WorldWideScience

Sample records for contextuality offers security

  1. Recommendations from Friends Anytime and Anywhere: Toward a Model of Contextual Offer and Consumption Values

    Science.gov (United States)

    Shen, Xiao-Liang; Wang, Nan

    2013-01-01

    Abstract The ubiquity and portability of mobile devices provide additional opportunities for information retrieval. People can easily access mobile applications anytime and anywhere when they need to acquire specific context-aware recommendations (contextual offer) from their friends. This study, thus, represents an initial attempt to understand users' acceptance of a mobile-based social reviews platform, where recommendations from friends can be obtained with mobile devices. Based on the consumption value theory, a theoretical model is proposed and empirically examined using survey data from 218 mobile users. The findings demonstrate that contextual offers based on users' profiles, access time, and geographic positions significantly predict their value perceptions (utilitarian, hedonic, and social), which, in turn, affect their intention to use a mobile social reviews platform. This study is also believed to provide some useful insights to both research and practice. PMID:23530548

  2. 12 CFR 563g.16 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Delayed or continuous offering and sale of securities. 563g.16 Section 563g.16 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.16 Delayed or continuous offering and sale of securities. Any offer or...

  3. International cooperation for food and nutrition security: Systematization of the participatory, contextualized, and intersectoral educational practices

    Directory of Open Access Journals (Sweden)

    Luciene BURLANDY

    Full Text Available ABSTRACT The present study systematized the experience gained with the project Construindo capacidades em segurança alimentar e nutricional no Brasil, Canadá e Angola (2004-2010, Building food and nutrition security skills in Brazil, Canada, and Angola, whose objective was to qualify actions that promote food and nutrition security in the three countries using different educational practices. The activities were organized in the following subprojects: (a online distance learning courses; (b workshops to train managers, government technicians, representatives of civil society organizations, and social subjects who offered to act as a link between communities; and (c local pilot projects. The present study reports this experience. The educational practices implemented in the municipalities of Araçuaí (MG, Juazeiro (BA, and Fortaleza (CE were analyzed based on systematized information in the project reports and activity records (texts and photographs. The analytical reference was based on the concept of food and nutrition education, guided by the fundamentals of Popular Education and Paulo Freire; on the concept of food and nutrition security; and on the following analytical dimensions: participation, contextualization of educational practices, and intersectoriality. The results evidenced how educational practices contributed to the construction of shared concepts of food and nutrition security from an intersectoral and participatory perspective that values the peculiarities of diet in different socioeconomic and cultural contexts, and highlights daily situations and local traditions. They also expose the limits and potentialities of an experience of this magnitude, conducted from an interdisciplinarity perspective and using participatory methods.

  4. 17 CFR 230.415 - Delayed or continuous offering and sale of securities.

    Science.gov (United States)

    2010-04-01

    ... majority-owned subsidiary; or (xi) Shares of common stock which are to be offered and sold on a delayed or... an existing trading market for outstanding shares of the same class at other than a fixed price. (5... and sale of securities. 230.415 Section 230.415 Commodity and Securities Exchanges SECURITIES AND...

  5. Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems.

    Science.gov (United States)

    Tang, Wan; Chen, Min; Ni, Jin; Yang, Ximin

    2011-01-01

    The traditional Radio Frequency Identification (RFID) system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID) system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC) by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  6. Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems

    Directory of Open Access Journals (Sweden)

    Ximin Yang

    2011-06-01

    Full Text Available The traditional Radio Frequency Identification (RFID system, in which the information maintained in tags is passive and static, has no intelligent decision-making ability to suit application and environment dynamics. The Second-Generation RFID (2G-RFID system, referred as 2G-RFID-sys, is an evolution of the traditional RFID system to ensure better quality of service in future networks. Due to the openness of the active mobile codes in the 2G-RFID system, the realization of conveying intelligence brings a critical issue: how can we make sure the backend system will interpret and execute mobile codes in the right way without misuse so as to avoid malicious attacks? To address this issue, this paper expands the concept of Role-Based Access Control (RBAC by introducing context-aware computing, and then designs a secure middleware for backend systems, named Two-Level Security Enhancement Mechanism or 2L-SEM, in order to ensure the usability and validity of the mobile code through contextual authentication and role analysis. According to the given contextual restrictions, 2L-SEM can filtrate the illegal and invalid mobile codes contained in tags. Finally, a reference architecture and its typical application are given to illustrate the implementation of 2L-SEM in a 2G-RFID system, along with the simulation results to evaluate how the proposed mechanism can guarantee secure execution of mobile codes for the system.

  7. Templates and Queries in Contextual Hypermedia

    DEFF Research Database (Denmark)

    Anderson, Kenneth Mark; Hansen, Frank Allan; Bouvin, Niels Olof

    2006-01-01

    discuss a framework, HyConSC, that implements this model and describe how it can be used to build new contextual hypermedia systems. Our framework aids the developer in the iterative development of contextual queries (via a dynamic query browser) and offers support for con-text matching, a key feature...... of contextual hypermedia. We have tested the framework with data and sensors taken from the HyCon contextual hypermedia system and are now migrating HyCon to this new framework....

  8. 17 CFR 230.701 - Exemption for offers and sales of securities pursuant to certain compensatory benefit plans and...

    Science.gov (United States)

    2010-04-01

    ... irrevocable election to defer is made. (iii) Derivative securities. In calculating outstanding securities for..., must be delivered. (6) If the sale involves a stock option or other derivative security, the issuer... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Exemption for offers and sales...

  9. Perspectives on contextual vulnerability in discourses of climate conflict

    Science.gov (United States)

    Okpara, U. T.; Stringer, L. C.; Dougill, A. J.

    2016-02-01

    The science of climate security and conflict is replete with controversies. Yet the increasing vulnerability of politically fragile countries to the security consequences of climate change is widely acknowledged. Although climate conflict reflects a continuum of conditional forces that coalesce around the notion of vulnerability, how different portrayals of vulnerability influence the discursive formation of climate conflict relations remains an exceptional but under-researched issue. This paper combines a systematic discourse analysis with a vulnerability interpretation diagnostic tool to explore (i) how discourses of climate conflict are constructed and represented, (ii) how vulnerability is communicated across discourse lines, and (iii) the strength of contextual vulnerability against a deterministic narrative of scarcity-induced conflict, such as that pertaining to land. Systematically characterising climate conflict discourses based on the central issues constructed, assumptions about mechanistic relationships, implicit normative judgements and vulnerability portrayals, provides a useful way of understanding where discourses differ. While discourses show a wide range of opinions "for" and "against" climate conflict relations, engagement with vulnerability has been less pronounced - except for the dominant context centrism discourse concerned about human security (particularly in Africa). In exploring this discourse, we observe an increasing sense of contextual vulnerability that is oriented towards a concern for complexity rather than predictability. The article concludes by illustrating that a turn towards contextual vulnerability thinking will help advance a constructivist theory-informed climate conflict scholarship that recognises historicity, specificity, and variability as crucial elements of contextual totalities of any area affected by climate conflict.

  10. 17 CFR 230.802 - Exemption for offerings in connection with an exchange offer or business combination for the...

    Science.gov (United States)

    2010-04-01

    ... connection with an exchange offer or business combination for the securities of foreign private issuers. 230... Offers and Business Combinations § 230.802 Exemption for offerings in connection with an exchange offer or business combination for the securities of foreign private issuers. Offers and sales in any...

  11. Contextual sensitivity in scientific reproducibility

    Science.gov (United States)

    Van Bavel, Jay J.; Mende-Siedlecki, Peter; Brady, William J.; Reinero, Diego A.

    2016-01-01

    In recent years, scientists have paid increasing attention to reproducibility. For example, the Reproducibility Project, a large-scale replication attempt of 100 studies published in top psychology journals found that only 39% could be unambiguously reproduced. There is a growing consensus among scientists that the lack of reproducibility in psychology and other fields stems from various methodological factors, including low statistical power, researcher’s degrees of freedom, and an emphasis on publishing surprising positive results. However, there is a contentious debate about the extent to which failures to reproduce certain results might also reflect contextual differences (often termed “hidden moderators”) between the original research and the replication attempt. Although psychologists have found extensive evidence that contextual factors alter behavior, some have argued that context is unlikely to influence the results of direct replications precisely because these studies use the same methods as those used in the original research. To help resolve this debate, we recoded the 100 original studies from the Reproducibility Project on the extent to which the research topic of each study was contextually sensitive. Results suggested that the contextual sensitivity of the research topic was associated with replication success, even after statistically adjusting for several methodological characteristics (e.g., statistical power, effect size). The association between contextual sensitivity and replication success did not differ across psychological subdisciplines. These results suggest that researchers, replicators, and consumers should be mindful of contextual factors that might influence a psychological process. We offer several guidelines for dealing with contextual sensitivity in reproducibility. PMID:27217556

  12. Contextual sensitivity in scientific reproducibility.

    Science.gov (United States)

    Van Bavel, Jay J; Mende-Siedlecki, Peter; Brady, William J; Reinero, Diego A

    2016-06-07

    In recent years, scientists have paid increasing attention to reproducibility. For example, the Reproducibility Project, a large-scale replication attempt of 100 studies published in top psychology journals found that only 39% could be unambiguously reproduced. There is a growing consensus among scientists that the lack of reproducibility in psychology and other fields stems from various methodological factors, including low statistical power, researcher's degrees of freedom, and an emphasis on publishing surprising positive results. However, there is a contentious debate about the extent to which failures to reproduce certain results might also reflect contextual differences (often termed "hidden moderators") between the original research and the replication attempt. Although psychologists have found extensive evidence that contextual factors alter behavior, some have argued that context is unlikely to influence the results of direct replications precisely because these studies use the same methods as those used in the original research. To help resolve this debate, we recoded the 100 original studies from the Reproducibility Project on the extent to which the research topic of each study was contextually sensitive. Results suggested that the contextual sensitivity of the research topic was associated with replication success, even after statistically adjusting for several methodological characteristics (e.g., statistical power, effect size). The association between contextual sensitivity and replication success did not differ across psychological subdisciplines. These results suggest that researchers, replicators, and consumers should be mindful of contextual factors that might influence a psychological process. We offer several guidelines for dealing with contextual sensitivity in reproducibility.

  13. Using contextual advertising in Internet marketing

    Directory of Open Access Journals (Sweden)

    Тетяна Олександрівна Левицька

    2017-07-01

    Full Text Available This article is devoted to the substantiation of the use of contextual advertising in Internet marketing as one of the most universal and expedient tools of modern advertising, applied for the first time in 1994, describing the principles of its implementation and the prospects for using it. The shortcomings and advantages of Internet marketing and contextual advertising in particular, its types and technologies, on which it is implemented, the possibilities, as well as the purposes of application, are considered. The main characteristics of contextual advertising, namely its characteristic properties as compared to the other types of Internet marketing, were highlighted. The use of contextual advertising in the search, on partner sites of the advertising network and an example of the report that was received by means of the Yandex.Metrika service have been shown. On the basis of the analysis the use of contextual advertising has been proved and its basic types and methods of measuring the effectiveness of advertising campaigns using deep analytics services have been demonstrated. The factor of the complexity of the configuration process has been singled out, and in this connection, a variant of professional intervention in setting up contextual advertising by specialized agencies has been offered. In the long term, the tools of contextual advertising are to expand. Every year, more and more services are being created for a deeper analysis of statistics, end-to-end analytics, and the improvement of the campaign management interface

  14. Using mobile phone contextual information to facilitate managing image collections

    DEFF Research Database (Denmark)

    Larsen, Jakob Eg; Luniewski, Maciej

    2009-01-01

    In this paper, we describe a prototype application that utilizes the embedded sensors in advanced mobile phones to infer meaningful contextual information, with the potential to support the users in managing their personal information. Contextual information such as time, location, movement...... in personal information management. We hypothesize that information inferred from embedded mobile phone sensors can offer useful contextual information for managing personal information, including the domain of interest here, namely image collections. This has potential for individuals as well as groups...

  15. Personal and contextual determinants of attitudes towards immigrants

    Directory of Open Access Journals (Sweden)

    Petrović Boban

    2016-01-01

    Full Text Available The issues of immigrants and attitudes towards immigrants are an important social issue in our country, and in recent years these issues have become more topical due to the large number of immigrants from the Middle East and Africa who pass through Serbia. This research was aimed at identifying the determinants of social attitudes towards immigrants. Contextual determinants, first of all, economic security and life in a multiethnic environment, as well as individual determinants, operationalized through the HEXACO model of personality, were examined. The research was conducted on the convenience sample of 540 participants. The results have shown that economic security has no direct effect on the attitudes towards immigrants, while the multiethnic environment is an important determinant of these attitudes. Personality traits, especially Openness, as well as Honesty- Humility, have better predictive power than the contextual variables. The factors of economic security are significant moderators of the relationship between personality and attitudes towards immigrants. The importance of the obtained results for understanding the formation of attitudes towards immigrants is discussed, as well as the methodological framework for future studies of attitudes towards immigrants and other social groups.

  16. Accident prevention in a contextual approach

    DEFF Research Database (Denmark)

    Dyhrberg, Mette Bang

    2003-01-01

    of such a contextual approach is shortly described and demonstrated in relation to a Danish case on accident prevention. It is concluded that the approach presently offers a post-ante, descriptive analytical understanding, and it is argued that it can be developed to a frame of reference for planning actions...

  17. 12 CFR 563g.4 - Non-public offering.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Non-public offering. 563g.4 Section 563g.4 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.4 Non-public offering. Offers and sales of securities by an issuer that satisfy the conditions of...

  18. 17 CFR 230.419 - Offerings by blank check companies.

    Science.gov (United States)

    2010-04-01

    ... derivative securities relating to securities held in the escrow or trust account may be exercised or... other derivative securities issued in the initial offering are exercisable, there is a continuous... 17 Commodity and Securities Exchanges 2 2010-04-01 2010-04-01 false Offerings by blank check...

  19. Contextual Fraction as a Measure of Contextuality

    Science.gov (United States)

    Abramsky, Samson; Barbosa, Rui Soares; Mansfield, Shane

    2017-08-01

    We consider the contextual fraction as a quantitative measure of contextuality of empirical models, i.e., tables of probabilities of measurement outcomes in an experimental scenario. It provides a general way to compare the degree of contextuality across measurement scenarios; it bears a precise relationship to violations of Bell inequalities; its value, and a witnessing inequality, can be computed using linear programing; it is monotonic with respect to the "free" operations of a resource theory for contextuality; and it measures quantifiable advantages in informatic tasks, such as games and a form of measurement-based quantum computing.

  20. 12 CFR 563g.21 - Filing of copies of offering circulars in certain exempt offerings.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Filing of copies of offering circulars in certain exempt offerings. 563g.21 Section 563g.21 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.21 Filing of copies of offering circulars in certain...

  1. Negative Social Contextual Stressors and Somatic Symptoms Among Young Black Males: An Exploratory Study

    OpenAIRE

    Scott, Lionel D.; McCoy, Henrika

    2015-01-01

    This study examines whether negative social contextual stressors were associated with somatic symptoms among young Black males (N = 74) after accounting for background and psychological characteristics. Using Cunningham and Spencer’s Black Male Experiences Measure, negative social contextual stressors connoted those experiences connected to the personal attributes, devaluation, and negative imagery of young Black males, such as being followed when entering a store or police or security guards...

  2. Secure Data Flow in a Calculus for Context Awareness

    DEFF Research Database (Denmark)

    Bucur, Doina; Nielsen, Mogens

    2008-01-01

    We present a Mobile-Ambients-based process calculus to describe context-aware computing in an infrastructure-based Ubiquitous Computing setting. In our calculus, computing agents can provide and discover contextual information and are owners of security policies. Simple access control to contextual...

  3. A unifying Bayesian account of contextual effects in value-based choice.

    Directory of Open Access Journals (Sweden)

    Francesco Rigoli

    2017-10-01

    Full Text Available Empirical evidence suggests the incentive value of an option is affected by other options available during choice and by options presented in the past. These contextual effects are hard to reconcile with classical theories and have inspired accounts where contextual influences play a crucial role. However, each account only addresses one or the other of the empirical findings and a unifying perspective has been elusive. Here, we offer a unifying theory of context effects on incentive value attribution and choice based on normative Bayesian principles. This formulation assumes that incentive value corresponds to a precision-weighted prediction error, where predictions are based upon expectations about reward. We show that this scheme explains a wide range of contextual effects, such as those elicited by other options available during choice (or within-choice context effects. These include both conditions in which choice requires an integration of multiple attributes and conditions where a multi-attribute integration is not necessary. Moreover, the same scheme explains context effects elicited by options presented in the past or between-choice context effects. Our formulation encompasses a wide range of contextual influences (comprising both within- and between-choice effects by calling on Bayesian principles, without invoking ad-hoc assumptions. This helps clarify the contextual nature of incentive value and choice behaviour and may offer insights into psychopathologies characterized by dysfunctional decision-making, such as addiction and pathological gambling.

  4. 17 CFR 230.253 - Offering circular.

    Science.gov (United States)

    2010-04-01

    .... Repetition of information should be avoided; cross-referencing of information within the document is... COMPLETENESS OF ANY OFFERING CIRCULAR OR OTHER SELLING LITERATURE. THESE SECURITIES ARE OFFERED PURSUANT TO AN...

  5. Defining Information Security.

    Science.gov (United States)

    Lundgren, Björn; Möller, Niklas

    2017-11-15

    This article proposes a new definition of information security, the 'Appropriate Access' definition. Apart from providing the basic criteria for a definition-correct demarcation and meaning concerning the state of security-it also aims at being a definition suitable for any information security perspective. As such, it bridges the conceptual divide between so-called 'soft issues' of information security (those including, e.g., humans, organizations, culture, ethics, policies, and law) and more technical issues. Because of this it is also suitable for various analytical purposes, such as analysing possible security breaches, or for studying conflicting attitudes on security in an organization. The need for a new definition is demonstrated by pointing to a number of problems for the standard definition type of information security-the so-called CIA definition. Besides being too broad as well as too narrow, it cannot properly handle the soft issues of information security, nor recognize the contextual and normative nature of security.

  6. Against Contextualism: Belief, Evidence, & the Bank Cases

    Directory of Open Access Journals (Sweden)

    Logan Paul Gage

    2013-04-01

    Full Text Available http://dx.doi.org/10.5007/1808-1711.2013v17n1p57 Contextualism (the view that ‘knowledge’ and its variants are context-sensitive has been supported in large part through appeal to intuitions about Keith DeRose’s Bank Cases. Recently, however, the contextualist construal of these cases has come under fire from Kent Bach and Jennifer Nagel who question whether the Bank Case subject’s confidence can remain constant in both low- and high-stakes cases. Having explained the Bank Cases and this challenge to them, I argue that DeRose has given a reasonable reply to this initial challenge. However, I proceed to argue that the current stalemate can be broken. Seeking to extend the Bach–Nagel critique, I offer a novel interpretation of the Bank Cases according to which the subject’s evidence changes between low- and high-stakes cases. If I am correct, then, given the amount of support the Bank Cases have been thought to lend contextualism, the case for contextualism is seriously weakened.

  7. 17 CFR 240.14e-1 - Unlawful tender offer practices.

    Science.gov (United States)

    2010-04-01

    ... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Unlawful tender offer... Securities Exchange Act of 1934 Regulation 14e § 240.14e-1 Unlawful tender offer practices. As a means... section 14(e) of the Act, no person who makes a tender offer shall: (a) Hold such tender offer open for...

  8. Pythia: A Privacy-enhanced Personalized Contextual Suggestion System for Tourism

    NARCIS (Netherlands)

    Drosatos, G.; Efraimidis, P.S.; Arampatzis, A.; Stamatelatos, G.; Athanasiadis, I.N.

    2015-01-01

    We present Pythia, a privacy-enhanced non-invasive contextual suggestion system for tourists, with important architectural innovations. The system offers high quality personalized recommendations, non-invasive operation and protection of user privacy. A key feature of Pythia is the exploitation of

  9. Dual-state modulation of the contextual cueing effect: Evidence from eye movement recordings.

    Science.gov (United States)

    Zhao, Guang; Liu, Qiang; Jiao, Jun; Zhou, Peiling; Li, Hong; Sun, Hong-jin

    2012-06-08

    The repeated configurations of random elements induce a better search performance than that of the displays of novel random configurations. The mechanism of such contextual cueing effect has been investigated through the use of the RT × Set Size function. There are divergent views on whether the contextual cueing effect is driven by attentional guidance or facilitation of initial perceptual processing or response selection. To explore this question, we used eye movement recording in this study, which offers information about the substages of the search task. The results suggest that the contextual cueing effect is contributed mainly by attentional guidance, and facilitation of response selection also plays a role.

  10. Action Centered Contextual Bandits.

    Science.gov (United States)

    Greenewald, Kristjan; Tewari, Ambuj; Klasnja, Predrag; Murphy, Susan

    2017-12-01

    Contextual bandits have become popular as they offer a middle ground between very simple approaches based on multi-armed bandits and very complex approaches using the full power of reinforcement learning. They have demonstrated success in web applications and have a rich body of associated theoretical guarantees. Linear models are well understood theoretically and preferred by practitioners because they are not only easily interpretable but also simple to implement and debug. Furthermore, if the linear model is true, we get very strong performance guarantees. Unfortunately, in emerging applications in mobile health, the time-invariant linear model assumption is untenable. We provide an extension of the linear model for contextual bandits that has two parts: baseline reward and treatment effect. We allow the former to be complex but keep the latter simple. We argue that this model is plausible for mobile health applications. At the same time, it leads to algorithms with strong performance guarantees as in the linear model setting, while still allowing for complex nonlinear baseline modeling. Our theory is supported by experiments on data gathered in a recently concluded mobile health study.

