We introduce a simple proof rule, which we call the Kamp Rule, and first we show that it is all we need to take us from logical validities involving now to contextual validities involving now too. We then go on to show that this deductive bridge is strong enough to carry us...... to contextual validities involving yesterday, today and tomorrow as well....

  12. Multi-level Contextual Type Theory

    Directory of Open Access Journals (Sweden)

    Mathieu Boespflug

    2011-10-01

    Full Text Available Contextual type theory distinguishes between bound variables and meta-variables to write potentially incomplete terms in the presence of binders. It has found good use as a framework for concise explanations of higher-order unification, characterize holes in proofs, and in developing a foundation for programming with higher-order abstract syntax, as embodied by the programming and reasoning environment Beluga. However, to reason about these applications, we need to introduce meta^2-variables to characterize the dependency on meta-variables and bound variables. In other words, we must go beyond a two-level system granting only bound variables and meta-variables. In this paper we generalize contextual type theory to n levels for arbitrary n, so as to obtain a formal system offering bound variables, meta-variables and so on all the way to meta^n-variables. We obtain a uniform account by collapsing all these different kinds of variables into a single notion of variabe indexed by some level k. We give a decidable bi-directional type system which characterizes beta-eta-normal forms together with a generalized substitution operation.

  13. 3D Bayesian contextual classifiers

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    2000-01-01

    We extend a series of multivariate Bayesian 2-D contextual classifiers to 3-D by specifying a simultaneous Gaussian distribution for the feature vectors as well as a prior distribution of the class variables of a pixel and its 6 nearest 3-D neighbours.......We extend a series of multivariate Bayesian 2-D contextual classifiers to 3-D by specifying a simultaneous Gaussian distribution for the feature vectors as well as a prior distribution of the class variables of a pixel and its 6 nearest 3-D neighbours....

  14. Linear contextual modal type theory

    DEFF Research Database (Denmark)

    Schack-Nielsen, Anders; Schürmann, Carsten

    Abstract. When one implements a logical framework based on linear type theory, for example the Celf system [?], one is immediately con- fronted with questions about their equational theory and how to deal with logic variables. In this paper, we propose linear contextual modal type theory that gives...... a mathematical account of the nature of logic variables. Our type theory is conservative over intuitionistic contextual modal type theory proposed by Nanevski, Pfenning, and Pientka. Our main contributions include a mechanically checked proof of soundness and a working implementation....

  15. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  16. 17 CFR 240.14e-1 - Unlawful tender offer practices.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Unlawful tender offer... Securities Exchange Act of 1934 Regulation 14e § 240.14e-1 Unlawful tender offer practices. As a means... section 14(e) of the Act, no person who makes a tender offer shall: (a) Hold such tender offer open for...

  17. Mobile and contextual learning

    Directory of Open Access Journals (Sweden)

    Agnes Kukulska-Hulme

    2009-12-01

    Full Text Available Is mobile learning just a part of everyday learning? This is a relevant question in an age when most people throughout the world now have access to mobile phones and mobility is increasingly taken for granted. In one sense, mobile learning is no different to carrying a textbook or learning through conversations at home, as part of formal education or in the workplace. The technology may be more engaging, but is the learning any different? Despite the ubiquity of mobile phones, smartphones, mp3 players and, increasingly, access to Wi-Fi connections and GPS navigation, the reasons for using mobile and wireless technologies in education are not yet widely known. There is significant specialist expertise, built from ten years of research (and more recently, reflective practice to demonstrate the unique characteristics of mobile learning, which include orchestrating shared learning with personal devices across formal and informal settings, providing immediately useful information, offering timely revision and reflection, connecting real and virtual locations, and enriching field trips and cultural visits. This knowledge needs to be disseminated and examined from new perspectives.

  18. Contextual Bandits for Information Retrieval

    NARCIS (Netherlands)

    Hofmann, K.; Whiteson, S.; de Rijke, M.

    2011-01-01

    In this paper we give an overview of and outlook on research at the intersection of information retrieval (IR) and contextual bandit problems. A critical problem in information retrieval is online learning to rank, where a search engine strives to improve the quality of the ranked result lists it

  19. DISCOURSE STYLISTICS AS CONTEXTUALIZED STYLISTICS

    OpenAIRE

    Marina Katnić-Bakaršić

    2003-01-01

    The focus of the paper is on discourse stylistics, viewed as contextualized discipline. Context includes various factors (sociohistorical, cognitive, cultural and intertextual). The paper investigates the most important approaches to discourse stylistics: pragmatic stylistics, discourse and/ or conversational analysis, cognitive stylistics, critical stylistics, feminists stylistics. In discourse stylistics analysis is always combined with interpretation, and description is followed by explana...

  20. Contextualizing Data Warehouses with Documents

    DEFF Research Database (Denmark)

    Perez, Juan Manuel; Berlanga, Rafael; Aramburu, Maria Jose

    2008-01-01

    warehouse with a document warehouse, resulting in a contextualized warehouse. Thus, the user first selects an analysis context by supplying some keywords. Then, the analysis is performed on a novel type of OLAP cube, called an R-cube, which is materialized by retrieving and ranking the documents...

  1. 3-D contextual Bayesian classifiers

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    In this paper we will consider extensions of a series of Bayesian 2-D contextual classification pocedures proposed by Owen (1984) Hjort & Mohn (1984) and Welch & Salter (1971) and Haslett (1985) to 3 spatial dimensions. It is evident that compared to classical pixelwise classification further...

  2. A 3-D Contextual Classifier

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    1997-01-01

    In this paper we will consider an extension of the Bayesian 2-D contextual class ification routine developed by Owen, Hjort \\$\\backslash\\$& Mohn to 3 spatial dimensions. It is evident that compared to classical pixelwise classification further information can be obtained by tak ing into account...

  3. The Future of Contextual Fear Learning for PTSD Research: A Methodological Review of Neuroimaging Studies.

    Science.gov (United States)

    Glenn, Daniel E; Risbrough, Victoria B; Simmons, Alan N; Acheson, Dean T; Stout, Daniel M

    2017-10-21

    There has been a great deal of recent interest in human models of contextual fear learning, particularly due to the use of such paradigms for investigating neural mechanisms related to the etiology of posttraumatic stress disorder. However, the construct of "context" in fear conditioning research is broad, and the operational definitions and methods used to investigate contextual fear learning in humans are wide ranging and lack specificity, making it difficult to interpret findings about neural activity. Here we will review neuroimaging studies of contextual fear acquisition in humans. We will discuss the methodology associated with four broad categories of how contextual fear learning is manipulated in imaging studies (colored backgrounds, static picture backgrounds, virtual reality, and configural stimuli) and highlight findings for the primary neural circuitry involved in each paradigm. Additionally, we will offer methodological recommendations for human studies of contextual fear acquisition, including using stimuli that distinguish configural learning from discrete cue associations and clarifying how context is experimentally operationalized.

  4. Quality assurance programs from laboratories offering radiological protection services

    International Nuclear Information System (INIS)

    Marrero Garcia, M.; Prendes Alonso, M.; Jova Sed, L.; Morales Monzon, J.A.

    1998-01-01

    The implementation of an adequate program for quality assurance in institutions servicing radiological protection programs will become an additional tool to achieve security targets included in that program. All scientific and technical services offered by CPHR employ quality assurance systems

  5. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  6. Contextualizing Corporate Political Responsibilities: Neoliberal CSR in Historical Perspective

    OpenAIRE

    Djelic, Marie-Laure; Etchanchu, Helen

    2015-01-01

    This article provides a historical analysis of the political role of Corporate Social Responsibility (CSR) before it was even called CSR. We describe two ideal types of political responsibilities during the eras of 19th century paternalism in Europe and corporate trusteeship in the US. Our historical contextualization of recent scholarly work on a “political turn” of CSR offers a two-pronged critique: 1. Growing discussions on political CSR start from a problematic foundation that does not ho...

  7. Nicotine Withdrawal Disrupts Contextual Learning but Not Recall of Prior Contextual Associations: Implications for Nicotine Addiction

    OpenAIRE

    Portugal, George S.; Gould, Thomas J.

    2008-01-01

    Interactions between nicotine and learning could contribute to nicotine addiction. Although previous research indicates that nicotine withdrawal disrupts contextual learning, the effects of nicotine withdrawal on contextual memories acquired before withdrawal are unknown. The present study investigated whether nicotine withdrawal disrupted recall of prior contextual memories by examining the effects of nicotine withdrawal on recall of nicotine conditioned place preference (CPP) and contextual...

  8. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  9. 48 CFR 570.303-3 - Late offers, modifications of offers, and withdrawals of offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Late offers, modifications of offers, and withdrawals of offers. 570.303-3 Section 570.303-3 Federal Acquisition Regulations... PROPERTY Contracting Procedures for Leasehold Interests in Real Property 570.303-3 Late offers...

  10. Brazilian readers and contextual reference Brazilian readers and contextual reference

    Directory of Open Access Journals (Sweden)

    Lilia M. O. Carioni

    2008-04-01

    Full Text Available This article describes an experiment carried out using Brazilian university students at UFSC, the purpose being to check comprehension relationships between two types of contextual reference and two languages, Portuguese and English. A major stimulus for the research was the question: are Brazilian students' difficulties in reading English related more to English language difficulties or to difficulties in processing text in general?

  11. Offer

    CERN Multimedia

    Staff Association

    2015-01-01

    Le parc ouvre ses portes le samedi 4 avril 2015!   La Chasse aux Oeufs du 4 au 26 avril En plus de ses 25 attractions et spectacles, le parc proposera aux enfants de 3 à 12 ans de relever le challenge d’une course aux oeufs dans un jardin de Pâques reconstitué ! Autant de petits oeufs à trouver dans un temps limite ; tout cela au milieu de lapins, poules, fleurs et autres oeufs géants pour repartir avec des gourmandises en chocolat de la marque Revillon Chocolatier.   Profitez de notre offre spéciale pour nos membres : Tarif unique Adulte/Enfant Entrée Zone terrestre 21,50 euros au lieu de 27 euros Accès à l’Aqualibi : 5 euros au lieu de 8 euros sur présentation du billet d’entrée au tarif membre AP. Entrée gratuite pour les enfants de moins de 3 ans, avec accès limité aux attractions. Les billet...

  12. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

      Bénéficiez du tarif spécial de 35 CHF/personne + 1 accompagnant au Théâtre de Carouge  en étant membre de l’Association du personnel.  Envoyez votre réservation par mail à smills@tcag.ch via votre adresse mail professionnelle. Indiquez la date de votre réservation, votre nom, prénom et numéro de téléphone. Une confirmation de réservation vous sera retournée par mail. La présentation de votre carte de membre sera demandée lors du retrait des billets.   De Molière – Mise en scène de Jean Liermier Argan, veuf, remarié avec Béline qui n’attend que la mort de son mari pour hériter, multiplie saignées, purges et autres ingestions de remèdes. Angélique, sa fille, vuet &a...

  13. OFFERS

    CERN Multimedia

    Staff Association

    2014-01-01

    Nouveau partenaire - Joy’s Club   Venez profiter des remises au Joy’s Club / Minigolf à Divonne-les-bains en tant que membre de l’Association ! Sur présentation de votre carte membre, vous bénéficierez d’une remise immédiate telle que : - Pour une partie adulte : 6 euros au lieu de 7 euros - Pour une partie enfant : 4 euros au lieu de 5 euros - Pour le mini Park : 6 euros au lieu de 7 euros Pour plus de renseignements, n’hésitez pas à demander au Secrétariat de l’Association ou à consulter notre site web: http://staff-association.web.cern.ch/fr/socioculturel/offres  

  14. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    12 % discount on football camps and courses for children from 3 to 13 years old, with bilingual coaches.   Now also courses during the autumn holidays! In order to get the discount you need to register online, then send a mail to info@intersoccer.ch with a scan of your membership card to recieve a refund of the discount.

  15. Offers

    CERN Multimedia

    Staff association

    2014-01-01

        Envie de soirée au théâtre, n’hésitez pas à bénéficier de nos offres pour nos membres ! Théâtre de Carouge : Réduction de 5 CHF pour tous les spectacles (30 CHF au lieu de 35 CHF) Le théâtre de Carouge vous présente sa nouvelle pièce : La double insconstance Du vedredi 21 mars au dimanche 6 avril 2014 De Marivaux Mise en scène de Philippe Mentha Audio-description le mardi 1er avril et le samedi 5 avril 2014 Il règne un doux mélange de révoltes et de séductions, de ruses et de fatalité dans cette Double Inconstance de Marivaux que met en scène Philippe Mentha, membre fondateur du Théâtre de Carouge et directeur depuis plus de trente ans du Théâtre Kléber-Méleau. L’allure d...

  16. Offers

    CERN Multimedia

    Staff Association

    2015-01-01

    Tickets "Zone terrestre": 21 € instead of 27 €. Access to Aqualibi: 5 € instead of 8 € on presentation of your SA member ticket. Free for children (3-11 years old) before 12 h 00. Free for children under 3, with limited access to the attractions. Car park free.

  17. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Découvrez les plus belles tables de Suisse romande et de France voisine en bénéficiant des réductions suivantes sur chaque repas, pendant une année : 50 % pour 2 personnes, 40 % pour 3 personnes, 30 % pour 4 personnes, 20 % pour 5 à 6 personnes. Comment ça marche ? Faites votre choix parmi les 110 restaurants de votre région et réservez votre table pour 2, 3, 4, 5 ou 6 personnes. Présentez votre Passeport Gourmand dès votre arrivée. Savourez votre repas et profitez d’une réduction exceptionnelle sur votre addition (hors boissons, menu du jour et business lunch). Quels sont vos avantages ? Profitez du prix préférentiel pour les membres de l’association du CERN : – Passeport Gourmand Genève : CHF 75.- (au lieu de CHF 95.-) – Passeport Gourmand Ain/Savoie/Haute-Savoie : CHF 59.- (au lieu de CH...

  18. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    Si cette offre vous intéresse, merci d’envoyer un mail à mh.boulanger@comedie.ch avec le détail de votre réservation via votre adresse mail professionnelle. Le retrait des places se fait à la billetterie sur présentation de votre carte de membre de l’Association du personnel. Pour toute commande d’abonnement ou de carte de réduction par courrier ou internet, cocher le tarif collectif en indiquant le nom de l’entreprise et en joignant un justificatif nominatif. Pour tout renseignement, n’hésitez pas à contacter Marie-Hélène Boulanger : –  Tel. : 022 809 60 86 –  email : mh.boulanger@comedie.ch

  19. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Découvrez les plus belles tables de Suisse romande et de France voisine en bénéficiant des réductions suivantes sur chaque repas, pendant une année : 50 % pour 2 personnes / 40 % pour 3 personnes / 30 % pour 4 personnes / 20 % pour 5 à 6 personnes. Comment ça marche ? Faites votre choix parmi les 110 restaurants de votre région et réservez votre table pour 2, 3, 4, 5 ou 6 personnes. Présentez votre Passeport Gourmand dès votre arrivée. Savourez votre repas et profitez d’une réduction exceptionnelle sur votre addition (hors boissons, menu du jour et business lunch). Quels sont vos avantages ? Profitez du prix préférentiel pour les membres de l’association du CERN : – Passeport Gourmand Genève : CHF 75.- (au lieu de CHF 95.-) – Passeport Gourmand Ain/Savoie/Haute-Savoie : CHF 59.- (au lieu de...

  20. Offers

    CERN Multimedia

    Staff Association

    2013-01-01

    Concert Scoop music tour sur le parc Walibi ! Vendredi 12 Juillet Vous trouverez la présentation de l’événement et les vidéos des artistes attendus avec leurs titres faisant vibrer les radios en ce moment sur le site internet http://www.walibi.com/rhone-alpes/fr-fr/evenements/scoop-music-tour. Le concert est gratuit et débute à la fermeture du parc avec une première partie surprise. Profitez donc d’une belle journée sur le parc et finissez en beauté avec le concert de l’été !

  1. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    To our members 5% discount on Fnac vouchers Vouchers of 50.-, 100.- et 200. - CHF Valid in the 4 shops in Switzerland without restriction on purchases. On sale in the office of Secretariat of the staff Association.

  2. Competing definitions of contextual environments

    Directory of Open Access Journals (Sweden)

    Jerrett Michael

    2006-12-01

    Full Text Available Abstract Background The growing interest in the effects of contextual environments on health outcomes has focused attention on the strengths and weaknesses of alternate contextual unit definitions for use in multilevel analysis. The present research examined three methods to define contextual units for a sample of children already enrolled in a respiratory health study. The Inclusive Equal Weights Method (M1 and Inclusive Sample Weighted Method (M2 defined communities using the boundaries of the census blocks that incorporated the residences of the CHS participants, except that the former estimated socio-demographic variables by averaging the census block data within each community, while the latter used weighted proportion of CHS participants per block. The Minimum Bounding Rectangle Method (M3 generated minimum bounding rectangles that included 95% of the CHS participants and produced estimates of census variables using the weighted proportion of each block within these rectangles. GIS was used to map the locations of study participants, define the boundaries of the communities where study participants reside, and compute estimates of socio-demographic variables. The sensitivity of census variable estimates to the choice of community boundaries and weights was assessed using standard tests of significance. Results The estimates of contextual variables vary significantly depending on the choice of neighborhood boundaries and weights. The choice of boundaries therefore shapes the community profile and the relationships between its components (variables. Conclusion Multilevel analysis concerned with the effects of contextual environments on health requires careful consideration of what constitutes a contextual unit for a given study sample, because the alternate definitions may have differential impact on the results. The three alternative methods used in this research all carry some subjectivity, which is embedded in the decision as to what

  3. Dual-state modulation of the contextual cueing effect: Evidence from eye movement recordings.

    Science.gov (United States)

    Zhao, Guang; Liu, Qiang; Jiao, Jun; Zhou, Peiling; Li, Hong; Sun, Hong-jin

    2012-06-08

    The repeated configurations of random elements induce a better search performance than that of the displays of novel random configurations. The mechanism of such contextual cueing effect has been investigated through the use of the RT × Set Size function. There are divergent views on whether the contextual cueing effect is driven by attentional guidance or facilitation of initial perceptual processing or response selection. To explore this question, we used eye movement recording in this study, which offers information about the substages of the search task. The results suggest that the contextual cueing effect is contributed mainly by attentional guidance, and facilitation of response selection also plays a role.

  4. Contextual approach to quantum formalism

    CERN Document Server

    Khrennikov, Andrei

    2009-01-01

    The aim of this book is to show that the probabilistic formalisms of classical statistical mechanics and quantum mechanics can be unified on the basis of a general contextual probabilistic model. By taking into account the dependence of (classical) probabilities on contexts (i.e. complexes of physical conditions), one can reproduce all distinct features of quantum probabilities such as the interference of probabilities and the violation of Bell’s inequality. Moreover, by starting with a formula for the interference of probabilities (which generalizes the well known classical formula of total probability), one can construct the representation of contextual probabilities by complex probability amplitudes or, in the abstract formalism, by normalized vectors of the complex Hilbert space or its hyperbolic generalization. Thus the Hilbert space representation of probabilities can be naturally derived from classical probabilistic assumptions. An important chapter of the book critically reviews known no-go theorems...

  5. Contextualized B2B Registries

    OpenAIRE

    Radetzki, U; Boniface, M.J.; Surridge, M.

    2007-01-01

    Abstract. Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and underlying registry technologies into busi-ness relationships, procurement and project management functions has not been examined and hence existing Web Service registries lack capabilities required by business today. In this paper we present a novel contextualized B2B registry that supports dynamic regist...

  6. DISCOURSE STYLISTICS AS CONTEXTUALIZED STYLISTICS

    Directory of Open Access Journals (Sweden)

    Marina Katnić-Bakaršić

    2003-01-01

    Full Text Available The focus of the paper is on discourse stylistics, viewed as contextualized discipline. Context includes various factors (sociohistorical, cognitive, cultural and intertextual. The paper investigates the most important approaches to discourse stylistics: pragmatic stylistics, discourse and/ or conversational analysis, cognitive stylistics, critical stylistics, feminists stylistics. In discourse stylistics analysis is always combined with interpretation, and description is followed by explanation and critique.

  7. Biometrics and smart cards combine to offer high security

    International Nuclear Information System (INIS)

    Seidman, S.

    1986-01-01

    This paper discusses the Smart Card a plastic credit card sized package with an embedded computer chip which encompasses a level of technical sophistication which makes it virtually impossible to counterfeit. The question of legitimacy of the person using the Card for physical, computer, or network access can be answered by storing a biometric template of the authorized user in the Smart Card's unalterable memory. The bimetric template can be based upon a retina print, a hand print, a finger print, a wrist-vein print, a voice print, or pseudo-biometrics, such as signature dynamics, gait dynamics or keyboard typing patterns. These Cards will function only when they are being used by the authorized individuals to whom they are issued

  8. The Impact of Investor Demand on Security Offerings

    NARCIS (Netherlands)

    E. Duca (Eric)

    2011-01-01

    textabstractThe studies in this thesis contribute to a growing stream of papers showing that capital structure decisions are not only influenced by corporate determinants, but also by fluctuations in investor tastes and capital available for investment. This is a relatively new way of looking at

  9. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  10. Personal and contextual determinants of attitudes towards immigrants

    Directory of Open Access Journals (Sweden)

    Petrović Boban

    2016-01-01

    Full Text Available The issues of immigrants and attitudes towards immigrants are an important social issue in our country, and in recent years these issues have become more topical due to the large number of immigrants from the Middle East and Africa who pass through Serbia. This research was aimed at identifying the determinants of social attitudes towards immigrants. Contextual determinants, first of all, economic security and life in a multiethnic environment, as well as individual determinants, operationalized through the HEXACO model of personality, were examined. The research was conducted on the convenience sample of 540 participants. The results have shown that economic security has no direct effect on the attitudes towards immigrants, while the multiethnic environment is an important determinant of these attitudes. Personality traits, especially Openness, as well as Honesty- Humility, have better predictive power than the contextual variables. The factors of economic security are significant moderators of the relationship between personality and attitudes towards immigrants. The importance of the obtained results for understanding the formation of attitudes towards immigrants is discussed, as well as the methodological framework for future studies of attitudes towards immigrants and other social groups.

  11. THE SECURITY AUDIT WITHIN INFORMATION SYSTEMS

    OpenAIRE

    Dan Constantin TOFAN

    2011-01-01

    The information security audit is definitely a tool for determining, achieving, and maintaining a proper level of security in an organization. This article offers a comprehensive review of the world's most popular standards related to information systems security audit.

  12. Secure Data Flow in a Calculus for Context Awareness

    DEFF Research Database (Denmark)

    Bucur, Doina; Nielsen, Mogens

    2008-01-01

    We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computing agents can provide and discover contextual information and are owners of security policies. Simple access control to contextual...

  13. Enhancing security of fingerprints through contextual biometric watermarking.

    Science.gov (United States)

    Noore, Afzel; Singh, Richa; Vatsa, Mayank; Houck, Max M

    2007-07-04

    This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually imperceptible and maintain the minutiae details. The integrity of the fingerprint image is verified through the high matching scores obtained from an automatic fingerprint identification system. There is also a high degree of visual correlation between the embedded images, and the extracted images from the watermarked fingerprint. The degree of similarity is computed using pixel-based metrics and human visual system metrics. The results also show that the proposed watermarked fingerprint and the extracted images are resilient to common attacks such as compression, filtering, and noise.

  14. The Impact of Contextual Factors on the Security of Code

    Science.gov (United States)

    2014-12-30

    and sustainment of software. Alignment is accomplished using explicit process engineering methods best characterized by the ISO 12207 -2008 model...Information Technology Process Assessment (parts 2 through 9), ISO /IEC, Geneva, 2011 10. International Standards Organization, ISO /IEC 12207 :2008 Systems...produced by the people at ISO [9,10]. This body of evidence leads us back to the initial premise, which is that the larger context is going to directly

  15. Contextualized pain management in newborns

    Directory of Open Access Journals (Sweden)

    Carlo Valerio Bellieni

    2016-08-01

    Full Text Available Neonatal pain treatment requires personalization, and pain assessment should be contextualized to be effective. Here we summarize the available tools in neonatal analgesia, paying a special attention to highlight the personalization of antalgic behavior, both in assessment and in treatment of neonatal pain. Proceedings of the 11th International Workshop on Neonatology and Satellite Meetings · Cagliari (Italy · October 26th-31st, 2015 · From the womb to the adultGuest Editors: Vassilios Fanos (Cagliari, Italy, Michele Mussap (Genoa, Italy, Antonio Del Vecchio (Bari, Italy, Bo Sun (Shanghai, China, Dorret I. Boomsma (Amsterdam, the Netherlands, Gavino Faa (Cagliari, Italy, Antonio Giordano (Philadelphia, USA

  16. Contextual logic for quantum systems

    International Nuclear Information System (INIS)

    Domenech, Graciela; Freytes, Hector

    2005-01-01

    In this work we build a quantum logic that allows us to refer to physical magnitudes pertaining to different contexts from a fixed one without the contradictions with quantum mechanics expressed in no-go theorems. This logic arises from considering a sheaf over a topological space associated with the Boolean sublattices of the ortholattice of closed subspaces of the Hilbert space of the physical system. Different from standard quantum logics, the contextual logic maintains a distributive lattice structure and a good definition of implication as a residue of the conjunction

  17. Memory cost of quantum contextuality

    International Nuclear Information System (INIS)

    Kleinmann, Matthias; Gühne, Otfried; Portillo, José R; Larsson, Jan-Åke; Cabello, Adán

    2011-01-01

    The simulation of quantum effects requires certain classical resources, and quantifying them is an important step to characterize the difference between quantum and classical physics. For a simulation of the phenomenon of state-independent quantum contextuality, we show that the minimum amount of memory used by the simulation is the critical resource. We derive optimal simulation strategies for important cases and prove that reproducing the results of sequential measurements on a two-qubit system requires more memory than the information-carrying capacity of the system. (paper)

  18. Offering Incentives from the Outside

    DEFF Research Database (Denmark)

    Emmanuel, Nikolas G.

    2017-01-01

    Incentives offer a good deal of underexplored opportunities to help manage conflict by encouraging political bargaining. This study has two primary objectives. First, it furthers the discussion of how external third parties can help manage conflicts. Second, it offers a typology of the available ...

  19. Facets of contextual realism in quantum mechanics

    International Nuclear Information System (INIS)

    Pan, Alok Kumar; Home, Dipankar

    2011-01-01

    In recent times, there is an upsurge of interest in demonstrating the quantum contextuality. In this proceedings, we explore the two different forms of arguments that have been used for showing the contextual character of quantum mechanics. First line of study concerns the violations of the noncontextual realist models by quantum mechanics, where second line of study that is qualitatively distinct from the earlier one, demonstrates the contextuality within the formalism of quantum mechanics.

  20. Contextual inquiry for medical device design

    CERN Document Server

    Privitera, Mary Beth

    2015-01-01

    Contextual Inquiry for Medical Device Design helps users understand the everyday use of medical devices and the way their usage supports the development of better products and increased market acceptance. The text explains the concept of contextual inquiry using real-life examples to illustrate its application. Case studies provide a frame of reference on how contextual inquiry is successfully used during product design, ultimately producing safer, improved medical devices. Presents the ways contextual inquiry can be used to inform the evaluation and business case of technologyHelps users

  1. Rapid contextual conditioning in autoshaping.

    Science.gov (United States)

    Balsam, P D; Schwartz, A L

    1981-10-01

    Two experiments are reported which investigate the speed of contextual conditioning in autoshaping. In both experiments, a procedure was employed in which ring doves were magazine trained in one context prior to the manipulation of background values in a second context. In Experiment 1, subjects were exposed to 4, 8, 64, 128, or 256 US-only presentations prior to autoshaping. Acquisition speed and maintained response measures were monotonically related to the number of pretraining trials. Subjects in Group 4 acquired the key-peck response fastest, and retardation was maximal within 64 pretraining trials. In Experiment 2, subjects given 20 pretraining trials were significantly more retarded than subjects given 2 pretraining trials, but only when pretraining and testing were conducted in the same context. Overall, the results of these experiments show that in autoshaping, contextual conditioning is very rapid; this demonstrates the plausibility of theoretical accounts of Pavlovian conditioning which assert that the development of the conditioned response depends on the associative values of both the CS and background stimuli.

  2. Mitigating Docker Security Issues

    OpenAIRE

    Yasrab, Robail

    2018-01-01

    It is very easy to run applications in Docker. Docker offers an ecosystem that offers a platform for application packaging, distributing and managing within containers. However, Docker platform is yet not matured. Presently, Docker is less secured as compare to virtual machines (VM) and most of the other cloud technologies. The key of reason of Docker inadequate security protocols is containers sharing of Linux kernel, which can lead to risk of privileged escalations. This research is going t...

  3. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  4. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  5. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  6. Moral contextualism and the problem of triviality

    NARCIS (Netherlands)

    Evers, Daan

    Moral contextualism is the view that claims like ‘A ought to X’ are implicitly relative to some (contextually variable) standard. This leads to a problem: what are fundamental moral claims like ‘You ought to maximize happiness’ relative to? If this claim is relative to a utilitarian standard, then

  7. Contextual Factors in Adolescent Substance Use.

    Science.gov (United States)

    Hochhauser, Mark; And Others

    Research on adolescent substance use has focused on prevalence and incidence; however, contextual factors have been largely ignored. A survey of 155 adolescents from a Minneapolis suburb was conducted to assess contextual factors affecting adolescent substance use. Subjects reported their use of alcohol, cigarettes, and marihuana with respect to…

  8. Moral contextualism and the problem of triviality

    NARCIS (Netherlands)

    Evers, H.W.A.