  11. Widening Participation and Contextual Entry Policy in Accounting and Finance

    Science.gov (United States)

    Rowbottom, N.

    2017-01-01

    The paper examines the performance of accounting and finance students entering university via a "widening participation" scheme that seeks to attract students who have been historically under-represented in higher education. Focus is placed on the policy of providing contextual entry offers that recognise that academic qualifications be…

  12. 12 CFR 335.501 - Tender offers.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Tender offers. 335.501 Section 335.501 Banks and Banking FEDERAL DEPOSIT INSURANCE CORPORATION REGULATIONS AND STATEMENTS OF GENERAL POLICY SECURITIES OF NONMEMBER INSURED BANKS § 335.501 Tender offers. The provisions of the applicable and currently...

  13. Multiculturalism and contextualism

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2015-01-01

    Many political theorists of multiculturalism (e.g. Joseph Carens, Bhikhu Parekh, James Tully) describe their theories as “contextualist.” But it is unclear what “contextualism” means and what difference it makes for political theory. I use a specific prominent example of a multiculturalist...... discussion, namely Tariq Modood’s argument about “moderate secularism,” as a test case and distinguish between different senses of contextualism. I discuss whether the claim that political theory is contextual in each sense is novel and interesting, and whether contextualism is a distinct feature...... of political theory of multiculturalism. I argue that the forms of contextualism which concern the scope and methodology of political theory are sensible, but not novel or distinctive of multiculturalism. I then discuss the more controversial forms of contextualism, which I call political and theoretical...

  14. 12 CFR 563g.2 - Offering circular requirement.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Offering circular requirement. 563g.2 Section 563g.2 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.2 Offering circular requirement. (a) General. No savings association shall offer or sell, directly...

  15. The Future of Contextual Fear Learning for PTSD Research: A Methodological Review of Neuroimaging Studies.

    Science.gov (United States)

    Glenn, Daniel E; Risbrough, Victoria B; Simmons, Alan N; Acheson, Dean T; Stout, Daniel M

    2017-10-21

    There has been a great deal of recent interest in human models of contextual fear learning, particularly due to the use of such paradigms for investigating neural mechanisms related to the etiology of posttraumatic stress disorder. However, the construct of "context" in fear conditioning research is broad, and the operational definitions and methods used to investigate contextual fear learning in humans are wide ranging and lack specificity, making it difficult to interpret findings about neural activity. Here we will review neuroimaging studies of contextual fear acquisition in humans. We will discuss the methodology associated with four broad categories of how contextual fear learning is manipulated in imaging studies (colored backgrounds, static picture backgrounds, virtual reality, and configural stimuli) and highlight findings for the primary neural circuitry involved in each paradigm. Additionally, we will offer methodological recommendations for human studies of contextual fear acquisition, including using stimuli that distinguish configural learning from discrete cue associations and clarifying how context is experimentally operationalized.

  16. Multi-level Contextual Type Theory

    Directory of Open Access Journals (Sweden)

    Mathieu Boespflug

    2011-10-01

    Full Text Available Contextual type theory distinguishes between bound variables and meta-variables to write potentially incomplete terms in the presence of binders. It has found good use as a framework for concise explanations of higher-order unification, characterize holes in proofs, and in developing a foundation for programming with higher-order abstract syntax, as embodied by the programming and reasoning environment Beluga. However, to reason about these applications, we need to introduce meta^2-variables to characterize the dependency on meta-variables and bound variables. In other words, we must go beyond a two-level system granting only bound variables and meta-variables. In this paper we generalize contextual type theory to n levels for arbitrary n, so as to obtain a formal system offering bound variables, meta-variables and so on all the way to meta^n-variables. We obtain a uniform account by collapsing all these different kinds of variables into a single notion of variabe indexed by some level k. We give a decidable bi-directional type system which characterizes beta-eta-normal forms together with a generalized substitution operation.

  17. Applications and Security of Next-Generation, User-Centric Wireless Systems

    Directory of Open Access Journals (Sweden)

    Danfeng Yao

    2010-07-01

    Full Text Available Pervasive wireless systems have significantly improved end-users’ quality of life. As manufacturing costs decrease, communications bandwidth increases, and contextual information is made more readily available, the role of next generation wireless systems in facilitating users’ daily activities will grow. Unique security and privacy issues exist in these wireless, context-aware, often decentralized systems. For example, the pervasive nature of such systems allows adversaries to launch stealthy attacks against them. In this review paper, we survey several emergent personal wireless systems and their applications. These systems include mobile social networks, active implantable medical devices, and consumer products. We explore each system’s usage of contextual information and provide insight into its security vulnerabilities. Where possible, we describe existing solutions for defendingagainst these vulnerabilities. Finally, we point out promising future research directions for improving these systems’ robustness and security

  18. 19 CFR 172.32 - Authority to accept offers.

    Science.gov (United States)

    2010-04-01

    ... 19 Customs Duties 2 2010-04-01 2010-04-01 false Authority to accept offers. 172.32 Section 172.32 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY; DEPARTMENT OF THE....32 Authority to accept offers. The authority to accept offers in compromise, subject to the...

  19. Contextualism in Normative Political Theory

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2016-01-01

    Contextualism denotes a set of ideas about the importance of attention to context. The topic of the article is contextualism in normative political theory/philosophy, in relation to the part of political theory concerned with systematic political argument for normative claims—evaluative claims...... that can be invoked to contextualize a specific object of political discussion such as a law, an institution, or the like. Contextualism denotes any view that political theory should take context into account, but there are many different views about what this means. Contextualism can be characterized...... by way of different contrasts, which imply that the resulting conceptions of contextualism are views about different things, such as justification, the nature of political theory, or methodology. Here the focus is on characterizations of contextualism in terms of methodology and justification...

  20. Being in Community: A Food Security Themed Approach to Public Scholarship

    Science.gov (United States)

    Harrison, Barbara; Nelson, Connie; Stroink, Mirella

    2013-01-01

    For six years the Food Security Research Network at Lakehead University, Canada, has been engaged in an interdisciplinary theme-based service-learning initiative focusing on food security. Informed by complexity theory, the contextual fluidity partnership model brings community partners, students, and faculty into a nexus through which new…

  1. DNS security management

    CERN Document Server

    Dooley, Michael

    2017-01-01

    An advanced Domain Name System (DNS) security resource that explores the operation of DNS, its vulnerabilities, basic security approaches, and mitigation strategies DNS Security Management offers an overall role-based security approach and discusses the various threats to the Domain Name Systems (DNS). This vital resource is filled with proven strategies for detecting and mitigating these all too frequent threats. The authors—noted experts on the topic—offer an introduction to the role of DNS and explore the operation of DNS. They cover a myriad of DNS vulnerabilities and include preventative strategies that can be implemented. Comprehensive in scope, the text shows how to secure DNS resolution with the Domain Name System Security Extensions (DNSSEC), DNS firewall, server controls, and much more. In addition, the text includes discussions on security applications facilitated by DNS, such as anti-spam, SFP, and DANE.

  2. Pragmatic security metrics applying metametrics to information security

    CERN Document Server

    Brotby, W Krag

    2013-01-01

    Other books on information security metrics discuss number theory and statistics in academic terms. Light on mathematics and heavy on utility, PRAGMATIC Security Metrics: Applying Metametrics to Information Security breaks the mold. This is the ultimate how-to-do-it guide for security metrics.Packed with time-saving tips, the book offers easy-to-follow guidance for those struggling with security metrics. Step by step, it clearly explains how to specify, develop, use, and maintain an information security measurement system (a comprehensive suite of metrics) to

  3. Convergence of Corporate and Information Security

    OpenAIRE

    Syed; Rahman, M.; Donahue, Shannon E.

    2010-01-01

    As physical and information security boundaries have become increasingly blurry many organizations are experiencing challenges with how to effectively and efficiently manage security within the corporate. There is no current standard or best practice offered by the security community regarding convergence; however many organizations such as the Alliance for Enterprise Security Risk Management (AESRM) offer some excellent suggestions for integrating a converged security program. This paper rep...

  4. Contextual Treatment of Dissociative Identity Disorder.

    Science.gov (United States)

    Gold, Steven N; Elhai, Jon D; Rea, Bayard D; Weiss, Donna; Masino, Theodore; Morris, Staci Leon; McIninch, Jessica

    2001-01-01

    Evidence for the effectiveness of contextual therapy, a new approach for treating adult survivors of prolonged child abuse (PCA), is provided via case studies of three women with Dissociative Identity Disorder (DID). Contextual therapy is based on the premise that it is not only traumatic experiences that account for PCA survivors' psychological difficulties. Even more fundamentally, many survivors grow up in an interpersonal context in which adequate resources for secure attachment and acquisition of adaptive living skills are not available. As a result, they are left with lasting deficits that undermine not only their current functioning, but also their ability to cope with reliving their traumatic memories in therapy. The primary focus of this treatment approach, therefore, is on developing capacities for feeling and functioning better in the present, rather than on extensive exploration and processing of the client's trauma history or, in the case of DID, of identity fragments. Treatment of the three cases presented ranged from eight months to two and one-half years' duration, and culminated in very positive outcomes. The women's reports of achievements, such as obtaining and maintaining gainful employment, greater self-sufficiency, and the establishment of more intimate and gratifying relationships, indicated marked improvements in daily functioning. Objective test data obtained at admission and discharge, and in one case, at follow-up, documented substantial reductions in dissociative, posttraumatic stress, depressive, and other symptoms.

  5. Nicotine Withdrawal Disrupts Contextual Learning but Not Recall of Prior Contextual Associations: Implications for Nicotine Addiction

    OpenAIRE

    Portugal, George S.; Gould, Thomas J.

    2008-01-01

    Interactions between nicotine and learning could contribute to nicotine addiction. Although previous research indicates that nicotine withdrawal disrupts contextual learning, the effects of nicotine withdrawal on contextual memories acquired before withdrawal are unknown. The present study investigated whether nicotine withdrawal disrupted recall of prior contextual memories by examining the effects of nicotine withdrawal on recall of nicotine conditioned place preference (CPP) and contextual...

  6. 12 CFR 563g.8 - Use of the offering circular.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Use of the offering circular. 563g.8 Section 563g.8 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.8 Use of the offering circular. (a) An offering circular or amendment declared effective by the...

  7. Negative Social Contextual Stressors and Somatic Symptoms Among Young Black Males: An Exploratory Study.

    Science.gov (United States)

    Scott, Lionel D; McCoy, Henrika

    This study examines whether negative social contextual stressors were associated with somatic symptoms among young Black males ( N = 74) after accounting for background and psychological characteristics. Using Cunningham and Spencer's Black Male Experiences Measure, negative social contextual stressors connoted those experiences connected to the personal attributes, devaluation, and negative imagery of young Black males, such as being followed when entering a store or police or security guards asking them what they are doing when hanging out (e.g., in the park or playground or on the street corner). Results showed that such stressors made a unique and significant contribution to the experience of somatic symptoms. Future research directions and implications for addressing the larger societal perceptions of young Black males are discussed.

  8. Contextual Variability in Free Recall

    Science.gov (United States)

    Lohnas, Lynn J.; Polyn, Sean M.; Kahana, Michael J.

    2011-01-01

    According to contextual-variability theory, experiences encoded at different times tend to be associated with different contextual states. The gradual evolution of context implies that spaced items will be associated with more distinct contextual states, and thus have more unique retrieval cues, than items presented in proximity. Ross and Landauer…

  9. Contextualizing Corporate Political Responsibilities: Neoliberal CSR in Historical Perspective

    OpenAIRE

    Djelic, Marie-Laure; Etchanchu, Helen

    2015-01-01

    This article provides a historical analysis of the political role of Corporate Social Responsibility (CSR) before it was even called CSR. We describe two ideal types of political responsibilities during the eras of 19th century paternalism in Europe and corporate trusteeship in the US. Our historical contextualization of recent scholarly work on a “political turn” of CSR offers a two-pronged critique: 1. Growing discussions on political CSR start from a problematic foundation that does not ho...

  10. Managing Cisco network security

    CERN Document Server

    Knipp, Eric

    2002-01-01

    An in-depth knowledge of how to configure Cisco IP network security is a MUST for anyone working in today''s internetworked world"There''s no question that attacks on enterprise networks are increasing in frequency and sophistication..."-Mike Fuhrman, Cisco Systems Manager, Security ConsultingManaging Cisco Network Security, Second Edition offers updated and revised information covering many of Cisco''s security products that provide protection from threats, detection of network security incidents, measurement of vulnerability and policy compliance and management of security policy across an extended organization. These are the tools that network administrators have to mount defenses against threats. Chapters also cover the improved functionality and ease of the Cisco Secure Policy Manger software used by thousands of small-to-midsized businesses and a special section on the Cisco Aironet Wireless Security Solutions.Security from a real-world perspectiveKey coverage of the new technologies offered by the Cisc...

  11. Global Repetition Influences Contextual Cueing

    Science.gov (United States)

    Zang, Xuelian; Zinchenko, Artyom; Jia, Lina; Li, Hong

    2018-01-01

    Our visual system has a striking ability to improve visual search based on the learning of repeated ambient regularities, an effect named contextual cueing. Whereas most of the previous studies investigated contextual cueing effect with the same number of repeated and non-repeated search displays per block, the current study focused on whether a global repetition frequency formed by different presentation ratios between the repeated and non-repeated configurations influence contextual cueing effect. Specifically, the number of repeated and non-repeated displays presented in each block was manipulated: 12:12, 20:4, 4:20, and 4:4 in Experiments 1–4, respectively. The results revealed a significant contextual cueing effect when the global repetition frequency is high (≥1:1 ratio) in Experiments 1, 2, and 4, given that processing of repeated displays was expedited relative to non-repeated displays. Nevertheless, the contextual cueing effect reduced to a non-significant level when the repetition frequency reduced to 4:20 in Experiment 3. These results suggested that the presentation frequency of repeated relative to the non-repeated displays could influence the strength of contextual cueing. In other words, global repetition statistics could be a crucial factor to mediate contextual cueing effect. PMID:29636716

  12. ORACLE DATABASE SECURITY

    OpenAIRE

    Cristina-Maria Titrade

    2011-01-01

    This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource management and password management. Security is a constant concern in the design and database development. Usually, there are no concerns about the existence of security, but rather how large it should be. A typically DBMS has several levels of security, in addition to those offered by the operating system or network. Typically, a DBMS has user a...

  13. CERN to offer secure grid, published in itWorldCanada

    CERN Multimedia

    Broersma, Matthew

    2006-01-01

    CERN, the Geneva-based nuclear physics research center, has launched a collaborative effort with some of the biggest name in IT to tighten up security on its landmark Large Hadron Collider (LHC) project, as well as working on platform virtualization and the interoperability of grid software (1 page)

  14. Tele-Lab IT-Security: an Architecture for an online virtual IT Security Lab

    Directory of Open Access Journals (Sweden)

    Christoph Meinel

    2008-05-01

    Full Text Available Recently, Awareness Creation in terms of IT security has become a big thing – not only for enterprises. Campaigns for pupils try to highlight the importance of IT security even in the user’s early years. Common practices in security education – as seen in computer science courses at universities – mainly consist of literature and lecturing. In the best case, the teaching facility offers practical courses in a dedicated isolated computer lab. Additionally, there are some more or less interactive e-learning applications around. Most existing offers can do nothing more than impart theoretical knowledge or basic information. They all lack of possibilities to provide practical experience with security software or even hacker tools in a realistic environment. The only exceptions are the expensive and hard-to-maintain dedicated computer security labs. Those can only be provided by very few organizations. Tele-Lab IT-Security was designed to offer hands-on experience exercises in IT security without the need of additional hardware or maintenance expenses. The existing implementation of Tele-Lab even provides access to the learning environment over the Internet – and thus can be used anytime and anywhere. The present paper describes the extended architecture on which the current version of the Tele-Lab server is built.

  15. Securing the Cloud Cloud Computer Security Techniques and Tactics

    CERN Document Server

    Winkler, Vic (JR)

    2011-01-01

    As companies turn to cloud computing technology to streamline and save money, security is a fundamental concern. Loss of certain control and lack of trust make this transition difficult unless you know how to handle it. Securing the Cloud discusses making the move to the cloud while securing your peice of it! The cloud offers felxibility, adaptability, scalability, and in the case of security-resilience. This book details the strengths and weaknesses of securing your company's information with different cloud approaches. Attacks can focus on your infrastructure, communications network, data, o

  16. A More Efficient Contextuality Distillation Protocol

    Science.gov (United States)

    Meng, Hui-xian; Cao, Huai-xin; Wang, Wen-hua; Fan, Ya-jing; Chen, Liang

    2018-03-01

    Based on the fact that both nonlocality and contextuality are resource theories, it is natural to ask how to amplify them more efficiently. In this paper, we present a contextuality distillation protocol which produces an n-cycle box B ∗ B ' from two given n-cycle boxes B and B '. It works efficiently for a class of contextual n-cycle ( n ≥ 4) boxes which we termed as "the generalized correlated contextual n-cycle boxes". For any two generalized correlated contextual n-cycle boxes B and B ', B ∗ B ' is more contextual than both B and B '. Moreover, they can be distilled toward to the maximally contextual box C H n as the times of iteration goes to infinity. Among the known protocols, our protocol has the strongest approximate ability and is optimal in terms of its distillation rate. What is worth noting is that our protocol can witness a larger set of nonlocal boxes that make communication complexity trivial than the protocol in Brunner and Skrzypczyk (Phys. Rev. Lett. 102, 160403 2009), this might be helpful for exploring the problem that why quantum nonlocality is limited.

  17. Security Expertise

    DEFF Research Database (Denmark)

    systematic study of security expertise and opens up a productive dialogue between science and technology studies and security studies to investigate the character and consequences of this expertise. In security theory, the study of expertise is crucial to understanding whose knowledge informs security making......This volume brings together scholars from different fields to explore the power, consequences and everyday practices of security expertise. Expertise mediates between different forms of knowledge: scientific and technological, legal, economic and political knowledge. This book offers the first...... and to reflect on the impact and responsibility of security analysis. In science and technology studies, the study of security politics adds a challenging new case to the agenda of research on expertise and policy. The contributors investigate cases such as academic security studies, security think tanks...

  18. Contextual inquiry for medical device design

    CERN Document Server

    Privitera, Mary Beth

    2015-01-01

    Contextual Inquiry for Medical Device Design helps users understand the everyday use of medical devices and the way their usage supports the development of better products and increased market acceptance. The text explains the concept of contextual inquiry using real-life examples to illustrate its application. Case studies provide a frame of reference on how contextual inquiry is successfully used during product design, ultimately producing safer, improved medical devices. Presents the ways contextual inquiry can be used to inform the evaluation and business case of technologyHelps users

  19. Structuring mobile and contextual learning

    NARCIS (Netherlands)

    Glahn, Christian; Specht, Marcus

    2011-01-01

    Glahn, C., & Specht, M. (2011). Structuring mobile and contextual learning. In Proceedings of the 10th World Conference on Mobile and Contextual Learning (pp. 188-195). October, 18-21, 2011, Beijing, China.

  20. PREDICTION OF DEMAND FOR PRIMARY BOND OFFERINGS USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Michal Tkac

    2014-12-01

    Full Text Available Purpose: Primary bond markets represent an interesting investment opportunity not only for banks, insurance companies, and other institutional investors, but also for individuals looking for capital gains. Since offered securities vary in terms of their rating, industrial classification, coupon, or maturity, demand of buyers for particular offerings often overcomes issued volume and price of given bond on secondary market consequently rises. Investors might be regarded as consumers purchasing required service according to their specific preferences at desired price. This paper aims at analysis of demand for bonds on primary market using artificial neural networks.Design/methodology: We design a multilayered feedforward neural network trained by Levenberg-Marquardt algorithm in order to estimate demand for individual bonds based on parameters of particular offerings. Outcomes obtained by artificial neural network are compared with conventional econometric methods.Findings: Our results indicate that artificial neural network significantly outperformed standard econometric techniques and on examined sample of primary bond offerings achieved considerably better performance in terms of prediction accuracy and mean squared error.Originality: We show that proposed neural network is able to successfully predict demand for primary obligation offerings based on their specifications. Moreover, we identify relevant parameters of issues which are able to considerably affect total demand for given security.  Our findings might not only help investors to detect marketable securities, but also enable issuing entities to increase demand for their bonds in order to decrease their offering price. 

  1. Tools of Contextualization

    DEFF Research Database (Denmark)

    Bouvin, Niels Olof; Brodersen, Ann Christina; Hansen, Frank Allan

    2005-01-01

    Project based education is growing in importance in elementary schools though it is still quite poorly technologically supported, particularly with respect to actively taking advantage of contextual information. Based on an empirical study of teaching and in particular project based education...... in Danish elementary schools, we present the HyConExplorer, a geospatial hypermedia system supporting project based education and learning outside of the classroom through contextualization of information. More specifically, the HyCon-Explorer provides means for: browsing with your feet, annotating...

  2. A Privacy-by-Design Contextual Suggestion System for Tourism

    Directory of Open Access Journals (Sweden)

    Pavlos S. Efraimidis

    2016-05-01

    Full Text Available We focus on personal data generated by the sensors and through the everyday usage of smart devices and take advantage of these data to build a non-invasive contextual suggestion system for tourism. The system, which we call Pythia, exploits the computational capabilities of modern smart devices to offer high quality personalized POI (point of interest recommendations. To protect user privacy, we apply a privacy by design approach within all of the steps of creating Pythia. The outcome is a system that comprises important architectural and operational innovations. The system is designed to process sensitive personal data, such as location traces, browsing history and web searches (query logs, to automatically infer user preferences and build corresponding POI-based user profiles. These profiles are then used by a contextual suggestion engine to anticipate user choices and make POI recommendations for tourists. Privacy leaks are minimized by implementing an important part of the system functionality at the user side, either as a mobile app or as a client-side web application, and by taking additional precautions, like data generalization, wherever necessary. As a proof of concept, we present a prototype that implements the aforementioned mechanisms on the Android platform accompanied with certain web applications. Even though the current prototype focuses only on location data, the results from the evaluation of the contextual suggestion algorithms and the user experience feedback from volunteers who used the prototype are very positive.

  3. Cloud security mechanisms

    OpenAIRE

    2014-01-01

    Cloud computing has brought great benefits in cost and flexibility for provisioning services. The greatest challenge of cloud computing remains however the question of security. The current standard tools in access control mechanisms and cryptography can only partly solve the security challenges of cloud infrastructures. In the recent years of research in security and cryptography, novel mechanisms, protocols and algorithms have emerged that offer new ways to create secure services atop cloud...

  4. Secure pairing with biometrics

    NARCIS (Netherlands)

    Buhan, I.R.; Boom, B.J.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.

    Secure pairing enables two devices that share no prior context with each other to agree upon a security association, which they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping and to a

  5. Brogaard's Moral Contextualism

    DEFF Research Database (Denmark)

    Binderup, Lars Grassme

    2008-01-01

    Brogaard's non-indexical version of moral contextualism has two related problems. It is unable to account for the function of truth-governed assertoric moral discourse, since it leaves two (semantically clearheaded) disputants without any incentive to resolve seemingly contradictory moral claims....... The moral contextualist could explain why people do feel such an incentive by ascribing false beliefs about the semantic workings of their own language. But, secondly, this leaves Brogaard's moral contextualism looking weaker than a Mackie-style invariantist error theory about morals. The latter is equally...

  6. 17 CFR 230.254 - Solicitation of interest document for use prior to an offering statement.

    Science.gov (United States)

    2010-04-01

    ... subject to the antifraud provisions of the federal securities laws. No solicitation or acceptance of money... document for use prior to an offering statement. 230.254 Section 230.254 Commodity and Securities Exchanges...-Conditional Small Issues Exemption § 230.254 Solicitation of interest document for use prior to an offering...

  7. NEW APPROACHES IN DECEPTION DETECTION II. ACTIVE INTERVIEWING STRATEGIES AND CONTEXTUAL INFORMATION

    Directory of Open Access Journals (Sweden)

    Jaume Masip

    2015-05-01

    Full Text Available Meta-analytical evidence shows that behavioural indicators of deception are scant, poorly diagnostic and inconsistent. This has yielded a shift in deception detection research. Rather than passively scrutinising the communication sender to find tell-tale behavioural indicators of deception, the deception judge needs to (a adopt an active role by using interviewing techniques specifically designed to detect deception, or (b focus on contextual (rather than behavioural deception cues. In the previous paper (Masip & Herrero, 2015a, we reviewed the antecedents of this change in focus, as well as the theoretical grounding of the new approaches. Here we describe specific interviewing strategies for detecting deception, as well as the (still scant research on contextual deception indicia. In doing this, we hope to offer the reader a detailed perspective on the recent developments in this specific area of psychology and law.

  8. Contextual risk and child psychopathology.

    Science.gov (United States)

    Flouri, Eirini

    2008-10-01

    In developmental psychopathology it almost goes without saying that contextual risk factors do not occur in isolation and that it is the combination of various risk factors that portends numerous negative child outcomes. Despite this, the body of literature that examines the relation between multiple risk exposure and child psychopathology using a cumulative risk approach is still relatively small. Even when studies use a cumulative risk approach they rarely test properly whether the relation between cumulative risk and child psychopathology is linear or nonlinear, with consequences for both theory development and intervention design: if cumulative risk impacts problem behavior in a positively accelerated exponential manner, for instance, it means that exposure to multiple risk is especially difficult to manage as problem behavior accelerates at a critical level of risk. Furthermore, few studies have actually examined factors that protect from negative outcomes in those exposed to cumulative risk and even fewer have explored cumulative protection in relation to cumulative risk. On the other hand, there is the view that a cumulative risk approach at least implicitly assumes that risk factors are, in essence, interchangeable. According to this view, the importance of testing for specificity should not be underestimated. Finally, the renewed interest in the role of neighborhood risk in child development has initiated a lively debate as to whether contextual risk should be operationalized at the family or the area level. In this letter I discuss these issues, and offer some suggestions as to how future research can address them.

  9. 17 CFR 240.13e-4 - Tender offers by issuers.

    Science.gov (United States)

    2010-04-01

    ... begins the running of such time period shall be included except that if such event occurs on other than a business day such period shall begin to run on and shall include the first business day thereafter. (4) The... offer. (6) The term security holders means holders of record and beneficial owners of securities of the...

  10. Professional Cocoa Application Security

    CERN Document Server

    Lee, Graham J

    2010-01-01

    The first comprehensive security resource for Mac and iPhone developers. The Mac platform is legendary for security, but consequently, Apple developers have little appropriate security information available to help them assure that their applications are equally secure. This Wrox guide provides the first comprehensive go-to resource for Apple developers on the available frameworks and features that support secure application development.: While Macs are noted for security, developers still need to design applications for the Mac and the iPhone with security in mind; this guide offers the first

  11. 17 CFR 240.14e-5 - Prohibiting purchases outside of a tender offer.

    Science.gov (United States)

    2010-04-01

    ...(s); (iv) The intention of the offeror to make purchases pursuant to the foreign tender offer(s) is... consideration paid outside of the tender offer that is greater than the tender offer price; and (G) Purchases or... 17 Commodity and Securities Exchanges 3 2010-04-01 2010-04-01 false Prohibiting purchases outside...

  12. Attentional and Contextual Priors in Sound Perception.

    Science.gov (United States)

    Wolmetz, Michael; Elhilali, Mounya

    2016-01-01

    Behavioral and neural studies of selective attention have consistently demonstrated that explicit attentional cues to particular perceptual features profoundly alter perception and performance. The statistics of the sensory environment can also provide cues about what perceptual features to expect, but the extent to which these more implicit contextual cues impact perception and performance, as well as their relationship to explicit attentional cues, is not well understood. In this study, the explicit cues, or attentional prior probabilities, and the implicit cues, or contextual prior probabilities, associated with different acoustic frequencies in a detection task were simultaneously manipulated. Both attentional and contextual priors had similarly large but independent impacts on sound detectability, with evidence that listeners tracked and used contextual priors for a variety of sound classes (pure tones, harmonic complexes, and vowels). Further analyses showed that listeners updated their contextual priors rapidly and optimally, given the changing acoustic frequency statistics inherent in the paradigm. A Bayesian Observer model accounted for both attentional and contextual adaptations found with listeners. These results bolster the interpretation of perception as Bayesian inference, and suggest that some effects attributed to selective attention may be a special case of contextual prior integration along a feature axis.

  13. Audit Characteristics for Information System Security

    OpenAIRE

    Marius POPA; Mihai DOINEA

    2007-01-01

    The paper presents the main aspects regarding the development of the information security and assurance of their security. The information systems, standards and audit processes definitions are offered. There are presented the most important security standards used in information system security assessment

  14. Mitigating Docker Security Issues

    OpenAIRE

    Yasrab, Robail

    2018-01-01

    It is very easy to run applications in Docker. Docker offers an ecosystem that offers a platform for application packaging, distributing and managing within containers. However, Docker platform is yet not matured. Presently, Docker is less secured as compare to virtual machines (VM) and most of the other cloud technologies. The key of reason of Docker inadequate security protocols is containers sharing of Linux kernel, which can lead to risk of privileged escalations. This research is going t...

  15. An Order-Theoretic Quantification of Contextuality

    Directory of Open Access Journals (Sweden)

    Ian T. Durham

    2014-09-01

    Full Text Available In this essay, I develop order-theoretic notions of determinism and contextuality on domains and topoi. In the process, I develop a method for quantifying contextuality and show that the order-theoretic sense of contextuality is analogous to the sense embodied in the topos-theoretic statement of the Kochen–Specker theorem. Additionally, I argue that this leads to a relation between the entropy associated with measurements on quantum systems and the second law of thermodynamics. The idea that the second law has its origin in the ordering of quantum states and processes dates to at least 1958 and possibly earlier. The suggestion that the mechanism behind this relation is contextuality, is made here for the first time.

  16. Preserved Affective Sharing But Impaired Decoding of Contextual Complex Emotions in Alcohol Dependence.

    Science.gov (United States)

    Grynberg, Delphine; Maurage, Pierre; Nandrino, Jean-Louis

    2017-04-01

    Prior research has repeatedly shown that alcohol dependence is associated with a large range of impairments in psychological processes, which could lead to interpersonal deficits. Specifically, it has been suggested that these interpersonal difficulties are underpinned by reduced recognition and sharing of others' emotional states. However, this pattern of deficits remains to be clarified. This study thus aimed to investigate whether alcohol dependence is associated with impaired abilities in decoding contextual complex emotions and with altered sharing of others' emotions. Forty-one alcohol-dependent individuals (ADI) and 37 matched healthy individuals completed the Multifaceted Empathy Test, in which they were instructed to identify complex emotional states expressed by individuals in contextual scenes and to state to what extent they shared them. Compared to healthy individuals, ADI were impaired in identifying negative (Cohen's d = 0.75) and positive (Cohen's d = 0.46) emotional states but, conversely, presented preserved abilities in sharing others' emotional states. This study shows that alcohol dependence is characterized by an impaired ability to decode complex emotional states (both positive and negative), despite the presence of complementary contextual cues, but by preserved emotion-sharing. Therefore, these results extend earlier data describing an impaired ability to decode noncontextualized emotions toward contextualized and ecologically valid emotional states. They also indicate that some essential emotional competences such as emotion-sharing are preserved in alcohol dependence, thereby offering potential therapeutic levers. Copyright © 2017 by the Research Society on Alcoholism.

  17. Empathy and contextual social cognition.

    Science.gov (United States)

    Melloni, Margherita; Lopez, Vladimir; Ibanez, Agustin

    2014-03-01

    Empathy is a highly flexible and adaptive process that allows for the interplay of prosocial behavior in many different social contexts. Empathy appears to be a very situated cognitive process, embedded with specific contextual cues that trigger different automatic and controlled responses. In this review, we summarize relevant evidence regarding social context modulation of empathy for pain. Several contextual factors, such as stimulus reality and personal experience, affectively link with other factors, emotional cues, threat information, group membership, and attitudes toward others to influence the affective, sensorimotor, and cognitive processing of empathy. Thus, we propose that the frontoinsular-temporal network, the so-called social context network model (SCNM), is recruited during the contextual processing of empathy. This network would (1) update the contextual cues and use them to construct fast predictions (frontal regions), (2) coordinate the internal (body) and external milieus (insula), and (3) consolidate the context-target associative learning of empathic processes (temporal sites). Furthermore, we propose these context-dependent effects of empathy in the framework of the frontoinsular-temporal network and examine the behavioral and neural evidence of three neuropsychiatric conditions (Asperger syndrome, schizophrenia, and the behavioral variant of frontotemporal dementia), which simultaneously present with empathy and contextual integration impairments. We suggest potential advantages of a situated approach to empathy in the assessment of these neuropsychiatric disorders, as well as their relationship with the SCNM.

  18. Pathways to Economic Security: Gender and Nonstandard Employment in Contemporary Japan

    Science.gov (United States)

    Gottfried, Heidi

    2008-01-01

    Compiling data from several government surveys, this article identifies key social indicators of economic security associated with nonstandard employment in Japan. Empirical trends of nonstandard employment are contextualized in the development of Japanese coordinated capitalism from the economic boom during the 1960s through the recession of the…

  19. Intact memory for implicit contextual information in Korsakoff's amnesia

    NARCIS (Netherlands)

    Oudman, Erik; Van der Stigchel, Stefan; Wester, Arie J.; Kessels, Roy P. C.; Postma, Albert

    Implicit contextual learning is the ability to acquire contextual information from our surroundings without conscious awareness. Such contextual information facilitates the localization of objects in space. In a typical implicit contextual learning paradigm, subjects need to find a target among a

  20. Intact memory for implicit contextual information in Korsakoff's amnesia

    NARCIS (Netherlands)

    Oudman, E.; Stigchel, S. van der; Wester, A.J.; Kessels, R.P.C.; Postma, A.

    2011-01-01

    Implicit contextual learning is the ability to acquire contextual information from our surroundings without conscious awareness. Such contextual information facilitates the localization of objects in space. In a typical implicit contextual learning paradigm, subjects need to find a target among a

  1. The Contextual Antecedents of Organizational Trust

    DEFF Research Database (Denmark)

    Li, Peter Ping; Bai, Yuntao; Xi, Youmin

    2012-01-01

    In this article we seek to explore the contextual antecedents of organizational trust. In light of the complex links between organizational contexts and organizational behaviours, we focus on the effects of the three most critical contextual antecedents, i.e., leadership role, structural rule...... in China, lent support for our multidimensional cross-level model of context–trust–behaviour link. We extend the research on organizational trust by treating it as a cross-level phenomenon and by specifying its core contextual antecedents and behavioural consequences....

  2. Outsourcing information security

    CERN Document Server

    Axelrod, Warren

    2004-01-01

    This comprehensive and timely resource examines security risks related to IT outsourcing, clearly showing you how to recognize, evaluate, minimize, and manage these risks. Unique in its scope, this single volume offers you complete coverage of the whole range of IT security services and fully treats the IT security concerns of outsourcing. The book helps you deepen your knowledge of the tangible and intangible costs and benefits associated with outsourcing IT and IS functions.

  3. Junos Security

    CERN Document Server

    Cameron, Rob; Giecco, Patricio; Eberhard, Timothy; Quinn, James

    2010-01-01

    Junos® Security is the complete and authorized introduction to the new Juniper Networks SRX hardware series. This book not only provides a practical, hands-on field guide to deploying, configuring, and operating SRX, it also serves as a reference to help you prepare for any of the Junos Security Certification examinations offered by Juniper Networks. Network administrators and security professionals will learn how to use SRX Junos services gateways to address an array of enterprise data network requirements -- including IP routing, intrusion detection, attack mitigation, unified threat manag

  4. Contextual Validity in Hybrid Logic

    DEFF Research Database (Denmark)

    Blackburn, Patrick Rowan; Jørgensen, Klaus Frovin

    2013-01-01

    interpretations. Moreover, such indexicals give rise to a special kind of validity—contextual validity—that interacts with ordinary logi- cal validity in interesting and often unexpected ways. In this paper we model these interactions by combining standard techniques from hybrid logic with insights from the work...... of Hans Kamp and David Kaplan. We introduce a simple proof rule, which we call the Kamp Rule, and first we show that it is all we need to take us from logical validities involving now to contextual validities involving now too. We then go on to show that this deductive bridge is strong enough to carry us...... to contextual validities involving yesterday, today and tomorrow as well....

  5. THE SECURITY AUDIT WITHIN INFORMATION SYSTEMS

    OpenAIRE

    Dan Constantin TOFAN

    2011-01-01

    The information security audit is definitely a tool for determining, achieving, and maintaining a proper level of security in an organization. This article offers a comprehensive review of the world's most popular standards related to information systems security audit.

  6. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  7. China's energy security: Perception and reality

    International Nuclear Information System (INIS)

    Leung, Guy C.K.

    2011-01-01

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: → Oil is the form of energy that has produced most of China's energy insecurity. → Transport sector, rather than industry, is the largest driver of China's oil demand. → The contribution of oil pipelines to China's energy security is smaller than many assumed. → Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. → Energy security is a means; it is not a goal.

  8. Initial Public Offering – Finance Source of Stock

    Directory of Open Access Journals (Sweden)

    Sorin Claudiu Radu

    2013-10-01

    Full Text Available Capital market offers a wide range of options for financing companies, which can be tailored to meet their exact needs. Thus, they have the opportunity of primary security sale (shares and bonds on the stock exchange, which may take place through a tender, in which case the financial instruments issued by a company are underwritten at the date of issue, or through a secondary offer, in which case they are issued and offered for sale by the issuer. If the public sale offer focuses on shares and aims at transforming the issuing company into a public one, then it bears the name of IPO (Initial Public Offering. The present work aims for the evolution of IPO trends on the European market in the aftermath of the global crisis outbreak. The market of IPO carried out by BSE is also analyzed herewith.

  9. Is there contextuality in behavioural and social systems?

    Science.gov (United States)

    Dzhafarov, E N; Zhang, Ru; Kujala, Janne

    2016-01-13

    Most behavioural and social experiments aimed at revealing contextuality are confined to cyclic systems with binary outcomes. In quantum physics, this broad class of systems includes as special cases Klyachko-Can-Binicioglu-Shumovsky-type, Einstein-Podolsky-Rosen-Bell-type and Suppes-Zanotti-Leggett-Garg-type systems. The theory of contextuality known as contextuality-by-default allows one to define and measure contextuality in all such systems, even if there are context-dependent errors in measurements, or if something in the contexts directly interacts with the measurements. This makes the theory especially suitable for behavioural and social systems, where direct interactions of 'everything with everything' are ubiquitous. For cyclic systems with binary outcomes, the theory provides necessary and sufficient conditions for non-contextuality, and these conditions are known to be breached in certain quantum systems. We review several behavioural and social datasets (from polls of public opinion to visual illusions to conjoint choices to word combinations to psychophysical matching), and none of these data provides any evidence for contextuality. Our working hypothesis is that this may be a broadly applicable rule: behavioural and social systems are non-contextual, i.e. all 'contextual effects' in them result from the ubiquitous dependence of response distributions on the elements of contexts other than the ones to which the response is presumably or normatively directed. © 2015 The Author(s).

  10. 25 CFR 40.4 - Security.

    Science.gov (United States)

    2010-04-01

    ... 25 Indians 1 2010-04-01 2010-04-01 false Security. 40.4 Section 40.4 Indians BUREAU OF INDIAN AFFAIRS, DEPARTMENT OF THE INTERIOR EDUCATION ADMINISTRATION OF EDUCATIONAL LOANS, GRANTS AND OTHER ASSISTANCE FOR HIGHER EDUCATION § 40.4 Security. If a borrower or cosigner has security to offer for an...

  11. Postgraduates courses offered to nursing

    Directory of Open Access Journals (Sweden)

    Pedro Jorge Araujo

    2011-07-01

    Full Text Available Aim: To know the official masters that the Spanish Universities have offered during the academic course 2010/2011.Material and methods: Descriptive observational and transversal court study, in which it has analysed 170 university official masters and in which it has used a questionnaire with a total of 15 questions elaborated for this work.Results: 52 Spanish Universities of the 75 that there is have offered during the academic course 2010/2011 official masters that can realise for graduated in infirmary. By areas, the official masters more offered have been the ones of nutrition and alimentary security. 76,33% of the official masters have a length of 1 academic year. Almost the half of the official masters have an orientation researcher-professional and almost 40% researcher. 62,65% of the masters give of face-to-face way. In 52,1% of the official masters do not realise external practices and 86,2% has continuity with the doctorate.Conclusions: It has seen that it is necessary that expand the number of masters including other fields of study that contribute to a main specialisation of the professionals of the infirmary. An important percentage of official masters give in face-to-face modality, and there is very few offered on-line or to distance.

  12. Quality assurance programs from laboratories offering radiological protection services

    International Nuclear Information System (INIS)

    Marrero Garcia, M.; Prendes Alonso, M.; Jova Sed, L.; Morales Monzon, J.A.

    1998-01-01

    The implementation of an adequate program for quality assurance in institutions servicing radiological protection programs will become an additional tool to achieve security targets included in that program. All scientific and technical services offered by CPHR employ quality assurance systems

  13. Web Services Security - Implementation and Evaluation Issues

    Science.gov (United States)

    Pimenidis, Elias; Georgiadis, Christos K.; Bako, Peter; Zorkadis, Vassilis

    Web services development is a key theme in the utilization the commercial exploitation of the semantic web. Paramount to the development and offering of such services is the issue of security features and they way these are applied in instituting trust amongst participants and recipients of the service. Implementing such security features is a major challenge to developers as they need to balance these with performance and interoperability requirements. Being able to evaluate the level of security offered is a desirable feature for any prospective participant. The authors attempt to address the issues of security requirements and evaluation criteria, while they discuss the challenges of security implementation through a simple web service application case.

  14. A Teaching-Learning Sequence for the Special Relativity Theory at High School Level Historically and Epistemologically Contextualized

    Science.gov (United States)

    Arriassecq, Irene; Greca, Ileana Maria

    2012-01-01

    This paper discusses some topics that stem from recent contributions made by the History, the Philosophy, and the Didactics of Science. We consider these topics relevant to the introduction of the Special Relativity Theory (SRT) in high school within a contextualized approach. We offer an outline of a teaching-learning sequence dealing with the…

  15. Development of a compassion-focused and contextual behavioural environment and validation of the Therapeutic Environment Scales (TESS).

    Science.gov (United States)

    Veale, David; Miles, Sarah; Naismith, Iona; Pieta, Maria; Gilbert, Paul

    2016-02-01

    Aims and method The aims of the study were to develop a scale sensitive enough to measure the interpersonal processes within a therapeutic environment, and to explore whether the new scale was sensitive enough to detect differences between settings, including a community based on compassionate mind and contextual behaviourism. The Therapeutic Environment Scales (TESS) were validated with 81 participants in three different settings: a specialist service for anxiety disorders, a specialist in-patient ward and a psychodynamic therapeutic community. Results TESS was found to be reliable and valid. Significant differences were seen between the services on the dimensions of compassion, belongingness, feeling safe, positive reinforcement of members' acts of courage, extinction and accommodation of unhelpful behaviours, inconsistency and high expressed emotion. These processes were over time associated with improved outcomes on a specialist service for anxiety disorders. Clinical implications The TESS offers a first step in exploring important interpersonal relationships in therapeutic environments and communities. An environment based on a compassionate mind and contextual behaviourism offers promise for the running of a therapeutic community.