    2013-01-01

    Moral contextualism is the view that claims like ‘A ought to X’ are implicitly relative to some (contextually variable) standard. This leads to a problem: what are fundamental moral claims like ‘You ought to maximize happiness’ relative to? If the claim is relative to a utilitarian standard, then

  9. Contextual factors and effective school improvement

    NARCIS (Netherlands)

    Sun, Hechuan; Creemers, Bert P. M.; de Jong, Rob

    This research provides policy-makers, researchers, and educators at all levels with a glimpse of the contextual influence on effective school improvement (ESI) in 8 European countries. What are the factors at the contextual level, particularly at the national level, which influence ESI? Are there

  10. Contextual Cueing Effects across the Lifespan

    Science.gov (United States)

    Merrill, Edward C.; Conners, Frances A.; Roskos, Beverly; Klinger, Mark R.; Klinger, Laura Grofer

    2013-01-01

    The authors evaluated age-related variations in contextual cueing, which reflects the extent to which visuospatial regularities can facilitate search for a target. Previous research produced inconsistent results regarding contextual cueing effects in young children and in older adults, and no study has investigated the phenomenon across the life…

  11. Alternative security

    International Nuclear Information System (INIS)

    Weston, B.H.

    1990-01-01

    This book contains the following chapters: The Military and Alternative Security: New Missions for Stable Conventional Security; Technology and Alternative Security: A Cherished Myth Expires; Law and Alternative Security: Toward a Just World Peace; Politics and Alternative Security: Toward a More Democratic, Therefore More Peaceful, World; Economics and Alternative Security: Toward a Peacekeeping International Economy; Psychology and Alternative Security: Needs, Perceptions, and Misperceptions; Religion and Alternative Security: A Prophetic Vision; and Toward Post-Nuclear Global Security: An Overview

  12. Reliable computation from contextual correlations

    Science.gov (United States)

    Oestereich, André L.; Galvão, Ernesto F.

    2017-12-01

    An operational approach to the study of computation based on correlations considers black boxes with one-bit inputs and outputs, controlled by a limited classical computer capable only of performing sums modulo-two. In this setting, it was shown that noncontextual correlations do not provide any extra computational power, while contextual correlations were found to be necessary for the deterministic evaluation of nonlinear Boolean functions. Here we investigate the requirements for reliable computation in this setting; that is, the evaluation of any Boolean function with success probability bounded away from 1 /2 . We show that bipartite CHSH quantum correlations suffice for reliable computation. We also prove that an arbitrarily small violation of a multipartite Greenberger-Horne-Zeilinger noncontextuality inequality also suffices for reliable computation.

  13. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  14. Dissociation - a preliminary contextual model

    Directory of Open Access Journals (Sweden)

    C Krüger

    2007-02-01

    Full Text Available Background. The Diagnostic and Statistical Manual of Mental Disorders (DSM system has certain limitations when applied to two South African examples of dissociation, because it is descriptive (non-explanatory and focuses on intrapsychic (non-communal processes. Even the existing Western explanatory models of dissociation fail to accommodate fully the communal aspects of dissociation in our South African context. Objectives and methods. The aim was to explore an expanded perspective on dissociation that does not limit it to an intrapsychic phenomenon, but that accounts for the interrelatedness of individuals within their social context. Auto-ethnography was used. In this article a collective, socially orientated, contextual hermeneutic was applied to two local examples of dissociation. Three existing Western models were expanded along multicontextual, collective lines, for them to be more useful in the pluralistic South African context. Results. This preliminary contextual model of dissociation includes a person’s interpersonal, socio-cultural, and spiritual contexts, in addition to the intrapsychic context. Dissociation is considered to be a normal information-processing tool that maintains balanced, coherent selves-in-society, i.e. individuals connected to each other. In the South African context dissociation appears mostly as a normal phenomenon and seldom as a sign of mental illness. Dissociation is pivotal for the normal construction of individual and communal identities in the face of conflicting sets of information from various contexts. Dissociation may help individuals or communities to survive in a world of conflicting messages, where conflict is often interpersonal/cultural/societal in nature, rather than primarily intrapsychic. Conclusions. This model should be developed and evaluated further. Such evaluation would require suitable new local terminology.

  15. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  16. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  17. Homeland Security

    Science.gov (United States)

    Provides an overview of EPA's homeland security roles and responsibilities, and links to specific homeland security issues: water security, research, emergency response, recovery, and waste management.

  18. A Privacy-by-Design Contextual Suggestion System for Tourism

    Directory of Open Access Journals (Sweden)

    Pavlos S. Efraimidis

    2016-05-01

    Full Text Available We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the computational capabilities of modern smart devices to offer high quality personalized POI (point of interest recommendations. To protect user privacy, we apply a privacy by design approach within all of the steps of creating Pythia. The outcome is a system that comprises important architectural and operational innovations. The system is designed to process sensitive personal data, such as location traces, browsing history and web searches (query logs, to automatically infer user preferences and build corresponding POI-based user profiles. These profiles are then used by a contextual suggestion engine to anticipate user choices and make POI recommendations for tourists. Privacy leaks are minimized by implementing an important part of the system functionality at the user side, either as a mobile app or as a client-side web application, and by taking additional precautions, like data generalization, wherever necessary. As a proof of concept, we present a prototype that implements the aforementioned mechanisms on the Android platform accompanied with certain web applications. Even though the current prototype focuses only on location data, the results from the evaluation of the contextual suggestion algorithms and the user experience feedback from volunteers who used the prototype are very positive.

  19. New offer for our members

    CERN Document Server

    Staff Association

    2018-01-01

    Evolution 2, your specialist for Outdoor Adventures Be it for a ski lesson, a parachute jump or for a mountain bike descent, come live an unforgettable experience with our outdoor specialists. Benefit from a 10 % discount on all activities: Offer is open to SA members and their family members living in the same household, upon presentation of the membership card. Offer available for all bookings made between 1 June 2018 and 30 May 2019. Offer available on all the Evoltion2 sites. A wide range of summer and winter activities. More information on http://evolution2.com/ Contact and reservation : +33 (0)4.50.02.63.35 management@evolution2.com

  20. 17 CFR 240.14e-5 - Prohibiting purchases outside of a tender offer.

    Science.gov (United States)

    2010-04-01

    ...(s); (iv) The intention of the offeror to make purchases pursuant to the foreign tender offer(s) is... consideration paid outside of the tender offer that is greater than the tender offer price; and (G) Purchases or... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Prohibiting purchases outside...

  1. Security Dilemma

    DEFF Research Database (Denmark)

    Wivel, Anders

    2011-01-01

    What is a security dilemma? What are the consequences of security dilemmas in international politics?......What is a security dilemma? What are the consequences of security dilemmas in international politics?...

  2. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  3. Convergence of Corporate and Information Security

    OpenAIRE

    Syed; Rahman, M.; Donahue, Shannon E.

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  4. Attentional and Contextual Priors in Sound Perception.

    Science.gov (United States)

    Wolmetz, Michael; Elhilali, Mounya

    2016-01-01

    Behavioral and neural studies of selective attention have consistently demonstrated that explicit attentional cues to particular perceptual features profoundly alter perception and performance. The statistics of the sensory environment can also provide cues about what perceptual features to expect, but the extent to which these more implicit contextual cues impact perception and performance, as well as their relationship to explicit attentional cues, is not well understood. In this study, the explicit cues, or attentional prior probabilities, and the implicit cues, or contextual prior probabilities, associated with different acoustic frequencies in a detection task were simultaneously manipulated. Both attentional and contextual priors had similarly large but independent impacts on sound detectability, with evidence that listeners tracked and used contextual priors for a variety of sound classes (pure tones, harmonic complexes, and vowels). Further analyses showed that listeners updated their contextual priors rapidly and optimally, given the changing acoustic frequency statistics inherent in the paradigm. A Bayesian Observer model accounted for both attentional and contextual adaptations found with listeners. These results bolster the interpretation of perception as Bayesian inference, and suggest that some effects attributed to selective attention may be a special case of contextual prior integration along a feature axis.

  5. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  6. Pythia: A Privacy-enhanced Personalized Contextual Suggestion System for Tourism

    NARCIS (Netherlands)

    Drosatos, G.; Efraimidis, P.S.; Arampatzis, A.; Stamatelatos, G.; Athanasiadis, I.N.

    2015-01-01

    We present Pythia, a privacy-enhanced non-invasive contextual suggestion system for tourists, with important architectural innovations. The system offers high quality personalized recommendations, non-invasive operation and protection of user privacy. A key feature of Pythia is the exploitation of

  7. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule...... in China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  8. Testing quantum contextuality. The problem of compatibility

    International Nuclear Information System (INIS)

    Szangolies, Jochen

    2015-01-01

    Jochen Szangolies contributes a novel way of dealing with the problem of the experimental testability of the Kochen-Specker theorem posed by realistic, that is, noisy, measurements. Such noise spoils perfect compatibility between successive measurements, which however is a necessary requirement to test the notion of contextuality in usual approaches. To overcome this difficulty, a new, extended notion of contextuality that reduces to Kochen-Specker contextuality in the limit of perfect measurement implementations is proposed by the author, together with a scheme to test this notion experimentally. Furthermore, the behaviour of these tests under realistic noise conditions is investigated.

  9. 17 CFR 230.254 - Solicitation of interest document for use prior to an offering statement.

    Science.gov (United States)

    2010-04-01

    ... subject to the antifraud provisions of the federal securities laws. No solicitation or acceptance of money... document for use prior to an offering statement. 230.254 Section 230.254 Commodity and Securities Exchanges...-Conditional Small Issues Exemption § 230.254 Solicitation of interest document for use prior to an offering...

  10. A unifying Bayesian account of contextual effects in value-based choice.

    Directory of Open Access Journals (Sweden)

    Francesco Rigoli

    2017-10-01

    Full Text Available Empirical evidence suggests the incentive value of an option is affected by other options available during choice and by options presented in the past. These contextual effects are hard to reconcile with classical theories and have inspired accounts where contextual influences play a crucial role. However, each account only addresses one or the other of the empirical findings and a unifying perspective has been elusive. Here, we offer a unifying theory of context effects on incentive value attribution and choice based on normative Bayesian principles. This formulation assumes that incentive value corresponds to a precision-weighted prediction error, where predictions are based upon expectations about reward. We show that this scheme explains a wide range of contextual effects, such as those elicited by other options available during choice (or within-choice context effects. These include both conditions in which choice requires an integration of multiple attributes and conditions where a multi-attribute integration is not necessary. Moreover, the same scheme explains context effects elicited by options presented in the past or between-choice context effects. Our formulation encompasses a wide range of contextual influences (comprising both within- and between-choice effects by calling on Bayesian principles, without invoking ad-hoc assumptions. This helps clarify the contextual nature of incentive value and choice behaviour and may offer insights into psychopathologies characterized by dysfunctional decision-making, such as addiction and pathological gambling.

  11. Contextual Advantage for State Discrimination

    Science.gov (United States)

    Schmid, David; Spekkens, Robert W.

    2018-02-01

    Finding quantitative aspects of quantum phenomena which cannot be explained by any classical model has foundational importance for understanding the boundary between classical and quantum theory. It also has practical significance for identifying information processing tasks for which those phenomena provide a quantum advantage. Using the framework of generalized noncontextuality as our notion of classicality, we find one such nonclassical feature within the phenomenology of quantum minimum-error state discrimination. Namely, we identify quantitative limits on the success probability for minimum-error state discrimination in any experiment described by a noncontextual ontological model. These constraints constitute noncontextuality inequalities that are violated by quantum theory, and this violation implies a quantum advantage for state discrimination relative to noncontextual models. Furthermore, our noncontextuality inequalities are robust to noise and are operationally formulated, so that any experimental violation of the inequalities is a witness of contextuality, independently of the validity of quantum theory. Along the way, we introduce new methods for analyzing noncontextuality scenarios and demonstrate a tight connection between our minimum-error state discrimination scenario and a Bell scenario.

  12. Contextual cueing by global features

    Science.gov (United States)

    Kunar, Melina A.; Flusberg, Stephen J.; Wolfe, Jeremy M.

    2008-01-01

    In visual search tasks, attention can be guided to a target item, appearing amidst distractors, on the basis of simple features (e.g. find the red letter among green). Chun and Jiang’s (1998) “contextual cueing” effect shows that RTs are also speeded if the spatial configuration of items in a scene is repeated over time. In these studies we ask if global properties of the scene can speed search (e.g. if the display is mostly red, then the target is at location X). In Experiment 1a, the overall background color of the display predicted the target location. Here the predictive color could appear 0, 400 or 800 msec in advance of the search array. Mean RTs are faster in predictive than in non-predictive conditions. However, there is little improvement in search slopes. The global color cue did not improve search efficiency. Experiments 1b-1f replicate this effect using different predictive properties (e.g. background orientation/texture, stimuli color etc.). The results show a strong RT effect of predictive background but (at best) only a weak improvement in search efficiency. A strong improvement in efficiency was found, however, when the informative background was presented 1500 msec prior to the onset of the search stimuli and when observers were given explicit instructions to use the cue (Experiment 2). PMID:17355043

  13. Contextual Advantage for State Discrimination

    Directory of Open Access Journals (Sweden)

    David Schmid

    2018-02-01

    Full Text Available Finding quantitative aspects of quantum phenomena which cannot be explained by any classical model has foundational importance for understanding the boundary between classical and quantum theory. It also has practical significance for identifying information processing tasks for which those phenomena provide a quantum advantage. Using the framework of generalized noncontextuality as our notion of classicality, we find one such nonclassical feature within the phenomenology of quantum minimum-error state discrimination. Namely, we identify quantitative limits on the success probability for minimum-error state discrimination in any experiment described by a noncontextual ontological model. These constraints constitute noncontextuality inequalities that are violated by quantum theory, and this violation implies a quantum advantage for state discrimination relative to noncontextual models. Furthermore, our noncontextuality inequalities are robust to noise and are operationally formulated, so that any experimental violation of the inequalities is a witness of contextuality, independently of the validity of quantum theory. Along the way, we introduce new methods for analyzing noncontextuality scenarios and demonstrate a tight connection between our minimum-error state discrimination scenario and a Bell scenario.

  14. Pharmacological Fingerprints of Contextual Uncertainty.

    Directory of Open Access Journals (Sweden)

    Louise Marshall

    2016-11-01

    Full Text Available Successful interaction with the environment requires flexible updating of our beliefs about the world. By estimating the likelihood of future events, it is possible to prepare appropriate actions in advance and execute fast, accurate motor responses. According to theoretical proposals, agents track the variability arising from changing environments by computing various forms of uncertainty. Several neuromodulators have been linked to uncertainty signalling, but comprehensive empirical characterisation of their relative contributions to perceptual belief updating, and to the selection of motor responses, is lacking. Here we assess the roles of noradrenaline, acetylcholine, and dopamine within a single, unified computational framework of uncertainty. Using pharmacological interventions in a sample of 128 healthy human volunteers and a hierarchical Bayesian learning model, we characterise the influences of noradrenergic, cholinergic, and dopaminergic receptor antagonism on individual computations of uncertainty during a probabilistic serial reaction time task. We propose that noradrenaline influences learning of uncertain events arising from unexpected changes in the environment. In contrast, acetylcholine balances attribution of uncertainty to chance fluctuations within an environmental context, defined by a stable set of probabilistic associations, or to gross environmental violations following a contextual switch. Dopamine supports the use of uncertainty representations to engender fast, adaptive responses.

  15. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  16. Contextualizing Asian American College Student Psychological Health

    Science.gov (United States)

    Liang, Christopher T. H.; Liu, Jessica; Nguyen, David; Song, Ge

    2017-01-01

    With attention to race, culture, and gender, this chapter contextualizes the help-seeking behaviors and psychological aspects of health facing Asian American college students. Recommendations are provided to student affairs professionals and counselors.

  17. An Order-Theoretic Quantification of Contextuality

    Directory of Open Access Journals (Sweden)

    Ian T. Durham

    2014-09-01

    Full Text Available In this essay, I develop order-theoretic notions of determinism and contextuality on domains and topoi. In the process, I develop a method for quantifying contextuality and show that the order-theoretic sense of contextuality is analogous to the sense embodied in the topos-theoretic statement of the Kochen–Specker theorem. Additionally, I argue that this leads to a relation between the entropy associated with measurements on quantum systems and the second law of thermodynamics. The idea that the second law has its origin in the ordering of quantum states and processes dates to at least 1958 and possibly earlier. The suggestion that the mechanism behind this relation is contextuality, is made here for the first time.

  18. Study on Uncertainty and Contextual Modelling

    Czech Academy of Sciences Publication Activity Database

    Klimešová, Dana; Ocelíková, E.

    2007-01-01

    Roč. 1, č. 1 (2007), s. 12-15 ISSN 1998-0140 Institutional research plan: CEZ:AV0Z10750506 Keywords : Knowledge * contextual modelling * temporal modelling * uncertainty * knowledge management Subject RIV: BD - Theory of Information

  19. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  20. Intact memory for implicit contextual information in Korsakoff's amnesia

    NARCIS (Netherlands)

    Oudman, Erik; Van der Stigchel, Stefan; Wester, Arie J.; Kessels, Roy P. C.; Postma, Albert

    Implicit contextual learning is the ability to acquire contextual information from our surroundings without conscious awareness. Such contextual information facilitates the localization of objects in space. In a typical implicit contextual learning paradigm, subjects need to find a target among a

  1. Intact memory for implicit contextual information in Korsakoff's amnesia

    NARCIS (Netherlands)

    Oudman, E.; Stigchel, S. van der; Wester, A.J.; Kessels, R.P.C.; Postma, A.

    2011-01-01

    Implicit contextual learning is the ability to acquire contextual information from our surroundings without conscious awareness. Such contextual information facilitates the localization of objects in space. In a typical implicit contextual learning paradigm, subjects need to find a target among a

  2. Initial Public Offering – Finance Source of Stock

    Directory of Open Access Journals (Sweden)

    Sorin Claudiu Radu

    2013-10-01

    Full Text Available Capital market offers a wide range of options for financing companies, which can be tailored to meet their exact needs. Thus, they have the opportunity of primary security sale (shares and bonds on the stock exchange, which may take place through a tender, in which case the financial instruments issued by a company are underwritten at the date of issue, or through a secondary offer, in which case they are issued and offered for sale by the issuer. If the public sale offer focuses on shares and aims at transforming the issuing company into a public one, then it bears the name of IPO (Initial Public Offering. The present work aims for the evolution of IPO trends on the European market in the aftermath of the global crisis outbreak. The market of IPO carried out by BSE is also analyzed herewith.

  3. Security Evolution.

    Science.gov (United States)

    De Patta, Joe

    2003-01-01

    Examines how to evaluate school security, begin making schools safe, secure schools without turning them into fortresses, and secure schools easily and affordably; the evolution of security systems into information technology systems; using schools' high-speed network lines; how one specific security system was developed; pros and cons of the…

  4. Audit Characteristics for Information System Security

    OpenAIRE

    Marius POPA; Mihai DOINEA

    2007-01-01

    The paper presents the main aspects regarding the development of the information security and assurance of their security. The information systems, standards and audit processes definitions are offered. There are presented the most important security standards used in information system security assessment

  5. Contextualizing Social Science in Nepal

    Directory of Open Access Journals (Sweden)

    Dev Raj Dahal

    2008-10-01

    Full Text Available Social science informs about the ideals and trains experts to deal with the complex social realities. It has a public purpose rooted in what we call dharma (professional and institutional responsibility as opposed to the arrogance of reason, self-will and self-rationalization intrinsic to contemporary rational choice and modernity. Learning has a synergy - establishing connection between the world of social science theories and the drama of social life. A lack of mutual learning between Nepal's traditional faith intellectuals and modern reason-based social scientists has created a big hiatus and contradiction. The academic life of social scientists in Nepal is completely outside of spiritual, moral and ethical influence experienced by ordinary public. The spiritual blindness of modern social scientists has thus opened multiple gaps between their worldview and those of the citizens on various frontiers--theoretical knowledge and practical experience, technical understanding and composite knowledge and secularity of social science and the vitality of the Hindu-Buddhist scriptures in the popular mind, culture, behavior and practices. This has reinforced a division between the system of knowledge of social scientists and the life-world of people. The proponents of new social movements in Nepal, such as women, Dalits, Janajatis, Madhesis, youths and marginalized population are seeking a structural shift in reason-based knowledge to both reason and feeling in social science knowledge discovery. This movement can open the "captive mind" to social learning of contextual knowledge, conduct research with the citizens, provide inputs to the policy makers and reverse their linear, structure-bound, rationalist and disciplinary thinking into the one that represents what the Nepal mandala, the Nepali space, is really like and how to improve it for the better. The renewal and indigenization of qualitative social science research is important to overcome the

  6. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  7. Policy offers protection from harassment

    Science.gov (United States)

    McNutt, Marcia

    We face a number of legal and ethical issues in our work as scientists and as AGU members. To uphold the highest ethical standards in our professional activities, the Council has adopted policies on free access to published material, ethics in publishing, and misconduct in science. But what about guidelines to govern the personal behavior that constitutes harassment, sexual or otherwise?For years the AGU headquarters staff has had a policy that offers protection from harassment and rules for dealing with it, but the membership went without one until 1994. That year the Council adopted a policy that extends to the membership as well as to the staff and the vendors they encounter at meetings. The law only requires a policy to prevent harassment in the workplace, but the Council felt that a harassment policy was particularly important for members because the subtle behavior that can constitute harassment is most likely to occur at events that combine work and social interaction, such as the meetings, conferences, and training seminars that AGU members attend.

  8. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  9. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  10. Contextualized personality: traditional and new assessment procedures.

    Science.gov (United States)

    Heller, Daniel; Watson, David; Komar, Jennifer; Min, Ji-A; Perunovic, Wei Qi Elaine

    2007-12-01

    We describe our ongoing program of research related to the assessment of contextualized personality, focusing on social roles and cultural cues as contextual factors. First, we present our research employing the traditional assessment approach, wherein participants are asked to rate explicitly their personality across several different roles. We argue that this hypothetical approach is potentially susceptible to the influence of stereotypes, social desirability, and demand characteristics. We therefore describe the development of three novel and subtle assessment procedures that are based on obtaining online self-representations that are activated while occupying a specific context. Finally, the strengths and limitations of all four approaches, as well as directions for future research in the study of contextualized personality, are discussed.

  11. Improving Acquisition Outcomes with Contextual Ambidexterity

    DEFF Research Database (Denmark)

    Meglio, Olimpia; King, David R.; Risberg, Annette

    2015-01-01

    The results of research on mergers and acquisitions often point to a need to improve acquisition outcomes and lessen the organizational turmoil that can often follow integration efforts. We assert that viewing acquisition integration through the lens of contextual ambidexterity may improve...... acquisition outcomes in two ways: by providing an integrated solution to the economic and social tensions in acquisitions, and by enabling managers to effectively confront the competing needs of task and human integration. We also posit that by building on contextual ambidexterity, we can extend...... the possibilities for both research and practice regarding task and human integration in acquisitions. We also emphasize the role of an integration manager and integration mechanisms in enabling contextual ambidexterity for successful acquisition integration. Finally, we identify implications for research...

  12. Contextuality for preparations, transformations, and unsharp measurements

    International Nuclear Information System (INIS)

    Spekkens, R.W.

    2005-01-01

    The Bell-Kochen-Specker theorem establishes the impossibility of a noncontextual hidden variable model of quantum theory, or equivalently, that quantum theory is contextual. In this paper, an operational definition of contextuality is introduced which generalizes the standard notion in three ways: (i) it applies to arbitrary operational theories rather than just quantum theory (ii) it applies to arbitrary experimental procedures rather than just sharp measurements, and (iii) it applies to a broad class of ontological models of quantum theory rather than just deterministic hidden variable models. We derive three no-go theorems for ontological models, each based on an assumption of noncontextuality for a different sort of experimental procedure; one for preparation procedures, another for unsharp measurement procedures (that is, measurement procedures associated with positive-operator valued measures), and a third for transformation procedures. All three proofs apply to two-dimensional Hilbert spaces, and are therefore stronger than traditional proofs of contextuality

  13. Contextual Factors for Finding Similar Experts

    DEFF Research Database (Denmark)

    Hofmann, Katja; Balog, Krisztian; Bogers, Toine

    2010-01-01

    -seeking models, are rarely taken into account. In this article, we extend content-based expert-finding approaches with contextual factors that have been found to influence human expert finding. We focus on a task of science communicators in a knowledge-intensive environment, the task of finding similar experts......, given an example expert. Our approach combines expertise-seeking and retrieval research. First, we conduct a user study to identify contextual factors that may play a role in the studied task and environment. Then, we design expert retrieval models to capture these factors. We combine these with content......-based retrieval models and evaluate them in a retrieval experiment. Our main finding is that while content-based features are the most important, human participants also take contextual factors into account, such as media experience and organizational structure. We develop two principled ways of modeling...

  14. Financial security

    NARCIS (Netherlands)

    de Goede, M.; Burgess, J.P.

    2010-01-01

    1. Introduction J. Peter Burgess Part 1: New Security Concepts 2. Civilizational Security Brett Bowden 3. Risk Oliver Kessler 4. Small Arms Keith Krause 5. Critical Human Security Taylor Owen 6. Critical Geopolitics Simon Dalby Part 2: New Security Subjects 7. Biopolitics Michael Dillon 8. Gendered

  15. Cyber security

    CERN Document Server

    Voeller, John G

    2014-01-01

    Cyber Security features articles from the Wiley Handbook of Science and Technology for Homeland Security covering topics related to cyber security metrics and measure  and related technologies that meet security needs. Specific applications to web services, the banking and the finance sector, and industrial process control systems are discussed.

  16. Contextual influences on reverse knowledge transfer

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2010-01-01

    Further development of theories about how contextual factors influence the beneficial reverse knowledge transfer from subsidiary to head quarters in disparate national country contexts, is the aim of our study. Earlier studies do not fully capture the different effects national country cultures can....... A proposition model is developed where the dependent variable is beneficial reverse knowledge transfer. The independent variables are: higher relative knowledge level in subsidiaty than in HQ, authority respect, activity fit with contextual learning preference. The conclusion suggest that different contexts...

  17. Involving Customer Relations in Contextual Design

    DEFF Research Database (Denmark)

    Simonsen, Jesper

    1996-01-01

    This paper presents a case study in the form of a contextual design project, the aim of which was to design a system for a particular organization. The starting point in the case was a need in the organization for a specific system. The case involved an analysis of the organizations customer...... point of the design project, how the project was conducted, and which results it ended up with. This is followed by a discussion of the effects of, and lessons learned by, involving customer relations in contextual design....

  18. Security negotiation

    OpenAIRE

    Mitrović, Miroslav M.; Ivaniš, Željko

    2013-01-01

    Contemporary security challenges, risks and threats represent a resultant of the achieved level of interaction between various entities within the paradigm of global security relations. Asymmetry and nonlinearity are main features of contemporary challenges in the field of global security. Negotiation in the area of security, namely the security negotiation, thus goes beyond just the domain of negotiation in conflicts and takes into consideration particularly asymmetric forms of possible sour...

  19. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  20. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...... to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...

  1. Predicting Contextual Informativeness for Vocabulary Learning

    Science.gov (United States)

    Kapelner, Adam; Soterwood, Jeanine; Nessaiver, Shalev; Adlof, Suzanne

    2018-01-01

    Vocabulary knowledge is essential to educational progress. High quality vocabulary instruction requires supportive contextual examples to teach word meaning and proper usage. Identifying such contexts by hand for a large number of words can be difficult. In this work, we take a statistical learning approach to engineer a system that predicts…

  2. Contextuality in canonical systems of random variables

    Science.gov (United States)

    Dzhafarov, Ehtibar N.; Cervantes, Víctor H.; Kujala, Janne V.

    2017-10-01

    Random variables representing measurements, broadly understood to include any responses to any inputs, form a system in which each of them is uniquely identified by its content (that which it measures) and its context (the conditions under which it is recorded). Two random variables are jointly distributed if and only if they share a context. In a canonical representation of a system, all random variables are binary, and every content-sharing pair of random variables has a unique maximal coupling (the joint distribution imposed on them so that they coincide with maximal possible probability). The system is contextual if these maximal couplings are incompatible with the joint distributions of the context-sharing random variables. We propose to represent any system of measurements in a canonical form and to consider the system contextual if and only if its canonical representation is contextual. As an illustration, we establish a criterion for contextuality of the canonical system consisting of all dichotomizations of a single pair of content-sharing categorical random variables. This article is part of the themed issue `Second quantum revolution: foundational questions'.

  3. Scene-Based Contextual Cueing in Pigeons

    Science.gov (United States)

    Wasserman, Edward A.; Teng, Yuejia; Brooks, Daniel I.

    2014-01-01

    Repeated pairings of a particular visual context with a specific location of a target stimulus facilitate target search in humans. We explored an animal model of such contextual cueing. Pigeons had to peck a target which could appear in one of four locations on color photographs of real-world scenes. On half of the trials, each of four scenes was consistently paired with one of four possible target locations; on the other half of the trials, each of four different scenes was randomly paired with the same four possible target locations. In Experiments 1 and 2, pigeons exhibited robust contextual cueing when the context preceded the target by 1 s to 8 s, with reaction times to the target being shorter on predictive-scene trials than on random-scene trials. Pigeons also responded more frequently during the delay on predictive-scene trials than on random-scene trials; indeed, during the delay on predictive-scene trials, pigeons predominately pecked toward the location of the upcoming target, suggesting that attentional guidance contributes to contextual cueing. In Experiment 3, involving left-right and top-bottom scene reversals, pigeons exhibited stronger control by global than by local scene cues. These results attest to the robustness and associative basis of contextual cueing in pigeons. PMID:25546098

  4. Cultural and Contextual Issues in Exemplar Research

    Science.gov (United States)

    King, Pamela Ebstyne; Oakes Mueller, Ross A.; Furrow, James

    2013-01-01

    This chapter specifically addresses how exemplar methods are especially relevant to examining cultural and contextual issues. Cross-cultural, cultural, and indigenous psychologies are discussed in order to highlight how studying actual exemplars in their unique and complex developmental contexts has the potential to identify themes that either…

  5. Which Social Media? A Call for Contextualization

    Directory of Open Access Journals (Sweden)

    Lincoln Dahlberg

    2015-04-01

    Full Text Available This essay briefly reflects upon digital social media in the mid-1990s in order to encourage: first, investigation of pre-twenty first century social media, towards the identification of lessons and resources for present-day research, practice, policy, and activism; and, second, the discursive and socio-historical contextualization of today’s social media.

  6. Locality and realism in contextual theories

    International Nuclear Information System (INIS)

    Hoekzema, D.

    1987-01-01

    Two types of contextual theories are distinguished and shown to be related. For theories of each type a criterion of locality is formulated which is weaker than the classical requirement of separability at spacelike intervals. The relations between the concepts of locality, realism, and ontic chance are discussed

  7. Towards a service centric contextualized vehicular cloud

    NARCIS (Netherlands)

    Hu, Xiping; Wang, Lei; Sheng, Zhengguo; TalebiFard, Peyman; Zhou, Li; Liu, Jia; Leung, Victor C.M.

    2014-01-01

    This paper proposes a service-centric contextualized vehicular (SCCV) cloud platform to facilitate the deployment and delivery of cloud-based mobile applications over vehicular networks. SCCV cloud employs a multi-tier architecture that consists of the network, mobile device, and cloud tiers. Based

  8. Significant Statistics: Viewed with a Contextual Lens

    Science.gov (United States)

    Tait-McCutcheon, Sandi

    2010-01-01

    This paper examines the pedagogical and organisational changes three lead teachers made to their statistics teaching and learning programs. The lead teachers posed the research question: What would the effect of contextually integrating statistical investigations and literacies into other curriculum areas be on student achievement? By finding the…

  9. Quantum contextuality in N-boson systems

    International Nuclear Information System (INIS)

    Benatti, Fabio; Floreanini, Roberto; Genovese, Marco; Olivares, Stefano

    2011-01-01

    Quantum contextuality in systems of identical bosonic particles is explicitly exhibited via the maximum violation of a suitable inequality of Clauser-Horne-Shimony-Holt type. Unlike the approaches considered so far, which make use of single-particle observables, our analysis involves collective observables constructed using multiboson operators. An exemplifying scheme to test this violation with a quantum optical setup is also discussed.

  10. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  11. Mobile Contextualized learning games for decision support training

    NARCIS (Netherlands)

    Klemke, Roland

    2014-01-01

    This interactive workshop session introduces mobile serious games as situated, contextualized learning games. Example cases for mobile serious games for decision support training are introduced and discussed. Participants will get to know contextualization techniques used in modern mobile devices

  12. Mobile Contextualized learning games for decision support training

    NARCIS (Netherlands)

    Klemke, Roland; Börner, Dirk; Suarez, Angel; Schneider, Jan; Antonaci, Alessandra

    2015-01-01

    This interactive workshop session introduces mobile serious games as situated, contextualized learning games. Example cases for mobile serious games for decision support training are introduced and discussed. Participants will get to know contextualization techniques used in modern mobile

  13. Testing a pedagogy for promoting historical contextualization in classrooms

    NARCIS (Netherlands)

    Huijgen, Tim; Holthuis, Paul; van Boxtel, Carla; van de Grift, Wim

    2016-01-01

    This study describes the development and testing of a pedagogy aimed at promoting students’ ability to perform historical contextualization. Promoting historical contextualization was conceptualized as three different pedagogical principles: 1) the awareness of the consequences of a present-oriented

  14. 48 CFR 25.503 - Group offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Group offers. 25.503... PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 25.503 Group offers. (a) If the solicitation or an offer specifies that award can be made only on a group of line items or on all line items...

  15. 48 CFR 570.306 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Evaluating offers. 570.306... Real Property 570.306 Evaluating offers. (a) You must evaluate offers solely in accordance with the... solicitation. The file must include the basis for evaluation, an analysis of each offer, and a summary of...

  16. 48 CFR 225.503 - Group offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Group offers. 225.503... OF DEFENSE SOCIOECONOMIC PROGRAMS FOREIGN ACQUISITION Evaluating Foreign Offers-Supply Contracts 225.503 Group offers. Evaluate group offers in accordance with FAR 25.503, but apply the evaluation...

  17. IMPLEMENTING A STUDENT-CENTERED PEDAGOGY THROUGH THE USE OF INTERESTING AND CULTURALLY CONTEXTUALIZED AUTHENTIC MATERIALS

    OpenAIRE

    Tabitha Kidwell; Hanung Triyoko

    2017-01-01

    The selection and use of appropriate materials is one of the most critical challenges facing English teachers today. In this article, we tell the stories (vignettes) of some of the major challenges we have faced as educators in this regard, and we offer a research base and practical suggestions related to each vignette. Selection of interesting and culturally contextualized authentic materials can go a long way towards creating a student-centered peddagogy. This will help to increase student ...

  18. Current smoking among young adolescents: assessing school based contextual norms

    OpenAIRE

    Pokorny, S; Jason, L; Schoeny, M

    2004-01-01

    Objective: To extend research on the relation of school based contextual norms to current smoking among adolescents by using three analytic techniques to test for contextual effects. It was hypothesised that significant contextual effects would be found in all three models, but that the strength of these effects would vary by the statistical rigor of the model.

  19. [Relational frame theory - a theoretical framework for contextual behavioral science].

    Science.gov (United States)

    Kensche, M; Schweiger, U

    2015-05-01

    Therapists have to deal with verbal systems and often work with verbal exchange. Therefore, a psychological theory is required, which teaches the therapist how to accomplish this task. The BRT is a theory of human language and cognition that explains how people use their verbal behavior as stimuli in their interrelations and how they act and react, based on the resulting relationships. This behavior is learned very early in the course of language acquisition and functions as a generalized operant. A prerequisite for this is the ability of people to undergo mental simulation. This enables them to construct diverse relational frameworks between individual stimuli. Without relational frameworks, people cannot function. The ability to establish a relational framework is a prerequisite for the formation of rule-governed behavior. Rule-governed behavior economizes complex decision processes, creates interpersonal security and enables dealing with events before they take place. On the other hand, the same properties that enable people to solve problems effectively can also contribute to rigid adherence to rules and experience avoidance. Relational frameworks, once established, outweigh other sources of behavioral regulation. Thus, it can become the basis of psychopathology. Poor contextual control makes it difficult for people to devote flexible, focused and voluntary attention to the present and align their actions with the immediate present. Contextual psychotherapy methods that are based on the BRT start precisely at this point: Targeted establishment of new contingencies in the therapeutic interaction through systematic strengthening of metacognitive mode and through the establishment of new rules that make possible a change in the rule-governed behavior enable undermining of dysfunctional rule-governed behavior and build up desirable behavior. This allows any therapeutic process to be more effective - regardless of the patient's expressed symptoms. © Georg Thieme

  20. 17 CFR 240.13e-4 - Tender offers by issuers.

    Science.gov (United States)

    2010-04-01

    ... begins the running of such time period shall be included except that if such event occurs on other than a business day such period shall begin to run on and shall include the first business day thereafter. (4) The... offer. (6) The term security holders means holders of record and beneficial owners of securities of the...

  1. Watermarking security

    CERN Document Server

    Bas, Patrick; Cayre, François; Doërr, Gwenaël; Mathon, Benjamin

    2016-01-01

    This book explains how to measure the security of a watermarking scheme, how to design secure schemes but also how to attack popular watermarking schemes. This book gathers the most recent achievements in the field of watermarking security by considering both parts of this cat and mouse game. This book is useful to industrial practitioners who would like to increase the security of their watermarking applications and for academics to quickly master this fascinating domain.

  2. Security Locks

    Science.gov (United States)

    Hart, Kevin

    2010-01-01

    According to a 2008 "Year in Review" report by Educational Security Incidents, an online repository that collects data on higher education security issues, the total number of security incidents reported at universities and colleges worldwide rose to 173 in 2008, a 24.5 percent increase over 2007. The number of institutions…

  3. A Teaching-Learning Sequence for the Special Relativity Theory at High School Level Historically and Epistemologically Contextualized

    Science.gov (United States)

    Arriassecq, Irene; Greca, Ileana Maria

    2012-01-01

    This paper discusses some topics that stem from recent contributions made by the History, the Philosophy, and the Didactics of Science. We consider these topics relevant to the introduction of the Special Relativity Theory (SRT) in high school within a contextualized approach. We offer an outline of a teaching-learning sequence dealing with the…

  4. Object based implicit contextual learning: a study of eye movements.

    Science.gov (United States)

    van Asselen, Marieke; Sampaio, Joana; Pina, Ana; Castelo-Branco, Miguel

    2011-02-01

    Implicit contextual cueing refers to a top-down mechanism in which visual search is facilitated by learned contextual features. In the current study we aimed to investigate the mechanism underlying implicit contextual learning using object information as a contextual cue. Therefore, we measured eye movements during an object-based contextual cueing task. We demonstrated that visual search is facilitated by repeated object information and that this reduction in response times is associated with shorter fixation durations. This indicates that by memorizing associations between objects in our environment we can recognize objects faster, thereby facilitating visual search.

  5. Negative Social Contextual Stressors and Somatic Symptoms Among Young Black Males: An Exploratory Study.

    Science.gov (United States)

    Scott, Lionel D; McCoy, Henrika

    This study examines whether negative social contextual stressors were associated with somatic symptoms among young Black males ( N = 74) after accounting for background and psychological characteristics. Using Cunningham and Spencer's Black Male Experiences Measure, negative social contextual stressors connoted those experiences connected to the personal attributes, devaluation, and negative imagery of young Black males, such as being followed when entering a store or police or security guards asking them what they are doing when hanging out (e.g., in the park or playground or on the street corner). Results showed that such stressors made a unique and significant contribution to the experience of somatic symptoms. Future research directions and implications for addressing the larger societal perceptions of young Black males are discussed.

  6. Dense Iterative Contextual Pixel Classification using Kriging

    DEFF Research Database (Denmark)

    Ganz, Melanie; Loog, Marco; Brandt, Sami

    2009-01-01

    have been proposed to this end, e.g., iterative contextual pixel classification, iterated conditional modes, and other approaches related to Markov random fields. A problem of these methods, however, is their computational complexity, especially when dealing with high-resolution images in which......In medical applications, segmentation has become an ever more important task. One of the competitive schemes to perform such segmentation is by means of pixel classification. Simple pixel-based classification schemes can be improved by incorporating contextual label information. Various methods...... relatively long range interactions may play a role. We propose a new method based on Kriging that makes it possible to include such long range interactions, while keeping the computations manageable when dealing with large medical images....

  7. Generation and memory for contextual detail.

    Science.gov (United States)

    Mulligan, Neil W

    2004-07-01

    Generation enhances item memory but may not enhance other aspects of memory. In 12 experiments, the author investigated the effect of generation on context memory, motivated in part by the hypothesis that generation produces a trade-off in encoding item and contextual information. Participants generated some study words (e.g., hot-c__) and read others (e.g., hot-cold). Generation consistently enhanced item memory but did not enhance context memory. More specifically, generation disrupted context memory for the color of the target word but did not affect context memory for location, background color, and cue-word color. The specificity of the negative generation effect in context memory argues against a general item-context trade-off. A processing account of generation meets greater success. In addition, the results provide no evidence that generation enhances recollection of contextual details. Copyright 2004 APA, all rights reserved

  8. Quantum contextuality in neutron interferometer experiments

    International Nuclear Information System (INIS)

    Hasegawa, Yuji; Loidl, Rudolf; Baron, Matthias; Badurek, Gerald; Rauch, Helmut

    2006-01-01

    Non-local correlations between sufficiently separated subsystems have been extensively discussed. Such a non-locality can be interpreted as a consequence of the correlation between commuting observables. A more general concept, i.e., contextuality, compared to non-locality can be introduced to describe striking phenomena predicted by quantum theory. As the first example, we report a neutron interferometer experiment, where the spin and the path degrees of freedom are used to exhibit the clear violation of a Bell-like inequality. Other aspects of the quantum contextuality is presented, e.g., a flavor of Kochen-Specker-like contradiction in neutron optical experiments, in addition to the quantum state tomography of the Bell-states which are used in the experiments

  9. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  10. A New Secure Pairing Protocol using Biometrics

    NARCIS (Netherlands)

    Buhan, I.R.

    2008-01-01

    Secure Pairing enables two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping or to a

  11. Methylphenidate enhances extinction of contextual fear

    OpenAIRE

    Abraham, Antony D.; Cunningham, Christopher L.; Lattal, K. Matthew

    2012-01-01

    Methylphenidate (MPH, Ritalin) is a norepinephrine and dopamine transporter blocker that is widely used in humans for treatment of attention deficit disorder and narcolepsy. Although there is some evidence that targeted microinjections of MPH may enhance fear acquisition, little is known about the effect of MPH on fear extinction. Here, we show that MPH, administered before or immediately following extinction of contextual fear, will enhance extinction retention in C57BL/6 mice. Animals that ...

  12. The Emergence of Contextual Social Psychology.

    Science.gov (United States)

    Pettigrew, Thomas F

    2018-07-01

    Social psychology experiences recurring so-called "crises." This article maintains that these episodes actually mark advances in the discipline; these "crises" have enhanced relevance and led to greater methodological and statistical sophistication. New statistical tools have allowed social psychologists to begin to achieve a major goal: placing psychological phenomena in their larger social contexts. This growing trend is illustrated with numerous recent studies; they demonstrate how cultures and social norms moderate basic psychological processes. Contextual social psychology is finally emerging.

  13. Contextual Semantic Parsing using Crowdsourced Spatial Descriptions

    OpenAIRE

    Dukes, Kais

    2014-01-01

    We describe a contextual parser for the Robot Commands Treebank, a new crowdsourced resource. In contrast to previous semantic parsers that select the most-probable parse, we consider the different problem of parsing using additional situational context to disambiguate between different readings of a sentence. We show that multiple semantic analyses can be searched using dynamic programming via interaction with a spatial planner, to guide the parsing process. We are able to parse sentences in...

  14. Contextual-Analysis for Infrastructure Awareness Systems

    DEFF Research Database (Denmark)

    Ramos, Juan David Hincapie; Tabard, Aurelien; Alt, Florian

    Infrastructures are persistent socio-technical systems used to deliver different kinds of services. Researchers have looked into how awareness of infrastructures in the areas of sustainability [6, 10] and software appropriation [11] can be provided. However, designing infrastructure-aware systems...... has specific requirements, which are often ignored. In this paper we explore the challenges when developing infrastructure awareness systems based on contextual analysis, and propose guidelines for enhancing the design process....

  15. Proposed test of macroscopic quantum contextuality

    International Nuclear Information System (INIS)

    Cabello, Adan

    2010-01-01

    We show that, for any system with a number of levels which can be identified with n qubits, there is an inequality for the correlations between three compatible dichotomic measurements which must be satisfied by any noncontextual theory, but is violated by any quantum state. Remarkably, the violation grows exponentially with n, and the tolerated error per correlation also increases with n, showing that state-independent quantum contextuality is experimentally observable in complex systems.

  16. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  17. Preserved Affective Sharing But Impaired Decoding of Contextual Complex Emotions in Alcohol Dependence.

    Science.gov (United States)

    Grynberg, Delphine; Maurage, Pierre; Nandrino, Jean-Louis

    2017-04-01

    Prior research has repeatedly shown that alcohol dependence is associated with a large range of impairments in psychological processes, which could lead to interpersonal deficits. Specifically, it has been suggested that these interpersonal difficulties are underpinned by reduced recognition and sharing of others' emotional states. However, this pattern of deficits remains to be clarified. This study thus aimed to investigate whether alcohol dependence is associated with impaired abilities in decoding contextual complex emotions and with altered sharing of others' emotions. Forty-one alcohol-dependent individuals (ADI) and 37 matched healthy individuals completed the Multifaceted Empathy Test, in which they were instructed to identify complex emotional states expressed by individuals in contextual scenes and to state to what extent they shared them. Compared to healthy individuals, ADI were impaired in identifying negative (Cohen's d = 0.75) and positive (Cohen's d = 0.46) emotional states but, conversely, presented preserved abilities in sharing others' emotional states. This study shows that alcohol dependence is characterized by an impaired ability to decode complex emotional states (both positive and negative), despite the presence of complementary contextual cues, but by preserved emotion-sharing. Therefore, these results extend earlier data describing an impaired ability to decode noncontextualized emotions toward contextualized and ecologically valid emotional states. They also indicate that some essential emotional competences such as emotion-sharing are preserved in alcohol dependence, thereby offering potential therapeutic levers. Copyright © 2017 by the Research Society on Alcoholism.

  18. Contextual control over task-set retrieval.

    Science.gov (United States)

    Crump, Matthew J C; Logan, Gordon D

    2010-11-01

    Contextual cues signaling task likelihood or the likelihood of task repetition are known to modulate the size of switch costs. We follow up on the finding by Leboe, Wong, Crump, and Stobbe (2008) that location cues predictive of the proportion of switch or repeat trials modulate switch costs. Their design employed one cue per task, whereas our experiment employed two cues per task, which allowed separate assessment of modulations to the cue-repetition benefit, a measure of lower level cue-encoding processes, and to the task-alternation cost, a measure of higher level processes representing task-set information. We demonstrate that location information predictive of switch proportion modulates performance at the level of task-set representations. Furthermore, we demonstrate that contextual control occurs even when subjects are unaware of the associations between context and switch likelihood. We discuss the notion that contextual information provides rapid, unconscious control over the extent to which prior task-set representations are retrieved in the service of guiding online performance.

  19. Viewpoint-independent contextual cueing effect

    Directory of Open Access Journals (Sweden)

    taiga etsuchiai

    2012-06-01

    Full Text Available We usually perceive things in our surroundings as unchanged despite viewpoint changes caused by self-motion. The visual system therefore must have a function to process objects independently of viewpoint. In this study, we examined whether viewpoint-independent spatial layout can be obtained implicitly. For this purpose, we used a contextual cueing effect, a learning effect of spatial layout in visual search displays known to be an implicit effect. We compared the transfer of the contextual cueing effect between cases with and without self-motion by using visual search displays for 3D objects, which changed according to the participant’s assumed location for viewing the stimuli. The contextual cueing effect was obtained with self-motion but disappeared when the display changed without self-motion. This indicates that there is an implicit learning effect in spatial coordinates and suggests that the spatial representation of object layouts or scenes can be obtained and updated implicitly. We also showed that binocular disparity play an important role in the layout representations.

  20. Contextuality is about identity of random variables

    International Nuclear Information System (INIS)

    Dzhafarov, Ehtibar N; Kujala, Janne V

    2014-01-01

    Contextual situations are those in which seemingly ‘the same’ random variable changes its identity depending on the conditions under which it is recorded. Such a change of identity is observed whenever the assumption that the variable is one and the same under different conditions leads to contradictions when one considers its joint distribution with other random variables (this is the essence of all Bell-type theorems). In our Contextuality-by-Default approach, instead of asking why or how the conditions force ‘one and the same’ random variable to change ‘its’ identity, any two random variables recorded under different conditions are considered different ‘automatically.’ They are never the same, nor are they jointly distributed, but one can always impose on them a joint distribution (probabilistic coupling). The special situations when there is a coupling in which these random variables are equal with probability 1 are considered noncontextual. Contextuality means that such couplings do not exist. We argue that the determination of the identity of random variables by conditions under which they are recorded is not a causal relationship and cannot violate laws of physics. (paper)

  1. Contextuality supplies the 'magic' for quantum computation.

    Science.gov (United States)

    Howard, Mark; Wallman, Joel; Veitch, Victor; Emerson, Joseph

    2014-06-19

    Quantum computers promise dramatic advantages over their classical counterparts, but the source of the power in quantum computing has remained elusive. Here we prove a remarkable equivalence between the onset of contextuality and the possibility of universal quantum computation via 'magic state' distillation, which is the leading model for experimentally realizing a fault-tolerant quantum computer. This is a conceptually satisfying link, because contextuality, which precludes a simple 'hidden variable' model of quantum mechanics, provides one of the fundamental characterizations of uniquely quantum phenomena. Furthermore, this connection suggests a unifying paradigm for the resources of quantum information: the non-locality of quantum theory is a particular kind of contextuality, and non-locality is already known to be a critical resource for achieving advantages with quantum communication. In addition to clarifying these fundamental issues, this work advances the resource framework for quantum computation, which has a number of practical applications, such as characterizing the efficiency and trade-offs between distinct theoretical and experimental schemes for achieving robust quantum computation, and putting bounds on the overhead cost for the classical simulation of quantum algorithms.

  2. Perpendicularity misjudgments caused by contextual stimulus elements.

    Science.gov (United States)

    Bulatov, Aleksandr; Bulatova, Natalija; Surkys, Tadas

    2012-10-15

    It has been demonstrated in previous studies that the illusions of extent of the Brentano type can be explained by the perceptual positional shifts of the stimulus terminators in direction of the centers-of-masses (centroids) of adjacent contextual flanks [Bulatov, A. et al. (2011). Contextual flanks' tilting and magnitude of illusion of extent. Vision Research, 51(1), 58-64]. In the present study, the applicability of the centroid approach to explain the right-angle misjudgments was tested psychophysically using stimuli composed of three small disks (dots) forming an imaginary rectangular triangle. Stimuli comprised the Müller-Lyer wings or line segments (bars) as the contextual distracters rotated around the vertices of the triangle, and changes in the magnitude of the illusion of perpendicularity were measured in a set of experiments. A good resemblance between the experimental data and theoretical predictions obtained strongly supports the suggestion regarding the common "centroid" origin of the illusions of extent of the Brentano type and misperception of the perpendicularity investigated. 2012 Elsevier Ltd. All rights reserved

  3. 43 CFR 12.715 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Evaluating offers. 12.715 Section 12.715... Act-Supplies § 12.715 Evaluating offers. (a) Unless the head of the grantee organization or a designee at a level no lower than the grantee's designated awarding official determines otherwise, the offered...

  4. 5 CFR 536.104 - Reasonable offer.

    Science.gov (United States)

    2010-01-01

    ... 5 Administrative Personnel 1 2010-01-01 2010-01-01 false Reasonable offer. 536.104 Section 536.104... Provisions § 536.104 Reasonable offer. (a) For the purpose of determining whether grade retention eligibility or entitlement must be terminated under § 536.207 or 536.208, the offer of a position is a reasonable...

  5. 7 CFR 3560.656 - Incentives offers.

    Science.gov (United States)

    2010-01-01

    ... 7 Agriculture 15 2010-01-01 2010-01-01 false Incentives offers. 3560.656 Section 3560.656... AGRICULTURE DIRECT MULTI-FAMILY HOUSING LOANS AND GRANTS Housing Preservation § 3560.656 Incentives offers. (a) The Agency will offer a borrower, who submits a prepayment request meeting the conditions of § 3560...

  6. 48 CFR 12.205 - Offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 1 2010-10-01 2010-10-01 false Offers. 12.205 Section 12... ACQUISITION OF COMMERCIAL ITEMS Special Requirements for the Acquisition of Commercial Items 12.205 Offers. (a) Where technical information is necessary for evaluation of offers, agencies should, as part of market...

  7. 32 CFR 536.64 - Final offers.

    Science.gov (United States)

    2010-07-01

    ... 32 National Defense 3 2010-07-01 2010-07-01 true Final offers. 536.64 Section 536.64 National... UNITED STATES Investigation and Processing of Claims § 536.64 Final offers. (a) When claims personnel... less than the amount claimed, a settlement authority will make a written final offer within his or her...

  8. The primary relevance of subconsciously offered attitudes

    DEFF Research Database (Denmark)

    Kristiansen, Tore

    2015-01-01

    ) and subconsciously (covertly) offered attitudes – because subconsciously offered attitudes appear to be a driving force in linguistic variation and change in a way that consciously offered attitudes are not. The argument is based on evidence from empirical investigations of attitudes and use in the ‘...

  9. Innovative gas offers; Les offres gazieres innovantes

    Energy Technology Data Exchange (ETDEWEB)

    Sala, O.; Mela, P. [Gaz de France (GDF), 75 - Paris (France); Chatelain, F. [Primagaz, 75 - Paris (France)

    2007-07-01

    New energy offers are progressively made available as the opening of gas market to competition becomes broader. How are organized the combined offers: gas, electricity, renewable energies and energy services? What are the marketing strategies implemented? Three participants at this round table present their offer and answer these questions. (J.S.)

  10. Investor Reaction to Mandatory Offers on the Warsaw Stock Exchange

    Directory of Open Access Journals (Sweden)

    Szymon Okoń

    2012-06-01

    Full Text Available The following paper aims to assess investor reaction to mandatory offers on the Warsaw Stock Exchange, which is important because knowledge about these reactions can be used to make better investment decisions. This paper highlights the importance of procedure in making a mandatory offer and its grounds in the Polish legal system. Additionally, it presents empirical research on the reactions of investors to mandatory offers on the Warsaw Stock Exchange. It has been provided that mandatory offers have a significant impact on the price of a company’s shares listed on the Warsaw Stock Exchange. Knowledge about the reactions of investors to a mandatory offer may be used when selecting securities for an investment portfolio. The findings may provide guidance in deciding whether to begin or end investment in the company, both for individual and institutional investors. The event study methodology approach used in the paper is regarded as valuable and can be the basis for further research in other areas of the capital market research, especially in the context of information efficiency.

  11. Using the Contextual Hub Analysis Tool (CHAT) in Cytoscape to Identify Contextually Relevant Network Hubs.

    Science.gov (United States)

    Muetze, Tanja; Lynn, David J

    2017-09-13

    Highly connected nodes in biological networks are called network hubs. Hubs are topologically important to the structure of the network and have been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we provide a step-by-step protocol for using the Contextual Hub Analysis Tool (CHAT), an application within Cytoscape 3, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene or protein expression data, and identify hub nodes that are more highly connected to contextual nodes than expected by chance. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  12. Contextual Sensing: Integrating Contextual Information with Human and Technical Geo-Sensor Information for Smart Cities

    Science.gov (United States)

    Sagl, Günther; Resch, Bernd; Blaschke, Thomas

    2015-01-01

    In this article we critically discuss the challenge of integrating contextual information, in particular spatiotemporal contextual information, with human and technical sensor information, which we approach from a geospatial perspective. We start by highlighting the significance of context in general and spatiotemporal context in particular and introduce a smart city model of interactions between humans, the environment, and technology, with context at the common interface. We then focus on both the intentional and the unintentional sensing capabilities of today’s technologies and discuss current technological trends that we consider have the ability to enrich human and technical geo-sensor information with contextual detail. The different types of sensors used to collect contextual information are analyzed and sorted into three groups on the basis of names considering frequently used related terms, and characteristic contextual parameters. These three groups, namely technical in situ sensors, technical remote sensors, and human sensors are analyzed and linked to three dimensions involved in sensing (data generation, geographic phenomena, and type of sensing). In contrast to other scientific publications, we found a large number of technologies and applications using in situ and mobile technical sensors within the context of smart cities, and surprisingly limited use of remote sensing approaches. In this article we further provide a critical discussion of possible impacts and influences of both technical and human sensing approaches on society, pointing out that a larger number of sensors, increased fusion of information, and the use of standardized data formats and interfaces will not necessarily result in any improvement in the quality of life of the citizens of a smart city. This article seeks to improve our understanding of technical and human geo-sensing capabilities, and to demonstrate that the use of such sensors can facilitate the integration of different

  13. Contextual Sensing: Integrating Contextual Information with Human and Technical Geo-Sensor Information for Smart Cities.

    Science.gov (United States)

    Sagl, Günther; Resch, Bernd; Blaschke, Thomas

    2015-07-14

    In this article we critically discuss the challenge of integrating contextual information, in particular spatiotemporal contextual information, with human and technical sensor information, which we approach from a geospatial perspective. We start by highlighting the significance of context in general and spatiotemporal context in particular and introduce a smart city model of interactions between humans, the environment, and technology, with context at the common interface. We then focus on both the intentional and the unintentional sensing capabilities of today's technologies and discuss current technological trends that we consider have the ability to enrich human and technical geo-sensor information with contextual detail. The different types of sensors used to collect contextual information are analyzed and sorted into three groups on the basis of names considering frequently used related terms, and characteristic contextual parameters. These three groups, namely technical in situ sensors, technical remote sensors, and human sensors are analyzed and linked to three dimensions involved in sensing (data generation, geographic phenomena, and type of sensing). In contrast to other scientific publications, we found a large number of technologies and applications using in situ and mobile technical sensors within the context of smart cities, and surprisingly limited use of remote sensing approaches. In this article we further provide a critical discussion of possible impacts and influences of both technical and human sensing approaches on society, pointing out that a larger number of sensors, increased fusion of information, and the use of standardized data formats and interfaces will not necessarily result in any improvement in the quality of life of the citizens of a smart city. This article seeks to improve our understanding of technical and human geo-sensing capabilities, and to demonstrate that the use of such sensors can facilitate the integration of different

  14. Contextual Hub Analysis Tool (CHAT): A Cytoscape app for identifying contextually relevant hubs in biological networks.

    Science.gov (United States)

    Muetze, Tanja; Goenawan, Ivan H; Wiencko, Heather L; Bernal-Llinares, Manuel; Bryan, Kenneth; Lynn, David J

    2016-01-01

    Highly connected nodes (hubs) in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT), which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed) than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest. CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store ( http://apps.cytoscape.org/apps/chat).