  16. Contextual factors and effective school improvement

    NARCIS (Netherlands)

    Sun, Hechuan; Creemers, Bert P. M.; de Jong, Rob

    This research provides policy-makers, researchers, and educators at all levels with a glimpse of the contextual influence on effective school improvement (ESI) in 8 European countries. What are the factors at the contextual level, particularly at the national level, which influence ESI? Are there

  17. Statistical security for Social Security.

    Science.gov (United States)

    Soneji, Samir; King, Gary

    2012-08-01

    The financial viability of Social Security, the single largest U.S. government program, depends on accurate forecasts of the solvency of its intergenerational trust fund. We begin by detailing information necessary for replicating the Social Security Administration's (SSA's) forecasting procedures, which until now has been unavailable in the public domain. We then offer a way to improve the quality of these procedures via age- and sex-specific mortality forecasts. The most recent SSA mortality forecasts were based on the best available technology at the time, which was a combination of linear extrapolation and qualitative judgments. Unfortunately, linear extrapolation excludes known risk factors and is inconsistent with long-standing demographic patterns, such as the smoothness of age profiles. Modern statistical methods typically outperform even the best qualitative judgments in these contexts. We show how to use such methods, enabling researchers to forecast using far more information, such as the known risk factors of smoking and obesity and known demographic patterns. Including this extra information makes a substantial difference. For example, by improving only mortality forecasting methods, we predict three fewer years of net surplus, $730 billion less in Social Security Trust Funds, and program costs that are 0.66% greater for projected taxable payroll by 2031 compared with SSA projections. More important than specific numerical estimates are the advantages of transparency, replicability, reduction of uncertainty, and what may be the resulting lower vulnerability to the politicization of program forecasts. In addition, by offering with this article software and detailed replication information, we hope to marshal the efforts of the research community to include ever more informative inputs and to continue to reduce uncertainties in Social Security forecasts.

  18. Facets of contextual realism in quantum mechanics

    International Nuclear Information System (INIS)

    Pan, Alok Kumar; Home, Dipankar

    2011-01-01

    In recent times, there is an upsurge of interest in demonstrating the quantum contextuality. In this proceedings, we explore the two different forms of arguments that have been used for showing the contextual character of quantum mechanics. First line of study concerns the violations of the noncontextual realist models by quantum mechanics, where second line of study that is qualitatively distinct from the earlier one, demonstrates the contextuality within the formalism of quantum mechanics.

  19. Communication Games Reveal Preparation Contextuality

    Science.gov (United States)

    Hameedi, Alley; Tavakoli, Armin; Marques, Breno; Bourennane, Mohamed

    2017-12-01

    A communication game consists of distributed parties attempting to jointly complete a task with restricted communication. Such games are useful tools for studying limitations of physical theories. A theory exhibits preparation contextuality whenever its predictions cannot be explained by a preparation noncontextual model. Here, we show that communication games performed in operational theories reveal the preparation contextuality of that theory. For statistics obtained in a particular family of communication games, we show a direct correspondence with correlations in spacelike separated events obeying the no-signaling principle. Using this, we prove that all mixed quantum states of any finite dimension are preparation contextual. We report on an experimental realization of a communication game involving three-level quantum systems from which we observe a strong violation of the constraints of preparation noncontextuality.

  20. Contemporary security management

    CERN Document Server

    Fay, John

    2010-01-01

    Contemporary Security Management, 3rd Edition teaches security professionals how to operate an efficient security department and how to integrate smoothly with other groups inside and outside their own organizations. Fay demonstrates the specifics of security management: * how to organize, plan, develop and manage a security operation. * how to identify vulnerabilities. * how to determine the protective resources required to offset threats. * how to implement all necessary physical and IT security measures. Security professionals share the responsibility for mitigating damage, serving as a resource to an Emergency Tactical Center, assisting the return of business continuity, and liaising with local response agencies such as police and fire departments, emergency medical responders, and emergency warning centers. At the organizational level, the book addresses budgeting, employee performance, counseling, hiring and termination, employee theft and other misconduct, and offers sound advice on building constructi...

  1. 17 CFR 239.41 - Form F-80, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.41 Section 239.41 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-80 may be used for...

  2. 17 CFR 239.38 - Form F-8, for registration under the Securities Act of 1933 of securities of certain Canadian...

    Science.gov (United States)

    2010-04-01

    ... completed fiscal years immediately prior to the business combination, when combined with the listing history... offers or a business combination. 239.38 Section 239.38 Commodity and Securities Exchanges SECURITIES AND... issuers to be issued in exchange offers or a business combination. (a) Form F-8 may be used for...

  3. Contextual Hub Analysis Tool (CHAT): A Cytoscape app for identifying contextually relevant hubs in biological networks.

    Science.gov (United States)

    Muetze, Tanja; Goenawan, Ivan H; Wiencko, Heather L; Bernal-Llinares, Manuel; Bryan, Kenneth; Lynn, David J

    2016-01-01

    Highly connected nodes (hubs) in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT), which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed) than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest. CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store ( http://apps.cytoscape.org/apps/chat).

  4. The transfer of Cfunc contextual control through equivalence relations.

    Science.gov (United States)

    Perez, William F; Fidalgo, Adriana P; Kovac, Roberta; Nico, Yara C

    2015-05-01

    Derived relational responding is affected by contextual stimuli (Cfunc) that select specific stimulus functions. The present study investigated the transfer of Cfunc contextual control through equivalence relations by evaluating both (a) the maintenance of Cfunc contextual control after the expansion of a relational network, and (b) the establishment of novel contextual stimuli by the transfer of Cfunc contextual control through equivalence relations. Initially, equivalence relations were established and contingencies were arranged so that colors functioned as Cfunc stimuli controlling participants' key-pressing responses in the presence of any stimulus from a three-member equivalence network. To investigate the first research question, the three-member equivalence relations were expanded to five members and the novel members were presented with the Cfunc stimuli in the key-pressing task. To address the second goal of this study, the colors (Cfunc) were established as equivalent to certain line patterns. The transfer of contextual cue function (Cfunc) was tested replacing the colored backgrounds with line patterns in the key-pressing task. Results suggest that the Cfunc contextual control was transferred to novel stimuli that were added to the relational network. In addition, the line patterns indirectly acquired the contextual cue function (Cfunc) initially established for the colored backgrounds. The conceptual and applied implications of Cfunc contextual control are discussed. © Society for the Experimental Analysis of Behavior.

  5. Contextual Sensing: Integrating Contextual Information with Human and Technical Geo-Sensor Information for Smart Cities.

    Science.gov (United States)

    Sagl, Günther; Resch, Bernd; Blaschke, Thomas

    2015-07-14

    In this article we critically discuss the challenge of integrating contextual information, in particular spatiotemporal contextual information, with human and technical sensor information, which we approach from a geospatial perspective. We start by highlighting the significance of context in general and spatiotemporal context in particular and introduce a smart city model of interactions between humans, the environment, and technology, with context at the common interface. We then focus on both the intentional and the unintentional sensing capabilities of today's technologies and discuss current technological trends that we consider have the ability to enrich human and technical geo-sensor information with contextual detail. The different types of sensors used to collect contextual information are analyzed and sorted into three groups on the basis of names considering frequently used related terms, and characteristic contextual parameters. These three groups, namely technical in situ sensors, technical remote sensors, and human sensors are analyzed and linked to three dimensions involved in sensing (data generation, geographic phenomena, and type of sensing). In contrast to other scientific publications, we found a large number of technologies and applications using in situ and mobile technical sensors within the context of smart cities, and surprisingly limited use of remote sensing approaches. In this article we further provide a critical discussion of possible impacts and influences of both technical and human sensing approaches on society, pointing out that a larger number of sensors, increased fusion of information, and the use of standardized data formats and interfaces will not necessarily result in any improvement in the quality of life of the citizens of a smart city. This article seeks to improve our understanding of technical and human geo-sensing capabilities, and to demonstrate that the use of such sensors can facilitate the integration of different

  6. Contextual Sensing: Integrating Contextual Information with Human and Technical Geo-Sensor Information for Smart Cities

    Science.gov (United States)

    Sagl, Günther; Resch, Bernd; Blaschke, Thomas

    2015-01-01

    In this article we critically discuss the challenge of integrating contextual information, in particular spatiotemporal contextual information, with human and technical sensor information, which we approach from a geospatial perspective. We start by highlighting the significance of context in general and spatiotemporal context in particular and introduce a smart city model of interactions between humans, the environment, and technology, with context at the common interface. We then focus on both the intentional and the unintentional sensing capabilities of today’s technologies and discuss current technological trends that we consider have the ability to enrich human and technical geo-sensor information with contextual detail. The different types of sensors used to collect contextual information are analyzed and sorted into three groups on the basis of names considering frequently used related terms, and characteristic contextual parameters. These three groups, namely technical in situ sensors, technical remote sensors, and human sensors are analyzed and linked to three dimensions involved in sensing (data generation, geographic phenomena, and type of sensing). In contrast to other scientific publications, we found a large number of technologies and applications using in situ and mobile technical sensors within the context of smart cities, and surprisingly limited use of remote sensing approaches. In this article we further provide a critical discussion of possible impacts and influences of both technical and human sensing approaches on society, pointing out that a larger number of sensors, increased fusion of information, and the use of standardized data formats and interfaces will not necessarily result in any improvement in the quality of life of the citizens of a smart city. This article seeks to improve our understanding of technical and human geo-sensing capabilities, and to demonstrate that the use of such sensors can facilitate the integration of different

  7. Contextual Factors in Adolescent Substance Use.

    Science.gov (United States)

    Hochhauser, Mark; And Others

    Research on adolescent substance use has focused on prevalence and incidence; however, contextual factors have been largely ignored. A survey of 155 adolescents from a Minneapolis suburb was conducted to assess contextual factors affecting adolescent substance use. Subjects reported their use of alcohol, cigarettes, and marihuana with respect to…

  8. Contextual Cueing Effects across the Lifespan

    Science.gov (United States)

    Merrill, Edward C.; Conners, Frances A.; Roskos, Beverly; Klinger, Mark R.; Klinger, Laura Grofer

    2013-01-01

    The authors evaluated age-related variations in contextual cueing, which reflects the extent to which visuospatial regularities can facilitate search for a target. Previous research produced inconsistent results regarding contextual cueing effects in young children and in older adults, and no study has investigated the phenomenon across the life…

  9. Resilient Infrastructure and Building Security

    DEFF Research Database (Denmark)

    Ingwar, Mads Ingerslew

    inference. Persistent authentication offers an effective integrated protection measure that is distributed directly in the facility and is non-intrusive to the public and affordable to the facility owners. Persistent authentication is suitable for security sensitive applications and can help protect...... to authentication that combines traditional access control systems with the sensing technologies and tracking capabilities offered by smart environments. Our approach is called Persistent Authentication for Location-based Services. Persistent authentication enables the secure provision of location-based services...

  10. Using the Contextual Hub Analysis Tool (CHAT) in Cytoscape to Identify Contextually Relevant Network Hubs.

    Science.gov (United States)

    Muetze, Tanja; Lynn, David J

    2017-09-13

    Highly connected nodes in biological networks are called network hubs. Hubs are topologically important to the structure of the network and have been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we provide a step-by-step protocol for using the Contextual Hub Analysis Tool (CHAT), an application within Cytoscape 3, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene or protein expression data, and identify hub nodes that are more highly connected to contextual nodes than expected by chance. © 2017 by John Wiley & Sons, Inc. Copyright © 2017 John Wiley & Sons, Inc.

  11. Security and SCADA protocols

    International Nuclear Information System (INIS)

    Igure, V. M.; Williams, R. D.

    2006-01-01

    Supervisory control and data acquisition (SCADA) networks have replaced discrete wiring for many industrial processes, and the efficiency of the network alternative suggests a trend toward more SCADA networks in the future. This paper broadly considers SCADA to include distributed control systems (DCS) and digital control systems. These networks offer many advantages, but they also introduce potential vulnerabilities that can be exploited by adversaries. Inter-connectivity exposes SCADA networks to many of the same threats that face the public internet and many of the established defenses therefore show promise if adapted to the SCADA differences. This paper provides an overview of security issues in SCADA networks and ongoing efforts to improve the security of these networks. Initially, a few samples from the range of threats to SCADA network security are offered. Next, attention is focused on security assessment of SCADA communication protocols. Three challenges must be addressed to strengthen SCADA networks. Access control mechanisms need to be introduced or strengthened, improvements are needed inside of the network to enhance security and network monitoring, and SCADA security management improvements and policies are needed. This paper discusses each of these challenges. This paper uses the Profibus protocol as an example to illustrate some of the vulnerabilities that arise within SCADA networks. The example Profibus security assessment establishes a network model and an attacker model before proceeding to a list of example attacks. (authors)

  12. Contextual modulation and stimulus selectivity in extrastriate cortex.

    Science.gov (United States)

    Krause, Matthew R; Pack, Christopher C

    2014-11-01

    Contextual modulation is observed throughout the visual system, using techniques ranging from single-neuron recordings to behavioral experiments. Its role in generating feature selectivity within the retina and primary visual cortex has been extensively described in the literature. Here, we describe how similar computations can also elaborate feature selectivity in the extrastriate areas of both the dorsal and ventral streams of the primate visual system. We discuss recent work that makes use of normalization models to test specific roles for contextual modulation in visual cortex function. We suggest that contextual modulation renders neuronal populations more selective for naturalistic stimuli. Specifically, we discuss contextual modulation's role in processing optic flow in areas MT and MST and for representing naturally occurring curvature and contours in areas V4 and IT. We also describe how the circuitry that supports contextual modulation is robust to variations in overall input levels. Finally, we describe how this theory relates to other hypothesized roles for contextual modulation. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. Contextual Autism

    DEFF Research Database (Denmark)

    Raahauge, Kirsten Marie

    2009-01-01

    This project deals with the notion of ghost anthropologically and artistic. The contextual autism of ghosting reveals itself as a sensation of in-betweeness in art as well as in everyday life. The ghost is not easily defined; as Jacques Derrida states in Spectres of Marx (1993/1994) about...

  14. Intercorporate Security Event Correlation

    Directory of Open Access Journals (Sweden)

    D. O. Kovalev

    2010-03-01

    Full Text Available Security controls are prone to false positives and false negatives which can lead to unwanted reputation losses for the bank. The reputational database within the security operations center (SOC and intercorporate correlation of security events are offered as a solution to increase attack detection fidelity. The theses introduce the definition and structure of the reputation, architectures of reputational exchange and the place of intercorporate correlation in overall SOC correlation analysis.

  15. On Contextuality.

    Science.gov (United States)

    Thayer-Bacon, Barbara J.

    This exploration of what feminism has to contribute to pragmatism, and vice versa, considers the idea of contextuality through an examination of the role of current pragmatists, such as Cornel West and Richard Rorty, and current feminists, including Charlene Haddock Siegfried, Maxine Greene, and Seyla Benhabib. To set the stage historically for…

  16. Competing definitions of contextual environments

    Directory of Open Access Journals (Sweden)

    Jerrett Michael

    2006-12-01

    Full Text Available Abstract Background The growing interest in the effects of contextual environments on health outcomes has focused attention on the strengths and weaknesses of alternate contextual unit definitions for use in multilevel analysis. The present research examined three methods to define contextual units for a sample of children already enrolled in a respiratory health study. The Inclusive Equal Weights Method (M1 and Inclusive Sample Weighted Method (M2 defined communities using the boundaries of the census blocks that incorporated the residences of the CHS participants, except that the former estimated socio-demographic variables by averaging the census block data within each community, while the latter used weighted proportion of CHS participants per block. The Minimum Bounding Rectangle Method (M3 generated minimum bounding rectangles that included 95% of the CHS participants and produced estimates of census variables using the weighted proportion of each block within these rectangles. GIS was used to map the locations of study participants, define the boundaries of the communities where study participants reside, and compute estimates of socio-demographic variables. The sensitivity of census variable estimates to the choice of community boundaries and weights was assessed using standard tests of significance. Results The estimates of contextual variables vary significantly depending on the choice of neighborhood boundaries and weights. The choice of boundaries therefore shapes the community profile and the relationships between its components (variables. Conclusion Multilevel analysis concerned with the effects of contextual environments on health requires careful consideration of what constitutes a contextual unit for a given study sample, because the alternate definitions may have differential impact on the results. The three alternative methods used in this research all carry some subjectivity, which is embedded in the decision as to what

  17. Does Contextual Cueing Guide the Deployment of Attention?

    Science.gov (United States)

    Kunar, Melina A.; Flusberg, Stephen; Horowitz, Todd S.; Wolfe, Jeremy M.

    2008-01-01

    Contextual cueing experiments show that when displays are repeated, reaction times (RTs) to find a target decrease over time even when observers are not aware of the repetition. It has been thought that the context of the display guides attention to the target. We tested this hypothesis by comparing the effects of guidance in a standard search task to the effects of contextual cueing. Firstly, in standard search, an improvement in guidance causes search slopes (derived from RT × Set Size functions) to decrease. In contrast, we found that search slopes in contextual cueing did not become more efficient over time (Experiment 1). Secondly, when guidance is optimal (e.g. in easy feature search) we still found a small, but reliable contextual cueing effect (Experiments 2a and 2b), suggesting that other factors, such as response selection, contribute to the effect. Experiment 3 supported this hypothesis by showing that the contextual cueing effect disappeared when we added interference to the response selection process. Overall, our data suggest that the relationship between guidance and contextual cueing is weak and that response selection can account for part of the effect. PMID:17683230

  18. Security Administrator Street Smarts A Real World Guide to CompTIA Security+ Skills

    CERN Document Server

    Miller, David R

    2011-01-01

    A step-by-step guide to the tasks involved in security administration If you aspire to a career in security administration, one of your greatest challenges will be gaining hands-on experience. This book takes you through the most common security admin tasks step by step, showing you the way around many of the roadblocks you can expect on the job. It offers a variety of scenarios in each phase of the security administrator's job, giving you the confidence of first-hand experience. In addition, this is an ideal complement to the brand-new, bestselling CompTIA Security+ Study Guide, 5th Edition o

  19. The Key to School Security.

    Science.gov (United States)

    Hotle, Dan

    1993-01-01

    In addition to legislative accessibility requirements, other security issues facing school administrators who select a security system include the following: access control; user friendliness; durability or serviceability; life safety precautions; possibility of vandalism, theft, and tampering; and key control. Offers steps to take in considering…

  20. Interaction between scene-based and array-based contextual cueing.

    Science.gov (United States)

    Rosenbaum, Gail M; Jiang, Yuhong V

    2013-07-01

    Contextual cueing refers to the cueing of spatial attention by repeated spatial context. Previous studies have demonstrated distinctive properties of contextual cueing by background scenes and by an array of search items. Whereas scene-based contextual cueing reflects explicit learning of the scene-target association, array-based contextual cueing is supported primarily by implicit learning. In this study, we investigated the interaction between scene-based and array-based contextual cueing. Participants searched for a target that was predicted by both the background scene and the locations of distractor items. We tested three possible patterns of interaction: (1) The scene and the array could be learned independently, in which case cueing should be expressed even when only one cue was preserved; (2) the scene and array could be learned jointly, in which case cueing should occur only when both cues were preserved; (3) overshadowing might occur, in which case learning of the stronger cue should preclude learning of the weaker cue. In several experiments, we manipulated the nature of the contextual cues present during training and testing. We also tested explicit awareness of scenes, scene-target associations, and arrays. The results supported the overshadowing account: Specifically, scene-based contextual cueing precluded array-based contextual cueing when both were predictive of the location of a search target. We suggest that explicit, endogenous cues dominate over implicit cues in guiding spatial attention.

  1. Lecture 2: Software Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture addresses the following question: how to create secure software? The lecture starts with a definition of computer security and an explanation of why it is so difficult to achieve. It then introduces the main security principles (like least-privilege, or defense-in-depth) and discusses security in different phases of the software development cycle. The emphasis is put on the implementation part: most common pitfalls and security bugs are listed, followed by advice on best practice for security development, testing and deployment. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and ...

  2. Microsoft Windows Security Essentials

    CERN Document Server

    Gibson, Darril

    2011-01-01

    Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand approach to Windows security risks and attacks for newcomers to the world of IT. By paring down to just the essentials, beginners gain a solid foundation of security concepts upon which more advanced topics and technologies can be built. This straightforward guide begins each chapter by laying out a list of topics to be discussed,

  3. Cyber Security--Are You Prepared?

    Science.gov (United States)

    Newman, Scott

    2007-01-01

    During the summer 2002 term, Oklahoma State University-Okmulgee's Information Technologies Division offered a one credit-hour network security course--which barely had adequate student interest to meet the institution's enrollment requirements. Today, OSU-Okmulgee boasts one of the nation's premier cyber security programs. Many prospective…

  4. Chronic fluoxetine dissociates contextual from auditory fear memory.

    Science.gov (United States)

    Sanders, Jeff; Mayford, Mark

    2016-10-06

    Fluoxetine is a medication used to treat Major Depressive Disorder and other psychiatric conditions. These experiments studied the effects of chronic fluoxetine treatment on the contextual versus auditory fear memory of mice. We found that chronic fluoxetine treatment of adult mice impaired their contextual fear memory, but spared auditory fear memory. Hippocampal perineuronal nets, which are involved in contextual fear memory plasticity, were unaltered by fluoxetine treatment. These data point to a selective inability to form contextual fear memory as a result of fluoxetine treatment, and they suggest that a blunting of hippocampal-mediated aversive memory may be a therapeutic action for this medication. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  5. Improving Acquisition Outcomes with Contextual Ambidexterity

    DEFF Research Database (Denmark)

    Meglio, Olimpia; King, David R.; Risberg, Annette

    2015-01-01

    The results of research on mergers and acquisitions often point to a need to improve acquisition outcomes and lessen the organizational turmoil that can often follow integration efforts. We assert that viewing acquisition integration through the lens of contextual ambidexterity may improve...... acquisition outcomes in two ways: by providing an integrated solution to the economic and social tensions in acquisitions, and by enabling managers to effectively confront the competing needs of task and human integration. We also posit that by building on contextual ambidexterity, we can extend...... the possibilities for both research and practice regarding task and human integration in acquisitions. We also emphasize the role of an integration manager and integration mechanisms in enabling contextual ambidexterity for successful acquisition integration. Finally, we identify implications for research...