  15. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  16. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  17. Securing Hadoop

    CERN Document Server

    Narayanan, Sudheesh

    2013-01-01

    This book is a step-by-step tutorial filled with practical examples which will focus mainly on the key security tools and implementation techniques of Hadoop security.This book is great for Hadoop practitioners (solution architects, Hadoop administrators, developers, and Hadoop project managers) who are looking to get a good grounding in what Kerberos is all about and who wish to learn how to implement end-to-end Hadoop security within an enterprise setup. It's assumed that you will have some basic understanding of Hadoop as well as be familiar with some basic security concepts.

  18. Grid Security

    CERN Multimedia

    CERN. Geneva

    2004-01-01

    The aim of Grid computing is to enable the easy and open sharing of resources between large and highly distributed communities of scientists and institutes across many independent administrative domains. Convincing site security officers and computer centre managers to allow this to happen in view of today's ever-increasing Internet security problems is a major challenge. Convincing users and application developers to take security seriously is equally difficult. This paper will describe the main Grid security issues, both in terms of technology and policy, that have been tackled over recent years in LCG and related Grid projects. Achievements to date will be described and opportunities for future improvements will be addressed.

  19. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  20. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  1. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  2. The Informatics Security Cost of Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2010-01-01

    Full Text Available The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The security requirements of distributed informatics applications are determined. Aspects regarding design, development and implementation are established. Influence factors for informatics security are presented and their correlation is analyzed. The costs associated to security processes are studied. Optimal criteria for informatics security are established. The security cost of the informatics application for validating organizational identifiers is determined using theoretical assumptions made for cost models. The conclusions highlight the validity of research results and offer perspectives for future research.

  3. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  4. Marketing strategy to differentiate the offer

    OpenAIRE

    Miceski, Trajko; Pasovska, Silvana

    2013-01-01

    The marketing strategy for differentiation of the offers is important and accepted strategy especially by the bigger legal entities. The differentiation of the offers leads to bigger profit and bigger profitability in operation, through targeting of the demand towards the product of the enterprise. The vertical differentiation of the offers is directed towards the quality of the product itself which is observed as a something superior despite the competitive product which is observed as somet...

  5. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  6. Contextual advertisement placement in printed media

    Science.gov (United States)

    Liu, Sam; Joshi, Parag

    2010-02-01

    Advertisements today provide the necessary revenue model supporting the WWW ecosystem. Targeted or contextual ad insertion plays an important role in optimizing the financial return of this model. Nearly all the current ads that appear on web sites are geared for display purposes such as banner and "pay-per-click". Little attention, however, is focused on deriving additional ad revenues when the content is repurposed for alternative mean of presentation, e.g. being printed. Although more and more content is moving to the Web, there are still many occasions where printed output of web content is desirable, such as maps and articles; thus printed ad insertion can potentially be lucrative. In this paper, we describe a contextual ad insertion network aimed to realize new revenue for print service providers for web printing. We introduce a cloud print service that enables contextual ads insertion, with respect to the main web page content, when a printout of the page is requested. To encourage service utilization, it would provide higher quality printouts than what is possible from current browser print drivers, which generally produce poor outputs, e.g. ill formatted pages. At this juncture we will limit the scope to only article-related web pages although the concept can be extended to arbitrary web pages. The key components of this system include (1) the extraction of article from web pages, (2) the extraction of semantics from article, (3) querying the ad database for matching advertisement or coupon, and (4) joint content and ad layout for print outputs.

  7. The Contextualization of Archetypes: Clinical Template Governance.

    Science.gov (United States)

    Pedersen, Rune; Ulriksen, Gro-Hilde; Ellingsen, Gunnar

    2015-01-01

    This paper is a status report from a large-scale openEHR-based EPR project from the North Norway Regional Health Authority. It concerns the standardization of a regional ICT portfolio and the ongoing development of a new process oriented EPR systems encouraged by the unfolding of a national repository for openEHR archetypes. Subject of interest; the contextualization of clinical templates is governed over multiple national boundaries which is complex due to the dependency of clinical resources. From the outset of this, we are interested in how local, regional, and national organizers maneuver to standardize while applying OpenEHR technology.

  8. Contextual factors, methodological principles and teacher cognition

    OpenAIRE

    Walsh, Rupert; Wyatt, Mark

    2014-01-01

    Teachers in various contexts worldwide are sometimes unfairly criticized for not putting teaching methods developed for the well-resourced classrooms of Western countries into practice. Factors such as the teachers’ “misconceptualizations” of “imported” methods, including Communicative Language Teaching (CLT), are often blamed, though the challenges imposed by “contextual demands,” such as large class sizes, are sometimes recognised. Meanwhile, there is sometimes an assumption that in the Wes...

  9. NEW APPROACHES IN DECEPTION DETECTION II. ACTIVE INTERVIEWING STRATEGIES AND CONTEXTUAL INFORMATION

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2015-05-01

    Full Text Available Meta-analytical evidence shows that behavioural indicators of deception are scant, poorly diagnostic and inconsistent. This has yielded a shift in deception detection research. Rather than passively scrutinising the communication sender to find tell-tale behavioural indicators of deception, the deception judge needs to (a adopt an active role by using interviewing techniques specifically designed to detect deception, or (b focus on contextual (rather than behavioural deception cues. In the previous paper (Masip & Herrero, 2015a, we reviewed the antecedents of this change in focus, as well as the theoretical grounding of the new approaches. Here we describe specific interviewing strategies for detecting deception, as well as the (still scant research on contextual deception indicia. In doing this, we hope to offer the reader a detailed perspective on the recent developments in this specific area of psychology and law.

  10. Social Security.

    Science.gov (United States)

    Social and Labour Bulletin, 1983

    1983-01-01

    This group of articles discusses a variety of studies related to social security and retirement benefits. These studies are related to both developing and developed nations and are also concerned with studying work conditions and government role in administering a democratic social security system. (SSH)

  11. Security management

    International Nuclear Information System (INIS)

    Adams, H.W.

    1990-01-01

    Technical progress is moving more and more quickly and the systems thus produced are so complex and have become so unclear to the individual that he can no longer estimate the consequences: Faith in progress has given way to deep mistrust. Companies have adjusted to this change in consciousness. An interesting tendency can be identified: technical security is already available - now the organization of security has become an important objective for companies. The key message of the book is: If outworn technical systems are no longer adequate, the organization must be thoroughly overhauled. Five chapters deal with the following themes: organization as an aspect of society; risk control; aspects of security; is there security in ADP; the broader concept of security. (orig./HP) [de

  12. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  13. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  14. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  15. The influence of contextual diversity on eye movements in reading

    OpenAIRE

    Plummer, Patrick; Perea, Manuel; Rayner, Keith

    2013-01-01

    Recent research has shown contextual diversity (i.e., the number of passages in which a given word appears) to be a reliable predictor of word processing difficulty. It has also been demonstrated that word-frequency has little or no effect on word recognition speed when accounting for contextual diversity in isolated word processing tasks. An eye-movement experiment was conducted wherein the effects of word-frequency and contextual diversity were directly contrasted in a normal sentence readi...

  16. Exhibition of Monogamy Relations between Entropic Non-contextuality Inequalities

    International Nuclear Information System (INIS)

    Zhu Feng; Zhang Wei; Huang Yi-Dong

    2017-01-01

    We exhibit the monogamy relation between two entropic non-contextuality inequalities in the scenario where compatible projectors are orthogonal. We show the monogamy relation can be exhibited by decomposing the orthogonality graph into perfect induced subgraphs. Then we find two entropic non-contextuality inequalities are monogamous while the KCBS-type non-contextuality inequalities are not if the orthogonality graphs of the observable sets are two odd cycles with two shared vertices. (paper)

  17. 43 CFR 12.815 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 43 Public Lands: Interior 1 2010-10-01 2010-10-01 false Evaluating offers. 12.815 Section 12.815 Public Lands: Interior Office of the Secretary of the Interior ADMINISTRATIVE AND AUDIT REQUIREMENTS AND... Act-Construction Materials § 12.815 Evaluating offers. (a) The restrictions of the Buy American Act do...

  18. 48 CFR 2825.203 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 6 2010-10-01 2010-10-01 true Evaluating offers. 2825.203 Section 2825.203 Federal Acquisition Regulations System DEPARTMENT OF JUSTICE Socioeconomic Programs FOREIGN ACQUISITION Buy American Act-Construction Materials 2825.203 Evaluating offers. The HCA, or...

  19. INFORMATION SYSTEM SECURITY (CYBER SECURITY

    Directory of Open Access Journals (Sweden)

    Muhammad Siddique Ansari

    2016-03-01

    Full Text Available Abstract - Business Organizations and Government unequivocally relies on upon data to deal with their business operations. The most unfavorable impact on association is disappointment of friendship, goodness, trustworthiness, legitimacy and probability of data and administrations. There is an approach to ensure data and to deal with the IT framework's Security inside association. Each time the new innovation is made, it presents some new difficulties for the insurance of information and data. To secure the information and data in association is imperative on the grounds that association nowadays inside and remotely joined with systems of IT frameworks. IT structures are inclined to dissatisfaction and security infringement because of slips and vulnerabilities. These slips and vulnerabilities can be brought on by different variables, for example, quickly creating headway, human slip, poor key particulars, poor movement schedules or censuring the threat. Likewise, framework changes, new deserts and new strikes are a huge piece of the time displayed, which helpers augmented vulnerabilities, disappointments and security infringement all through the IT structure life cycle. The business went to the confirmation that it is essentially difficult to ensure a slip free, risk free and secure IT structure in perspective of the disfigurement of the disavowing security parts, human pass or oversight, and part or supplies frustration. Totally secure IT frameworks don't exist; just those in which the holders may have changing degrees of certainty that security needs of a framework are fulfilled do. The key viewpoints identified with security of data outlining are examined in this paper. From the start, the paper recommends pertinent legitimate structure and their duties including open association obligation, and afterward it returns to present and future time, system limits, structure security in business division. At long last, two key inadequacy markers

  20. Being in Community: A Food Security Themed Approach to Public Scholarship

    Science.gov (United States)

    Harrison, Barbara; Nelson, Connie; Stroink, Mirella

    2013-01-01

    For six years the Food Security Research Network at Lakehead University, Canada, has been engaged in an interdisciplinary theme-based service-learning initiative focusing on food security. Informed by complexity theory, the contextual fluidity partnership model brings community partners, students, and faculty into a nexus through which new…

  1. 17 CFR 240.14e-2 - Position of subject company with respect to a tender offer.

    Science.gov (United States)

    2010-04-01

    ... disclosing that the subject company: (1) Recommends acceptance or rejection of the bidder's tender offer; (2... accordance with such laws, regulations and policies. (d) Exemption for cross-border tender offers. The... with respect to a tender offer. 240.14e-2 Section 240.14e-2 Commodity and Securities Exchanges...

  2. Information security management handbook

    CERN Document Server

    Tipton, Harold F

    2006-01-01

    Access Control Systems and Methodology. Telecommunications and Network Security. Security Management Practices. Application Program Security. Cryptography. Computer, System, and Security Architecture. Operations Security. Business Continuity Planning and Disaster Recovery Planning. Law, Investigation and Ethics. Physical Security.

  3. Experimental Detection of Information Deficit in a Photonic Contextuality Scenario

    Science.gov (United States)

    Zhan, Xiang; Kurzyński, Paweł; Kaszlikowski, Dagomir; Wang, Kunkun; Bian, Zhihao; Zhang, Yongsheng; Xue, Peng

    2017-12-01

    Contextuality is an essential characteristic of quantum theory, and supplies the power for many quantum information processes. Previous tests of contextuality focus mainly on the probability distribution of measurement results. However, a test of contextuality can be formulated in terms of entropic inequalities whose violations imply information deficit in the studied system. This information deficit has not been observed on a single local system. Here we report the first experimental detection of information deficit in an entropic test of quantum contextuality based on photonic setup. The corresponding inequality is violated with more than 13 standard deviations.

  4. The transfer of Cfunc contextual control through equivalence relations.

    Science.gov (United States)

    Perez, William F; Fidalgo, Adriana P; Kovac, Roberta; Nico, Yara C

    2015-05-01

    Derived relational responding is affected by contextual stimuli (Cfunc) that select specific stimulus functions. The present study investigated the transfer of Cfunc contextual control through equivalence relations by evaluating both (a) the maintenance of Cfunc contextual control after the expansion of a relational network, and (b) the establishment of novel contextual stimuli by the transfer of Cfunc contextual control through equivalence relations. Initially, equivalence relations were established and contingencies were arranged so that colors functioned as Cfunc stimuli controlling participants' key-pressing responses in the presence of any stimulus from a three-member equivalence network. To investigate the first research question, the three-member equivalence relations were expanded to five members and the novel members were presented with the Cfunc stimuli in the key-pressing task. To address the second goal of this study, the colors (Cfunc) were established as equivalent to certain line patterns. The transfer of contextual cue function (Cfunc) was tested replacing the colored backgrounds with line patterns in the key-pressing task. Results suggest that the Cfunc contextual control was transferred to novel stimuli that were added to the relational network. In addition, the line patterns indirectly acquired the contextual cue function (Cfunc) initially established for the colored backgrounds. The conceptual and applied implications of Cfunc contextual control are discussed. © Society for the Experimental Analysis of Behavior.

  5. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  6. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  7. Contextual factors, methodological principles and teacher cognition

    Directory of Open Access Journals (Sweden)

    Rupert Walsh

    2014-01-01

    Full Text Available Teachers in various contexts worldwide are sometimes unfairly criticized for not putting teaching methods developed for the well-resourced classrooms of Western countries into practice. Factors such as the teachers’ “misconceptualizations” of “imported” methods, including Communicative Language Teaching (CLT, are often blamed, though the challenges imposed by “contextual demands,” such as large class sizes, are sometimes recognised. Meanwhile, there is sometimes an assumption that in the West there is a happy congruence between policy supportive of CLT or Task-Based Language Teaching, teacher education and supervision, and curriculum design with teachers’ cognitions and their practices. Our case study of three EFL teachers at a UK adult education college is motivated by a wish to question this assumption. Findings from observational and interview data suggest the practices of two teachers were largely consistent with their methodological principles, relating to stronger and weaker forms of CLT respectively, as well as to more general educational principles, such as a concern for learners; the supportive environment seemed to help. The third teacher appeared to put “difficult” contextual factors, for example, tests, ahead of methodological principles without, however, obviously benefiting. Implications highlight the important role of teacher cognition research in challenging cultural assumptions.

  8. Strategic information security

    CERN Document Server

    Wylder, John

    2003-01-01

    Introduction to Strategic Information SecurityWhat Does It Mean to Be Strategic? Information Security Defined The Security Professional's View of Information Security The Business View of Information SecurityChanges Affecting Business and Risk Management Strategic Security Strategic Security or Security Strategy?Monitoring and MeasurementMoving Forward ORGANIZATIONAL ISSUESThe Life Cycles of Security ManagersIntroductionThe Information Security Manager's Responsibilities The Evolution of Data Security to Information SecurityThe Repository Concept Changing Job Requirements Business Life Cycles

  9. Security Bingo

    CERN Multimedia

    Computer Security Team

    2011-01-01

    Want to check your security awareness and win one of three marvellous books on computer security? Just print out this page, mark which of the 25 good practices below you already follow, and send the sheet back to us by 31 October 2011 at either Computer.Security@cern.ch or P.O. Box G19710.   Winners[1] must show that they fulfil at least five good practices in a continuous vertical, horizontal or diagonal row. For details on CERN Computer Security, please consult http://cern.ch/security. I personally…   …am concerned about computer security. …run my computer with an anti-virus software and up-to-date signature files. …lock my computer screen whenever I leave my office. …have chosen a reasonably complex password. …have restricted access to all my files and data. …am aware of the security risks and threats to CERN’s computing facilities. &hell...

  10. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  11. Computer security

    CERN Document Server

    Gollmann, Dieter

    2011-01-01

    A completely up-to-date resource on computer security Assuming no previous experience in the field of computer security, this must-have book walks you through the many essential aspects of this vast topic, from the newest advances in software and technology to the most recent information on Web applications security. This new edition includes sections on Windows NT, CORBA, and Java and discusses cross-site scripting and JavaScript hacking as well as SQL injection. Serving as a helpful introduction, this self-study guide is a wonderful starting point for examining the variety of competing sec

  12. Secure PVM

    Energy Technology Data Exchange (ETDEWEB)

    Dunigan, T.H.; Venugopal, N.

    1996-09-01

    This research investigates techniques for providing privacy, authentication, and data integrity to PVM (Parallel Virtual Machine). PVM is extended to provide secure message passing with no changes to the user`s PVM application, or, optionally, security can be provided on a message-by message basis. Diffe-Hellman is used for key distribution of a single session key for n-party communication. Keyed MD5 is used for message authentication, and the user may select from various secret-key encryption algorithms for message privacy. The modifications to PVM are described, and the performance of secure PVM is evaluated.

  13. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  14. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  15. Hospitalized Patients' Responses to Offers of Prayer.

    Science.gov (United States)

    McMillan, Kathy; Taylor, Elizabeth Johnston

    2018-02-01

    Most Americans pray; many pray about their health. When they are hospitalized, however, do patients want an offer of prayer from a healthcare provider? This project allowed for the measurement of hospitalized patient's responses to massage therapists' offers of a colloquial prayer after a massage. After the intervention, 78 patients completed questionnaires that elicited quantitative data that were analyzed using uni- and bivariate statistical analyses. In this sample, 88% accepted the offer of prayer, 85% found it helpful, and 51% wanted prayer daily. Patients may welcome prayer, as long as the clinician shows "genuine kindness and respect."

  16. Collective Security

    DEFF Research Database (Denmark)

    Galster, Kjeld

    in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed disinclination to accept that the collective security concept and international treaties and accords signed by Denmark should necessitate credible...... and other international treaties provided arguments for adjusting the foreign and security policy ambitions, and since the general flux in worldwide market conditions left perceptible ripples in Danish economy, budget discussions grew in importance over this period. The pacifist stance entailed......Collective Security: National Egotism (Abstract) In Danish pre-World War I defence debate the notion of collective security is missing. During the early years of the 19th century, the political work is influenced by a pervasive feeling of rising tension and danger on the continent of Europe...

  17. Security Transformation

    National Research Council Canada - National Science Library

    Metz, Steven

    2003-01-01

    ... adjustment. With American military forces engaged around the world in both combat and stabilization operations, the need for rigorous and critical analysis of security transformation has never been greater...

  18. Crude oil–corn–ethanol – nexus: A contextual approach

    International Nuclear Information System (INIS)

    Natanelov, Valeri; McKenzie, Andrew M.; Van Huylenbroeck, Guido

    2013-01-01

    This paper offers a holistic study on the complex relationships between crude oil, corn and ethanol during a turbulent period between 2006 and end of 2011. Through a holistic mapping of the current market situation and a contextual analytical design we show that there exists a strong relationship between crude oil and corn markets on one side, and crude oil and ethanol on the other. However, the price relationship between corn and ethanol was revealed to be less straightforward, and is driven by the US government fuel policy. Furthermore the study indicates that corn markets have became more prone to volatility due to ethanol production, especially when the demand for corn is high and/or the crude oil prices are high enough to create a competitive market for ethanol. - Highlights: • Strong relationship between crude oil–corn and crude oil–ethanol. • Corn–ethanol connected through a by-pass of crude oil markets. • Ethanol market has no direct impact on the price levels of corn. • Corn markets became more prone to volatility due to ethanol production

  19. 17 CFR 8.16 - Settlement offers.

    Science.gov (United States)

    2010-04-01

    ... Section 8.16 Commodity and Securities Exchanges COMMODITY FUTURES TRADING COMMISSION EXCHANGE PROCEDURES FOR DISCIPLINARY, SUMMARY, AND MEMBERSHIP DENIAL ACTIONS Disciplinary Procedure § 8.16 Settlement... the disciplinary committee at any time after the investigation report is completed. The disciplinary...

  20. 16 CFR 238.2 - Initial offer.

    Science.gov (United States)

    2010-01-01

    ... § 238.2 Initial offer. (a) No statement or illustration should be used in any advertisement which creates a false impression of the grade, quality, make, value, currency of model, size, color, usability...

  1. Sustainable Offering Practices Through Stakeholders Engagement

    Directory of Open Access Journals (Sweden)

    Bijay Prasad Kushwaha

    2018-02-01

    Full Text Available Sustainable development is achieved by satisfying the current ends without shrinking the existing means which can serve as needs for the society in the future. It has become global motive and responsibility of present community to utilize resources in an optimum way with minimum environmental damage. The objective of this paper is to study theoretical framework and practical approaches on sustainable offering practices through customer engagement. The study has also examined the opportunities and challenges of sustainable offering practices in India. The study is based on a previous study and secondary data has been used for analysis. The outcome revealed the process for successful sustainable offering practices in context of Indian consumers. The analysis has helped to understand different practices of sustainable offering through engaging stakeholders.

  2. European Security

    DEFF Research Database (Denmark)

    Møller, Bjørn

    Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"......Theoretical chapters on "Security", "Organisations" and "Regions," Historical Chapters on "Europe and Its Distinguishing Features" and on "The United Nations," "NATO," "The CSCE/OSCE and the Council of Europe" and "The European Union"...

  3. Data Security

    OpenAIRE

    Lopez, Diego

    2013-01-01

    Training specialists in the field of data security and security administrators for the information systems represents a significant priority demanded by both governmental environments and the central and local administrations, as well as by the private sector - companies, banks. They are responsible for implementing information services and systems, but they are also their beneficiaries, with applicability in fields such as: e government, e-administration, e-banking, e-commerce, e-payment, wh...

  4. Nuclear security

    International Nuclear Information System (INIS)

    1991-12-01

    This paper reports that despite their crucial importance to national security, safeguards at the Department of Energy's (DOE) weapons facilities may be falling short. DOE security inspections have identified many weaknesses, including poor performance by members of DOE's security force, poor accountability for quantities of nuclear materials, and the inability of personnel to locate documents containing classified information. About 13 percent of the 2,100 identified weakness resulted in DOE inspectors giving out unsatisfactory security ratings; another 38 percent led to marginal ratings. In addition, DOE's centralized safeguards and security information tracking system lacks current data on whether DOE field offices have corrected the identified weaknesses. Without reliable information, DOE has no way of knowing whether timely action was taken to correct problems, nor can it determine whether weaknesses are systematic. DOE has tried to minimize the impact of these security weaknesses at its facilities by establishing multiple layers of protection measures and instituting interim and compensatory measures for identified weaknesses. DOE is planning enhancements to the centralized tracking system that should improve its reliability and increase its effectiveness

  5. FOOD SECURITY

    Directory of Open Access Journals (Sweden)

    Dorina Ardelean

    2013-12-01

    Full Text Available The assurance of food security at the individual level doesn’t implicitly provide for the one at family level as the concepts of hunger, malnutrition and food insecurity are the steps of the same process of access restricted to a sufficient supply of food. In order to achieve food security at the individual level the following is necessary: ensuring food availability (production, reserve stocks; redistribution of food availability within the country or out through international exchanges; effective access of the population to purchase food consumer goods, by ensuring its effective demand as required. Food security of families (FFS is required for assuring individual food security (IFS, but it is not sufficient because the food available may be unevenly distributed between family members. National food security (NFS corresponds to the possibilities that different countries have to ensure both FFS and IFS without sacrificing other important objectives. Under the name of GAS is defined the global food security which represents permanent access for the entire population of the globe to the necessary food for a healthy and active life.

  6. Focal Event, Contextualization, and Effective Communication in the Mathematics Classroom

    Science.gov (United States)

    Nilsson, Per; Ryve, Andreas

    2010-01-01

    The aim of this article is to develop analytical tools for studying mathematical communication in collaborative activities. The theoretical construct of contextualization is elaborated methodologically in order to study diversity in individual thinking in relation to effective communication. The construct of contextualization highlights issues of…

  7. Experimental demonstration of quantum contextuality with nonentangled photons

    International Nuclear Information System (INIS)

    Liu, B. H.; Huang, Y. F.; Gong, Y. X.; Sun, F. W.; Zhang, Y. S.; Li, C. F.; Guo, G. C.

    2009-01-01

    We present an experimental test of quantum contextuality by using two-photon product states. The experimental results show that the noncontextual hidden-variable theories are violated by nonentangled states in spite of the local hidden-variable theories can be violated or not. We find that the Hong-Ou-Mandel-type quantum interference effect causes the quantum contextuality.

  8. Unfinished Student Answer in PISA Mathematics Contextual Problem

    Science.gov (United States)

    Lutfianto, Moch.; Zulkardi; Hartono, Yusuf

    2013-01-01

    Solving mathematics contextual problems is one way that can be used to enable students to have the skills needed to live in the 21st century. Completion contextual problem requires a series of steps in order to properly answer the questions that are asked. The purpose of this study was to determine the steps performed students in solving…

  9. Contextual Stress and Health Risk Behaviors among African American Adolescents

    Science.gov (United States)

    Copeland-Linder, Nikeea; Lambert, Sharon F.; Chen, Yi-Fu; Ialongo, Nicholas S.

    2011-01-01

    This study examined the longitudinal association between contextual stress and health risk behaviors and the role of protective factors in a community epidemiologically-defined sample of urban African American adolescents (N = 500; 46.4% female). Structural equation modeling was used to create a latent variable measuring contextual stress…

  10. Consequences of contextual factors on clinical reasoning in resident physicians.

    Science.gov (United States)

    McBee, Elexis; Ratcliffe, Temple; Picho, Katherine; Artino, Anthony R; Schuwirth, Lambert; Kelly, William; Masel, Jennifer; van der Vleuten, Cees; Durning, Steven J

    2015-12-01

    Context specificity and the impact that contextual factors have on the complex process of clinical reasoning is poorly understood. Using situated cognition as the theoretical framework, our aim was to evaluate the verbalized clinical reasoning processes of resident physicians in order to describe what impact the presence of contextual factors have on their clinical reasoning. Participants viewed three video recorded clinical encounters portraying straightforward diagnoses in internal medicine with select patient contextual factors modified. After watching each video recording, participants completed a think-aloud protocol. Transcripts from the think-aloud protocols were analyzed using a constant comparative approach. After iterative coding, utterances were analyzed for emergent themes with utterances grouped into categories, themes and subthemes. Ten residents participated in the study with saturation reached during analysis. Participants universally acknowledged the presence of contextual factors in the video recordings. Four categories emerged as a consequence of the contextual factors: (1) emotional reactions (2) behavioral inferences (3) optimizing the doctor patient relationship and (4) difficulty with closure of the clinical encounter. The presence of contextual factors may impact clinical reasoning performance in resident physicians. When confronted with the presence of contextual factors in a clinical scenario, residents experienced difficulty with closure of the encounter, exhibited as diagnostic uncertainty. This finding raises important questions about the relationship between contextual factors and clinical reasoning activities and how this relationship might influence the cost effectiveness of care. This study also provides insight into how the phenomena of context specificity may be explained using situated cognition theory.

  11. Contextual control over expression of fear is affected by cortisol

    Directory of Open Access Journals (Sweden)

    Vanessa Anna Van Ast

    2012-10-01

    Full Text Available At the core of anxiety disorders is the inability to use contextual information to modulate behavioral responses to potentially threatening events. Models of the pathogenesis of anxiety disorders incorporate stress and concomitant stress hormones as important vulnerability factors, while others emphasize sex as an important factor. However, translational basic research has not yet investigated the effects of stress hormones and sex on the ability to use contextual information to modulate responses to threat. Therefore, the purpose of the present study was threefold: first, we aimed at developing an experimental paradigm specifically capable of capturing contextual modulation of the expression of fear. Second, we tested whether cortisol would alter the contextualization of fear expression. Third, we aimed at assessing whether alterations in contextualization due to cortisol were different for men and women. Healthy participants (n = 42 received placebo or hydrocortisone (20 mg prior to undergoing a newly developed differential contextual fear conditioning paradigm. The results indicated that people rapidly acquire differential contextual modulation of the expression of fear, as measured by fear potentiated startle and skin conductance responses. In addition, cortisol impaired the contextualization of fear expression leading to increased fear generalization on fear potentiated startle data in women. The opposite pattern was found in men. Finally, as assessed by skin conductance responses, cortisol impaired differential conditioning in men. The results are in line with models suggesting heightened vulnerability in women for developing anxiety disorders after stressful events.

  12. Is there contextuality in behavioural and social systems?

    Science.gov (United States)

    Dzhafarov, E N; Zhang, Ru; Kujala, Janne

    2016-01-13

    Most behavioural and social experiments aimed at revealing contextuality are confined to cyclic systems with binary outcomes. In quantum physics, this broad class of systems includes as special cases Klyachko-Can-Binicioglu-Shumovsky-type, Einstein-Podolsky-Rosen-Bell-type and Suppes-Zanotti-Leggett-Garg-type systems. The theory of contextuality known as contextuality-by-default allows one to define and measure contextuality in all such systems, even if there are context-dependent errors in measurements, or if something in the contexts directly interacts with the measurements. This makes the theory especially suitable for behavioural and social systems, where direct interactions of 'everything with everything' are ubiquitous. For cyclic systems with binary outcomes, the theory provides necessary and sufficient conditions for non-contextuality, and these conditions are known to be breached in certain quantum systems. We review several behavioural and social datasets (from polls of public opinion to visual illusions to conjoint choices to word combinations to psychophysical matching), and none of these data provides any evidence for contextuality. Our working hypothesis is that this may be a broadly applicable rule: behavioural and social systems are non-contextual, i.e. all 'contextual effects' in them result from the ubiquitous dependence of response distributions on the elements of contexts other than the ones to which the response is presumably or normatively directed. © 2015 The Author(s).

  13. Effects of Normal Aging on Memory for Multiple Contextual Features

    Science.gov (United States)

    Gagnon, Sylvain; Soulard, Kathleen; Brasgold, Melissa; Kreller, Joshua

    2007-01-01

    Twenty-four younger (18-35 years) and 24 older adult participants (65 or older) were exposed to three experimental conditions involving the memorization words and their associated contextual features, with contextual feature complexity increasing from Conditions 1 to 3. In Condition 1, words presented varied only on one binary feature (color,…

  14. Cultural and Contextual Influences on Parenting in Mexican American Families

    Science.gov (United States)

    White, Rebecca M. B.; Roosa, Mark W.; Weaver, Scott R.; Nair, Rajni L.

    2009-01-01

    Family stress theory can explain associations between contextual stressors and parenting. The theory, however, has not been tested among Mexican Americans or expanded to include cultural-contextual risks. This study examined associations between neighborhood, economic, and acculturative stressors and parenting behaviors in a sample of 570…

  15. The Influence of Contextual Diversity on Eye Movements in Reading

    Science.gov (United States)

    Plummer, Patrick; Perea, Manuel; Rayner, Keith

    2014-01-01

    Recent research has shown contextual diversity (i.e., the number of passages in which a given word appears) to be a reliable predictor of word processing difficulty. It has also been demonstrated that word-frequency has little or no effect on word recognition speed when accounting for contextual diversity in isolated word processing tasks. An…

  16. Contextual Aspects of Smart City Energy Systems Analysis

    DEFF Research Database (Denmark)

    Thellufsen, Jakob Zinck

    The thesis defines the concept of smart city energy systems. The thesis emphasises the need to investigate the smart city energy system and two contextual aspects. The system integration context and the geographical context. The system integration context emphasises that increased interrelation...... of the different contextual aspects....

  17. Security an introduction

    CERN Document Server

    Purpura, Philip P

    2011-01-01

    Section I The History and Profession of SecurityDefinition, Role, and History of Security Security Defined The Contexts of Security The Roles of Security The History of Security Security in an Environment of Threats, Terrorism, and All-Hazards Threats and Hazards Terrorism National Strategies The Profession and Business of Security The Business of Security Professionalism and Security Associations Ethics Regulation of the Security Industry Security Training Higher Education Careers Section II Protecting People and AssetsSecurity Methodology Methodology Defined Security Business Proposals Secur

  18. IoT Contextual Factors on Healthcare.

    Science.gov (United States)

    Michalakis, Konstantinos; Caridakis, George

    2017-01-01

    With the emergence of the Internet of Things, new services in healthcare will be available and existing systems will be integrated in the IoT framework, providing automated medical supervision and efficient medical treatment. Context awareness plays a critical role in realizing the vision of the IoT, providing rich contextual information that can help the system act more efficiently. Since context in healthcare has its unique characteristics, it is necessary to define an appropriate context aware framework for healthcare IoT applications. We identify this context as perceived in healthcare applications and describe the context aware procedures. We also present an architecture that connects the sensors that measure biometric data with the sensory networks of the environment and the various IoT middleware that reside in the geographical area. Finally, we discuss the challenges for the realization of this vision.

  19. Contextual Teaching and Learning for Practitioners

    Directory of Open Access Journals (Sweden)

    Clemente Charles Hudson

    2008-08-01

    Full Text Available Contextual Teaching and Learning (CTL is defined as a way to introduce content using a variety of activelearning techniques designed to help students connect what they already know to what they are expected to learn, and to construct new knowledge from the analysis and synthesis of this learning process. A theoretical basis for CTL is outlined, with a focus on Connection, Constructivist, and Active Learning theories. A summary of brain activity during the learning process illustrates the physiological changes and connections that occur during educational activities. Three types of learning scenarios (project-based, goal-based, and inquiry-oriented are presented to illustrate how CTL can be applied by practitioners.

  20. Probabilistic generation of quantum contextual sets

    International Nuclear Information System (INIS)

    Megill, Norman D.; Fresl, Kresimir; Waegell, Mordecai; Aravind, P.K.; Pavicic, Mladen

    2011-01-01

    We give a method for exhaustive generation of a huge number of Kochen-Specker contextual sets, based on the 600-cell, for possible experiments and quantum gates. The method is complementary to our previous parity proof generation of these sets, and it gives all sets while the parity proof method gives only sets with an odd number of edges in their hypergraph representation. Thus we obtain 35 new kinds of critical KS sets with an even number of edges. We also give a statistical estimate of the number of sets that might be obtained in an eventual exhaustive enumeration. -- Highlights: → We generate millions of new Kochen-Specker noncontextual set. → We find thousands of novel critical Kochen-Specker (KS) sets. → We give algorithms for generating KS sets from a new 4-dim class. → We represent KS sets by means of hypergraphs and their figures. → We give a new exact estimation method for random sampling of sets.

  1. Variables as Contextual Constraints in Translating Irony

    Directory of Open Access Journals (Sweden)

    Babîi Oana

    2015-06-01

    Full Text Available The translator’s role and responsibility are high in any act of interlingual communication, and even higher when irony, an indirect and deliberately elusive form of communication, is involved in the translation process. By allowing more than one possible interpretation, irony is inevitably exposed to the risk of being misunderstood. This paper attempts to capture the complexity of translating irony, making use of theoretical frameworks provided by literary studies and translation studies. It analyses if and how the types of irony, the literary genres and the cultural, normative factors, perceived as potential contextual constraints, have an impact on the translator’ choices in rendering irony in translation, taking illustrative examples from Jonathan Swift, Oscar Wilde, Aldous Huxley and David Lodge’s works.

  2. Mutual Contextualization in Tripartite Graphs of Folksonomies

    Science.gov (United States)

    Yeung, Ching-Man Au; Gibbins, Nicholas; Shadbolt, Nigel

    The use of tags to describe Web resources in a collaborative manner has experienced rising popularity among Web users in recent years. The product of such activity is given the name folksonomy, which can be considered as a scheme of organizing information in the users' own way. This research work attempts to analyze tripartite graphs - graphs involving users, tags and resources - of folksonomies and discuss how these elements acquire their semantics through their associations with other elements, a process we call mutual contextualization. By studying such process, we try to identify solutions to problems such as tag disambiguation, retrieving documents of similar topics and discovering communities of users. This paper describes the basis of the research work, mentions work done so far and outlines future plans.

  3. Liberalism and gender: a contextual persepctive

    Directory of Open Access Journals (Sweden)

    Soledad Escalante Beltrán

    2006-04-01

    Full Text Available This article contextually discusses the category of gender from a liberal perspective. The six sections of the study provide a deep criticism of the social sciences from a less rigid perspective in the handling of dichotomous and exclusionary categories such as masculine-feminine, rational-emotional, private-public, liberal-community, to mention some of the central issues raised by the various debates about gender. A comparative methodology is used to analyze authors such as Kolberg, Gilligan, Rawls and others. One of the principal conclusions reached in this study is that traditional theoretical schemes, still in use, impede achieving broader consensuses and delay the resolution of practical problems such as, in the Peruvian case, those resulting from the translation of the discourse of equity into actions and concrete daily practices that provide citizens true access to justice.

  4. School variation in asthma: compositional or contextual?

    Directory of Open Access Journals (Sweden)

    Tracy K Richmond

    2009-12-01

    Full Text Available Childhood asthma prevalence and morbidity have been shown to vary by neighborhood. Less is known about between-school variation in asthma prevalence and whether it exists beyond what one might expect due to students at higher risk of asthma clustering within different schools. Our objective was to determine whether between-school variation in asthma prevalence exists and if so, if it is related to the differential distribution of individual risk factors for and correlates of asthma or to contextual influences of schools.Cross-sectional analysis of 16,640 teens in grades 7-12 in Wave 1 (data collected in 1994-5 of the National Longitudinal Study of Adolescent Health. Outcome was current diagnosis of asthma as reported by respondents' parents. Two-level random effects models were used to assess the contribution of schools to the variance in asthma prevalence before and after controlling for individual attributes.The highest quartile schools had mean asthma prevalence of 21.9% compared to the lowest quartile schools with mean asthma prevalence of 7.1%. In our null model, the school contributed significantly to the variance in asthma (sigma(u0(2 = 0.27, CI: 0.20, 0.35. Controlling for individual, school and neighborhood attributes reduced the between-school variance modestly (sigma(u0(2 = 0.19 CI: 0.13-0.29.Significant between-school variation in current asthma prevalence exists even after controlling for the individual, school and neighborhood factors. This provides evidence for school level contextual influences on asthma. Further research is needed to determine potential mechanisms through which schools may influence asthma outcomes.

  5. Experimental demonstration of quantum contextuality on an NMR qutrit

    Energy Technology Data Exchange (ETDEWEB)

    Dogra, Shruti; Dorai, Kavita, E-mail: kavita@iisermohali.ac.in; Arvind

    2016-05-20

    We experimentally test quantum contextuality of a single qutrit using NMR. The contextuality inequalities based on nine observables developed by Kurzynski et al. are first reformulated in terms of traceless observables which can be measured in an NMR experiment. These inequalities reveal the contextuality of almost all single-qutrit states. We demonstrate the violation of the inequality on four different initial states of a spin-1 deuterium nucleus oriented in a liquid crystal matrix, and follow the violation as the states evolve in time. We also describe and experimentally perform a single-shot test of contextuality for a subclass of qutrit states whose density matrix is diagonal in the energy basis. - Highlights: • A contextuality inequality for a single qutrit was designed using traceless observables. • The violation of the inequality was experimentally demonstrated using NMR. • A single-shot test was experimentally performed for a subclass of diagonal qutrit states.

  6. Experimental demonstration of quantum contextuality on an NMR qutrit

    International Nuclear Information System (INIS)

    Dogra, Shruti; Dorai, Kavita; Arvind

    2016-01-01

    We experimentally test quantum contextuality of a single qutrit using NMR. The contextuality inequalities based on nine observables developed by Kurzynski et al. are first reformulated in terms of traceless observables which can be measured in an NMR experiment. These inequalities reveal the contextuality of almost all single-qutrit states. We demonstrate the violation of the inequality on four different initial states of a spin-1 deuterium nucleus oriented in a liquid crystal matrix, and follow the violation as the states evolve in time. We also describe and experimentally perform a single-shot test of contextuality for a subclass of qutrit states whose density matrix is diagonal in the energy basis. - Highlights: • A contextuality inequality for a single qutrit was designed using traceless observables. • The violation of the inequality was experimentally demonstrated using NMR. • A single-shot test was experimentally performed for a subclass of diagonal qutrit states.

  7. Contextual Cueing Effect in Spatial Layout Defined by Binocular Disparity

    Science.gov (United States)

    Zhao, Guang; Zhuang, Qian; Ma, Jie; Tu, Shen; Liu, Qiang; Sun, Hong-jin

    2017-01-01

    Repeated visual context induces higher search efficiency, revealing a contextual cueing effect, which depends on the association between the target and its visual context. In this study, participants performed a visual search task where search items were presented with depth information defined by binocular disparity. When the 3-dimensional (3D) configurations were repeated over blocks, the contextual cueing effect was obtained (Experiment 1). When depth information was in chaos over repeated configurations, visual search was not facilitated and the contextual cueing effect largely crippled (Experiment 2). However, when we made the search items within a tiny random displacement in the 2-dimentional (2D) plane but maintained the depth information constant, the contextual cueing was preserved (Experiment 3). We concluded that the contextual cueing effect was robust in the context provided by 3D space with stereoscopic information, and more importantly, the visual system prioritized stereoscopic information in learning of spatial information when depth information was available. PMID:28912739

  8. Task-relevant information is prioritized in spatiotemporal contextual cueing.

    Science.gov (United States)

    Higuchi, Yoko; Ueda, Yoshiyuki; Ogawa, Hirokazu; Saiki, Jun

    2016-11-01

    Implicit learning of visual contexts facilitates search performance-a phenomenon known as contextual cueing; however, little is known about contextual cueing under situations in which multidimensional regularities exist simultaneously. In everyday vision, different information, such as object identity and location, appears simultaneously and interacts with each other. We tested the hypothesis that, in contextual cueing, when multiple regularities are present, the regularities that are most relevant to our behavioral goals would be prioritized. Previous studies of contextual cueing have commonly used the visual search paradigm. However, this paradigm is not suitable for directing participants' attention to a particular regularity. Therefore, we developed a new paradigm, the "spatiotemporal contextual cueing paradigm," and manipulated task-relevant and task-irrelevant regularities. In four experiments, we demonstrated that task-relevant regularities were more responsible for search facilitation than task-irrelevant regularities. This finding suggests our visual behavior is focused on regularities that are relevant to our current goal.

  9. Personal health records: retrieving contextual information with Google Custom Search.

    Science.gov (United States)

    Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel

    2012-01-01

    Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record.

  10. Avaliação de máquinas e equipamentos que oferecem riscos à segurança do trabalhador nas etapas de pós-colheita do café Evaluation of machines and equipment that offer risks to the security of the worker in the stages of after-harvest of the coffee

    Directory of Open Access Journals (Sweden)

    Cinara da Cunha Siqueira Carvalho

    2008-12-01

    Full Text Available A Lei Brasileira nº 6.514, de 22 de dezembro de 1977 (BRASIL, 2004 e as leis aprovadas pela portaria nº3.067, de 12 de abril de 1988 que cuida das questões de saúde e segurança do trabalhador, prometem o direito subjetivo do trabalhador urbano e rural, a redução dos riscos do trabalho mediante normas de saúde, higiene e segurança. Considerando que essas leis atualmente estão sendo aplicadas em fazendas e unidades de processamento de café, no intuito de preservar o bem-estar do trabalhador, conduziu-se este trabalho, com o objetivo de avaliar o estado de conservação de máquinas e equipamentos que podem oferecer riscos à saúde e comprometer a segurança do funcionário, e verificar sua conformidade com as normas regulamentadoras durante a fase de pós-colheita de café. Foram observados e registrados os riscos oferecidos pelas máquinas e equipamentos, existentes em trinta unidades de beneficiamento de café do município de São Sebastião do Paraíso - MG, e avaliados de forma qualitativa. Foi observado que o estado de conservação desses equipamentos é irregular, pois apresentam ruído, temperaturas extremas, poeira e oferecem riscos de choques e acidentes mecânicos que comprometem a saúde do trabalhador.The Brazilian Law nº. 6.514, of December 22, 1977 and the approved laws for the entrance nº3.067, of April 12, 1988 that take care of the subjects of health and the worker's safety, promise the urban and rural worker's subjective rights, such as the reduction of the risks of the work by norms of health, hygiene and safety. Considering that those laws are now being applied in farms and processing coffee units aiming of preserving the worker's well-being, the present work had as objective to evaluate the state of conservation of the machines and equipments that can offer risks to the health to compromise the employee's safety and to verify their conformity with the regulating norms during the stage of coffee after

  11. Automatic ethics: the effects of implicit assumptions and contextual cues on moral behavior.

    Science.gov (United States)

    Reynolds, Scott J; Leavitt, Keith; DeCelles, Katherine A

    2010-07-01

    We empirically examine the reflexive or automatic aspects of moral decision making. To begin, we develop and validate a measure of an individual's implicit assumption regarding the inherent morality of business. Then, using an in-basket exercise, we demonstrate that an implicit assumption that business is inherently moral impacts day-to-day business decisions and interacts with contextual cues to shape moral behavior. Ultimately, we offer evidence supporting a characterization of employees as reflexive interactionists: moral agents whose automatic decision-making processes interact with the environment to shape their moral behavior.

  12. DIRAC Security

    CERN Document Server

    Casajús Ramo, A

    2006-01-01

    DIRAC is the LHCb Workload and Data Management System. Based on a service-oriented architecture, it enables generic distributed computing with lightweight Agents and Clients for job execution and data transfers. DIRAC implements a client-server architecture exposing server methods through XML Remote Procedure Call (XML-RPC) protocol. DIRAC is mostly coded in python. DIRAC security infrastructure has been designed to be a completely generic XML-RPC transport over a SSL tunnel. This new security layer is able to handle standard X509 certificates as well as grid-proxies to authenticate both sides of the connection. Serve and client authentication relies over OpenSSL and py-Open SSL, but to be able to handle grid proxies some modifications have been added to those libraries. DIRAC security infrastructure handles authorization and authorization as well as provides extended capabilities like secure connection tunneling and file transfer. Using this new security infrastructure all LHCb users can safely make use o...

  13. The ultimatum game: Discrete vs. continuous offers

    Science.gov (United States)

    Dishon-Berkovits, Miriam; Berkovits, Richard

    2014-09-01

    In many experimental setups in social-sciences, psychology and economy the subjects are requested to accept or dispense monetary compensation which is usually given in discrete units. Using computer and mathematical modeling we show that in the framework of studying the dynamics of acceptance of proposals in the ultimatum game, the long time dynamics of acceptance of offers in the game are completely different for discrete vs. continuous offers. For discrete values the dynamics follow an exponential behavior. However, for continuous offers the dynamics are described by a power-law. This is shown using an agent based computer simulation as well as by utilizing an analytical solution of a mean-field equation describing the model. These findings have implications to the design and interpretation of socio-economical experiments beyond the ultimatum game.

  14. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  15. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  16. Cryptographic Combinatorial Securities Exchanges

    Science.gov (United States)

    Thorpe, Christopher; Parkes, David C.

    We present a useful new mechanism that facilitates the atomic exchange of many large baskets of securities in a combinatorial exchange. Cryptography prevents information about the securities in the baskets from being exploited, enhancing trust. Our exchange offers institutions who wish to trade large positions a new alternative to existing methods of block trading: they can reduce transaction costs by taking advantage of other institutions’ available liquidity, while third party liquidity providers guarantee execution—preserving their desired portfolio composition at all times. In our exchange, institutions submit encrypted orders which are crossed, leaving a “remainder”. The exchange proves facts about the portfolio risk of this remainder to third party liquidity providers without revealing the securities in the remainder, the knowledge of which could also be exploited. The third parties learn either (depending on the setting) the portfolio risk parameters of the remainder itself, or how their own portfolio risk would change if they were to incorporate the remainder into a portfolio they submit. In one setting, these third parties submit bids on the commission, and the winner supplies necessary liquidity for the entire exchange to clear. This guaranteed clearing, coupled with external price discovery from the primary markets for the securities, sidesteps difficult combinatorial optimization problems. This latter method of proving how taking on the remainder would change risk parameters of one’s own portfolio, without revealing the remainder’s contents or its own risk parameters, is a useful protocol of independent interest.

  17. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  18. Improving Tamper Detection for Hazardous Waste Security

    International Nuclear Information System (INIS)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-01-01

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them

  19. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  20. China's energy security: Perception and reality

    International Nuclear Information System (INIS)

    Leung, Guy C.K.

    2011-01-01

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: → Oil is the form of energy that has produced most of China's energy insecurity. → Transport sector, rather than industry, is the largest driver of China's oil demand. → The contribution of oil pipelines to China's energy security is smaller than many assumed. → Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. → Energy security is a means; it is not a goal.

  1. Privatising Security

    Directory of Open Access Journals (Sweden)

    Irina Mindova-Docheva

    2016-06-01

    Full Text Available The article proposes an analysis of the different approaches towards employing the international legal framework in the regulation and oversight of private military and security companies’ operation in armed conflicts and in peace time security systems. It proposes a partnership-based approach for public and private actors aiming at creating and sharing common values under the principles of solidarity, protection of human rights and rule of law. A focus of further research should be the process of shaping those common values.

  2. Secure Architectures in the Cloud

    NARCIS (Netherlands)

    De Capitani di Vimercati, Sabrina; Pieters, Wolter; Probst, Christian W.

    2011-01-01

    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud‿. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces

  3. The Etiquette of Accepting a Job Offer

    Science.gov (United States)

    Perlmutter, David D.

    2013-01-01

    The academic job market is overcrowded, but departments are hiring, and each year thousands of graduate students and other candidates will get phone calls offering them tenure-track positions. It is typically a moment of mutual giddiness. The department heads are excited at the prospect of a terrific new colleague; the job applicants now know that…

  4. 16 CFR 502.101 - Introductory offers.

    Science.gov (United States)

    2010-01-01

    ... Commercial Practices FEDERAL TRADE COMMISSION RULES, REGULATIONS, STATEMENT OF GENERAL POLICY OR... FAIR PACKAGING AND LABELING ACT Retail Sale Price Representations § 502.101 Introductory offers. (a... retail sale at a price lower than the anticipated ordinary and customary retail sale price. (b) The...

  5. Scientific Library Offers New Training Options | Poster

    Science.gov (United States)

    The Scientific Library is expanding its current training opportunities by offering webinars, allowing employees to take advantage of trainings from the comfort of their own offices. Due to the nature of their work, some employees find it inconvenient to attend in-person training classes; others simply prefer to use their own computers. The Scientific Library has been

  6. Hierarchical acquisition of visual specificity in spatial contextual cueing.

    Science.gov (United States)

    Lie, Kin-Pou

    2015-01-01

    Spatial contextual cueing refers to visual search performance's being improved when invariant associations between target locations and distractor spatial configurations are learned incidentally. Using the instance theory of automatization and the reverse hierarchy theory of visual perceptual learning, this study explores the acquisition of visual specificity in spatial contextual cueing. Two experiments in which detailed visual features were irrelevant for distinguishing between spatial contexts found that spatial contextual cueing was visually generic in difficult trials when the trials were not preceded by easy trials (Experiment 1) but that spatial contextual cueing progressed to visual specificity when difficult trials were preceded by easy trials (Experiment 2). These findings support reverse hierarchy theory, which predicts that even when detailed visual features are irrelevant for distinguishing between spatial contexts, spatial contextual cueing can progress to visual specificity if the stimuli remain constant, the task is difficult, and difficult trials are preceded by easy trials. However, these findings are inconsistent with instance theory, which predicts that when detailed visual features are irrelevant for distinguishing between spatial contexts, spatial contextual cueing will not progress to visual specificity. This study concludes that the acquisition of visual specificity in spatial contextual cueing is more plausibly hierarchical, rather than instance-based.

  7. Stimulus homogeneity enhances implicit learning: evidence from contextual cueing.

    Science.gov (United States)

    Feldmann-Wüstefeld, Tobias; Schubö, Anna

    2014-04-01

    Visual search for a target object is faster if the target is embedded in a repeatedly presented invariant configuration of distractors ('contextual cueing'). It has also been shown that the homogeneity of a context affects the efficiency of visual search: targets receive prioritized processing when presented in a homogeneous context compared to a heterogeneous context, presumably due to grouping processes at early stages of visual processing. The present study investigated in three Experiments whether context homogeneity also affects contextual cueing. In Experiment 1, context homogeneity varied on three levels of the task-relevant dimension (orientation) and contextual cueing was most pronounced for context configurations with high orientation homogeneity. When context homogeneity varied on three levels of the task-irrelevant dimension (color) and orientation homogeneity was fixed, no modulation of contextual cueing was observed: high orientation homogeneity led to large contextual cueing effects (Experiment 2) and low orientation homogeneity led to low contextual cueing effects (Experiment 3), irrespective of color homogeneity. Enhanced contextual cueing for homogeneous context configurations suggest that grouping processes do not only affect visual search but also implicit learning. We conclude that memory representation of context configurations are more easily acquired when context configurations can be processed as larger, grouped perceptual units. However, this form of implicit perceptual learning is only improved by stimulus homogeneity when stimulus homogeneity facilitates grouping processes on a dimension that is currently relevant in the task. Copyright © 2014 Elsevier B.V. All rights reserved.

  8. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  9. Virtual queuing at airport security lanes

    NARCIS (Netherlands)

    Lange, de R.; Samoilovich, I.; Rhee, van der B.

    2013-01-01

    Airports continuously seek opportunities to reduce the security costs without negatively affecting passenger satisfaction. In this paper, we investigate the possibilities of implementing virtual queuing at airport security lanes, by offering some passengers a time window during which they can arrive

  10. Teaching Case: Security Breach at Target

    Science.gov (United States)

    Plachkinova, Miloslava; Maurer, Chris

    2018-01-01

    This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…

  11. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  12. Cyber Security--Are You Prepared?

    Science.gov (United States)

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  13. PREDICTION OF DEMAND FOR PRIMARY BOND OFFERINGS USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Michal Tkac

    2014-12-01

    Full Text Available Purpose: Primary bond markets represent an interesting investment opportunity not only for banks, insurance companies, and other institutional investors, but also for individuals looking for capital gains. Since offered securities vary in terms of their rating, industrial classification, coupon, or maturity, demand of buyers for particular offerings often overcomes issued volume and price of given bond on secondary market consequently rises. Investors might be regarded as consumers purchasing required service according to their specific preferences at desired price. This paper aims at analysis of demand for bonds on primary market using artificial neural networks.Design/methodology: We design a multilayered feedforward neural network trained by Levenberg-Marquardt algorithm in order to estimate demand for individual bonds based on parameters of particular offerings. Outcomes obtained by artificial neural network are compared with conventional econometric methods.Findings: Our results indicate that artificial neural network significantly outperformed standard econometric techniques and on examined sample of primary bond offerings achieved considerably better performance in terms of prediction accuracy and mean squared error.Originality: We show that proposed neural network is able to successfully predict demand for primary obligation offerings based on their specifications. Moreover, we identify relevant parameters of issues which are able to considerably affect total demand for given security.  Our findings might not only help investors to detect marketable securities, but also enable issuing entities to increase demand for their bonds in order to decrease their offering price. 

  14. Receipt of a pediatric liver offer as the first offer reduces waitlist mortality for adult women.

    Science.gov (United States)

    Ge, Jin; Gilroy, Richard; Lai, Jennifer C

    2018-03-31

    In liver transplantation, adults with small stature have a greater susceptibility to waitlist mortality. This may explain the persistent waitlist mortality disparity that exists for women. We hypothesized that women who receive early offers of pediatric donor livers have improved waitlist survival, and that preferentially offering these organs to women mitigates this sex-based disparity. We analyzed donor liver offers from 2010 to 2014. Adult candidates who received a first offer that ranked within the first three match run positions from the donors' perspective were classified based on gender and whether they received a pediatric versus adult offer. We used competing risks regression to associate first offer type and waitlist mortality. 8,101 waitlist candidates received a first offer that was ranked within the first three match run positions: 5.6% (293/5,202) men and 6.2% (179/2,899) women received a pediatric donor liver as their first offer. In multivariable analyses, compared to adult-first men, adult-first women (sHR1.33, 95%CI 1.17-1.51, p offer had a lower risk of waitlist mortality compared to those who receive adult offers. Our data provides a simple approach to mitigating the increased waitlist mortality experienced by women by incorporating donor and recipient size, as variables, into organ allocation. This article is protected by copyright. All rights reserved. © 2018 by the American Association for the Study of Liver Diseases.

  15. Information Security

    NARCIS (Netherlands)

    Hartel, Pieter H.; Suryana Herman, Nanna; Leukfeldt, E.R.; Stol, W.Ph.

    2012-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is

  16. Food security

    NARCIS (Netherlands)

    Ridder, M. de

    2011-01-01

    Food security is back on the agenda as a top priority for policy makers. In January 2011, record high food prices resulted in protests in Tunisia, which subsequently led to the spread of the revolutions in other North African and Middle Eastern countries. Although experts have asserted that no

  17. A taxonomy for contextual information in electronic health records.

    Science.gov (United States)

    Weir, Charlene R; Staggers, Nancy; Doing-Harris, Kristina; Dunlea, Robert; McCormick, Teresa; Barrus, Robyn

    2012-01-01

    Contextual information is functional, social and financial information about patients and is central to many health-care decisions, including end-of-life care, living arrangements, and the aggressiveness of treatment. It is the language of patients when talking about their health and frequently the focus of nursing interventions. In this study, we report the results of a qualitative analysis of interviews of 17 clinicians focusing on their use of contextual information during the process of care, decision-making and documentation. We identified seven characteristics of contextual information relevant to its use in a clinical setting. Implications for Natural Language Processing and Ontology construction are discussed.

  18. Competition, Speculative Risks, and IT Security Outsourcing

    Science.gov (United States)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  19. Service Offering at Electrical Equipment Manufacturers

    Directory of Open Access Journals (Sweden)

    Lucie Kaňovská

    2015-09-01

    Full Text Available Purpose of the article: The aim of the paper is to uncover ways of managing service offering provided by electrical equipment manufactures in the Czech Republic. The segment is extremely important for Czech industry nowadays, especially because of many companies being subcontractors for the car industry and mechanical engineering. The producers of electric equipment comply with the Czech industry classification CZ-NACE 27. Methodology/methods: The questionnaire in the form of the Likert scale was prepared to gather information about customer services. The respondents were usually directors or managers, e.g. employees with high competencies of knowing customer services in this particular market. The total of 22 companies were included in the survey. Research was focused on the following industries classifications belonging to CZ-NACE 27: CZ-NACE 27, CZ-NACE 271 and CZ-NACE 273. According to Czech Statistical Office the total number of companies belonging to these 3 segments is 136. It means 16,2% companies belonging to CZ-NACE 27 participated in our research. Basic statistical methods were used to analyse the complete database. Scientific aim: The paper deals with the problem of service offering provided by today’s manufacturers. Global understanding of services that manufacturers really develop, sell, deliver and manage is still limited. Findings: Managing service offering provided by today‘s manufacturers shows that 1 Manufacturers not offer only tangible products, but also wide range of services and even information and support. 2 New products are not designed only according to company technicians, but also according to their customers. Their products and services are developed, tested and improved according to their needs. 3 Services provide complex customer care from time product selection to its end. Conclusions: Manufacturers of tangible products need to enlarge their product offering to be able to satisfy customers. Therefore

  20. CONTEXTUAL STRATEGIES FOR CONDUCTING EFFECTIVE NEGOTIATION

    Directory of Open Access Journals (Sweden)

    Camelia\tBĂEȘU

    2015-12-01

    Full Text Available Within this paper we try to argue the development of contextual strategies for conducting effective negotiation. Throughout the paper we present that the first motivation which we manage to identify is that we negotiate to improve whatever situation we are involved in. It is of great relevance to identify a few reasons for what we negotiate. Another motivation is that negotiation is an opportunity for creativity and it does allow you to fashion a solution according to, usually different kinds of facts, different fact situation so you may get to express some creativity. Negotiation is perceived as an opportunity where we can also build relationship with the other person. We can also communicate better with the other side about where they are, what they want and where they want to go. Next, we try to identify what makes for successful negotiation during each stage of the negotiation process. According to this paper there are five things which are the essence of business negotiation.