  6. A New Secure Pairing Protocol using Biometrics

    NARCIS (Netherlands)

    Buhan, I.R.

    2008-01-01

    Secure Pairing enables two devices, which share no prior context with each other, to agree upon a security association that they can use to protect their subsequent communication. Secure pairing offers guarantees of the association partner identity and it should be resistant to eavesdropping or to a

  7. SMS security system for smart home detectors

    OpenAIRE

    Cekova, Katerina; Gelev, Saso

    2016-01-01

    Security has always been an important problem everywhere. Home security has been a major issue where crime is increasing and everybody wants home security to protect the home. Safety from theft and flame are the most important requirements of a home security system for people. A remote home security system offers many benefits from keeping homeowners, and their property safe. This paper present controlling of the home security system remotely from Android Application. Owners can turn on or...

  8. Testing quantum contextuality. The problem of compatibility

    International Nuclear Information System (INIS)

    Szangolies, Jochen

    2015-01-01

    Jochen Szangolies contributes a novel way of dealing with the problem of the experimental testability of the Kochen-Specker theorem posed by realistic, that is, noisy, measurements. Such noise spoils perfect compatibility between successive measurements, which however is a necessary requirement to test the notion of contextuality in usual approaches. To overcome this difficulty, a new, extended notion of contextuality that reduces to Kochen-Specker contextuality in the limit of perfect measurement implementations is proposed by the author, together with a scheme to test this notion experimentally. Furthermore, the behaviour of these tests under realistic noise conditions is investigated.

  9. Linear contextual modal type theory

    DEFF Research Database (Denmark)

    Schack-Nielsen, Anders; Schürmann, Carsten

    Abstract. When one implements a logical framework based on linear type theory, for example the Celf system [?], one is immediately con- fronted with questions about their equational theory and how to deal with logic variables. In this paper, we propose linear contextual modal type theory that gives...... a mathematical account of the nature of logic variables. Our type theory is conservative over intuitionistic contextual modal type theory proposed by Nanevski, Pfenning, and Pientka. Our main contributions include a mechanically checked proof of soundness and a working implementation....

  10. Hierarchical acquisition of visual specificity in spatial contextual cueing.

    Science.gov (United States)

    Lie, Kin-Pou

    2015-01-01

    Spatial contextual cueing refers to visual search performance's being improved when invariant associations between target locations and distractor spatial configurations are learned incidentally. Using the instance theory of automatization and the reverse hierarchy theory of visual perceptual learning, this study explores the acquisition of visual specificity in spatial contextual cueing. Two experiments in which detailed visual features were irrelevant for distinguishing between spatial contexts found that spatial contextual cueing was visually generic in difficult trials when the trials were not preceded by easy trials (Experiment 1) but that spatial contextual cueing progressed to visual specificity when difficult trials were preceded by easy trials (Experiment 2). These findings support reverse hierarchy theory, which predicts that even when detailed visual features are irrelevant for distinguishing between spatial contexts, spatial contextual cueing can progress to visual specificity if the stimuli remain constant, the task is difficult, and difficult trials are preceded by easy trials. However, these findings are inconsistent with instance theory, which predicts that when detailed visual features are irrelevant for distinguishing between spatial contexts, spatial contextual cueing will not progress to visual specificity. This study concludes that the acquisition of visual specificity in spatial contextual cueing is more plausibly hierarchical, rather than instance-based.

  11. Object based implicit contextual learning: a study of eye movements.

    Science.gov (United States)

    van Asselen, Marieke; Sampaio, Joana; Pina, Ana; Castelo-Branco, Miguel

    2011-02-01

    Implicit contextual cueing refers to a top-down mechanism in which visual search is facilitated by learned contextual features. In the current study we aimed to investigate the mechanism underlying implicit contextual learning using object information as a contextual cue. Therefore, we measured eye movements during an object-based contextual cueing task. We demonstrated that visual search is facilitated by repeated object information and that this reduction in response times is associated with shorter fixation durations. This indicates that by memorizing associations between objects in our environment we can recognize objects faster, thereby facilitating visual search.

  12. Social Salience Discriminates Learnability of Contextual Cues in an Artificial Language.

    Science.gov (United States)

    Rácz, Péter; Hay, Jennifer B; Pierrehumbert, Janet B

    2017-01-01

    We investigate the learning of contextual meaning by adults in an artificial language. Contextual meaning here refers to the non-denotative contextual information that speakers attach to a linguistic construction. Through a series of short games, played online, we test how well adults can learn different contextual meanings for a word-formation pattern in an artificial language. We look at whether learning contextual meanings depends on the social salience of the context, whether our players interpret these contexts generally, and whether the learned meaning is generalized to new words. Our results show that adults are capable of learning contextual meaning if the context is socially salient, coherent, and interpretable. Once a contextual meaning is recognized, it is readily generalized to related forms and contexts.

  13. Contextuality under weak assumptions

    International Nuclear Information System (INIS)

    Simmons, Andrew W; Rudolph, Terry; Wallman, Joel J; Pashayan, Hakop; Bartlett, Stephen D

    2017-01-01

    The presence of contextuality in quantum theory was first highlighted by Bell, Kochen and Specker, who discovered that for quantum systems of three or more dimensions, measurements could not be viewed as deterministically revealing pre-existing properties of the system. More precisely, no model can assign deterministic outcomes to the projectors of a quantum measurement in a way that depends only on the projector and not the context (the full set of projectors) in which it appeared, despite the fact that the Born rule probabilities associated with projectors are independent of the context. A more general, operational definition of contextuality introduced by Spekkens, which we will term ‘probabilistic contextuality’, drops the assumption of determinism and allows for operations other than measurements to be considered contextual. Even two-dimensional quantum mechanics can be shown to be contextual under this generalised notion. Probabilistic noncontextuality represents the postulate that elements of an operational theory that cannot be distinguished from each other based on the statistics of arbitrarily many repeated experiments (they give rise to the same operational probabilities) are ontologically identical. In this paper, we introduce a framework that enables us to distinguish between different noncontextuality assumptions in terms of the relationships between the ontological representations of objects in the theory given a certain relation between their operational representations. This framework can be used to motivate and define a ‘possibilistic’ analogue, encapsulating the idea that elements of an operational theory that cannot be unambiguously distinguished operationally can also not be unambiguously distinguished ontologically. We then prove that possibilistic noncontextuality is equivalent to an alternative notion of noncontextuality proposed by Hardy. Finally, we demonstrate that these weaker noncontextuality assumptions are sufficient to prove

  14. Virtual queuing at airport security lanes

    NARCIS (Netherlands)

    Lange, de R.; Samoilovich, I.; Rhee, van der B.

    2013-01-01

    Airports continuously seek opportunities to reduce the security costs without negatively affecting passenger satisfaction. In this paper, we investigate the possibilities of implementing virtual queuing at airport security lanes, by offering some passengers a time window during which they can arrive

  15. EDAS: An Evaluation Prototype for Autonomic Event-Driven Adaptive Security in the Internet of Things

    Directory of Open Access Journals (Sweden)

    Waqas Aman

    2015-07-01

    Full Text Available In Internet of Things (IoT, the main driving technologies are considered to be tiny sensory objects. These objects cannot host traditional preventive and detective technologies to provide protection against the increasing threat sophistication. Furthermore, these solutions are limited to analyzing particular contextual information, for instance network information or files, and do not provide holistic context for risk analysis and response. Analyzing a part of a situation may lead to false alarms and later to unnecessary and incorrect configurations. To overcome these concerns, we proposed an event-driven adaptive security (EDAS model for IoT. EDAS aims to observe security events (changes generated by various things in the monitored IoT environment, investigates any intentional or unintentional risks associated with the events and adapts to it autonomously. It correlates different events in time and space to reduce any false alarms and provides a mechanism to predict attacks before they are realized. Risks are responded to autonomically by utilizing a runtime adaptation ontology. The mitigation action is chosen after assessing essential information, such as the risk faced, user preferences, device capabilities and service requirements. Thus, it selects an optimal mitigation action in a particular adverse situation. The objective of this paper is to investigate EDAS feasibility and its aptitude as a real-world prototype in a remote patient monitoring context. It details how EDAS can be a practical choice for IoT-eHealth in terms of the security, design and implementation features it offers as compared to traditional security controls. We have explained the prototype’s major components and have highlighted the key technical challenges.

  16. Literature Review on Cyber Security Investment Decisions

    OpenAIRE

    ŞENTÜRK, Hakan; ÇİL, Celal Zaim; SAĞIROĞLU, Şeref

    2016-01-01

    Severe financial losses incurred by cyber security attacks with increasing complexity and frequency, as well as booming cyber security sector offering variety of products as investment options have led the focus of the research in the field to the economic dimension of cyber security. The need for determination of methods to be used when making cyber security investment decisions under budget constraints have become prominent. In five sections as the cyber security investment strategies, risk...

  17. Automatic ethics: the effects of implicit assumptions and contextual cues on moral behavior.

    Science.gov (United States)

    Reynolds, Scott J; Leavitt, Keith; DeCelles, Katherine A

    2010-07-01

    We empirically examine the reflexive or automatic aspects of moral decision making. To begin, we develop and validate a measure of an individual's implicit assumption regarding the inherent morality of business. Then, using an in-basket exercise, we demonstrate that an implicit assumption that business is inherently moral impacts day-to-day business decisions and interacts with contextual cues to shape moral behavior. Ultimately, we offer evidence supporting a characterization of employees as reflexive interactionists: moral agents whose automatic decision-making processes interact with the environment to shape their moral behavior.

  18. 3D Bayesian contextual classifiers

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    2000-01-01

    We extend a series of multivariate Bayesian 2-D contextual classifiers to 3-D by specifying a simultaneous Gaussian distribution for the feature vectors as well as a prior distribution of the class variables of a pixel and its 6 nearest 3-D neighbours.......We extend a series of multivariate Bayesian 2-D contextual classifiers to 3-D by specifying a simultaneous Gaussian distribution for the feature vectors as well as a prior distribution of the class variables of a pixel and its 6 nearest 3-D neighbours....

  19. Beyond grid security

    International Nuclear Information System (INIS)

    Hoeft, B; Epting, U; Koenig, T

    2008-01-01

    While many fields relevant to Grid security are already covered by existing working groups, their remit rarely goes beyond the scope of the Grid infrastructure itself. However, security issues pertaining to the internal set-up of compute centres have at least as much impact on Grid security. Thus, this talk will present briefly the EU ISSeG project (Integrated Site Security for Grids). In contrast to groups such as OSCT (Operational Security Coordination Team) and JSPG (Joint Security Policy Group), the purpose of ISSeG is to provide a holistic approach to security for Grid computer centres, from strategic considerations to an implementation plan and its deployment. The generalised methodology of Integrated Site Security (ISS) is based on the knowledge gained during its implementation at several sites as well as through security audits, and this will be briefly discussed. Several examples of ISS implementation tasks at the Forschungszentrum Karlsruhe will be presented, including segregation of the network for administration and maintenance and the implementation of Application Gateways. Furthermore, the web-based ISSeG training material will be introduced. This aims to offer ISS implementation guidance to other Grid installations in order to help avoid common pitfalls

  20. Contextualizing symbol, symbolizing context

    Science.gov (United States)

    Maudy, Septiani Yugni; Suryadi, Didi; Mulyana, Endang

    2017-08-01

    When students learn algebra for the first time, inevitably they are experiencing transition from arithmetic to algebraic thinking. Once students could apprehend this essential mathematical knowledge, they are cultivating their ability in solving daily life problems by applying algebra. However, as we dig into this transitional stage, we identified possible students' learning obstacles to be dealt with seriously in order to forestall subsequent hindrance in studying more advance algebra. We come to realize this recurring problem as we undertook the processes of re-personalization and re-contextualization in which we scrutinize the very basic questions: 1) what is variable, linear equation with one variable and their relationship with the arithmetic-algebraic thinking? 2) Why student should learn such concepts? 3) How to teach those concepts to students? By positioning ourselves as a seventh grade student, we address the possibility of children to think arithmetically when confronted with the problems of linear equation with one variable. To help them thinking algebraically, Bruner's modes of representation developed contextually from concrete to abstract were delivered to enhance their interpretation toward the idea of variables. Hence, from the outset we designed the context for student to think symbolically initiated by exploring various symbols that could be contextualized in order to bridge student traversing the arithmetic-algebraic fruitfully.

  1. Leitura contextual e processamento metalingüístico no português do Brasil: um estudo longitudinal Contextual reading and metalinguistic processing in Brazilian portuguese: a longitudinal study

    Directory of Open Access Journals (Sweden)

    Márcia Maria Peruzzi Elia da Mota

    2012-01-01

    explores the relationship between morphological awareness tasks and Cloze scores through simple correlations and, in the second part, the specificity of such relationship was inquired using multiple regressions. The results give some support to the hypothesis that morphological awareness offers an independent contribution regarding phonological awareness to contextual reading in Brazilian Portuguese.

  2. Computer and information security handbook

    CERN Document Server

    Vacca, John R

    2012-01-01

    The second edition of this comprehensive handbook of computer and information security provides the most complete view of computer security and privacy available. It offers in-depth coverage of security theory, technology, and practice as they relate to established technologies as well as recent advances. It explores practical solutions to many security issues. Individual chapters are authored by leading experts in the field and address the immediate and long-term challenges in the authors' respective areas of expertise. The book is organized into 10 parts comprised of 70 contributed

  3. IMPLEMENTING A STUDENT-CENTERED PEDAGOGY THROUGH THE USE OF INTERESTING AND CULTURALLY CONTEXTUALIZED AUTHENTIC MATERIALS

    OpenAIRE

    Tabitha Kidwell; Hanung Triyoko

    2017-01-01

    The selection and use of appropriate materials is one of the most critical challenges facing English teachers today. In this article, we tell the stories (vignettes) of some of the major challenges we have faced as educators in this regard, and we offer a research base and practical suggestions related to each vignette. Selection of interesting and culturally contextualized authentic materials can go a long way towards creating a student-centered peddagogy. This will help to increase student ...

  4. Who receives cannabis use offers: A general population study of adolescents.

    Science.gov (United States)

    Burdzovic Andreas, Jasmina; Pape, Hilde

    2015-11-01

    Drug use is predicated on a combination of "willingness" and "opportunity". That is, independent of any desire to use drugs, a drug use opportunity is required; be it indirect (i.e., being in a drug-use setting) or direct (i.e., receiving a direct drug offer). However, whether some youth are more likely to encounter such direct drug use opportunities is not fully known. We examined whether certain characteristics placed adolescents at greater risk for being offered cannabis, after accounting for a number of demographic-, contextual-, interpersonal-, and personal-level risk factors. We utilized data from a Norwegian school survey (n=19,309) where the likelihood of receiving cannabis offer in the past year was estimated using logistic regression models. Substantive focus was on the individual and combined effects of personal (i.e., delinquency) and interpersonal (i.e., cannabis-using close friend) risk factors. Separate models were fit for middle- and high-school students. Delinquency was a significant risk factor for receiving cannabis offers, as was a cannabis-using best friend. In addition, peer cannabis use increased the risk of cannabis offers mostly for adolescents on the lower delinquency spectrum, but less so for highly delinquent adolescents. These interaction effects were primarily driven by the middle-school cohort. Cannabis offers were more likely to be extended to youth of certain high-risk profiles. Targeted prevention strategies can therefore be extended to a general profile of younger adolescents with externalizing problems and cannabis-using peers. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  5. Economic foundation and importance of non-state security sector within the national security system

    Directory of Open Access Journals (Sweden)

    Anđelković Slobodan

    2016-01-01

    Full Text Available The main purpose of this paper was to present the causes (for, role (played by and the growing importance of the non-state actors within the national security sector, while analyzing the economic interest of individuals, organizations and the state itself that were favoring such a development. In the course of our research we established how, as the state narrowed its activities down to more vital and more dangerous fields of work, this opened up space for independent contractors to enter those fields which carried less systemic risk. Such change was made possible in the post-Cold War context, when many of the former service members were hired by private companies. The economic motive had a role to play as well, given the need for additional security going beyond what state offered to its citizens, as many doubted the ability (efficiency of state to provide it in the first place; and private sector's willingness to provide it for a price. In Serbia, position of non-state security sector is still very much limited by the traditional notion of security as well as the division of competences, both left-overs from socialist times. This goes against positive tendencies within the sector itself (improvement of types and specialization of the security as service; strengthening of legal regulation; flexibility of services being offered. By conducting its basic service and improving the security of its clients, representatives of non-state security sector are - indirectly - improving the security of society as a whole, ensuring economic stability, which presents one of key national interests.

  6. The (social) construction of information security

    NARCIS (Netherlands)

    Pieters, Wolter

    While the philosophical foundations of information security have been unexamined, there is an implicit philosophy of what protection of information is. This philosophy is based on the notion of containment, taken from analogies with things that offer physical security (e.g., buildings, safes,

  7. Probing contextuality with pre- and post-selection

    International Nuclear Information System (INIS)

    Tollaksen, Jeff

    2007-01-01

    By analyzing the concept of contextuality (Bell-Kochen-Specker) in terms of pre-and-post-selection (PPS), it is possible to assign definite values to observables in a new way. Physical reasons are presented for restrictions on these assignments. When measurements are performed which do not disturb the pre- and post-selection (i.e. weak measurements), then novel experimental aspects of contextuality can be demonstrated including a proof that every PPS-paradox with definite predictions implies contextuality. Certain results of these measurements (eccentric weak values with e.g. negative values outside the spectrum), however, cannot be explained by a 'classical-like' hidden variable theory. Surprising theoretical implications are discussed

  8. 17 CFR 240.14e-2 - Position of subject company with respect to a tender offer.

    Science.gov (United States)

    2010-04-01

    ... disclosing that the subject company: (1) Recommends acceptance or rejection of the bidder's tender offer; (2... accordance with such laws, regulations and policies. (d) Exemption for cross-border tender offers. The... with respect to a tender offer. 240.14e-2 Section 240.14e-2 Commodity and Securities Exchanges...

  9. Security issues in mobile NFC devices

    CERN Document Server

    Roland, Michael

    2015-01-01

    This work provides an assessment of the current state of near field communication (NFC) security, it reports on new attack scenarios, and offers concepts and solutions to overcome any unresolved issues. The work describes application-specific security aspects of NFC based on exemplary use-case scenarios and uses these to focus on the interaction with NFC tags and on card emulation. The current security architectures of NFC-enabled cellular phones are evaluated with regard to the identified security aspects.

  10. Security aspects of database systems implementation

    OpenAIRE

    Pokorný, Tomáš

    2009-01-01

    The aim of this thesis is to provide a comprehensive overview of database systems security. Reader is introduced into the basis of information security and its development. Following chapter defines a concept of database system security using ISO/IEC 27000 Standard. The findings from this chapter form a complex list of requirements on database security. One chapter also deals with legal aspects of this domain. Second part of this thesis offers a comparison of four object-relational database s...

  11. 12 CFR 563g.12 - Securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Securities sale report. 563g.12 Section 563g.12 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.12 Securities sale report. (a) Within 30 days after the first sale of the securities, every six...

  12. Moral contextualism and the problem of triviality

    NARCIS (Netherlands)

    Evers, Daan

    Moral contextualism is the view that claims like ‘A ought to X’ are implicitly relative to some (contextually variable) standard. This leads to a problem: what are fundamental moral claims like ‘You ought to maximize happiness’ relative to? If this claim is relative to a utilitarian standard, then

  13. Moral contextualism and the problem of triviality

    NARCIS (Netherlands)

    Evers, H.W.A.

    2013-01-01

    Moral contextualism is the view that claims like ‘A ought to X’ are implicitly relative to some (contextually variable) standard. This leads to a problem: what are fundamental moral claims like ‘You ought to maximize happiness’ relative to? If the claim is relative to a utilitarian standard, then

  14. Pre- and post-selection, weak values and contextuality

    International Nuclear Information System (INIS)

    Tollaksen, Jeff

    2007-01-01

    By analysing the concept of contextuality (Bell-Kochen-Specker) in terms of pre- and post-selection, it is possible to assign definite values to observables in a new and surprising way. Physical reasons are presented for restrictions on these assignments. When measurements are performed which do not disturb the pre- and post-selection (i.e. weak measurements), then novel experimental aspects of contextuality can be demonstrated. We also prove that every PPS-paradox with definite predictions directly implies 'quantum contextuality' which is introduced as the analogue of contextuality at the level of quantum mechanics rather than at the level of hidden variable theories. Finally, we argue that certain results of these measurements (e.g. eccentric weak values outside the eigenvalue spectrum) cannot be explained by a 'classical-like' hidden variable theory

  15. Information security cost management

    CERN Document Server

    Bazavan, Ioana V

    2006-01-01

    While information security is an ever-present challenge for all types of organizations today, most focus on providing security without addressing the necessities of staff, time, or budget in a practical manner.Information Security Cost Management offers a pragmatic approach to implementing information security, taking budgetary and real-world constraints into consideration. By providing frameworks, step-by-step processes, and project management breakdowns, this book demonstrates how to design the best security strategy with the resources you have available. Organized into five sections, the book-Focuses on setting the right road map so that you can be most effective in your information security implementationsDiscusses cost-effective staffing, the single biggest expense to the security organizationPresents practical ways to build and manage the documentation that details strategy, provides resources for operating annual audits, and illustrates how to advertise accomplishments to senior management effectivelyI...

  16. Viewpoint-independent contextual cueing effect

    Directory of Open Access Journals (Sweden)

    taiga etsuchiai

    2012-06-01

    Full Text Available We usually perceive things in our surroundings as unchanged despite viewpoint changes caused by self-motion. The visual system therefore must have a function to process objects independently of viewpoint. In this study, we examined whether viewpoint-independent spatial layout can be obtained implicitly. For this purpose, we used a contextual cueing effect, a learning effect of spatial layout in visual search displays known to be an implicit effect. We compared the transfer of the contextual cueing effect between cases with and without self-motion by using visual search displays for 3D objects, which changed according to the participant’s assumed location for viewing the stimuli. The contextual cueing effect was obtained with self-motion but disappeared when the display changed without self-motion. This indicates that there is an implicit learning effect in spatial coordinates and suggests that the spatial representation of object layouts or scenes can be obtained and updated implicitly. We also showed that binocular disparity play an important role in the layout representations.

  17. Scene-Based Contextual Cueing in Pigeons

    Science.gov (United States)

    Wasserman, Edward A.; Teng, Yuejia; Brooks, Daniel I.

    2014-01-01

    Repeated pairings of a particular visual context with a specific location of a target stimulus facilitate target search in humans. We explored an animal model of such contextual cueing. Pigeons had to peck a target which could appear in one of four locations on color photographs of real-world scenes. On half of the trials, each of four scenes was consistently paired with one of four possible target locations; on the other half of the trials, each of four different scenes was randomly paired with the same four possible target locations. In Experiments 1 and 2, pigeons exhibited robust contextual cueing when the context preceded the target by 1 s to 8 s, with reaction times to the target being shorter on predictive-scene trials than on random-scene trials. Pigeons also responded more frequently during the delay on predictive-scene trials than on random-scene trials; indeed, during the delay on predictive-scene trials, pigeons predominately pecked toward the location of the upcoming target, suggesting that attentional guidance contributes to contextual cueing. In Experiment 3, involving left-right and top-bottom scene reversals, pigeons exhibited stronger control by global than by local scene cues. These results attest to the robustness and associative basis of contextual cueing in pigeons. PMID:25546098

  18. Contextual Factors for Finding Similar Experts

    DEFF Research Database (Denmark)

    Hofmann, Katja; Balog, Krisztian; Bogers, Toine

    2010-01-01

    -seeking models, are rarely taken into account. In this article, we extend content-based expert-finding approaches with contextual factors that have been found to influence human expert finding. We focus on a task of science communicators in a knowledge-intensive environment, the task of finding similar experts......, given an example expert. Our approach combines expertise-seeking and retrieval research. First, we conduct a user study to identify contextual factors that may play a role in the studied task and environment. Then, we design expert retrieval models to capture these factors. We combine these with content......-based retrieval models and evaluate them in a retrieval experiment. Our main finding is that while content-based features are the most important, human participants also take contextual factors into account, such as media experience and organizational structure. We develop two principled ways of modeling...

  19. Social security reform in two stages

    Directory of Open Access Journals (Sweden)

    Carlos Ranulfo Melo

    2006-01-01

    Full Text Available This article analyzes Brazilian social security reform during the Fernando Henrique and Lula Administrations. After comparing the contexts in which the different Constitutional Amendment proposals (PECs were submitted and the behavior by Members of Congress during the two periods, we argue that a contextual change (namely a switch in places between government and opposition affected the distribution of preferences and resources between the players and impacted the government in the various arenas in which the game was being played, and that as a result the reformist agenda has made more progress under the current Workers' Party administration.

  20. Experimental demonstration of quantum contextuality on an NMR qutrit

    Energy Technology Data Exchange (ETDEWEB)

    Dogra, Shruti; Dorai, Kavita, E-mail: kavita@iisermohali.ac.in; Arvind

    2016-05-20

    We experimentally test quantum contextuality of a single qutrit using NMR. The contextuality inequalities based on nine observables developed by Kurzynski et al. are first reformulated in terms of traceless observables which can be measured in an NMR experiment. These inequalities reveal the contextuality of almost all single-qutrit states. We demonstrate the violation of the inequality on four different initial states of a spin-1 deuterium nucleus oriented in a liquid crystal matrix, and follow the violation as the states evolve in time. We also describe and experimentally perform a single-shot test of contextuality for a subclass of qutrit states whose density matrix is diagonal in the energy basis. - Highlights: • A contextuality inequality for a single qutrit was designed using traceless observables. • The violation of the inequality was experimentally demonstrated using NMR. • A single-shot test was experimentally performed for a subclass of diagonal qutrit states.

  1. Experimental demonstration of quantum contextuality on an NMR qutrit

    International Nuclear Information System (INIS)

    Dogra, Shruti; Dorai, Kavita; Arvind

    2016-01-01

    We experimentally test quantum contextuality of a single qutrit using NMR. The contextuality inequalities based on nine observables developed by Kurzynski et al. are first reformulated in terms of traceless observables which can be measured in an NMR experiment. These inequalities reveal the contextuality of almost all single-qutrit states. We demonstrate the violation of the inequality on four different initial states of a spin-1 deuterium nucleus oriented in a liquid crystal matrix, and follow the violation as the states evolve in time. We also describe and experimentally perform a single-shot test of contextuality for a subclass of qutrit states whose density matrix is diagonal in the energy basis. - Highlights: • A contextuality inequality for a single qutrit was designed using traceless observables. • The violation of the inequality was experimentally demonstrated using NMR. • A single-shot test was experimentally performed for a subclass of diagonal qutrit states.

  2. Validating Domains of Patient Contextual Factors Essential to Preventing Contextual Errors: A Qualitative Study Conducted at Chicago Area Veterans Health Administration Sites.

    Science.gov (United States)

    Binns-Calvey, Amy E; Malhiot, Alex; Kostovich, Carol T; LaVela, Sherri L; Stroupe, Kevin; Gerber, Ben S; Burkhart, Lisa; Weiner, Saul J; Weaver, Frances M

    2017-09-01

    "Patient context" indicates patient circumstances and characteristics or states that are essential to address when planning patient care. Specific patient "contextual factors," if overlooked, result in an inappropriate plan of care, a medical error termed a "contextual error." The myriad contextual factors that constitute patient context have been grouped into broad domains to create a taxonomy of challenges to consider when planning care. This study sought to validate a previously identified list of contextual domains. This qualitative study used directed content analysis. In 2014, 19 Department of Veterans Affairs (VA) providers (84% female) and 49 patients (86% male) from two VA medical centers and four outpatient clinics in the Chicago area participated in semistructured interviews and focus groups. Topics included patient-specific, community, and resource-related factors that affect patients' abilities to manage their care. Transcripts were analyzed with a previously identified list of contextual domains as a framework. Analysis of responses revealed that patients and providers identified the same 10 domains previously published, plus 3 additional ones. Based on comments made by patients and providers, the authors created a revised list of 12 domains from themes that emerged. Six pertain to patient circumstances such as access to care and financial situation, and 6 to patient characteristics/states including skills, abilities, and knowledge. Contextual factors in patients' lives may be essential to address for effective care planning. The rubric developed can serve as a "contextual differential" for clinicians to consider when addressing challenges patients face when planning their care.

  3. Contextuality in canonical systems of random variables

    Science.gov (United States)

    Dzhafarov, Ehtibar N.; Cervantes, Víctor H.; Kujala, Janne V.

    2017-10-01

    Random variables representing measurements, broadly understood to include any responses to any inputs, form a system in which each of them is uniquely identified by its content (that which it measures) and its context (the conditions under which it is recorded). Two random variables are jointly distributed if and only if they share a context. In a canonical representation of a system, all random variables are binary, and every content-sharing pair of random variables has a unique maximal coupling (the joint distribution imposed on them so that they coincide with maximal possible probability). The system is contextual if these maximal couplings are incompatible with the joint distributions of the context-sharing random variables. We propose to represent any system of measurements in a canonical form and to consider the system contextual if and only if its canonical representation is contextual. As an illustration, we establish a criterion for contextuality of the canonical system consisting of all dichotomizations of a single pair of content-sharing categorical random variables. This article is part of the themed issue `Second quantum revolution: foundational questions'.

  4. International Nuclear Security Education Network (INSEN): Promoting nuclear security education

    International Nuclear Information System (INIS)

    Muhamad Samudi Yasir

    2013-01-01

    Full-text: The need for human resource development programmes in nuclear security was underlined at several International Atomic Energy Agency (IAEA) General Conferences and Board of Governors Meetings. Successive IAEA Nuclear Security Plans, the most recent of which was agreed by the Board of Governors in September 2009, give high priority to assisting States in establishing educational programmes in nuclear security in order to ensure the sustainability of nuclear security improvements. The current Nuclear Security Plan 1 covering 2010-2013 emphasizes on the importance of considering existing capacities at international, regional and national levels while designing nuclear security academic programmes. In the course of implementing the Plan, the IAEA developed a guide entitled Educational Programme in Nuclear Security (IAEA Nuclear Security Series No. 12) that consists of a model of a MAster of Science (M.Sc.) and a Certificate Programme in Nuclear Security. This guide was aims at assisting universities or other educational institutes to developed academic programmes in nuclear security. Independently, some universities already offered academic programmes covering some areas of nuclear security, while other universities have asked the IAEA to support the implementation of these programmes. In order to better address current and future request for assistance in this area, the IAEA establish a collaboration network-International Nuclear Security Education Network (INSEN), among universities who are providing nuclear security education or who are interested in starting an academic programme/ course(s) in nuclear security. Universiti Kebangsaan Malaysia (UKM) is a first local university became a member of INSEN since the beginning of the establishment. (author)

  5. Mobile Contextualized learning games for decision support training

    NARCIS (Netherlands)

    Klemke, Roland; Börner, Dirk; Suarez, Angel; Schneider, Jan; Antonaci, Alessandra

    2015-01-01

    This interactive workshop session introduces mobile serious games as situated, contextualized learning games. Example cases for mobile serious games for decision support training are introduced and discussed. Participants will get to know contextualization techniques used in modern mobile

  6. Contextual remapping in visual search after predictable target-location changes.

    Science.gov (United States)

    Conci, Markus; Sun, Luning; Müller, Hermann J

    2011-07-01

    Invariant spatial context can facilitate visual search. For instance, detection of a target is faster if it is presented within a repeatedly encountered, as compared to a novel, layout of nontargets, demonstrating a role of contextual learning for attentional guidance ('contextual cueing'). Here, we investigated how context-based learning adapts to target location (and identity) changes. Three experiments were performed in which, in an initial learning phase, observers learned to associate a given context with a given target location. A subsequent test phase then introduced identity and/or location changes to the target. The results showed that contextual cueing could not compensate for target changes that were not 'predictable' (i.e. learnable). However, for predictable changes, contextual cueing remained effective even immediately after the change. These findings demonstrate that contextual cueing is adaptive to predictable target location changes. Under these conditions, learned contextual associations can be effectively 'remapped' to accommodate new task requirements.

  7. Contextualized personality: traditional and new assessment procedures.

    Science.gov (United States)

    Heller, Daniel; Watson, David; Komar, Jennifer; Min, Ji-A; Perunovic, Wei Qi Elaine

    2007-12-01

    We describe our ongoing program of research related to the assessment of contextualized personality, focusing on social roles and cultural cues as contextual factors. First, we present our research employing the traditional assessment approach, wherein participants are asked to rate explicitly their personality across several different roles. We argue that this hypothetical approach is potentially susceptible to the influence of stereotypes, social desirability, and demand characteristics. We therefore describe the development of three novel and subtle assessment procedures that are based on obtaining online self-representations that are activated while occupying a specific context. Finally, the strengths and limitations of all four approaches, as well as directions for future research in the study of contextualized personality, are discussed.

  8. Stimulus homogeneity enhances implicit learning: evidence from contextual cueing.

    Science.gov (United States)

    Feldmann-Wüstefeld, Tobias; Schubö, Anna

    2014-04-01

    Visual search for a target object is faster if the target is embedded in a repeatedly presented invariant configuration of distractors ('contextual cueing'). It has also been shown that the homogeneity of a context affects the efficiency of visual search: targets receive prioritized processing when presented in a homogeneous context compared to a heterogeneous context, presumably due to grouping processes at early stages of visual processing. The present study investigated in three Experiments whether context homogeneity also affects contextual cueing. In Experiment 1, context homogeneity varied on three levels of the task-relevant dimension (orientation) and contextual cueing was most pronounced for context configurations with high orientation homogeneity. When context homogeneity varied on three levels of the task-irrelevant dimension (color) and orientation homogeneity was fixed, no modulation of contextual cueing was observed: high orientation homogeneity led to large contextual cueing effects (Experiment 2) and low orientation homogeneity led to low contextual cueing effects (Experiment 3), irrespective of color homogeneity. Enhanced contextual cueing for homogeneous context configurations suggest that grouping processes do not only affect visual search but also implicit learning. We conclude that memory representation of context configurations are more easily acquired when context configurations can be processed as larger, grouped perceptual units. However, this form of implicit perceptual learning is only improved by stimulus homogeneity when stimulus homogeneity facilitates grouping processes on a dimension that is currently relevant in the task. Copyright © 2014 Elsevier B.V. All rights reserved.

  9. The Informatics Security Cost of Distributed Applications

    Directory of Open Access Journals (Sweden)

    Ion IVAN

    2010-01-01

    Full Text Available The objective, necessity, means and estimated efficiency of information security cost modeling are presented. The security requirements of distributed informatics applications are determined. Aspects regarding design, development and implementation are established. Influence factors for informatics security are presented and their correlation is analyzed. The costs associated to security processes are studied. Optimal criteria for informatics security are established. The security cost of the informatics application for validating organizational identifiers is determined using theoretical assumptions made for cost models. The conclusions highlight the validity of research results and offer perspectives for future research.

  10. Mobile Contextualized learning games for decision support training

    NARCIS (Netherlands)

    Klemke, Roland

    2014-01-01

    This interactive workshop session introduces mobile serious games as situated, contextualized learning games. Example cases for mobile serious games for decision support training are introduced and discussed. Participants will get to know contextualization techniques used in modern mobile devices

  11. Task-relevant information is prioritized in spatiotemporal contextual cueing.

    Science.gov (United States)

    Higuchi, Yoko; Ueda, Yoshiyuki; Ogawa, Hirokazu; Saiki, Jun

    2016-11-01

    Implicit learning of visual contexts facilitates search performance-a phenomenon known as contextual cueing; however, little is known about contextual cueing under situations in which multidimensional regularities exist simultaneously. In everyday vision, different information, such as object identity and location, appears simultaneously and interacts with each other. We tested the hypothesis that, in contextual cueing, when multiple regularities are present, the regularities that are most relevant to our behavioral goals would be prioritized. Previous studies of contextual cueing have commonly used the visual search paradigm. However, this paradigm is not suitable for directing participants' attention to a particular regularity. Therefore, we developed a new paradigm, the "spatiotemporal contextual cueing paradigm," and manipulated task-relevant and task-irrelevant regularities. In four experiments, we demonstrated that task-relevant regularities were more responsible for search facilitation than task-irrelevant regularities. This finding suggests our visual behavior is focused on regularities that are relevant to our current goal.

  12. The problem of contextuality and the impossibility of experimental metaphysics thereof

    Science.gov (United States)

    Hermens, Ronnie

    Recently a new impulse has been given to the experimental investigation of contextuality. In this paper we show that for a widely used definition of contextuality there can be no decisive experiment on the existence of contextuality. To this end, we give a clear presentation of the hidden variable models due to Meyer, Kent and Clifton (MKC), which would supposedly nullify the Kochen-Specker theorem. Although we disagree with this last statement, the models do play a significant role in the discussion on the meaning of contextuality. In fact, we introduce a specific MKC-model of which we show that it is non-contextual and completely in agreement with quantum mechanical predictions. We also investigate the possibility of other definitions of non-contextuality-with an emphasis on operational definitions-and argue that any useful definition relies on the specification of a theoretical framework. It is therefore concluded that no experimental test can yield any conclusions about contextuality on a metaphysical level.

  13. Remote health monitoring: predicting outcome success based on contextual features for cardiovascular disease.

    Science.gov (United States)

    Alshurafa, Nabil; Eastwood, Jo-Ann; Pourhomayoun, Mohammad; Liu, Jason J; Sarrafzadeh, Majid

    2014-01-01

    Current studies have produced a plethora of remote health monitoring (RHM) systems designed to enhance the care of patients with chronic diseases. Many RHM systems are designed to improve patient risk factors for cardiovascular disease, including physiological parameters such as body mass index (BMI) and waist circumference, and lipid profiles such as low density lipoprotein (LDL) and high density lipoprotein (HDL). There are several patient characteristics that could be determining factors for a patient's RHM outcome success, but these characteristics have been largely unidentified. In this paper, we analyze results from an RHM system deployed in a six month Women's Heart Health study of 90 patients, and apply advanced feature selection and machine learning algorithms to identify patients' key baseline contextual features and build effective prediction models that help determine RHM outcome success. We introduce Wanda-CVD, a smartphone-based RHM system designed to help participants with cardiovascular disease risk factors by motivating participants through wireless coaching using feedback and prompts as social support. We analyze key contextual features that secure positive patient outcomes in both physiological parameters and lipid profiles. Results from the Women's Heart Health study show that health threat of heart disease, quality of life, family history, stress factors, social support, and anxiety at baseline all help predict patient RHM outcome success.

  14. Contextually in a Peres—Mermin square using arbitrary operators

    International Nuclear Information System (INIS)

    Laversanne-Finot, A; Ketterer, A; Coudreau, T; Milman, P; Barros, M R; Walborn, S P; Keller, A

    2016-01-01

    The contextuality of quantum mechanics can be shown by the violation of inequalities based on measurements of well chosen observables. These inequalities have been designed separately for both discrete and continuous variables. Here we unify both strategies by introducing general conditions to demonstrate the contextuality of quantum mechanics from measurements of observables of arbitrary dimensions. Among the consequences of our results is the impossibility of having a maximal violation of contextuality in the Peres-Mermin scenario with discrete observables of odd dimensions. In addition, we show how to construct a large class of observables with a continuous spectrum enabling the realization of contextuality tests both in the Gaussian and non-Gaussian regimes. (paper)

  15. Contextual control over expression of fear is affected by cortisol

    Directory of Open Access Journals (Sweden)

    Vanessa Anna Van Ast

    2012-10-01

    Full Text Available At the core of anxiety disorders is the inability to use contextual information to modulate behavioral responses to potentially threatening events. Models of the pathogenesis of anxiety disorders incorporate stress and concomitant stress hormones as important vulnerability factors, while others emphasize sex as an important factor. However, translational basic research has not yet investigated the effects of stress hormones and sex on the ability to use contextual information to modulate responses to threat. Therefore, the purpose of the present study was threefold: first, we aimed at developing an experimental paradigm specifically capable of capturing contextual modulation of the expression of fear. Second, we tested whether cortisol would alter the contextualization of fear expression. Third, we aimed at assessing whether alterations in contextualization due to cortisol were different for men and women. Healthy participants (n = 42 received placebo or hydrocortisone (20 mg prior to undergoing a newly developed differential contextual fear conditioning paradigm. The results indicated that people rapidly acquire differential contextual modulation of the expression of fear, as measured by fear potentiated startle and skin conductance responses. In addition, cortisol impaired the contextualization of fear expression leading to increased fear generalization on fear potentiated startle data in women. The opposite pattern was found in men. Finally, as assessed by skin conductance responses, cortisol impaired differential conditioning in men. The results are in line with models suggesting heightened vulnerability in women for developing anxiety disorders after stressful events.

  16. Green Secure Processors: Towards Power-Efficient Secure Processor Design

    Science.gov (United States)

    Chhabra, Siddhartha; Solihin, Yan

    With the increasing wealth of digital information stored on computer systems today, security issues have become increasingly important. In addition to attacks targeting the software stack of a system, hardware attacks have become equally likely. Researchers have proposed Secure Processor Architectures which utilize hardware mechanisms for memory encryption and integrity verification to protect the confidentiality and integrity of data and computation, even from sophisticated hardware attacks. While there have been many works addressing performance and other system level issues in secure processor design, power issues have largely been ignored. In this paper, we first analyze the sources of power (energy) increase in different secure processor architectures. We then present a power analysis of various secure processor architectures in terms of their increase in power consumption over a base system with no protection and then provide recommendations for designs that offer the best balance between performance and power without compromising security. We extend our study to the embedded domain as well. We also outline the design of a novel hybrid cryptographic engine that can be used to minimize the power consumption for a secure processor. We believe that if secure processors are to be adopted in future systems (general purpose or embedded), it is critically important that power issues are considered in addition to performance and other system level issues. To the best of our knowledge, this is the first work to examine the power implications of providing hardware mechanisms for security.