  1. Embedding quantum into classical: contextualization vs conditionalization.

    Directory of Open Access Journals (Sweden)

    Ehtibar N Dzhafarov

    Full Text Available We compare two approaches to embedding joint distributions of random variables recorded under different conditions (such as spins of entangled particles for different settings into the framework of classical, Kolmogorovian probability theory. In the contextualization approach each random variable is "automatically" labeled by all conditions under which it is recorded, and the random variables across a set of mutually exclusive conditions are probabilistically coupled (imposed a joint distribution upon. Analysis of all possible probabilistic couplings for a given set of random variables allows one to characterize various relations between their separate distributions (such as Bell-type inequalities or quantum-mechanical constraints. In the conditionalization approach one considers the conditions under which the random variables are recorded as if they were values of another random variable, so that the observed distributions are interpreted as conditional ones. This approach is uninformative with respect to relations between the distributions observed under different conditions because any set of such distributions is compatible with any distribution assigned to the conditions.

  2. Group adaptation, formal darwinism and contextual analysis.

    Science.gov (United States)

    Okasha, S; Paternotte, C

    2012-06-01

    We consider the question: under what circumstances can the concept of adaptation be applied to groups, rather than individuals? Gardner and Grafen (2009, J. Evol. Biol.22: 659-671) develop a novel approach to this question, building on Grafen's 'formal Darwinism' project, which defines adaptation in terms of links between evolutionary dynamics and optimization. They conclude that only clonal groups, and to a lesser extent groups in which reproductive competition is repressed, can be considered as adaptive units. We re-examine the conditions under which the selection-optimization links hold at the group level. We focus on an important distinction between two ways of understanding the links, which have different implications regarding group adaptationism. We show how the formal Darwinism approach can be reconciled with G.C. Williams' famous analysis of group adaptation, and we consider the relationships between group adaptation, the Price equation approach to multi-level selection, and the alternative approach based on contextual analysis. © 2012 The Authors. Journal of Evolutionary Biology © 2012 European Society For Evolutionary Biology.

  3. Kontextualisierung von Queer Theory Contextualizing Queer Theory

    Directory of Open Access Journals (Sweden)

    Anna Voigt

    2008-03-01

    Full Text Available Christine M. Klapeer legt in diesem Einführungsband dar, aus welchen politischen und theoretischen Kontexten heraus sich ‚queer‘ zu einem Begriff mit besonderem politischem und theoretischem Gehalt entwickelt hat. Wesentlich zielt sie dabei auf eine kritische Kontextualisierung von „queer theory”. Die Autorin geht zunächst auf das Gay Liberation Movement ein, grenzt die Queer Theory vom Poststrukturalismus, von feministischen Theorien und den Lesbian and Gay Studies ab, beleuchtet Eckpunkte queeren Denkens und zeichnet schließlich die Entwicklungen in Österreich sowohl politisch-rechtlich als auch bewegungsgeschichtlich und in der Wissenschaftslandschaft nach.Christine M. Klapeer’s introductory volume demonstrates the manner in which ‘queer’ grew out of various political and theoretical contexts to become a term with special political and theoretical content. She focuses primarily on a critical contextualization of “queer theory.” The author begins by approaching the Gay Liberation Movement and then distinguishes Queer Theory from poststructuralism, from feminist theories, and from Lesbian and Gay Studies. She continues on to illuminate the key aspects of queer thought and concludes by sketching the development in Austria in terms of politics and the law, the history of movements, and within the landscape of knowledge.

  4. Measurement contextuality is implied by macroscopic realism

    International Nuclear Information System (INIS)

    Chen Zeqian; Montina, A.

    2011-01-01

    Ontological theories of quantum mechanics provide a realistic description of single systems by means of well-defined quantities conditioning the measurement outcomes. In order to be complete, they should also fulfill the minimal condition of macroscopic realism. Under the assumption of outcome determinism and for Hilbert space dimension greater than 2, they were all proved to be contextual for projective measurements. In recent years a generalized concept of noncontextuality was introduced that applies also to the case of outcome indeterminism and unsharp measurements. It was pointed out that the Beltrametti-Bugajski model is an example of measurement noncontextual indeterminist theory. Here we provide a simple proof that this model is the only one with such a feature for projective measurements and Hilbert space dimension greater than 2. In other words, there is no extension of quantum theory providing more accurate predictions of outcomes and simultaneously preserving the minimal labeling of events through projective operators. As a corollary, noncontextuality for projective measurements implies noncontextuality for unsharp measurements. By noting that the condition of macroscopic realism requires an extension of quantum theory, unless a breaking of unitarity is invoked, we arrive at the conclusion that the only way to solve the measurement problem in the framework of an ontological theory is by relaxing the hypothesis of measurement noncontextuality in its generalized sense.

  5. Computer Security Day

    CERN Multimedia

    CERN Bulletin

    2010-01-01

      Viruses, phishing, malware and cyber-criminals can all threaten your computer and your data, even at CERN! Experts will share their experience with you and offer solutions to keep your computer secure. Thursday, 10 June 2010, 9.30, Council Chamber Make a note in your diary! Presentations in French and English: How do hackers break into your computer? Quels sont les enjeux et conséquences des attaques informatiques contre le CERN ? How so criminals steal your money on the Internet? Comment utiliser votre ordinateur de manière sécurisée ? and a quiz: test your knowledge and win one of the many prizes that will be on offer! For more information and to follow the day's events via a live webcast go to: http://cern.ch/SecDay.  

  6. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  7. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  8. Wind offering in energy and reserve markets

    DEFF Research Database (Denmark)

    Soares, Tiago; Pinson, Pierre; Morais, Hugo

    2016-01-01

    The increasing penetration of wind generation in power systems to fulfil the ambitious European targets will make wind power producers to play an even more important role in the future power system. Wind power producers are being incentivized to participate in reserve markets to increase...... their revenue, since currently wind turbine/farm technologies allow them to provide ancillary services. Thus, wind power producers are to develop offering strategies for participation in both energy and reserve markets, accounting for market rules, while ensuring optimal revenue. We consider a proportional...... offering strategy to optimally decide upon participation in both markets by maximizing expected revenue from day-ahead decisions while accounting for estimated regulation costs for failing to provide the services. An evaluation of considering the same proportional splitting of energy and reserve in both...

  9. FOREIGN LANGUAGE PROGRAMS OFFERED IN TURKISH UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Bengül CETINTAS

    2016-10-01

    Full Text Available n this study, the departments of philology and teaching, which take place in higher education programs in Turkey and give education in foreign language, have been examined. 23 different languages are offered to philology students who wants to attend to faculty of literature. Students can prefer classical languages besides modern languages. However, English, German, French, Arabic and Japanese are offered to the students of teaching department. To teach another foreign language, pedagogical formation is also required.This study focuses on the departments of German Language Teaching and German Language and Literature. From this point, the place and the importance of other philology and foreign language teaching departments in Turkish higher education have been examined.

  10. Strategies and tactics in structuring equity offerings

    International Nuclear Information System (INIS)

    Emes, A. F.

    1998-01-01

    Volatile changes in the oil and gas sector investment climate within the last few months were reviewed in an effort to illustrate that despite the sharp downturn in the attractiveness of gas and oil sector investments, certain financing transactions are still being completed, and 'deals' are still available, provided that they are made attractive to investors. Investors may be more selective, may be looking more carefully at the issuing company's track record and management, but they are still there for the right deal. Flow-through offerings, share-for-share, or share-for-property acquisitions, joint ventures, sale of assets as alternative to equity, the junior capital pool as an alternative to initial public offering, the reverse take over, use of the royalty tax market, project financing, convertible debentures, and the use of warrants were explored as options available to issuers to attract investors even during difficult times

  11. CJEP will offer open science badges.

    Science.gov (United States)

    Pexman, Penny M

    2017-03-01

    This editorial announces the decision of the Canadian Journal of Experimental Psychology (CJEP) to offer Open Science Framework (OSF) Badges. The Centre for Open Science provides tools to facilitate open science practices. These include the OSF badges. The badges acknowledge papers that meet standards for openness of data, methods, or research process. They are now described in the CJEP Submission Guidelines, and are provided in the editorial. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  12. Petroleum development offers way out of poverty

    International Nuclear Information System (INIS)

    Mollet, P.

    1996-01-01

    The North African states of Algeria, Libya, Tunisia and Egypt are starting to explore the possibility of fuelling their economic development using their petroleum reserves which have not, as yet, been exploited. Poverty and Islamic extremism is widespread, leading to political difficulties domestically and a reluctance on the part of international oil companies to reinvest in the region. Despite these problems, growth in the local petroleum industry may yet offer a path to economic growth. (UK)

  13. A PLATFORM FOR CONTEXTUAL MOBILE PRIVACY

    Science.gov (United States)

    2017-12-01

    used). As a result, a more intelligent method is needed to de- termine when a given permission request is likely to be deemed appropriate by the...tionality, we must develop an environment where permissions appear—to the application—to be allowed, but in reality only spurious or artificial data is...Term Cybersecurity (CLTC) at UC Berkeley, the Na- tional Science Foundation under grant CNS-1318680, and Intel through the ISTC for Secure Computing

  14. An Analysis of Students Enrolled to an Undergraduate University Course Offered Also Online

    Science.gov (United States)

    Scarabottolo, Nello

    2016-01-01

    This paper analyzes the main characteristics of the students enrolled to a three-years undergraduate course on Security of Computer Systems and Networks, offered in traditional, classroom based fashion as well as online at the University of Milan (Italy). This allows to compare classroom and online students from several points of view, and gives…

  15. 44 CFR 79.7 - Offers and appeals under the SRL program.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...

  16. 17 CFR 230.165 - Offers made in connection with a business combination transaction.

    Science.gov (United States)

    2010-04-01

    ... a business combination transaction. 230.165 Section 230.165 Commodity and Securities Exchanges... Offers made in connection with a business combination transaction. Preliminary Note: This section is available only to communications relating to business combinations. The exemption does not apply to...

  17. 17 CFR 230.236 - Exemption of shares offered in connection with certain transactions.

    Science.gov (United States)

    2010-04-01

    ... Exemptions § 230.236 Exemption of shares offered in connection with certain transactions. Shares of stock or... securities in lieu of issuing fractional shares, script certificates or order forms, in connection with a stock dividend, stock split, reverse stock split, conversion, merger or similar transaction, shall be...

  18. 76 FR 54998 - Request for Information on Consumer Financial Products and Services Offered to Servicemembers

    Science.gov (United States)

    2011-09-06

    ... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...

  19. Computer Security: the security marathon

    CERN Multimedia

    Computer Security Team

    2014-01-01

    If you believe that “security” is a sprint, that a quick hack is invulnerable, that quick bug fixing is sufficient, that plugging security measures on top of existing structures is good, that once you are secure your life will be easy... then let me convince you otherwise.   An excellent example of this is when the summer students join us at CERN. As the summer period is short, software projects must be accomplished quickly, like a sprint. Rush, rush! But often, this sprint ends with aching muscles. Regularly, these summer students approach us to have their project or web server made visible to the Internet. Regularly, quick security reviews of those web servers diagnose severe underperformance with regards to security: the web applications are flawed or use insecure protocols; the employed software tools, databases or web frameworks are sub-optimal and not adequately chosen for that project; the operating system is non-standard and has never been brought up-to-date; and ...

  20. Chronic fluoxetine dissociates contextual from auditory fear memory.

    Science.gov (United States)

    Sanders, Jeff; Mayford, Mark

    2016-10-06

    Fluoxetine is a medication used to treat Major Depressive Disorder and other psychiatric conditions. These experiments studied the effects of chronic fluoxetine treatment on the contextual versus auditory fear memory of mice. We found that chronic fluoxetine treatment of adult mice impaired their contextual fear memory, but spared auditory fear memory. Hippocampal perineuronal nets, which are involved in contextual fear memory plasticity, were unaltered by fluoxetine treatment. These data point to a selective inability to form contextual fear memory as a result of fluoxetine treatment, and they suggest that a blunting of hippocampal-mediated aversive memory may be a therapeutic action for this medication. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  1. Contextualized teaching on the problem solving performance of students

    Directory of Open Access Journals (Sweden)

    Rolando V. Obiedo

    2017-12-01

    Full Text Available This study investigated the effect of contextualized teaching on students’ problem solving skills in physics through a quasi-experimental approach. Problem solving performance of students was described quantitatively through their mean problem solving scores and problem solving skills level. A unit plan patterned from the cognitive apprenticeship approach and contextualized using maritime context of ship stability was implemented on the experimental group while the control group had the conventional lecture method. Pre and post assessment, which is a researcher-developed word problem assessment, was administered to both groups. Results indicated increased problem solving mean scores (p < 0.001, problem solving skill level (p < 0.001 of the experimental group while the control group increased only their problem solving skill level (p = 0.008. Thus, contextualized teaching can improve the problem solving performance of students. This study recommends using contextualization using other physics topics where other contexts can be applied.

  2. Moderating effects of contextual factors on relationship between ...

    African Journals Online (AJOL)

    Decision–making by physicians on patients' treatment has received increased research attention. ... The main objective of this paper is to review the influence of the marketing strategies by pharmaceutical firms and contextual factors on ...

  3. Awareness for Contextualized Digital Contents in Ubiquitous Learning Environments

    NARCIS (Netherlands)

    Börner, Dirk

    2010-01-01

    Börner, D. (2009). Awareness for Contextualized Digital Contents in Ubiquitous Learning Environments. Presented at the Doctoral Consortium of the Fourth European Conference on Technology Enhanced Learning (EC-TEL 2009). September, 29-October, 2, 2009, Nice, France.

  4. Organizational justice and health: Contextual determinants and psychobiological consequences

    NARCIS (Netherlands)

    Herr, R.M.

    2015-01-01

    The research presented in this thesis entitled "Organizational Justice and Health: Contextual Determinants and Psychobiological Consequences" aimed to investigate associations between organizational justice and employee health and biological functioning. Organizational justice is an occupational

  5. Anterior prefrontal involvement in implicit contextual change detection

    Directory of Open Access Journals (Sweden)

    Stefan Pollmann

    2009-10-01

    Full Text Available Anterior prefrontal cortex is usually associated with high level executive functions. Here, we show that the frontal pole, specifically left lateral frontopolar cortex, is involved in signaling change in implicitly learned spatial contexts, in the absence of conscious change detection. In a variant of the contextual cueing paradigm, participants first learned implicitly contingencies between distractor contexts and target locations. After learning, repeated distractor contexts were paired with new target locations. Left lateral frontopolar (BA10 and superior frontal (BA9 cortices showed selective signal increase for this target location change in repeated displays in an event-related fMRI experiment, which was most pronounced in participants with high contextual facilitation before the change. The data support the view that left lateral frontopolar cortex is involved in signaling contextual change to posterior brain areas as a precondition for adaptive changes of attentional resource allocation. This signaling occurs in the absence of awareness of learned contingencies or contextual change.

  6. Brain based learning with contextual approach to mathematics achievement

    Directory of Open Access Journals (Sweden)

    V Kartikaningtyas

    2017-12-01

    Full Text Available The aim of this study was to know the effect of Brain Based Learning (BBL with a contextual approach to mathematics achievement. BBL-contextual is the learning model that designed to develop and optimize the brain ability for getting a new concept and solving the real life problem. This study method was a quasi-experiment. The population was the junior high school students. The sample chosen by using stratified cluster random sampling. The sample was 109 students. The data collected through a mathematics achievement test that was given after the treatment. The data analyzed by using one way ANOVA. The results of the study showed that BBL-contextual is better than direct learning on mathematics achievement. It means BBL-contextual could be an effective and innovative model.

  7. Pre- and post-selection, weak values and contextuality

    International Nuclear Information System (INIS)

    Tollaksen, Jeff

    2007-01-01

    By analysing the concept of contextuality (Bell-Kochen-Specker) in terms of pre- and post-selection, it is possible to assign definite values to observables in a new and surprising way. Physical reasons are presented for restrictions on these assignments. When measurements are performed which do not disturb the pre- and post-selection (i.e. weak measurements), then novel experimental aspects of contextuality can be demonstrated. We also prove that every PPS-paradox with definite predictions directly implies 'quantum contextuality' which is introduced as the analogue of contextuality at the level of quantum mechanics rather than at the level of hidden variable theories. Finally, we argue that certain results of these measurements (e.g. eccentric weak values outside the eigenvalue spectrum) cannot be explained by a 'classical-like' hidden variable theory

  8. Contextually in a Peres—Mermin square using arbitrary operators

    International Nuclear Information System (INIS)

    Laversanne-Finot, A; Ketterer, A; Coudreau, T; Milman, P; Barros, M R; Walborn, S P; Keller, A

    2016-01-01

    The contextuality of quantum mechanics can be shown by the violation of inequalities based on measurements of well chosen observables. These inequalities have been designed separately for both discrete and continuous variables. Here we unify both strategies by introducing general conditions to demonstrate the contextuality of quantum mechanics from measurements of observables of arbitrary dimensions. Among the consequences of our results is the impossibility of having a maximal violation of contextuality in the Peres-Mermin scenario with discrete observables of odd dimensions. In addition, we show how to construct a large class of observables with a continuous spectrum enabling the realization of contextuality tests both in the Gaussian and non-Gaussian regimes. (paper)

  9. Security Administration Reports Application

    Data.gov (United States)

    Social Security Administration — Contains SSA Security Reports that allow Information Security Officers (ISOs) to access, review and take appropriate action based on the information contained in the...

  10. Security Investigation Database (SID)

    Data.gov (United States)

    US Agency for International Development — Security Investigation & Personnel Security Clearance - COTS personnel security application in a USAID virtualized environement that can support USAID's business...

  11. Nuclear security

    International Nuclear Information System (INIS)

    1991-07-01

    This paper reports that despite an Executive Order limiting the authority to make original classification decisions to government officials, DOE has delegated this authority to a number of contractor employees. Although the number of original classification decisions made by these contractors is small, this neither negates nor diminishes the significance of the improper delegation of authority. If misclassification were to occur, particularly at the Top Secret level, U.S. national security interests could potentially be seriously affected and threatened. DOE's argument that the delegation of such authority is a long-standing policy and done on a selective basis does not legitimize the practice and does not relieve DOE of its responsibility to meet the requirements of the Executive Order. DOE needs to independently assess all original classification determinations made by contractors; otherwise, it cannot be sure that U.S. national security interests have been or are being adequately protected

  12. Does Contextual Cueing Guide the Deployment of Attention?

    OpenAIRE

    Kunar, Melina A.; Flusberg, Stephen; Horowitz, Todd S.; Wolfe, Jeremy M.

    2007-01-01

    Contextual cueing experiments show that when displays are repeated, reaction times (RTs) to find a target decrease over time even when observers are not aware of the repetition. It has been thought that the context of the display guides attention to the target. We tested this hypothesis by comparing the effects of guidance in a standard search task to the effects of contextual cueing. Firstly, in standard search, an improvement in guidance causes search slopes (derived from RT × Set Size func...

  13. Existential contextuality and the models of Meyer, Kent, and Clifton

    International Nuclear Information System (INIS)

    Appleby, D.M.

    2002-01-01

    It is shown that the models recently proposed by Meyer, Kent, and Clifton (MKC) exhibit a novel kind of contextuality, which we term existential contextuality. In this phenomenon it is not simply the pre-existing value but the actual existence of an observable which is context dependent. This result confirms the point made elsewhere, that the MKC models do not, as the authors claim, 'nullify' the Kochen-Specker theorem. It may also be of some independent interest

  14. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Security system

    Science.gov (United States)

    Baumann, Mark J.; Kuca, Michal; Aragon, Mona L.

    2016-02-02

    A security system includes a structure having a structural surface. The structure is sized to contain an asset therein and configured to provide a forceful breaching delay. The structure has an opening formed therein to permit predetermined access to the asset contained within the structure. The structure includes intrusion detection features within or associated with the structure that are activated in response to at least a partial breach of the structure.

  16. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  17. Contextual Categorisation of Academics’ Conceptions of Teaching

    Directory of Open Access Journals (Sweden)

    Scott Daniel

    2017-04-01

    Full Text Available Background: Despite large-class research-based instructional strategies being firmly established in the literature, traditional teacher-centred lecturing remains the norm. This is particularly the case in physics, where Physics Education Research (PER has blossomed as a discipline in its own right over the last few decades, but research-based strategies are not widely implemented. This variation in practice is underpinned by variations in beliefs and understandings about teaching. Studies investigating the spectrum of conceptions of teaching held by teachers and, in particular, academics have almost uniformly identified a single dimension from teacher-centred to student-centred. These studies have used a phenomenographic approach to capture the variety of conceptions of teaching, but have excluded contextual issues like class size. Research Question: How does class size affect academics’ conceptions of teaching? Method: This study used an online survey to compare and contrast respondents’ experiences of small and large classes, and in particular lectures. The survey was promoted to Australian university academics from a range of disciplines, predominantly science, technology, engineering, and mathematics (STEM. Responses to the sets of small-class questions were analysed independently from the sets of equivalent large-class questions. For each respondent their small-class responses were categorised, where possible, as either being student-centred or teacher-centred, and likewise, independently, for their large-class responses. Results: In total, 107 survey responses were received. Of these, 51 had the sets of both their large- and small-class responses unambiguously categorised. Five of these were student-centred regardless of class size, and 17 of these were teacher-centred regardless of class size. All of the remaining 29 responses were teacher-centred in large classes, but student-centred in small classes. Conversely, none of the

  18. Does Contextual Cueing Guide the Deployment of Attention?

    Science.gov (United States)

    Kunar, Melina A.; Flusberg, Stephen; Horowitz, Todd S.; Wolfe, Jeremy M.

    2008-01-01

    Contextual cueing experiments show that when displays are repeated, reaction times (RTs) to find a target decrease over time even when observers are not aware of the repetition. It has been thought that the context of the display guides attention to the target. We tested this hypothesis by comparing the effects of guidance in a standard search task to the effects of contextual cueing. Firstly, in standard search, an improvement in guidance causes search slopes (derived from RT × Set Size functions) to decrease. In contrast, we found that search slopes in contextual cueing did not become more efficient over time (Experiment 1). Secondly, when guidance is optimal (e.g. in easy feature search) we still found a small, but reliable contextual cueing effect (Experiments 2a and 2b), suggesting that other factors, such as response selection, contribute to the effect. Experiment 3 supported this hypothesis by showing that the contextual cueing effect disappeared when we added interference to the response selection process. Overall, our data suggest that the relationship between guidance and contextual cueing is weak and that response selection can account for part of the effect. PMID:17683230

  19. Human cortical activity evoked by contextual processing in attentional orienting.

    Science.gov (United States)

    Zhao, Shuo; Li, Chunlin; Uono, Shota; Yoshimura, Sayaka; Toichi, Motomi

    2017-06-07

    The ability to assess another person's direction of attention is paramount in social communication, many studies have reported a similar pattern between gaze and arrow cues in attention orienting. Neuroimaging research has also demonstrated no qualitative differences in attention to gaze and arrow cues. However, these studies were implemented under simple experiment conditions. Researchers have highlighted the importance of contextual processing (i.e., the semantic congruence between cue and target) in attentional orienting, showing that attentional orienting by social gaze or arrow cues could be modulated through contextual processing. Here, we examine the neural activity of attentional orienting by gaze and arrow cues in response to contextual processing using functional magnetic resonance imaging. The results demonstrated that the influence of neural activity through contextual processing to attentional orienting occurred under invalid conditions (when the cue and target were incongruent versus congruent) in the ventral frontoparietal network, although we did not identify any differences in the neural substrates of attentional orienting in contextual processing between gaze and arrow cues. These results support behavioural data of attentional orienting modulated by contextual processing based on the neurocognitive architecture.

  20. Understanding contextual influences of community reintegration among injured servicemembers.

    Science.gov (United States)

    Hawkins, Brent L; McGuire, Francis A; Linder, Sandra M; Britt, Thomas W

    2015-01-01

    As part of a larger mixed-methods research project investigating the influence of contextual factors on community reintegration (CR), this qualitative study sought to understand the subjective experiences of injured servicemembers and their perception of how contextual factors influenced their CR. More specifically, this article addresses how the influences of contextual factors differ between injured servicemembers with different levels of CR. Using a phenomenological framework, semistructured interviews were conducted with nine injured, community-dwelling servicemembers with low, moderate, and high levels of CR (three per category). Participants provided in-depth descriptions of the contextual barriers and facilitators of CR. Thematic analysis indicated the importance of social support and personal factors (e.g., self-efficacy, personal motivation) as the primary means for being reintegrated into their homes and communities. Other themes indicated factors that had an indirect but important influence on CR, including adapted sports, recreation, and other social programs; rehabilitation programs and therapists; school, work, and volunteering; and organizations and policies in developing social supports and personal factors. Comparisons between servicemembers indicated participants with low CR described many more contextual barriers and far fewer contextual facilitators to reintegration than those with high CR. Those with moderate CR were unique in that they described many facilitators and barriers to reintegration.

  1. Contextual modulation and stimulus selectivity in extrastriate cortex.

    Science.gov (United States)

    Krause, Matthew R; Pack, Christopher C

    2014-11-01

    Contextual modulation is observed throughout the visual system, using techniques ranging from single-neuron recordings to behavioral experiments. Its role in generating feature selectivity within the retina and primary visual cortex has been extensively described in the literature. Here, we describe how similar computations can also elaborate feature selectivity in the extrastriate areas of both the dorsal and ventral streams of the primate visual system. We discuss recent work that makes use of normalization models to test specific roles for contextual modulation in visual cortex function. We suggest that contextual modulation renders neuronal populations more selective for naturalistic stimuli. Specifically, we discuss contextual modulation's role in processing optic flow in areas MT and MST and for representing naturally occurring curvature and contours in areas V4 and IT. We also describe how the circuitry that supports contextual modulation is robust to variations in overall input levels. Finally, we describe how this theory relates to other hypothesized roles for contextual modulation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  2. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  3. Specker's parable of the overprotective seer: A road to contextuality, nonlocality and complementarity

    International Nuclear Information System (INIS)

    Liang, Yeong-Cherng; Spekkens, Robert W.; Wiseman, Howard M.

    2011-01-01

    In 1960, the mathematician Ernst Specker described a simple example of nonclassical correlations, the counter-intuitive features of which he dramatized using a parable about a seer, who sets an impossible prediction task to his daughter's suitors. We revisit this example here, using it as an entree to three central concepts in quantum foundations: contextuality, Bell-nonlocality, and complementarity. Specifically, we show that Specker's parable offers a narrative thread that weaves together a large number of results, including the following: the impossibility of measurement-noncontextual and outcome-deterministic ontological models of quantum theory (the 1967 Kochen-Specker theorem), in particular, the recent state-specific pentagram proof of Klyachko; the impossibility of Bell-local models of quantum theory (Bell's theorem), especially the proofs by Mermin and Hardy and extensions thereof; the impossibility of a preparation-noncontextual ontological model of quantum theory; the existence of triples of positive operator valued measures (POVMs) that can be measured jointly pairwise but not triplewise. Along the way, several novel results are presented: a generalization of a theorem by Fine connecting the existence of a joint distribution over outcomes of counterfactual measurements to the existence of a measurement-noncontextual and outcome-deterministic ontological model; a generalization of Klyachko's proof of the Kochen-Specker theorem from pentagrams to a family of star polygons; a proof of the Kochen-Specker theorem in the style of Hardy's proof of Bell's theorem (i.e., one that makes use of the failure of the transitivity of implication for counterfactual statements); a categorization of contextual and Bell-nonlocal correlations in terms of frustrated networks; a derivation of a new inequality testing preparation noncontextuality; some novel results on the joint measurability of POVMs and the question of whether these can be modeled noncontextually. Finally

  4. Contextual control of discriminated operant behavior.

    Science.gov (United States)

    Bouton, Mark E; Todd, Travis P; León, Samuel P

    2014-01-01

    Previous research has suggested that changing the context after instrumental (operant) conditioning can weaken the strength of the operant response. That result contrasts with the results of studies of Pavlovian conditioning, in which a context switch often does not affect the response elicited by a conditioned stimulus. To begin to make the methods more similar, Experiments 1-3 tested the effects of a context switch in rats on a discriminated operant response (R; lever pressing or chain pulling) that had been reinforced only in the presence of a 30-s discriminative stimulus (S; tone or light). As in Pavlovian conditioning, responses and reinforcers became confined to presentations of the S during training. However, in Experiment 1, after training in Context A, a switch to Context B caused a decrement in responding during S. In Experiment 2, a switch to Context B likewise decreased responding in S when Context B was equally familiar, equally associated with reinforcement, or equally associated with the training of a discriminated operant (a different R reinforced in a different S). However, there was no decrement if Context B had been associated with the same response that was trained in Context A (Experiments 2 and 3). The effectiveness of S transferred across contexts, whereas the strength of the response did not. Experiment 4 found that a continuously reinforced response was also disrupted by context change when the same response manipulandum was used in both training and testing. Overall, the results suggest that the context can have a robust general role in the control of operant behavior. Mechanisms of contextual control are discussed.