  17. Understanding contextual influences of community reintegration among injured servicemembers.

    Science.gov (United States)

    Hawkins, Brent L; McGuire, Francis A; Linder, Sandra M; Britt, Thomas W

    2015-01-01

    As part of a larger mixed-methods research project investigating the influence of contextual factors on community reintegration (CR), this qualitative study sought to understand the subjective experiences of injured servicemembers and their perception of how contextual factors influenced their CR. More specifically, this article addresses how the influences of contextual factors differ between injured servicemembers with different levels of CR. Using a phenomenological framework, semistructured interviews were conducted with nine injured, community-dwelling servicemembers with low, moderate, and high levels of CR (three per category). Participants provided in-depth descriptions of the contextual barriers and facilitators of CR. Thematic analysis indicated the importance of social support and personal factors (e.g., self-efficacy, personal motivation) as the primary means for being reintegrated into their homes and communities. Other themes indicated factors that had an indirect but important influence on CR, including adapted sports, recreation, and other social programs; rehabilitation programs and therapists; school, work, and volunteering; and organizations and policies in developing social supports and personal factors. Comparisons between servicemembers indicated participants with low CR described many more contextual barriers and far fewer contextual facilitators to reintegration than those with high CR. Those with moderate CR were unique in that they described many facilitators and barriers to reintegration.

  18. Object-based implicit learning in visual search: perceptual segmentation constrains contextual cueing.

    Science.gov (United States)

    Conci, Markus; Müller, Hermann J; von Mühlenen, Adrian

    2013-07-09

    In visual search, detection of a target is faster when it is presented within a spatial layout of repeatedly encountered nontarget items, indicating that contextual invariances can guide selective attention (contextual cueing; Chun & Jiang, 1998). However, perceptual regularities may interfere with contextual learning; for instance, no contextual facilitation occurs when four nontargets form a square-shaped grouping, even though the square location predicts the target location (Conci & von Mühlenen, 2009). Here, we further investigated potential causes for this interference-effect: We show that contextual cueing can reliably occur for targets located within the region of a segmented object, but not for targets presented outside of the object's boundaries. Four experiments demonstrate an object-based facilitation in contextual cueing, with a modulation of context-based learning by relatively subtle grouping cues including closure, symmetry, and spatial regularity. Moreover, the lack of contextual cueing for targets located outside the segmented region was due to an absence of (latent) learning of contextual layouts, rather than due to an attentional bias towards the grouped region. Taken together, these results indicate that perceptual segmentation provides a basic structure within which contextual scene regularities are acquired. This in turn argues that contextual learning is constrained by object-based selection.

  19. 44 CFR 79.7 - Offers and appeals under the SRL program.

    Science.gov (United States)

    2010-10-01

    ..., DEPARTMENT OF HOMELAND SECURITY INSURANCE AND HAZARD MITIGATION National Flood Insurance Program FLOOD MITIGATION GRANTS § 79.7 Offers and appeals under the SRL program. (a) Consultation. States and communities... mitigation activity. These consultations shall be initiated in the early stages of the project development...

  20. China's energy security: Perception and reality

    Energy Technology Data Exchange (ETDEWEB)

    Leung, Guy C.K., E-mail: guyleung@gmail.co [Hong Kong Energy Studies Centre, Hong Kong Baptist University, Kowloon Tong, Hong Kong Special Administrative Region (Hong Kong)

    2011-03-15

    China, now the world's second-largest economy, is worried about energy security, which underpins the core objectives of Beijing and the political legitimacy of the Communist Party of China. The purpose of this study is to explore certain popular myths about China's energy security. The study consists of six parts. After the introduction, it formulates the obscure concept of 'energy security' and attempts to contextualize it with 'Chinese characteristics.' Then it explicitly points out that the largest driver of oil demand by China as the 'World's Factory' is transport instead of industry. Next, it explores the effectiveness of transnational pipelines as a measure of energy security and explains why they are less effective than many observers have previously assumed. Furthermore, it investigates the global expansion of Chinese national oil companies and questions their actual contribution to energy security. A few concluding remarks then follow. - Research highlights: {yields} Oil is the form of energy that has produced most of China's energy insecurity. {yields} Transport sector, rather than industry, is the largest driver of China's oil demand. {yields} The contribution of oil pipelines to China's energy security is smaller than many assumed. {yields} Acquisition of oil reserves abroad cannot necessarily guarantee China a supply of oil that is more reliable and less expensive. {yields} Energy security is a means; it is not a goal.

  1. Exhibition of Monogamy Relations between Entropic Non-contextuality Inequalities

    International Nuclear Information System (INIS)

    Zhu Feng; Zhang Wei; Huang Yi-Dong

    2017-01-01

    We exhibit the monogamy relation between two entropic non-contextuality inequalities in the scenario where compatible projectors are orthogonal. We show the monogamy relation can be exhibited by decomposing the orthogonality graph into perfect induced subgraphs. Then we find two entropic non-contextuality inequalities are monogamous while the KCBS-type non-contextuality inequalities are not if the orthogonality graphs of the observable sets are two odd cycles with two shared vertices. (paper)

  2. 12 CFR 563g.19 - Approval of the security.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Approval of the security. 563g.19 Section 563g.19 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.19 Approval of the security. Any securities of a savings association which are not exempt under...

  3. Contextual control over task-set retrieval.

    Science.gov (United States)

    Crump, Matthew J C; Logan, Gordon D

    2010-11-01

    Contextual cues signaling task likelihood or the likelihood of task repetition are known to modulate the size of switch costs. We follow up on the finding by Leboe, Wong, Crump, and Stobbe (2008) that location cues predictive of the proportion of switch or repeat trials modulate switch costs. Their design employed one cue per task, whereas our experiment employed two cues per task, which allowed separate assessment of modulations to the cue-repetition benefit, a measure of lower level cue-encoding processes, and to the task-alternation cost, a measure of higher level processes representing task-set information. We demonstrate that location information predictive of switch proportion modulates performance at the level of task-set representations. Furthermore, we demonstrate that contextual control occurs even when subjects are unaware of the associations between context and switch likelihood. We discuss the notion that contextual information provides rapid, unconscious control over the extent to which prior task-set representations are retrieved in the service of guiding online performance.

  4. Computer Security: Introduction to information and computer security (1/4)

    CERN Multimedia

    CERN. Geneva

    2012-01-01

    Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Aix-en-Provence and Haute Ecole de Gestion in Geneva in 2010. His professional interests include software and network security, distributed systems, and Web and mobile technologies. With the prevalence of modern information te...

  5. Current smoking among young adolescents: assessing school based contextual norms

    OpenAIRE

    Pokorny, S; Jason, L; Schoeny, M

    2004-01-01

    Objective: To extend research on the relation of school based contextual norms to current smoking among adolescents by using three analytic techniques to test for contextual effects. It was hypothesised that significant contextual effects would be found in all three models, but that the strength of these effects would vary by the statistical rigor of the model.

  6. Consequences of contextual factors on clinical reasoning in resident physicians.

    Science.gov (United States)

    McBee, Elexis; Ratcliffe, Temple; Picho, Katherine; Artino, Anthony R; Schuwirth, Lambert; Kelly, William; Masel, Jennifer; van der Vleuten, Cees; Durning, Steven J

    2015-12-01

    Context specificity and the impact that contextual factors have on the complex process of clinical reasoning is poorly understood. Using situated cognition as the theoretical framework, our aim was to evaluate the verbalized clinical reasoning processes of resident physicians in order to describe what impact the presence of contextual factors have on their clinical reasoning. Participants viewed three video recorded clinical encounters portraying straightforward diagnoses in internal medicine with select patient contextual factors modified. After watching each video recording, participants completed a think-aloud protocol. Transcripts from the think-aloud protocols were analyzed using a constant comparative approach. After iterative coding, utterances were analyzed for emergent themes with utterances grouped into categories, themes and subthemes. Ten residents participated in the study with saturation reached during analysis. Participants universally acknowledged the presence of contextual factors in the video recordings. Four categories emerged as a consequence of the contextual factors: (1) emotional reactions (2) behavioral inferences (3) optimizing the doctor patient relationship and (4) difficulty with closure of the clinical encounter. The presence of contextual factors may impact clinical reasoning performance in resident physicians. When confronted with the presence of contextual factors in a clinical scenario, residents experienced difficulty with closure of the encounter, exhibited as diagnostic uncertainty. This finding raises important questions about the relationship between contextual factors and clinical reasoning activities and how this relationship might influence the cost effectiveness of care. This study also provides insight into how the phenomena of context specificity may be explained using situated cognition theory.

  7. Bluetooth security attacks comparative analysis, attacks, and countermeasures

    CERN Document Server

    Haataja, Keijo; Pasanen, Sanna; Toivanen, Pekka

    2013-01-01

    This overview of Bluetooth security examines network vulnerabilities and offers a comparative analysis of recent security attacks. It also examines related countermeasures and proposes a novel attack that works against all existing Bluetooth versions.

  8. Contextual Aspects of Smart City Energy Systems Analysis

    DEFF Research Database (Denmark)

    Thellufsen, Jakob Zinck

    The thesis defines the concept of smart city energy systems. The thesis emphasises the need to investigate the smart city energy system and two contextual aspects. The system integration context and the geographical context. The system integration context emphasises that increased interrelation...... of the different contextual aspects....

  9. Anterior prefrontal involvement in implicit contextual change detection

    Directory of Open Access Journals (Sweden)

    Stefan Pollmann

    2009-10-01

    Full Text Available Anterior prefrontal cortex is usually associated with high level executive functions. Here, we show that the frontal pole, specifically left lateral frontopolar cortex, is involved in signaling change in implicitly learned spatial contexts, in the absence of conscious change detection. In a variant of the contextual cueing paradigm, participants first learned implicitly contingencies between distractor contexts and target locations. After learning, repeated distractor contexts were paired with new target locations. Left lateral frontopolar (BA10 and superior frontal (BA9 cortices showed selective signal increase for this target location change in repeated displays in an event-related fMRI experiment, which was most pronounced in participants with high contextual facilitation before the change. The data support the view that left lateral frontopolar cortex is involved in signaling contextual change to posterior brain areas as a precondition for adaptive changes of attentional resource allocation. This signaling occurs in the absence of awareness of learned contingencies or contextual change.

  10. Experimental Detection of Information Deficit in a Photonic Contextuality Scenario

    Science.gov (United States)

    Zhan, Xiang; Kurzyński, Paweł; Kaszlikowski, Dagomir; Wang, Kunkun; Bian, Zhihao; Zhang, Yongsheng; Xue, Peng

    2017-12-01

    Contextuality is an essential characteristic of quantum theory, and supplies the power for many quantum information processes. Previous tests of contextuality focus mainly on the probability distribution of measurement results. However, a test of contextuality can be formulated in terms of entropic inequalities whose violations imply information deficit in the studied system. This information deficit has not been observed on a single local system. Here we report the first experimental detection of information deficit in an entropic test of quantum contextuality based on photonic setup. The corresponding inequality is violated with more than 13 standard deviations.

  11. The time course of attentional deployment in contextual cueing.

    Science.gov (United States)

    Jiang, Yuhong V; Sigstad, Heather M; Swallow, Khena M

    2013-04-01

    The time course of attention is a major characteristic on which different types of attention diverge. In addition to explicit goals and salient stimuli, spatial attention is influenced by past experience. In contextual cueing, behaviorally relevant stimuli are more quickly found when they appear in a spatial context that has previously been encountered than when they appear in a new context. In this study, we investigated the time that it takes for contextual cueing to develop following the onset of search layout cues. In three experiments, participants searched for a T target in an array of Ls. Each array was consistently associated with a single target location. In a testing phase, we manipulated the stimulus onset asynchrony (SOA) between the repeated spatial layout and the search display. Contextual cueing was equivalent for a wide range of SOAs between 0 and 1,000 ms. The lack of an increase in contextual cueing with increasing cue durations suggests that as an implicit learning mechanism, contextual cueing cannot be effectively used until search begins.

  12. Contextual diversity facilitates learning new words in the classroom.

    Directory of Open Access Journals (Sweden)

    Eva Rosa

    Full Text Available In the field of word recognition and reading, it is commonly assumed that frequently repeated words create more accessible memory traces than infrequently repeated words, thus capturing the word-frequency effect. Nevertheless, recent research has shown that a seemingly related factor, contextual diversity (defined as the number of different contexts [e.g., films] in which a word appears, is a better predictor than word-frequency in word recognition and sentence reading experiments. Recent research has shown that contextual diversity plays an important role when learning new words in a laboratory setting with adult readers. In the current experiment, we directly manipulated contextual diversity in a very ecological scenario: at school, when Grade 3 children were learning words in the classroom. The new words appeared in different contexts/topics (high-contextual diversity or only in one of them (low-contextual diversity. Results showed that words encountered in different contexts were learned and remembered more effectively than those presented in redundant contexts. We discuss the practical (educational [e.g., curriculum design] and theoretical (models of word recognition implications of these findings.

  13. Contextual influences on reverse knowledge transfer

    DEFF Research Database (Denmark)

    Søberg, Peder Veng

    2010-01-01

    Further development of theories about how contextual factors influence the beneficial reverse knowledge transfer from subsidiary to head quarters in disparate national country contexts, is the aim of our study. Earlier studies do not fully capture the different effects national country cultures can....... A proposition model is developed where the dependent variable is beneficial reverse knowledge transfer. The independent variables are: higher relative knowledge level in subsidiaty than in HQ, authority respect, activity fit with contextual learning preference. The conclusion suggest that different contexts...

  14. Contextual Text Mining

    Science.gov (United States)

    Mei, Qiaozhu

    2009-01-01

    With the dramatic growth of text information, there is an increasing need for powerful text mining systems that can automatically discover useful knowledge from text. Text is generally associated with all kinds of contextual information. Those contexts can be explicit, such as the time and the location where a blog article is written, and the…

  15. On the Modelling of Context-Aware Security for Mobile Devices

    Directory of Open Access Journals (Sweden)

    Tomasz Zurek

    2016-01-01

    Full Text Available Security management in wireless networks has to deal with the changing character of the environment, which can further lead to decision making problem for unexpected events. Among a huge list of devices, the mobile ones are especially vulnerable to this situation. The solution for adapting systems and applications to dynamic environments can be context-aware description of the user actions, which gives a possibility to take into account the factors that influence these actions. In the article, we propose a context-aware security adjusting model, which is based on proposition logic and incorporates mechanisms that assist in the reasoning process. The main benefits that differentiate our approach from similar ones are a formal representation of the model, the usage of the whole spectrum of context attributes, the detection and analysis of contextual data integrity, and conflicting rules’ eradication capability. All these traits transcribe into a more effective way of adjusting security measures in accordance with existing circumstances. To illustrate the proposed approach, we present the case study of context-aware security management for mobile devices.

  16. Updating energy security and environmental policy: Energy security theories revisited.

    Science.gov (United States)

    Proskuryakova, L

    2018-06-18

    The energy security theories are based on the premises of sufficient and reliable supply of fossil fuels at affordable prices in centralized supply systems. Policy-makers and company chief executives develop energy security strategies based on the energy security theories and definitions that dominate in the research and policy discourse. It is therefore of utmost importance that scientists revisit these theories in line with the latest changes in the energy industry: the rapid advancement of renewables and smart grid, decentralization of energy systems, new environmental and climate challenges. The study examines the classic energy security concepts (neorealism, neoliberalism, constructivism and international political economy) and assesses if energy technology changes are taken into consideration. This is done through integrative literature review, comparative analysis, identification of 'international relations' and 'energy' research discourse with the use of big data, and case studies of Germany, China, and Russia. The paper offers suggestions for revision of energy security concepts through integration of future technology considerations. Copyright © 2018 Elsevier Ltd. All rights reserved.

  17. Contextual cueing based on the semantic-category membership of the environment

    OpenAIRE

    GOUJON, A

    2005-01-01

    During the analysis of a visual scene, top-down processing is constantly directing the subject's attention to the zones of interest in the scene. The contextual cueing paradigm developed by Chun and Jiang (1998) shows how contextual regularities can facilitate the search for a particular element via implicit learning mechanisms. In the proposed study, contextual cueing task with lexical displays was used. The semantic-category membership of the contextual words predicted the location of the t...

  18. Competition, Speculative Risks, and IT Security Outsourcing

    Science.gov (United States)

    Cezar, Asunur; Cavusoglu, Huseyin; Raghunathan, Srinivasan

    Information security management is becoming a more critical and, simultaneously, a challenging function for many firms. Even though many security managers are skeptical about outsourcing of IT security, others have cited reasons that are used for outsourcing of traditional IT functions for why security outsourcing is likely to increase. Our research offers a novel explanation, based on competitive externalities associated with IT security, for firms' decisions to outsource IT security. We show that if competitive externalities are ignored, then a firm will outsource security if and only if the MSSP offers a quality (or a cost) advantage over in-house operations, which is consistent with the traditional explanation for security outsourcing. However, a higher quality is neither a prerequisite nor a guarantee for a firm to outsource security. The competitive risk environment and the nature of the security function outsourced, in addition to quality, determine firms' outsourcing decisions. If the reward from the competitor's breach is higher than the loss from own breach, then even if the likelihood of a breach is higher under the MSSP the expected benefit from the competitive demand externality may offset the loss from the higher likelihood of breaches, resulting in one or both firms outsourcing security. The incentive to outsource security monitoring is higher than that of infrastructure management because the MSSP can reduce the likelihood of breach on both firms and thus enhance the demand externality effect. The incentive to outsource security monitoring (infrastructure management) is higher (lower) if either the likelihood of breach on both firms is lower (higher) when security is outsourced or the benefit (relative to loss) from the externality is higher (lower). The benefit from the demand externality arising out of a security breach is higher when more of the customers that leave the breached firm switch to the non-breached firm.

  19. Brain based learning with contextual approach to mathematics achievement

    Directory of Open Access Journals (Sweden)

    V Kartikaningtyas

    2017-12-01

    Full Text Available The aim of this study was to know the effect of Brain Based Learning (BBL with a contextual approach to mathematics achievement. BBL-contextual is the learning model that designed to develop and optimize the brain ability for getting a new concept and solving the real life problem. This study method was a quasi-experiment. The population was the junior high school students. The sample chosen by using stratified cluster random sampling. The sample was 109 students. The data collected through a mathematics achievement test that was given after the treatment. The data analyzed by using one way ANOVA. The results of the study showed that BBL-contextual is better than direct learning on mathematics achievement. It means BBL-contextual could be an effective and innovative model.

  20. Human cortical activity evoked by contextual processing in attentional orienting.

    Science.gov (United States)

    Zhao, Shuo; Li, Chunlin; Uono, Shota; Yoshimura, Sayaka; Toichi, Motomi

    2017-06-07

    The ability to assess another person's direction of attention is paramount in social communication, many studies have reported a similar pattern between gaze and arrow cues in attention orienting. Neuroimaging research has also demonstrated no qualitative differences in attention to gaze and arrow cues. However, these studies were implemented under simple experiment conditions. Researchers have highlighted the importance of contextual processing (i.e., the semantic congruence between cue and target) in attentional orienting, showing that attentional orienting by social gaze or arrow cues could be modulated through contextual processing. Here, we examine the neural activity of attentional orienting by gaze and arrow cues in response to contextual processing using functional magnetic resonance imaging. The results demonstrated that the influence of neural activity through contextual processing to attentional orienting occurred under invalid conditions (when the cue and target were incongruent versus congruent) in the ventral frontoparietal network, although we did not identify any differences in the neural substrates of attentional orienting in contextual processing between gaze and arrow cues. These results support behavioural data of attentional orienting modulated by contextual processing based on the neurocognitive architecture.

  1. Contextual cueing impairment in patients with age-related macular degeneration.

    Science.gov (United States)

    Geringswald, Franziska; Herbik, Anne; Hoffmann, Michael B; Pollmann, Stefan

    2013-09-12

    Visual attention can be guided by past experience of regularities in our visual environment. In the contextual cueing paradigm, incidental learning of repeated distractor configurations speeds up search times compared to random search arrays. Concomitantly, fewer fixations and more direct scan paths indicate more efficient visual exploration in repeated search arrays. In previous work, we found that simulating a central scotoma in healthy observers eliminated this search facilitation. Here, we investigated contextual cueing in patients with age-related macular degeneration (AMD) who suffer from impaired foveal vision. AMD patients performed visual search using only their more severely impaired eye (n = 13) as well as under binocular viewing (n = 16). Normal-sighted controls developed a significant contextual cueing effect. In comparison, patients showed only a small nonsignificant advantage for repeated displays when searching with their worse eye. When searching binocularly, they profited from contextual cues, but still less than controls. Number of fixations and scan pattern ratios showed a comparable pattern as search times. Moreover, contextual cueing was significantly correlated with acuity in monocular search. Thus, foveal vision loss may lead to impaired guidance of attention by contextual memory cues.

  2. Involving Customer Relations in Contextual Design

    DEFF Research Database (Denmark)

    Simonsen, Jesper

    1996-01-01

    This paper presents a case study in the form of a contextual design project, the aim of which was to design a system for a particular organization. The starting point in the case was a need in the organization for a specific system. The case involved an analysis of the organizations customer...... point of the design project, how the project was conducted, and which results it ended up with. This is followed by a discussion of the effects of, and lessons learned by, involving customer relations in contextual design....

  3. Contextual mediation of perceptions in hauntings and poltergeist-like experiences.

    Science.gov (United States)

    Lange, R; Houran, J; Harte, T M; Havens, R A

    1996-06-01

    The content of perceived apparitions, e.g., bereavement hallucinations, cannot be explained entirely in terms of electromagnetically induced neurochemical processes. It was shown that contextual variables influential in hallucinatory and hypnotic states also structured reported haunting experiences. As predicted, high congruency was found between the experiential content and the nature of the contextual variables. Further, the number of contextual variables involved in an experience was related to the type of experience and the state or arousal preceding the experience. Based on these findings we argue that a more complete explanation of haunting experiences should take into account both electromagnetically induced neurochemical processes and factors related to contextual mediation.

  4. Brazilian readers and contextual reference Brazilian readers and contextual reference

    Directory of Open Access Journals (Sweden)

    Lilia M. O. Carioni

    2008-04-01

    Full Text Available This article describes an experiment carried out using Brazilian university students at UFSC, the purpose being to check comprehension relationships between two types of contextual reference and two languages, Portuguese and English. A major stimulus for the research was the question: are Brazilian students' difficulties in reading English related more to English language difficulties or to difficulties in processing text in general?