  5. Classifier Fusion With Contextual Reliability Evaluation.

    Science.gov (United States)

    Liu, Zhunga; Pan, Quan; Dezert, Jean; Han, Jun-Wei; He, You

    2018-05-01

    Classifier fusion is an efficient strategy to improve the classification performance for the complex pattern recognition problem. In practice, the multiple classifiers to combine can have different reliabilities and the proper reliability evaluation plays an important role in the fusion process for getting the best classification performance. We propose a new method for classifier fusion with contextual reliability evaluation (CF-CRE) based on inner reliability and relative reliability concepts. The inner reliability, represented by a matrix, characterizes the probability of the object belonging to one class when it is classified to another class. The elements of this matrix are estimated from the -nearest neighbors of the object. A cautious discounting rule is developed under belief functions framework to revise the classification result according to the inner reliability. The relative reliability is evaluated based on a new incompatibility measure which allows to reduce the level of conflict between the classifiers by applying the classical evidence discounting rule to each classifier before their combination. The inner reliability and relative reliability capture different aspects of the classification reliability. The discounted classification results are combined with Dempster-Shafer's rule for the final class decision making support. The performance of CF-CRE have been evaluated and compared with those of main classical fusion methods using real data sets. The experimental results show that CF-CRE can produce substantially higher accuracy than other fusion methods in general. Moreover, CF-CRE is robust to the changes of the number of nearest neighbors chosen for estimating the reliability matrix, which is appealing for the applications.

  6. Turnkey offering a claimed sector 'first'.

    Science.gov (United States)

    Law, Oliver

    2011-01-01

    Manufacturer and supplier of LED theatre lights, HD camera systems, video integration technologies, and ceiling support units, Trumpf Medical Systems UK, and "logistical services" company Canute International Medical Services (CIMS), one of whose specialities is providing mobile medical units for diagnostic imaging, have entered into a partnership that will see the two companies offer fully fitted out modular operating theatres and other medical/clinical buildings incorporating the latest technology and equipment, on a fully project-managed, "turnkey" basis. Oliver Law, Trumpf Medical Systems UK managing director, explains the background, and the new service's anticipated customer benefits.

  7. Albania, offshore subscribed, offering EOR opportunities

    International Nuclear Information System (INIS)

    Anon.

    1992-01-01

    This paper reports that Albania is starting a campaign to offer field development/enhanced recovery projects to foreign companies. The fields chosen for EOR projects and their producing lithologies are: Patos-Marinza, sandstone. Kucova-Arrza, sandstone. Gorisht-Kocul, limestone. Ballsh-Hekal, limestone. Cakran-Mollaj, limestone. Visoka, limestone. Delvina, limestone. Field locations mostly lie along Albania's Adriatic Sea coast. Oil production began in Albania in 1929, peaked at about 60,000 b/d in 1975 and has steadily fallen

  8. Security with nuclear weapons

    International Nuclear Information System (INIS)

    Karp, R.C.

    1991-01-01

    Recent improvements in East-West relations and the process of dramatic political change in Europe may result in unprecedented opportunities to reduce the global arsenal of nuclear weapons. Despite these welcome developments, the prospects for effectively controlling the spread of nuclear capability in the Third World have remained much less encouraging. The possibility of large reductions in nuclear weapons poses fundamental questions about their purpose. Why have some states chosen to acquire nuclear weapons? How and why have these decisions been maintained over time? Why have some states elected to approach, but not cross, the nuclear threshold? This book examines the commonalities and differences in political approaches to nuclear weapons both within and between three groups of states: nuclear, non-nuclear and threshold. The chapters explore the evolution of thinking about nuclear weapons and the role these weapons play in national security planning, and question the official security rationales offered by the nuclear weapon states for the maintenance of nuclear capabilities. For the non-nuclear weapon states, the book presents an analysis of alternative ways of assuring security and foreign policy effectiveness. For the threshold states, it examines the regional contexts within which these states maintain their threshold status. This book transcends traditional East-West approaches to analysis of nuclear issues by giving equal prominence to the issues of nuclear proliferation and non-nuclearism. The book also provides a comprehensive analysis of how current approaches to nuclear weapons have evolved both within and among the groups of countries under study

  9. Security studies

    International Nuclear Information System (INIS)

    Venot, R.

    2001-01-01

    Full text: Security studies constitute one of the major tools for evaluating the provisions implemented at facilities to protect and control Nuclear Material against unauthorized removal. Operators use security studies to demonstrate that they are complying with objectives set by the Competent Authority to counter internal or external acts aimed at unauthorized removal of NM. The paper presents the context of security studies carried out in France. The philosophy of these studies is based on a postulated unauthorized removal of NM and the study of the behavior of the systems implemented to control and protect NM in a facility. The potential unauthorized removal of NM usually may take place in two stages. The first stage involves the sequence leading to handling of the NM. It occurs inside the physical barriers of a facility and may include action involving the documents corresponding to Material Control and Accounting systems. At this stage it is possible to limit the risk of unauthorized removal of NM by means of detection capabilities of the MC and A systems. The second stage is more specific to theft and involves removing the NM out of the physical barriers of a facility in which they are being held, notably by affecting the Physical Protection System. Operators have to study, from a quantity and time lapse point of view, the ability of the installed systems to detect unauthorized removal, as well as the possibility of tampering with the systems to mask unlawful operations. Operators have also to analyze the sequences during which NM are accessed, removed from their containment and further removed from the facility in which they are stored. At each stage in the process, the probability of detection and the time taken to carry out the above actions have to be estimated. Of course, these two types of studies complement each other. Security studies have begun, in France, for more than fifteen years. Up to now more than fifty security studies are available in the

  10. Social security reform in two stages

    Directory of Open Access Journals (Sweden)

    Carlos Ranulfo Melo

    2006-01-01

    Full Text Available This article analyzes Brazilian social security reform during the Fernando Henrique and Lula Administrations. After comparing the contexts in which the different Constitutional Amendment proposals (PECs were submitted and the behavior by Members of Congress during the two periods, we argue that a contextual change (namely a switch in places between government and opposition affected the distribution of preferences and resources between the players and impacted the government in the various arenas in which the game was being played, and that as a result the reformist agenda has made more progress under the current Workers' Party administration.

  11. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  12. 12 CFR 344.7 - Settlement of securities transactions.

    Science.gov (United States)

    2010-01-01

    ... of securities transactions. (a) A bank shall not effect or enter into a contract for the purchase or... for payment of funds and delivery of securities later than the third business day after the date of... offering. A bank shall not effect or enter into a contract for the purchase or sale of the securities that...

  13. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  14. Offer - La Comédie theatre

    CERN Multimedia

    Staff Association

    2017-01-01

    The “La Comédie” theatre unveiled its programme for the season 2017–2018. We are delighted to share this brand new, rich and varied programme with you. The “La Comédie” theatre has various discounts for our members Buy 2 subscriptions for the price of 1 : 2 cards “Libertà” for CHF 240.- instead of CHF 480.- Cruise freely through the season with an 8-entry card valid for the shows of your choice. These cards are transferable and can be shared with one or more accompanying persons. 2 cards “Piccolo” for CHF 120 instead of CHF 240.- This card lets you discover 4 shows which are suitable for all audiences (offers valid while stock lasts) Benefit from a reduction of 20 % on a full price ticket during all the season: from CHF 40.- to CHF 24.- ticket instead of CHF 50.- to CHF 30.- depending on the show (Also valid for one accompanying person). Interested in one of these offers? Create an ac...

  15. Wind offering in energy and reserve markets

    Science.gov (United States)

    Soares, T.; Pinson, P.; Morais, H.

    2016-09-01

    The increasing penetration of wind generation in power systems to fulfil the ambitious European targets will make wind power producers to play an even more important role in the future power system. Wind power producers are being incentivized to participate in reserve markets to increase their revenue, since currently wind turbine/farm technologies allow them to provide ancillary services. Thus, wind power producers are to develop offering strategies for participation in both energy and reserve markets, accounting for market rules, while ensuring optimal revenue. We consider a proportional offering strategy to optimally decide upon participation in both markets by maximizing expected revenue from day-ahead decisions while accounting for estimated regulation costs for failing to provide the services. An evaluation of considering the same proportional splitting of energy and reserve in both day- ahead and balancing market is performed. A set of numerical examples illustrate the behavior of such strategy. An important conclusion is that the optimal split of the available wind power between energy and reserve strongly depends upon prices and penalties on both market trading floors.

  16. CURRICULAR OFFER INFLUENCING STUDENTS’ SATISFACTION: COMPARATIVE STUDY

    Directory of Open Access Journals (Sweden)

    Oana DUMITRASCU

    2014-11-01

    Full Text Available The main objective of the study is the determination of students’ satisfaction regarding curricular activities. The study has been accomplished using the qualitative and quantitative research, using the bibliographic study, various secondary sources and different primary sources. The study is developed with a marketing research and accomplished using the survey method. 699 students from four universities have been questioned. Due to a comparative study the University of Applied Sciences Worms, University of Applied Sciences Wiesbaden Rüsselsheim, University of Applied Sciences Frankfurt am Main and Nürtingen-Geislingen University have been analysed and their similarities and differences have been identified. The collected data, based on the established sample, is evaluated through univariate and bivariate analysis. In accordance with the evaluated sample, specific gaps from each region are identified regarding the curricular offer of the analysed universities. As a result to the conducted study, recommendations for the University of Applied Sciences Worms regarding the student’s satisfaction concerning the curricular offer are presented.

  17. National Cyber Security Policy

    Indian Academy of Sciences (India)

    National Cyber Security Policy. Salient Features: Caters to ... Creating a secure cyber ecosystem. Creating an assurance framework. Encouraging Open Standards. Strengthening the Regulatory framework. Creating mechanisms for security threat early warning, vulnerability management and response to security threats.

  18. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to

  19. An Offer You Cannot Refuse: Obtaining Efficiency and Fairness in Preplay Negotiation Games with Conditional Offers

    DEFF Research Database (Denmark)

    Goranko, Valentin; Turrini, Paolo

    2013-01-01

    . Such offers transform the payoff matrix of the original game and allow for some degree of cooperation between rational players while preserving the non-cooperative nature of the game. We focus on 2-player negotiations games arising in the preplay phase when offers for payments are made conditional...... on a suggested matching offer of the same kind being made in return by the receiver. We study and analyze such bargaining games, obtain results describing their possible solutions and discuss the degrees of efficiency and fairness that can be achieved in such negotiation process depending on whether time...

  20. Remote health monitoring: predicting outcome success based on contextual features for cardiovascular disease.

    Science.gov (United States)

    Alshurafa, Nabil; Eastwood, Jo-Ann; Pourhomayoun, Mohammad; Liu, Jason J; Sarrafzadeh, Majid

    2014-01-01

    Current studies have produced a plethora of remote health monitoring (RHM) systems designed to enhance the care of patients with chronic diseases. Many RHM systems are designed to improve patient risk factors for cardiovascular disease, including physiological parameters such as body mass index (BMI) and waist circumference, and lipid profiles such as low density lipoprotein (LDL) and high density lipoprotein (HDL). There are several patient characteristics that could be determining factors for a patient's RHM outcome success, but these characteristics have been largely unidentified. In this paper, we analyze results from an RHM system deployed in a six month Women's Heart Health study of 90 patients, and apply advanced feature selection and machine learning algorithms to identify patients' key baseline contextual features and build effective prediction models that help determine RHM outcome success. We introduce Wanda-CVD, a smartphone-based RHM system designed to help participants with cardiovascular disease risk factors by motivating participants through wireless coaching using feedback and prompts as social support. We analyze key contextual features that secure positive patient outcomes in both physiological parameters and lipid profiles. Results from the Women's Heart Health study show that health threat of heart disease, quality of life, family history, stress factors, social support, and anxiety at baseline all help predict patient RHM outcome success.

  1. Network security

    CERN Document Server

    Perez, André

    2014-01-01

    This book introduces the security mechanisms deployed in Ethernet, Wireless-Fidelity (Wi-Fi), Internet Protocol (IP) and MultiProtocol Label Switching (MPLS) networks. These mechanisms are grouped throughout the book according to the following four functions: data protection, access control, network isolation, and data monitoring. Data protection is supplied by data confidentiality and integrity control services. Access control is provided by a third-party authentication service. Network isolation is supplied by the Virtual Private Network (VPN) service. Data monitoring consists of applying

  2. Information Security

    OpenAIRE

    2005-01-01

    Information security is all about the protection of digital assets, such as digital content, personal health records, state secrets etc. These assets can be handled by a party who is authorised to access and control the asset or a party who is not authorised to do so. Authorisation determines who is trusted to actually handle an asset. Two concepts complement authorisation. Authentication deter-mines who makes a request to handle an asset. To decide who is authorised, a system needs to au-the...

  3. Bulk delivery of explosives offers positive advantages

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1993-09-01

    The bulk delivery of precisely-formulated explosives directly to the shothole is a safe, secure and cost effective way of bringing rock to the quarry floor. This article describes several of the latest generation of Anfo trucks. The typical Anfo truck carries ammonium nitrate and fuel oil in bulk, together with several other mix constituents, including an emulsifying agent. These are designed to form the basis of a range of emulsion-type explosives. In effect, these are water in oil emulsions where the water phase consists of droplets of a saturated solution of the oxidizing material suspended in oil. The formulations may be further tailored to the shothole requirements by the addition of oils or waxes, which can alter the viscosity of the explosive. The precise and programmable controls which determine the exact quantities of materials delivered to the mixer mean that the explosive mixtures can be tailored exactly to the requirements of the blasting operation, be it the amount of rock to be dislodged, the geological conditions, or the state of the shothole - either wet or dry. 4 systems are described in detail. 3 figs.

  4. INTERCULTURAL ISSUES OF THE TOURIST OFFER

    Directory of Open Access Journals (Sweden)

    Cristina Elena ALBU

    2015-03-01

    Full Text Available Tourism is an opportunity for people from different cultures to meet and interact, to exchange ideas, traditions and ways of thinking. In this industry it is very easy to judge a person just after taking an overall look and studying her general behavior. The aim of this article is to determine the intercultural issues that can show up during the tourist act, while people belonging to different cultures interact. The research method used for creating this article is documentary study. The tourist offer shall be adapted to different types of tourist, taking into consideration some aspects as tourists’ behavior, the type of tourism they prefer and, most of all, the culture they belong to and the culture of the people from the place they visit. Despite the immense diversity of our minds, there is a structure that can serve as a basis for mutual understanding.

  5. Assessing roles of vocabulary knowledge predominating in contextual clues

    Directory of Open Access Journals (Sweden)

    Patcharawadee Promduang

    2016-07-01

    Full Text Available The purpose of this study is to investigate the relationship between vocabulary knowledge and the use of contextual clues and whether EFL learners who are well-equipped with reading skills are able to comprehend the text despite a low level of vocabulary knowledge. Therefore, the study focused on which vocabulary dimensions help students guess unfamiliar words. The study was carried out at Hatyai University in Thailand. The population of this study consisted of 34 undergraduates who were studying International Business English and had taken a course in reading techniques. The present study was conducted to conceptually validate the roles of breadth and depth of vocabulary knowledge to improve skills by contextual clue. Vocabulary Depth was specially employed to evaluate two dimensions namely Paradigmatic and Syntagmatic. The Schmitt and Clapham Vocabulary Level Test was used to test vocabulary breadth, while the vocabulary depth was implemented by Read’s Vocabulary Depth Test. Reading parts of the TOEFL were adopted for contextual clue items. There were two statistical analysis tools also implemented in this study: paired-sample t-test and bivariate correlation. First, in an attempt to find which vocabulary dimension predominates in guessing word meaning from the text, a paired-sample t-test was utilized to compare the difference of two vocabulary dimensions in reading part: vocabulary depth and contextual clues, and vocabulary breadth and contextual clues. Second, a bivariate correlation was used to find the degree of relationship between vocabulary knowledge and contextual clues. The consequences of this study identified empirical results that 1 there was a positive relationship between contextual clues and vocabulary depth, the reverse is true in vocabulary breadth. Moreover, vocabulary depth is more significantly crucial than breadth to enhance student’s ability to guess words’ meaning from the context.

  6. Reducing Maternal Mortality in Papua New Guinea: Contextualizing Access to Safe Surgery and Anesthesia.

    Science.gov (United States)

    Dennis, Alicia T

    2018-01-01

    Papua New Guinea has one of the world's highest maternal mortality rates with approximately 215 women dying per 100,000 live births. The sustainable development goals outline key priority areas for achieving a reduction in maternal mortality including a focus on universal health coverage with safe surgery and anesthesia for all pregnant women. This narrative review addresses the issue of reducing maternal mortality in Papua New Guinea by contextualizing the need for safe obstetric surgery and anesthesia within a structure of enabling environments at key times in a woman's life. The 3 pillars of enabling environments are as follows: a stable humanitarian government; a safe, secure, and clean environment; and a strong health system. Key times, and their associated specific issues, in a woman's life include prepregnancy, antenatal, birth and the postpartum period, childhood, adolescence and young womanhood, and the postchildbearing years.

  7. Patronage, Contextual Flexibility, and Organisational Innovation in Lebanese Protected Areas Management

    Directory of Open Access Journals (Sweden)

    Mads Solberg

    2014-01-01

    Full Text Available The Lebanese Shouf Biosphere Reserve (SBR counts among the most successful Middle Eastern conservation projects today. This article describes the evolution and contemporary management of conservation in Shouf. Using SBR as the empirical foci it argues that mobilisation of customary political hierarchies to secure environmental protection is not bound to impede conservation agendas as suggested by Kingston (2001, but rather provided the SBR with managerial flexibility under a weak state. The case study shows how new environmental agendas articulated with traditional political regimes in building novel, stable institutions. From these emerged contextually flexible solutions for mediating resources and negotiating nature. The Shouf′s particular clientelist political structure gave rise to networks simultaneously civic and part of the Lebanese state. Explaining the apparent stability of conservation practice in Shouf requires shifting analytical frames away from polarised debates either for or against the roles of state, civil society, and patronage in conservation.

  8. 75 FR 64182 - Issuer Review of Assets in Offerings of Asset-Backed Securities

    Science.gov (United States)

    2010-10-19

    ... review your comments more efficiently, please use only one method. The Commission will post all comments... originated in compliance with applicable laws, including predatory lending and Truth in Lending statutes..., including predatory lending and Truth in Lending statutes? Should we establish standards for a review of the...

  9. 76 FR 4231 - Issuer Review of Assets in Offerings of Asset-Backed Securities

    Science.gov (United States)

    2011-01-25

    .... The issuing entity is designed to be a passive entity, and in order to meet the definition of ABS... other issuers, and because of the structure of ABS issuers as typically passive pools of assets, the... commentator, such originators use electronic decision-making systems as a first filter for applications. Most...

  10. Security infrastructures: towards the INDECT system security

    OpenAIRE

    Stoianov, Nikolai; Urueña, Manuel; Niemiec, Marcin; Machník, Petr; Maestro, Gema

    2012-01-01

    This paper provides an overview of the security infrastructures being deployed inside the INDECT project. These security infrastructures can be organized in five main areas: Public Key Infrastructure, Communication security, Cryptography security, Application security and Access control, based on certificates and smartcards. This paper presents the new ideas and deployed testbeds for these five areas. In particular, it explains the hierarchical architecture of the INDECT PKI...

  11. Internet Banking Security Strategy: Securing Customer Trust

    OpenAIRE

    Frimpong Twum; Kwaku Ahenkora

    2012-01-01

    Internet banking strategies should enhance customers¡¯ online experiences which are affected by trust and security issues. This study provides perspectives of users and nonusers on internet banking security with a view to understanding trust and security factors in relation to adoption and continuous usage. Perception of internet banking security influenced usage intentions. Nonusers viewed internet banking to be insecure but users perceived it to be secure with perceived ease of use influenc...

  12. Contextual knowledge reduces demands on working memory during reading.

    Science.gov (United States)

    Miller, Lisa M Soederberg; Cohen, Jason A; Wingfield, Arthur

    2006-09-01

    An experiment is reported in which young, middle-aged, and older adults read and recalled ambiguous texts either with or without the topic title that supplied contextual knowledge. Within each of the age groups, the participants were divided into those with high or low working memory (WM) spans, with available WM capacity further manipulated by the presence or absence of an auditory target detection task concurrent with the reading task. Differences in reading efficiency (reading time per proposition recalled) between low WM span and high WM span groups were greater among readers who had access to contextual knowledge relative to those who did not, suggesting that contextual knowledge reduces demands on WM capacity. This position was further supported by the finding that increased age and attentional demands, two factors associated with reduced WM capacity, exaggerated the benefits of contextual knowledge on reading efficiency. The relative strengths of additional potential predictors of reading efficiency (e.g., interest, effort, and memory beliefs), along with knowledge, WM span, and age, are reported. Findings showed that contextual knowledge was the strongest predictor of reading efficiency even after controlling for the effects of all of the other predictors.

  13. The time course of attentional deployment in contextual cueing.

    Science.gov (United States)

    Jiang, Yuhong V; Sigstad, Heather M; Swallow, Khena M

    2013-04-01

    The time course of attention is a major characteristic on which different types of attention diverge. In addition to explicit goals and salient stimuli, spatial attention is influenced by past experience. In contextual cueing, behaviorally relevant stimuli are more quickly found when they appear in a spatial context that has previously been encountered than when they appear in a new context. In this study, we investigated the time that it takes for contextual cueing to develop following the onset of search layout cues. In three experiments, participants searched for a T target in an array of Ls. Each array was consistently associated with a single target location. In a testing phase, we manipulated the stimulus onset asynchrony (SOA) between the repeated spatial layout and the search display. Contextual cueing was equivalent for a wide range of SOAs between 0 and 1,000 ms. The lack of an increase in contextual cueing with increasing cue durations suggests that as an implicit learning mechanism, contextual cueing cannot be effectively used until search begins.

  14. Pigeons Exhibit Contextual Cueing to Both Simple and Complex Backgrounds

    Science.gov (United States)

    Wasserman, Edward A.; Teng, Yuejia; Castro, Leyre

    2014-01-01

    Repeated pairings of a particular visual context with a specific location of a target stimulus facilitate target search in humans. We explored an animal model of this contextual cueing effect using a novel Cueing-Miscueing design. Pigeons had to peck a target which could appear in one of four possible locations on four possible color backgrounds or four possible color photographs of real-world scenes. On 80% of the trials, each of the contexts was uniquely paired with one of the target locations; on the other 20% of the trials, each of the contexts was randomly paired with the remaining target locations. Pigeons came to exhibit robust contextual cueing when the context preceded the target by 2 s, with reaction times to the target being shorter on correctly-cued trials than on incorrectly-cued trials. Contextual cueing proved to be more robust with photographic backgrounds than with uniformly colored backgrounds. In addition, during the context-target delay, pigeons predominately pecked toward the location of the upcoming target, suggesting that attentional guidance contributes to contextual cueing. These findings confirm the effectiveness of animal models of contextual cueing and underscore the important part played by associative learning in producing the effect. PMID:24491468

  15. Contextual diversity facilitates learning new words in the classroom.

    Directory of Open Access Journals (Sweden)

    Eva Rosa

    Full Text Available In the field of word recognition and reading, it is commonly assumed that frequently repeated words create more accessible memory traces than infrequently repeated words, thus capturing the word-frequency effect. Nevertheless, recent research has shown that a seemingly related factor, contextual diversity (defined as the number of different contexts [e.g., films] in which a word appears, is a better predictor than word-frequency in word recognition and sentence reading experiments. Recent research has shown that contextual diversity plays an important role when learning new words in a laboratory setting with adult readers. In the current experiment, we directly manipulated contextual diversity in a very ecological scenario: at school, when Grade 3 children were learning words in the classroom. The new words appeared in different contexts/topics (high-contextual diversity or only in one of them (low-contextual diversity. Results showed that words encountered in different contexts were learned and remembered more effectively than those presented in redundant contexts. We discuss the practical (educational [e.g., curriculum design] and theoretical (models of word recognition implications of these findings.

  16. Hypobaric hypoxia impairs cued and contextual fear memory in rats.

    Science.gov (United States)

    Kumari, Punita; Kauser, Hina; Wadhwa, Meetu; Roy, Koustav; Alam, Shahnawaz; Sahu, Surajit; Kishore, Krishna; Ray, Koushik; Panjwani, Usha

    2018-04-26

    Fear memory is essential for survival, and its dysregulation leads to disorders. High altitude hypobaric hypoxia (HH) is known to induce cognitive decline. However, its effect on fear memory is still an enigma. We aimed to investigate the temporal effect of HH on fear conditioning and the underlying mechanism. Adult male Sprague-Dawley rats were trained for fear conditioning and exposed to simulated HH equivalent to 25,000 ft for different durations (1, 3, 7, 14 and 21 days). Subsequently, rats were tested for cued and contextual fear conditioning. Neuronal morphology, apoptosis and DNA fragmentation were studied in the medial prefrontal cortex (mPFC), hippocampus and basolateral amygdala (BLA). We observed significant deficit in cued and contextual fear acquisition (at 1, 3 and 7 days) and consolidation (cued at 1 and 3 days and contextual fear at 1, 3 and 7 days) under HH. HH exposure with retraining showed the earlier restoration of contextual fear memory. Further, we found a gradual increase in the number of pyknotic and apoptotic neurons together with the increase in DNA fragmentation in mPFC, hippocampus, and BLA up to 7 days of HH exposure. The present study concludes that HH exposure equivalent to 25000 ft induced cued and contextual fear memory deficit (acquisition and consolidation) which is found to be correlated with the neurodegenerative changes in the limbic brain regions. Copyright © 2018. Published by Elsevier B.V.

  17. The Contextual Database of the Generations and Gender Programme: Concept, content, and research examples

    Directory of Open Access Journals (Sweden)

    Arianna Caporali

    2016-08-01

    Full Text Available Background: Differences in demographic behaviours across countries and subnational regions have stimulated interest in studying the relationships between individual characteristics and the contexts in which individuals are embedded. Analytical approaches that include contextual indicators in statistical analyses of demographic behaviour need well-documented comparative data at the national and the subnational regional level. The Contextual Database (CDB of the Generations and Gender Programme (GGP; http://www.ggp-i.org/data/ggp-contextual-database supports such analyses by providing comparative data on demographic and socio-economic contexts in up to 60 countries in Europe, North America, Asia, and Oceania. Objective: This paper presents conceptual considerations and an overview of the content and the functionality of the CDB. Research examples illustrate how data from this database can increase the analytical potential of demographic analyses. Conclusions: The CDB is a state-of-the-art research tool that provides well-documented comparative data at the national and the subnational regional level. Although it is conceptually linked to the Generations and Gender Survey (GGS, it can also be used to analyse data from other surveys, to study macro developments, and for teaching and lecturing. The CDB has a number of valuable features. First, it has a large number of indicators specifically geared towards demographic analyses, which provide extensive temporal and geographic coverage. Second, its dynamic web environment provides a high degree of transparency on data sources, as it offers meta-data for each individual entry. Finally, the CDB supports geocoding schemes that are used by the GGS and other surveys to denote region and country of residence.

  18. Industrial Heritage in Tuzla Canton Tourist Offer

    Directory of Open Access Journals (Sweden)

    Edin Jahić

    2014-04-01

    Full Text Available Industrial heritage has a great importance in development of tourism of Tuzla Canton because this is a region which had well developed industry in the past. Major part of this industry has been destroyed and now can be used for touristic purposes Besides this function, industrial plants can be used for development of culture, education, etc., and we already have such positive examples in wealthier European countries. The aim of the survey was to examine the opinion of tourist agencies, which are providers of tourist services, on further development of tourism in the region of Tuzla Canton, with special emphasis on industrial tourism, because tourist agencies are one of the key factors in creation of tourism development. Methods used for data collecting, processing and analysis are: historical, descriptive, comparative, case study, survey (SPSS version 20. Elements that need improving and further development are highlighted. The research results can help the tourist destination management, in this case TC, but also all segments of the tourism industry of TC, improve their offer and communication with a potential tourism market.

  19. CEE region offers ample value proposition

    Energy Technology Data Exchange (ETDEWEB)

    Dobrova, Helena; Gawenda, Piotr [IHS, Geneva (Switzerland)

    2008-12-15

    The Central-Eastern Europe region (CEE) continues to evolve and offer ample value propositions to various types of operators. This area experiences a surge of exploration and production (E and P) interest over the past years. The bulk of the present-day production in the CEE countries is derived from mature oil and gas fields situated in prolific hydrocarbon provinces known since the mid-XIX century (e.g., the Carpathians in Poland and Romania). Yet, these areas still remain the major exploration targets to this day. The authors of the contribution under consideration summarize the E and P activities in the CEE countries during the past 12 to 18 months. This summary shows a fairly heterogeneous petroleum-related exploration picture: some countries have yet to launch their first E and P operations, others maintain a somewhat limited level of activities, while a few states, namely Bulgaria, Hungary, Poland and Romania, show a very busy contractual and operational shedule. The effords are yielding astounding results in some countries, delivered principally by small-size to medium-size independent explorers, as well as former state entities and a few remaining NOCs.

  20. Ottawa offers funds for particle accelerator

    International Nuclear Information System (INIS)

    1991-01-01

    The federal government has offered to contribute at least $236 million toward the controversial KAON particle accelerator facility in Vancouver. Justice Minister Kim Campbell says that no deal on the project has been signed, but negotiations with British Columbia are going well. She said Ottawa is prepared to contribute a third of the operating costs. The facility is intended to investigate the basic structure of matter by smashing atoms into their tiniest components known as quarks. It's estimated that operating costs will be in the range of $90 million a year. Campbell said the United States is willing to contribute $100 million toward the project, but did not know what this would be for. Debate about the KAON facility within the scientific community has been raging for years. Many scientists fear KAON would draw money away from other areas of research, which already face chronic financial problems. Campbell insisted that KAON would not distort overall research priorities, but made no firm commitments about increases for other areas of science. She said money for KAON, assuming the project does get final approval, will not be delivered before the 1994 fiscal year and won't affect efforts to reduce the federal deficit

  1. Who receives cannabis use offers: A general population study of adolescents.

    Science.gov (United States)

    Burdzovic Andreas, Jasmina; Pape, Hilde

    2015-11-01

    Drug use is predicated on a combination of "willingness" and "opportunity". That is, independent of any desire to use drugs, a drug use opportunity is required; be it indirect (i.e., being in a drug-use setting) or direct (i.e., receiving a direct drug offer). However, whether some youth are more likely to encounter such direct drug use opportunities is not fully known. We examined whether certain characteristics placed adolescents at greater risk for being offered cannabis, after accounting for a number of demographic-, contextual-, interpersonal-, and personal-level risk factors. We utilized data from a Norwegian school survey (n=19,309) where the likelihood of receiving cannabis offer in the past year was estimated using logistic regression models. Substantive focus was on the individual and combined effects of personal (i.e., delinquency) and interpersonal (i.e., cannabis-using close friend) risk factors. Separate models were fit for middle- and high-school students. Delinquency was a significant risk factor for receiving cannabis offers, as was a cannabis-using best friend. In addition, peer cannabis use increased the risk of cannabis offers mostly for adolescents on the lower delinquency spectrum, but less so for highly delinquent adolescents. These interaction effects were primarily driven by the middle-school cohort. Cannabis offers were more likely to be extended to youth of certain high-risk profiles. Targeted prevention strategies can therefore be extended to a general profile of younger adolescents with externalizing problems and cannabis-using peers. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  2. Planning security for supply security

    International Nuclear Information System (INIS)

    Spies von Buellesheim.

    1994-01-01

    The situation of the hardcoal mining industry is still difficult, however better than last year. Due to better economic trends in the steel industry, though on a lower level, sales in 1994 have stabilised. Stocks are being significantly reduced. As to the production, we have nearly reached a level which has been politically agreed upon in the long run. Due to the determined action of the coalmining companies, a joint action of management and labour, the strong pressure has been mitigated. On the energy policy sector essential targets have been achieved: First of all the ECSC decision on state aid which will be in force up to the year 2002 and which will contribute to accomplish the results of the 1991 Coal Round. Furthermore, the 1994 Act on ensuring combustion of hardcoal in electricity production up to the year 2005. The hardcoal mining industry is grateful to all political decision makers for the achievements. The industry demands, however, that all questions still left open, including the procurement of financial means after 1996, should be settled soon on the basis of the new act and in accordance with the 1991 Coal Round and the energy concept of the Federal Government. German hardcoal is an indispensable factor within a balanced energy mix which guarantees the security of our energy supply, the security of the price structure and the respect of the environment. (orig.) [de

  3. Secure public cloud platform for medical images sharing.

    Science.gov (United States)

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  4. Information security fundamentals

    CERN Document Server

    Peltier, Thomas R

    2013-01-01

    Developing an information security program that adheres to the principle of security as a business enabler must be the first step in an enterprise's effort to build an effective security program. Following in the footsteps of its bestselling predecessor, Information Security Fundamentals, Second Edition provides information security professionals with a clear understanding of the fundamentals of security required to address the range of issues they will experience in the field.The book examines the elements of computer security, employee roles and r

  5. Offering Strategy of a Flexibility Aggregator in a Balancing Market Using Asymmetric Block Offers

    DEFF Research Database (Denmark)

    Bobo, Lucien Ali; Delikaraoglou, Stefanos; Vespermann, Niklas

    2018-01-01

    scenarios are used to find optimal load-shifting offers under uncertainty. The problem is formulated as a stochastic mixed-integer linear program and can be solved with reasonable computational time. This work is taking place in the framework of the real-life demonstration project EcoGrid 2.0, which......In order to enable large-scale penetration of renewables with variable generation, new sources of flexibility have to be exploited in the power systems. Allowing asymmetric block offers (including response and rebound blocks) in balancing markets can facilitate the participation of flexibility...... aggregators and unlock load-shifting flexibility from, e.g., thermostatic loads. In this paper, we formulate an optimal offering strategy for a risk-averse flexibility aggregator participating in such a market. Using a price-taker approach, load flexibility characteristics and balancing market price forecast...

  6. Probing contextuality with pre- and post-selection

    International Nuclear Information System (INIS)

    Tollaksen, Jeff

    2007-01-01

    By analyzing the concept of contextuality (Bell-Kochen-Specker) in terms of pre-and-post-selection (PPS), it is possible to assign definite values to observables in a new way. Physical reasons are presented for restrictions on these assignments. When measurements are performed which do not disturb the pre- and post-selection (i.e. weak measurements), then novel experimental aspects of contextuality can be demonstrated including a proof that every PPS-paradox with definite predictions implies contextuality. Certain results of these measurements (eccentric weak values with e.g. negative values outside the spectrum), however, cannot be explained by a 'classical-like' hidden variable theory. Surprising theoretical implications are discussed

  7. Contextual profiles of young adult Ecstasy users: a multisite study

    Science.gov (United States)

    Ramtekkar, Ujjwal P.; Striley, Catherine W; Cottler, Linda B

    2010-01-01

    These analyses assess contextual profiles of 612 young adult Ecstasy users, 18–30 years of age, from St. Louis (USA), Miami (USA) and Sydney (Australia). Bivariate analyses revealed different contextual factors influencing Ecstasy use. Friends were the most common sources of Ecstasy at all sites and most used with friends. St. Louis and Miami use mostly occurred in residences, whereas in Sydney use was mostly at clubs, bars or restaurants. Ecstasy consumption at public places and in cars, trains or ferries was significantly higher in Miami (89% and 77%) than in St. Louis (67% and 65%) and Sydney (67% and 61%). At all sites, simultaneous use of LSD/mushroom and nitrous oxide with Ecstasy was common; concurrent amphetamines predominated in Sydney and heroin/opiates in St. Louis Contextual factors influencing Ecstasy use among young adults vary by geographic region. Their inclusion may help tailor effective prevention programs to reduce or ameliorate Ecstasy use. PMID:21094585

  8. Neutron polarimetric test of Leggett's contextual model of quantum mechanics

    International Nuclear Information System (INIS)

    Schmitzer, C.; Bartosik, H.; Klepp, J.; Sponar, S.; Badurek, G.; Hasegawa, J.

    2009-01-01

    Full text: The Einstein-Podolsky-Rosen (EPR) argument attempted to dispute quantum theory. With the Bell inequality it was possible to set up an experimental test of the EPR argument. Here, we describe the rebuilding of the measurement station at the tangential beam exit of the TRIGA reactor of the Atominstitut in Vienna. A new polarimeter setup was constructed and adjusted to generate Bell states by entangling a neutron's energy and spin. After accomplishing visibilities of up to 98.7 %, it was possible to test a Leggett-type inequality, which challenges a 'contextual' hidden variable theory. Such a contextual model would have been capable of reproducing former Bell inequality violations. Measurement results of this Leggett inequality and a generalized Clauser-Horne-Shimony-Holt (CHSH) inequality show violations of this hidden variable model. Hence noncontextual and contextual hidden variable theories can be excluded simultaneously and quantum mechanical predictions are confirmed. (author)

  9. Recovery from equipment failures in ATC: Determination of contextual factors

    International Nuclear Information System (INIS)

    Subotic, Branka; Ochieng, Washington Y.; Straeter, Oliver

    2007-01-01

    Human reliability assessment (HRA) currently uses various approaches to determine and quantify human error. These approaches are increasingly being employed in various safety-critical domains, such as air traffic management and its ground component air traffic control. HRA research over the years has shown the important role of the context in which human errors take place. Recent techniques now put more emphasis on the definition of key contextual factors and their impact on the reliability of human performance. This paper presents a review of the current understanding of contextual factors in various industries. It uses this together with results from controller interviews to identify the contextual factors relevant to controller recovery from equipment failures in air traffic control. These factors should be used in conjunction with an appropriate method to analyse the performance of a controller during the process of recovery from failures

  10. Analysis of Some Recent Tests of Quantum Contextuality

    International Nuclear Information System (INIS)

    La Cour, Brian R.

    2010-01-01

    Contextuality plays a central role in many key proofs for the impossibility of hidden variables in quantum mechanics. The most famous among these is the Kochen-Specker theorem, which originally applied to a Hilbert space of three dimensions, but much simpler proofs in higher dimensions have since been found. In recent years there has been a resurgence of interest in contextuality, and a number of experiments have been performed to test it in the four-dimensional context. Recently, it has been shown that contextuality may be interpreted as the result of simple measurement disturbance if the set of measurements chosen are time-like separated [B. La Cour, Phys. Rev. A, 79, 012102 (2009)]. In this work, several such experiments will be reviewed, and it will be shown that none are capable of ruling out a realistic, local hidden variable interpretation.

  11. Security Architecture of Cloud Computing

    OpenAIRE

    V.KRISHNA REDDY; Dr. L.S.S.REDDY

    2011-01-01

    The Cloud Computing offers service over internet with dynamically scalable resources. Cloud Computing services provides benefits to the users in terms of cost and ease of use. Cloud Computing services need to address the security during the transmission of sensitive data and critical applications to shared and public cloud environments. The cloud environments are scaling large for data processing and storage needs. Cloud computing environment have various advantages as well as disadvantages o...

  12. Contextualizing learning to improve care using collaborative communities of practices.

    Science.gov (United States)

    Jeffs, Lianne; McShane, Julie; Flintoft, Virginia; White, Peggy; Indar, Alyssa; Maione, Maria; Lopez, A J; Bookey-Bassett, Sue; Scavuzzo, Lauren

    2016-09-02

    apply new learnings in local contexts. Study findings offer insights into collaborative, inter-organizational CoP learning approaches to build QI capabilities amongst clinicians, staff, and managers. In particular, our study delineates the need to contextualize QI learning by using deliberate learning activities to balance systematic and structured approaches alongside pragmatic and accommodating approaches with expert mentors.

  13. Computer Security: the security marathon, part 2

    CERN Multimedia

    Computer Security Team

    2014-01-01

    Do you recall our latest article on the “Security Marathon” (see here) and why it’s wrong to believe that computer security is a sprint, that a quick hack is invulnerable, that quick bug-fixing is sufficient, that plugging security measures on top of existing structures is a good idea, that once you are secure, your life is cosy?   In fact, security is a marathon for us too. Again and again, we have felt comfortable with the security situation at CERN, with dedicated protections deployed on individual hosts, with the security measures deployed by individual service managers, with the attentiveness and vigilance of our users, and with the responsiveness of the Management. Again and again, however, we subsequently detect or receive reports that this is wrong, that protections are incomplete, that security measures are incomplete, that security awareness has dropped. Thus, unfortunately, we often have to go back to square one and address similar issues over and over...

  14. Educational offer of family compensation cash, towards greater social responsibility

    Directory of Open Access Journals (Sweden)

    Maritza Cristancho García

    2015-12-01

    Full Text Available This document is an overview of the educational offer generated by the family compensation funds and their contribution to the commitment of social tissue formation according to the territorial challenges, considering some characteristics of the institutions of family subsidy system. The process is stated from the review of the "White Paper of the family subsidy system" (ILO, 2014; the undergraduate thesis from the Faculty of Political Science of Del Rosario University "Analysis of the evolution of the figure of the family compensation funds in Colombia as managers of social security for the period between 1954 and 2009, Case Study Cafam "(Cortés, 2011; the document developed by Externado University entitled "The institutions of the family subsidy system as operators of social policy" (Carrasco and Farné, 2010; the document developed by Asocajas in conjuction with Corporación para el desarrollo de la seguridad social “Perspectives of family subsidy system” (Asocajas y Codess, 2014; and finally, considering the development of an analysis of the information provided by Asocajas, and the information taken from the different web pages of the 43 institutions of the family subsidy system that were analyzed.

  15. Ecological theories of systems and contextual change in medical education.

    Science.gov (United States)

    Ellaway, Rachel H; Bates, Joanna; Teunissen, Pim W

    2017-12-01

    Contemporary medical practice is subject to many kinds of change, to which both individuals and systems have to respond and adapt. Many medical education programmes have their learners rotating through different training contexts, which means that they too must learn to adapt to contextual change. Contextual change presents many challenges to medical education scholars and practitioners, not least because of a somewhat fractured and contested theoretical basis for responding to these challenges. There is a need for robust concepts to articulate and connect the various debates on contextual change in medical education. Ecological theories of systems encompass a range of concepts of how and why systems change and how and why they respond to change. The use of these concepts has the potential to help medical education scholars explore the nature of change and understand the role it plays in affording as well as limiting teaching and learning. This paper, aimed at health professional education scholars and policy makers, explores a number of key concepts from ecological theories of systems to present a comprehensive model of contextual change in medical education to inform theory and practice in all areas of medical education. The paper considers a range of concepts drawn from ecological theories of systems, including biotic and abiotic factors, panarchy, attractors and repellers, basins of attraction, homeostasis, resilience, adaptability, transformability and hysteresis. Each concept is grounded in practical examples from medical education. Ecological theories of systems consider change and response in terms of adaptive cycles functioning at different scales and speeds. This can afford opportunities for systematic consideration of responses to contextual change in medical education, which in turn can inform the design of education programmes, activities, evaluations, assessments and research that accommodates the dynamics and consequences of contextual change.

  16. Contextualization processes and the initial education of physics teachers

    Directory of Open Access Journals (Sweden)

    Cristina Cândida de Macedo

    2014-03-01

    Full Text Available Contextualization of school contents has been seen as a possibility of facilitating students’ learning, since it makes the educative process more significant to them. However, there is no agreement as to the meaning and the forms of applying such processes. Particularly in the area of Science teaching, the creation of thematic projects has been seen as a way of contextualizing school contents. It is noteworthy that the experience with the education of Physics teachers shows that the creation and execution of such projects brings many difficulties to teachers, the main obstacle being the understanding of what contextualized educative processes are. Having this in mind, a project has been elaborated with the objective of analyzing the comprehension Physics teachers that are going through teacher education courses have of the processes of contextualization. The data for this investigation has been obtained from students who attended a course of the Physics Teacher Education module at the Federal University of Itajubá. It is significant to mention that in this course students are asked to create three versions of a thematic project. In order to analyze the data, the procedure of Thematic Content and Category Analysis was adopted. This research shows that Physics teachers to be incorporate the discourses of the educative ideas throughout the course. However, there is a series of obstacles they face as they attempt to understand and carry out contextualized educative processes. Those difficulties are connected to their experience with this kind of educative process throughout the years they spend at school and in the teacher education course. We conclude thus that it is essential that contextualized educative activities be part of the reality of teacher education programs.

  17. A Contextual Fire Detection Algorithm for Simulated HJ-1B Imagery

    Directory of Open Access Journals (Sweden)

    Xiangsheng Kong

    2009-02-01

    Full Text Available The HJ-1B satellite, which was launched on September 6, 2008, is one of the small ones placed in the constellation for disaster prediction and monitoring. HJ-1B imagery was simulated in this paper, which contains fires of various sizes and temperatures in a wide range of terrestrial biomes and climates, including RED, NIR, MIR and TIR channels. Based on the MODIS version 4 contextual algorithm and the characteristics of HJ-1B sensor, a contextual fire detection algorithm was proposed and tested using simulated HJ-1B data. It was evaluated by the probability of fire detection and false alarm as functions of fire temperature and fire area. Results indicate that when the simulated fire area is larger than 45 m2 and the simulated fire temperature is larger than 800 K, the algorithm has a higher probability of detection. But if the simulated fire area is smaller than 10 m2, only when the simulated fire temperature is larger than 900 K, may the fire be detected. For fire areas about 100 m2, the proposed algorithm has a higher detection probability than that of the MODIS product. Finally, the omission and commission error were evaluated which are important factors to affect the performance of this algorithm. It has been demonstrated that HJ-1B satellite data are much sensitive to smaller and cooler fires than MODIS or AVHRR data and the improved capabilities of HJ-1B data will offer a fine opportunity for the fire detection.

  18. Generalized anxiety disorder in racial and ethnic minorities: a case of nativity and contextual factors.

    Science.gov (United States)

    Budhwani, Henna; Hearld, Kristine Ria; Chavez-Yenter, Daniel

    2015-04-01

    Minorities comprise more than one third of the U.S., and research on the correlates and causes of depression, anxiety, and other mental illnesses have yielded mixed results in minority groups necessitating an understanding of causes and correlates of health. Thus, the aim of this paper is to evaluate the relationship between minority status, contextual factors, and lifetime Generalized Anxiety Disorder. Logistic regression models were implemented, comparing immigrants to their American-born counterparts as well as to American-born Whites. Foreign-born Afro-Caribbeans exhibited lower rates of lifetime GAD. A lower percentage of foreign-born minorities met the criteria for GAD as compared to their American-born counterparts, and all racial and ethnic groups met the criteria for lifetime GAD at a lower rate as compared to American-born Whites. By using theory proactively and including contextual factors, this multi-faceted approach to health disparities research yielded findings which both supported historic beliefs but created opportunities for supplemental research looking at immigrants and GAD. Key findings were that health lifestyle choices and exposure to discrimination significantly affected the chance of having GAD. Nativity was protective; however, its effect was ameliorated by exposure to discrimination or engagement in alcohol abuse. Thus, this study offers practical insight into environmental factors for clinicians caring for racial and ethnic minorities diagnosed with GAD. Copyright © 2015 Elsevier B.V. All rights reserved.

  19. IMPLEMENTING A STUDENT-CENTERED PEDAGOGY THROUGH THE USE OF INTERESTING AND CULTURALLY CONTEXTUALIZED AUTHENTIC MATERIALS

    Directory of Open Access Journals (Sweden)

    Tabitha Kidwell

    2017-04-01

    Full Text Available The selection and use of appropriate materials is one of the most critical challenges facing English teachers today. In this article, we tell the stories (vignettes of some of the major challenges we have faced as educators in this regard, and we offer a research base and practical suggestions related to each vignette. Selection of interesting and culturally contextualized authentic materials can go a long way towards creating a student-centered peddagogy. This will help to increase student motivation, achievemnt, and retention. Our first recommendation is to cultivate interst in the classroom. Interest can be elicited by selecting materials that lead to individual interest, students‘ personal interests, situational interest, the inherant interest in a specific situation like amystery or a puzzle, or topic interest, interest in the subject of the activity. An excellent way to elicit student interest is through the use of authentic materials. Teachers should endeavor to create interst in their classrooms by choosing interesting topics and texts, editing those texts, and using suspense and surprise. Our second suggestion is to use culturally contextualized authentic materials. These can come from two directions: either they can be situated in the culture of the students (the ―home‖ culture, or they can be situated in the culture of native speakers (the ―target‖ culture. Use of both types of cultural materials is important, and both can be termed ―authentic.‖ The most important point is that the materials are authentic, and therefore more meaningful to students.

  20. 48 CFR 225.7703-3 - Evaluating offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 3 2010-10-01 2010-10-01 false Evaluating offers. 225... Iraq or Afghanistan 225.7703-3 Evaluating offers. (a) Evaluate offers submitted in response to... Afghanistan, as follows: (1) If the low offer is an offer of a product or service from Iraq or Afghanistan...

  1. Robust Contextual Bandit via the Capped-$\\ell_{2}$ norm

    OpenAIRE

    Zhu, Feiyun; Zhu, Xinliang; Wang, Sheng; Yao, Jiawen; Huang, Junzhou

    2017-01-01

    This paper considers the actor-critic contextual bandit for the mobile health (mHealth) intervention. The state-of-the-art decision-making methods in mHealth generally assume that the noise in the dynamic system follows the Gaussian distribution. Those methods use the least-square-based algorithm to estimate the expected reward, which is prone to the existence of outliers. To deal with the issue of outliers, we propose a novel robust actor-critic contextual bandit method for the mHealth inter...

  2. Social enterprises in Denmark: Historical, contextual and conceptual aspects

    DEFF Research Database (Denmark)

    Andersen, Linda Lundgaard; Hulgård, Lars; Jacobsen, Gurli

    Social enterprises in Denmark: Historical, contextual and conceptual aspectsLinda Lundgaard Andersen & Lars Hulgård, Center for Social Enterprise, Roskilde UniversityGurli Jakobsen, Copenhagen Business SchoolCOST Action (EMPOWER‐SE)Working Group 1, Lisbon 28. february & 1. march 2018......Social enterprises in Denmark: Historical, contextual and conceptual aspectsLinda Lundgaard Andersen & Lars Hulgård, Center for Social Enterprise, Roskilde UniversityGurli Jakobsen, Copenhagen Business SchoolCOST Action (EMPOWER‐SE)Working Group 1, Lisbon 28. february & 1. march 2018...

  3. SEYMOUR GLASS: CONTEXTUAL AND LINGUISTIC IDENTITY

    Directory of Open Access Journals (Sweden)

    O.O. Kulchytska

    2015-09-01

    Full Text Available In the article, the personality of Seymour Glass, the chief character of the Glass family saga by J.D. Salinger, is analyzed from social and his own philosophical perspectives. Two of Salinger’s works – “A Perfect Day for Bananafish” and “Hapworth 16, 1924”, which complement each other in terms of character analysis, – are the focus of our attention. They offer answers to the questions (a how the personality of Seymour predetermines the frame structure of the whole Glass series, (b why Salinger starts with the end of Seymour’s life and ends with its beginning, and (c what are the author’s motives in writing “Hapworth” since one of its central ideas – the philosophy of reincarnation – has already been presented in “Teddy”.

  4. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  5. Simposium 19: Teaching Offers Many Possibilities

    Directory of Open Access Journals (Sweden)

    Denise Vaz Macedo

    2014-08-01

    Full Text Available K-Education(PortugueseChair: V. TrindadeBayardo Torres; Clovis Wannmacher; Denise Macedo  Teaching Offers Many Possibilities Denise Vaz Macedo Biochemistry Department, Biology Institute, Unicamp, Campinas, Brazil.   In the last years my research lines are maintained exclusively through my biochemistry teaching activities at graduation and specialization course (360h. The teaching methodology used was developed over these 20 years into the classroom research. It is based on five practical activities carried out at the initial moment by the students themselves, who monitor the effects of different physical activity situations through the measurement of some plasma metabolites on point of care devices. After instructions the students perform the exercises collects and tabulate the data generated and document all the doubts arising. The educational goal right now is to show that the theory related to muscle contraction, the ATP-producing metabolic pathways is linked to their profession. At adequate moments each group presents to the whole class the practical activity carried out, the data and the doubts produced. After a fully discussion the students are able to relate the data to the studied theory. Also the initial doubts are clarified. A questionnaire applied before and after the discipline indicates the learning effectiveness of this method. Some other results: the students who have demonstrated special interest in the classroom normally join into de lab. Simultaneously they are also prepared for the teaching activity. The demand of specialization course is greater than the supply. The financial resources generated are expressive and administered by the University Foundation. They are fully applied to purchase permanent and consumption materials and for the payment of eventual scholarships for lab researchers. The publication in indexed journals has been constant and regular, and the obtained experimental results always return to the

  6. Marketing Digital Offerings Is Different: Strategies for Teaching about Digital Offerings in the Marketing Classroom

    Science.gov (United States)

    Roberts, Scott D.; Micken, Kathleen S.

    2015-01-01

    Digital offerings represent different challenges for marketers than do traditional goods and services. After reviewing the literature, the authors suggest ways that the marketing of digital goods and services might be better presented to and better understood by students. The well-known four challenges of services marketing model (e.g.,…

  7. Marketing in Dutch mainline congregations. The importance of what religious organizations offer and how they offer

    NARCIS (Netherlands)

    Sengers, E.

    2010-01-01

    In rational choice theory, the central explanatory term for the vitality of religious organizations is 'cost'. The higher the cost, the more successful the organization is supposed to be. However, as cost and reward are complementary, research should also pay attention to the rewards offered by

  8. Pathways to Economic Security: Gender and Nonstandard Employment in Contemporary Japan

    Science.gov (United States)

    Gottfried, Heidi

    2008-01-01

    Compiling data from several government surveys, this article identifies key social indicators of economic security associated with nonstandard employment in Japan. Empirical trends of nonstandard employment are contextualized in the development of Japanese coordinated capitalism from the economic boom during the 1960s through the recession of the…

  9. Information Systems Security Audit

    OpenAIRE

    Gheorghe Popescu; Veronica Adriana Popescu; Cristina Raluca Popescu

    2007-01-01

    The article covers:Defining an information system; benefits obtained by introducing new information technologies; IT management;Defining prerequisites, analysis, design, implementation of IS; Information security management system; aspects regarding IS security policy; Conceptual model of a security system; Auditing information security systems and network infrastructure security.

  10. Security for grids

    Energy Technology Data Exchange (ETDEWEB)

    Humphrey, Marty; Thompson, Mary R.; Jackson, Keith R.

    2005-08-14

    Securing a Grid environment presents a distinctive set of challenges. This paper groups the activities that need to be secured into four categories: naming and authentication; secure communication; trust, policy, and authorization; and enforcement of access control. It examines the current state of the art in securing these processes and introduces new technologies that promise to meet the security requirements of Grids more completely.

  11. Security Technologies for Open Networking Environments (STONE)

    Energy Technology Data Exchange (ETDEWEB)

    Muftic, Sead

    2005-03-31

    -domain scenarios is supported by a set of security engines that represent the core of the Federated Identities Management Server, which is also an extension of the Domain Security Server. The Federated Identity Management server allows users to federate their identities or terminate the federation between the service provider and the identity provider. At the service provider web site, the users are offered a list of identity providers to which they can choose to federate their identities. After users federate their identity, they can perform Single Sign-On protocol in an environment of federated domains. The group security system consists of a number of security technologies under a unified architecture, which supports creation of secure groups and execution of secure group transactions and applications in an open networking environment. The system is based on extensions of the GSAKMP standard for group key distribution and management. The Top layer is the Security Infrastructure with the Security Management and Administration System components and protocols that provide security functions common to all secure network applications The Middle layer is the Secure Group Protocols and Applications layer, consisting of the Policy and Group Key Distribution Server and Web-based (thin) Client. The Bottom layer is the supporting Middleware Security Platform, the cryptographic platform already described above. The group security system is designed to perform the functions necessary to create secure groups and enable secure group applications. Specifically, the system can manage group roles, create and disseminate a group security policy, perform authentication and authorization of users using PKI certificates and Web services security, generate group keys, and recover from compromises. In accordance with the GSAKMP standard, the group security system must perform all the required group life-cycle functions: group definition, group establishment, group maintenance, and group removal. The

  12. Quality of Security Service: Adaptive Security

    National Research Council Canada - National Science Library

    Levin, Timothy E; Irvine, Cynthia E; Spyropoulou, Evdoxia

    2004-01-01

    The premise of Quality of Security Service is that system and network management functions can be more effective if variable levels of security services and requirements can be presented to users or network tasks...

  13. Optimization of calculation models of maintenance offers for new civil engines

    OpenAIRE

    Pechoutre, Jean-Baptiste

    2011-01-01

    The sales support department performs calculations concerning maintenance offerings for civil engines based on the use of complex tools. This report describes the missions conducted during my Master's thesis: firstly, the establishment of a monitoring and security tool in the process of calculating maintenance costs. The second achievement is the creation of a tool for decision support in order to estimate and compare some of the maintenance costs associated with the use of the new commercial...

  14. Campus Area Network Wi-Fi Security

    Directory of Open Access Journals (Sweden)

    Arjun K. Pillay

    2017-07-01

    Full Text Available Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

  15. Social Security Bulletin

    Data.gov (United States)

    Social Security Administration — The Social Security Bulletin (ISSN 1937-4666) is published quarterly by the Social Security Administration. The Bulletin is prepared in the Office of Retirement and...

  16. Transportation Security Administration

    Science.gov (United States)

    ... content Official website of the Department of Homeland Security Transportation Security Administration A - Z Index Blog What Can I ... Search form Search the Site Main menu Travel Security Screening Special Procedures TSA Pre✓® Passenger Support Travel ...

  17. Security, Fraud Detection

    Indian Academy of Sciences (India)

    First page Back Continue Last page Overview Graphics. Secure. Secure. Server – Intruder prevention/detection; Network – Encryption, PKI; Client - Secure. Fraud detection based on audit trails. Automatic alerts like credit-card alerts based on suspicious patterns.

  18. Computer security engineering management

    International Nuclear Information System (INIS)

    McDonald, G.W.

    1988-01-01

    For best results, computer security should be engineered into a system during its development rather than being appended later on. This paper addresses the implementation of computer security in eight stages through the life cycle of the system; starting with the definition of security policies and ending with continuing support for the security aspects of the system throughout its operational life cycle. Security policy is addressed relative to successive decomposition of security objectives (through policy, standard, and control stages) into system security requirements. This is followed by a discussion of computer security organization and responsibilities. Next the paper directs itself to analysis and management of security-related risks, followed by discussion of design and development of the system itself. Discussion of security test and evaluation preparations, and approval to operate (certification and accreditation), is followed by discussion of computer security training for users is followed by coverage of life cycle support for the security of the system

  19. USCG Security Plan Review

    Data.gov (United States)

    Department of Homeland Security — The Security Plan Review module is intended for vessel and facility operators to check on the status of their security plans submitted to the US Coast Guard. A MISLE...

  20. Identifying Meaningful Behaviors for Social Competence: A Contextual Approach.

    Science.gov (United States)

    Warnes, Emily D.; Sheridan, Susan M.; Geske, Jenenne; Warnes, William A.

    An exploratory study was conducted which assessed behaviors that characterize social competence in the 2nd and 5th grades. A contextual approach was used to gather information from 2nd and 5th grade children and their parents and teachers regarding the behaviors they perceived to be important for getting along well with peers. Data were gathered…