  5. 12 CFR 344.7 - Settlement of securities transactions.

    Science.gov (United States)

    2010-01-01

    ... of securities transactions. (a) A bank shall not effect or enter into a contract for the purchase or... for payment of funds and delivery of securities later than the third business day after the date of... offering. A bank shall not effect or enter into a contract for the purchase or sale of the securities that...

  6. Contextualizing the self: the emergence of a biographical understanding in adolescence.

    Science.gov (United States)

    Habermas, Tilmann; Hatiboğlu, Neşe

    2014-01-01

    In adolescence, remembering the personal past and understanding what kind of person one is intertwine to form a story of one's life as the most extant, informative, and flexible form of self-representation. In adolescence, the striving for self-coherence translates into a quest for global coherence of the life story. We suggest that contextualizing is a fifth means for creating global coherence in life narratives besides the cultural concept of biography, temporal, causal-motivational, and thematic coherence. We present three kinds of contextualizing in life narratives, the temporal macrostructure, sociohistorical contextualizing of one's life, and hierarchical and linear segmenting of the text and life. These three forms of contextualizing in life narratives by their authors are complemented by three forms of contextual influences on life narratives analyzed by researchers, namely the historical, personal, and communicative situation in which they are recounted. Contextualizing is exemplified by the life narrative of a young migrant. © 2014 Wiley Periodicals, Inc.

  7. The Underbelly of Global Security

    DEFF Research Database (Denmark)

    Mynster Christensen, Maya

    2015-01-01

    -militias, facilitated by a British security company and the Sierra Leone government. In doing so, the article contributes to the ongoing scholarly debate on the privatization of security by offering a “local” ethnographically informed perspective on the micro-dynamics of “global” security. It is argued that the supply......In the aftermath of the Sierra Leone civil war, demobilized militia soldiers have become an attractive resource to private security companies. Based on extensive ethnographic fieldwork, this article traces the outsourcing of security at American military bases in Iraq to Sierra Leonean ex...... of global security depends on a form of local immobility: on a population that is “stuck”, yet constantly on the move to seize opportunities for survival and recognition. Structured by a chronological account of the recruitment, deployment, and deportation of Sierra Leonean ex-militias, the article...

  8. Assessing roles of vocabulary knowledge predominating in contextual clues

    Directory of Open Access Journals (Sweden)

    Patcharawadee Promduang

    2016-07-01

    Full Text Available The purpose of this study is to investigate the relationship between vocabulary knowledge and the use of contextual clues and whether EFL learners who are well-equipped with reading skills are able to comprehend the text despite a low level of vocabulary knowledge. Therefore, the study focused on which vocabulary dimensions help students guess unfamiliar words. The study was carried out at Hatyai University in Thailand. The population of this study consisted of 34 undergraduates who were studying International Business English and had taken a course in reading techniques. The present study was conducted to conceptually validate the roles of breadth and depth of vocabulary knowledge to improve skills by contextual clue. Vocabulary Depth was specially employed to evaluate two dimensions namely Paradigmatic and Syntagmatic. The Schmitt and Clapham Vocabulary Level Test was used to test vocabulary breadth, while the vocabulary depth was implemented by Read’s Vocabulary Depth Test. Reading parts of the TOEFL were adopted for contextual clue items. There were two statistical analysis tools also implemented in this study: paired-sample t-test and bivariate correlation. First, in an attempt to find which vocabulary dimension predominates in guessing word meaning from the text, a paired-sample t-test was utilized to compare the difference of two vocabulary dimensions in reading part: vocabulary depth and contextual clues, and vocabulary breadth and contextual clues. Second, a bivariate correlation was used to find the degree of relationship between vocabulary knowledge and contextual clues. The consequences of this study identified empirical results that 1 there was a positive relationship between contextual clues and vocabulary depth, the reverse is true in vocabulary breadth. Moreover, vocabulary depth is more significantly crucial than breadth to enhance student’s ability to guess words’ meaning from the context.

  9. Contextual knowledge reduces demands on working memory during reading.

    Science.gov (United States)

    Miller, Lisa M Soederberg; Cohen, Jason A; Wingfield, Arthur

    2006-09-01

    An experiment is reported in which young, middle-aged, and older adults read and recalled ambiguous texts either with or without the topic title that supplied contextual knowledge. Within each of the age groups, the participants were divided into those with high or low working memory (WM) spans, with available WM capacity further manipulated by the presence or absence of an auditory target detection task concurrent with the reading task. Differences in reading efficiency (reading time per proposition recalled) between low WM span and high WM span groups were greater among readers who had access to contextual knowledge relative to those who did not, suggesting that contextual knowledge reduces demands on WM capacity. This position was further supported by the finding that increased age and attentional demands, two factors associated with reduced WM capacity, exaggerated the benefits of contextual knowledge on reading efficiency. The relative strengths of additional potential predictors of reading efficiency (e.g., interest, effort, and memory beliefs), along with knowledge, WM span, and age, are reported. Findings showed that contextual knowledge was the strongest predictor of reading efficiency even after controlling for the effects of all of the other predictors.

  10. Investor Reaction to Mandatory Offers on the Warsaw Stock Exchange

    Directory of Open Access Journals (Sweden)

    Szymon Okoń

    2012-06-01

    Full Text Available The following paper aims to assess investor reaction to mandatory offers on the Warsaw Stock Exchange, which is important because knowledge about these reactions can be used to make better investment decisions. This paper highlights the importance of procedure in making a mandatory offer and its grounds in the Polish legal system. Additionally, it presents empirical research on the reactions of investors to mandatory offers on the Warsaw Stock Exchange. It has been provided that mandatory offers have a significant impact on the price of a company’s shares listed on the Warsaw Stock Exchange. Knowledge about the reactions of investors to a mandatory offer may be used when selecting securities for an investment portfolio. The findings may provide guidance in deciding whether to begin or end investment in the company, both for individual and institutional investors. The event study methodology approach used in the paper is regarded as valuable and can be the basis for further research in other areas of the capital market research, especially in the context of information efficiency.

  11. Teaching Case: Security Breach at Target

    Science.gov (United States)

    Plachkinova, Miloslava; Maurer, Chris

    2018-01-01

    This case study follows the security breach that affected Target at the end of 2013 and resulted in the loss of financial data for over 70 million customers. The case provides an overview of the company and describes the reasons that led to one of the biggest security breaches in history. It offers a discussion on Target's vendor management…

  12. Personal health records: retrieving contextual information with Google Custom Search.

    Science.gov (United States)

    Ahsan, Mahmud; Seldon, H Lee; Sayeed, Shohel

    2012-01-01

    Ubiquitous personal health records, which can accompany a person everywhere, are a necessary requirement for ubiquitous healthcare. Contextual information related to health events is important for the diagnosis and treatment of disease and for the maintenance of good health, yet it is seldom recorded in a health record. We describe a dual cellphone-and-Web-based personal health record system which can include 'external' contextual information. Much contextual information is available on the Internet and we can use ontologies to help identify relevant sites and information. But a search engine is required to retrieve information from the Web and developing a customized search engine is beyond our scope, so we can use Google Custom Search API Web service to get contextual data. In this paper we describe a framework which combines a health-and-environment 'knowledge base' or ontology with the Google Custom Search API to retrieve relevant contextual information related to entries in a ubiquitous personal health record.

  13. Contextual Cueing Effect in Spatial Layout Defined by Binocular Disparity

    Science.gov (United States)

    Zhao, Guang; Zhuang, Qian; Ma, Jie; Tu, Shen; Liu, Qiang; Sun, Hong-jin

    2017-01-01

    Repeated visual context induces higher search efficiency, revealing a contextual cueing effect, which depends on the association between the target and its visual context. In this study, participants performed a visual search task where search items were presented with depth information defined by binocular disparity. When the 3-dimensional (3D) configurations were repeated over blocks, the contextual cueing effect was obtained (Experiment 1). When depth information was in chaos over repeated configurations, visual search was not facilitated and the contextual cueing effect largely crippled (Experiment 2). However, when we made the search items within a tiny random displacement in the 2-dimentional (2D) plane but maintained the depth information constant, the contextual cueing was preserved (Experiment 3). We concluded that the contextual cueing effect was robust in the context provided by 3D space with stereoscopic information, and more importantly, the visual system prioritized stereoscopic information in learning of spatial information when depth information was available. PMID:28912739

  14. Testing a pedagogy for promoting historical contextualization in classrooms

    NARCIS (Netherlands)

    Huijgen, Tim; Holthuis, Paul; van Boxtel, Carla; van de Grift, Wim

    2016-01-01

    This study describes the development and testing of a pedagogy aimed at promoting students’ ability to perform historical contextualization. Promoting historical contextualization was conceptualized as three different pedagogical principles: 1) the awareness of the consequences of a present-oriented

  15. Specker's parable of the overprotective seer: A road to contextuality, nonlocality and complementarity

    International Nuclear Information System (INIS)

    Liang, Yeong-Cherng; Spekkens, Robert W.; Wiseman, Howard M.

    2011-01-01

    In 1960, the mathematician Ernst Specker described a simple example of nonclassical correlations, the counter-intuitive features of which he dramatized using a parable about a seer, who sets an impossible prediction task to his daughter's suitors. We revisit this example here, using it as an entree to three central concepts in quantum foundations: contextuality, Bell-nonlocality, and complementarity. Specifically, we show that Specker's parable offers a narrative thread that weaves together a large number of results, including the following: the impossibility of measurement-noncontextual and outcome-deterministic ontological models of quantum theory (the 1967 Kochen-Specker theorem), in particular, the recent state-specific pentagram proof of Klyachko; the impossibility of Bell-local models of quantum theory (Bell's theorem), especially the proofs by Mermin and Hardy and extensions thereof; the impossibility of a preparation-noncontextual ontological model of quantum theory; the existence of triples of positive operator valued measures (POVMs) that can be measured jointly pairwise but not triplewise. Along the way, several novel results are presented: a generalization of a theorem by Fine connecting the existence of a joint distribution over outcomes of counterfactual measurements to the existence of a measurement-noncontextual and outcome-deterministic ontological model; a generalization of Klyachko's proof of the Kochen-Specker theorem from pentagrams to a family of star polygons; a proof of the Kochen-Specker theorem in the style of Hardy's proof of Bell's theorem (i.e., one that makes use of the failure of the transitivity of implication for counterfactual statements); a categorization of contextual and Bell-nonlocal correlations in terms of frustrated networks; a derivation of a new inequality testing preparation noncontextuality; some novel results on the joint measurability of POVMs and the question of whether these can be modeled noncontextually. Finally

  16. Contextual Hub Analysis Tool (CHAT: A Cytoscape app for identifying contextually relevant hubs in biological networks [version 2; referees: 2 approved

    Directory of Open Access Journals (Sweden)

    Tanja Muetze

    2016-08-01

    Full Text Available Highly connected nodes (hubs in biological networks are topologically important to the structure of the network and have also been shown to be preferentially associated with a range of phenotypes of interest. The relative importance of a hub node, however, can change depending on the biological context. Here, we report a Cytoscape app, the Contextual Hub Analysis Tool (CHAT, which enables users to easily construct and visualize a network of interactions from a gene or protein list of interest, integrate contextual information, such as gene expression or mass spectrometry data, and identify hub nodes that are more highly connected to contextual nodes (e.g. genes or proteins that are differentially expressed than expected by chance. In a case study, we use CHAT to construct a network of genes that are differentially expressed in Dengue fever, a viral infection. CHAT was used to identify and compare contextual and degree-based hubs in this network. The top 20 degree-based hubs were enriched in pathways related to the cell cycle and cancer, which is likely due to the fact that proteins involved in these processes tend to be highly connected in general. In comparison, the top 20 contextual hubs were enriched in pathways commonly observed in a viral infection including pathways related to the immune response to viral infection. This analysis shows that such contextual hubs are considerably more biologically relevant than degree-based hubs and that analyses which rely on the identification of hubs solely based on their connectivity may be biased towards nodes that are highly connected in general rather than in the specific context of interest.   Availability: CHAT is available for Cytoscape 3.0+ and can be installed via the Cytoscape App Store (http://apps.cytoscape.org/apps/chat.

  17. Unfinished Student Answer in PISA Mathematics Contextual Problem

    Science.gov (United States)

    Lutfianto, Moch.; Zulkardi; Hartono, Yusuf

    2013-01-01

    Solving mathematics contextual problems is one way that can be used to enable students to have the skills needed to live in the 21st century. Completion contextual problem requires a series of steps in order to properly answer the questions that are asked. The purpose of this study was to determine the steps performed students in solving…

  18. Experimental demonstration of quantum contextuality with nonentangled photons

    International Nuclear Information System (INIS)

    Liu, B. H.; Huang, Y. F.; Gong, Y. X.; Sun, F. W.; Zhang, Y. S.; Li, C. F.; Guo, G. C.

    2009-01-01

    We present an experimental test of quantum contextuality by using two-photon product states. The experimental results show that the noncontextual hidden-variable theories are violated by nonentangled states in spite of the local hidden-variable theories can be violated or not. We find that the Hong-Ou-Mandel-type quantum interference effect causes the quantum contextuality.

  19. Capturing security requirements for software systems.

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-07-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  20. Capturing security requirements for software systems

    Directory of Open Access Journals (Sweden)

    Hassan El-Hadary

    2014-07-01

    Full Text Available Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way.

  1. Capturing security requirements for software systems

    Science.gov (United States)

    El-Hadary, Hassan; El-Kassas, Sherif

    2014-01-01

    Security is often an afterthought during software development. Realizing security early, especially in the requirement phase, is important so that security problems can be tackled early enough before going further in the process and avoid rework. A more effective approach for security requirement engineering is needed to provide a more systematic way for eliciting adequate security requirements. This paper proposes a methodology for security requirement elicitation based on problem frames. The methodology aims at early integration of security with software development. The main goal of the methodology is to assist developers elicit adequate security requirements in a more systematic way during the requirement engineering process. A security catalog, based on the problem frames, is constructed in order to help identifying security requirements with the aid of previous security knowledge. Abuse frames are used to model threats while security problem frames are used to model security requirements. We have made use of evaluation criteria to evaluate the resulting security requirements concentrating on conflicts identification among requirements. We have shown that more complete security requirements can be elicited by such methodology in addition to the assistance offered to developers to elicit security requirements in a more systematic way. PMID:25685514

  2. 17 CFR 230.463 - Report of offering of securities and use of proceeds therefrom.

    Science.gov (United States)

    2010-04-01

    ... effective registration statement for securities to be issued: (1) In a business combination described in Rule 145(a) (§ 230.145(a)); (2) By an issuer which pursuant to a business combination described in Rule 145(a) has succeeded to another issuer that prior to such business combination had a registration...

  3. Lecture 3: Web Application Security

    CERN Multimedia

    CERN. Geneva

    2013-01-01

    Computer security has been an increasing concern for IT professionals for a number of years, yet despite all the efforts, computer systems and networks remain highly vulnerable to attacks of different kinds. Design flaws and security bugs in the underlying software are among the main reasons for this. This lecture focuses on security aspects of Web application development. Various vulnerabilities typical to web applications (such as Cross-site scripting, SQL injection, cross-site request forgery etc.) are introduced and discussed. Sebastian Lopienski is CERN’s deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support servic...

  4. Securing Major Events

    International Nuclear Information System (INIS)

    Loeoef, Susanna

    2013-01-01

    When asked why the IAEA should provide nuclear security support to countries that organize large public events, Nuclear Security Officer Sophia Miaw answers quickly and without hesitation. ''Imagine any major public event such as the Olympics, a football championship, or an Expo. If a dirty bomb were to be exploded at a site where tens of thousands of people congregate, the radioactive contamination would worsen the effects of the bomb, increase the number of casualties, impede a rapid emergency response, and cause long term disruption in the vicinity,'' she said. Avoiding such nightmarish scenarios is the driving purpose behind the assistance the IAEA offers States that host major sporting or other public events. The support can range from a single training course to a comprehensive programme that includes threat assessment, training, loaned equipment and exercises. The type and scope of assistance depends on the host country's needs. ''We incorporate nuclear security measures into their security plan. We don't create anything new,'' Miaw said

  5. Homeland Security Education: Managerial versus Nonmanagerial Market Perspectives of an Academic Program

    Science.gov (United States)

    Doss, Daniel; Henley, Russ; McElreath, David; Lackey, Hilliard; Jones, Don; Gokaraju, Balakrishna; Sumrall, William

    2016-01-01

    The authors discuss the findings of a market study that preceded the offering of an academic program in homeland security. The university disseminated a mail survey to gain data for analysis of variance testing of several hypotheses regarding market perceptions of the intended homeland security program offering. Stratification involved segregating…

  6. 17 CFR 230.165 - Offers made in connection with a business combination transaction.

    Science.gov (United States)

    2010-04-01

    ... a business combination transaction. 230.165 Section 230.165 Commodity and Securities Exchanges... Offers made in connection with a business combination transaction. Preliminary Note: This section is available only to communications relating to business combinations. The exemption does not apply to...

  7. The influence of contextual diversity on eye movements in reading

    OpenAIRE

    Plummer, Patrick; Perea, Manuel; Rayner, Keith

    2013-01-01

    Recent research has shown contextual diversity (i.e., the number of passages in which a given word appears) to be a reliable predictor of word processing difficulty. It has also been demonstrated that word-frequency has little or no effect on word recognition speed when accounting for contextual diversity in isolated word processing tasks. An eye-movement experiment was conducted wherein the effects of word-frequency and contextual diversity were directly contrasted in a normal sentence readi...

  8. Contextual cueing improves attentional guidance, even when guidance is supposedly optimal.

    Science.gov (United States)

    Harris, Anthony M; Remington, Roger W

    2017-05-01

    Visual search through previously encountered contexts typically produces reduced reaction times compared with search through novel contexts. This contextual cueing benefit is well established, but there is debate regarding its underlying mechanisms. Eye-tracking studies have consistently shown reduced number of fixations with repetition, supporting improvements in attentional guidance as the source of contextual cueing. However, contextual cueing benefits have been shown in conditions in which attentional guidance should already be optimal-namely, when attention is captured to the target location by an abrupt onset, or under pop-out conditions. These results have been used to argue for a response-related account of contextual cueing. Here, we combine eye tracking with response time to examine the mechanisms behind contextual cueing in spatially cued and pop-out conditions. Three experiments find consistent response time benefits with repetition, which appear to be driven almost entirely by a reduction in number of fixations, supporting improved attentional guidance as the mechanism behind contextual cueing. No differences were observed in the time between fixating the target and responding-our proxy for response related processes. Furthermore, the correlation between contextual cueing magnitude and the reduction in number of fixations on repeated contexts approaches 1. These results argue strongly that attentional guidance is facilitated by familiar search contexts, even when guidance is near-optimal. (PsycINFO Database Record (c) 2017 APA, all rights reserved).

  9. Social Security Number Replacement Card Applications filed via the Internet

    Data.gov (United States)

    Social Security Administration — The Social Security Administration (SSA) provides a variety of ways to conduct business with the agency. SSA offers members of the public the opportunity to request...

  10. New View of Ping-Pong Protocol Security

    International Nuclear Information System (INIS)

    Zawadzki Piotr

    2012-01-01

    The ping-pong protocol offers confidential transmission of classic information without a prior key agreement. It is believed that it is quasi secure in lossless quantum channels. Serious doubts related to the analysis paradigm which has been used so far are presented in the study. The security of the protocol is reconsidered. (general)

  11. A Novel Model for Security Evaluation for Compliance

    DEFF Research Database (Denmark)

    Hald, Sara Ligaard; Pedersen, Jens Myrup; Prasad, Neeli R.

    2011-01-01

    for Compliance (SEC) model offers a lightweight alternative for use by decision makers to get a quick overview of the security attributes of different technologies for easy comparison and requirement compliance evaluation. The scientific contribution is this new approach to security modelling as well...

  12. The role of peripheral vision in implicit contextual cuing.

    Science.gov (United States)

    van Asselen, Marieke; Castelo-Branco, Miguel

    2009-01-01

    Implicit contextual cuing refers to the ability to learn the association between contextual information of our environment and a specific target, which can be used to guide attention during visual search. It was recently suggested that the storage of a snapshot image of the local context of a target underlies implicit contextual cuing. To make such a snapshot, it is necessary to use peripheral vision. In order to test whether peripheral vision can underlie implicit contextual cuing, we used a covert visual search task, in which participants were required to indicate the orientation of a target stimulus while foveating a fixation cross. The response times were shorter when the configuration of the stimuli was repeated than when the configuration was new. Importantly, this effect was still found after 10 days, indicating that peripherally perceived spatial context information can be stored in memory for long periods of time. These results indicate that peripheral vision can be used to make a snapshot of the local context of a target.

  13. Contextualized teaching on the problem solving performance of students

    Directory of Open Access Journals (Sweden)

    Rolando V. Obiedo

    2017-12-01

    Full Text Available This study investigated the effect of contextualized teaching on students’ problem solving skills in physics through a quasi-experimental approach. Problem solving performance of students was described quantitatively through their mean problem solving scores and problem solving skills level. A unit plan patterned from the cognitive apprenticeship approach and contextualized using maritime context of ship stability was implemented on the experimental group while the control group had the conventional lecture method. Pre and post assessment, which is a researcher-developed word problem assessment, was administered to both groups. Results indicated increased problem solving mean scores (p < 0.001, problem solving skill level (p < 0.001 of the experimental group while the control group increased only their problem solving skill level (p = 0.008. Thus, contextualized teaching can improve the problem solving performance of students. This study recommends using contextualization using other physics topics where other contexts can be applied.

  14. Contextuality for preparations, transformations, and unsharp measurements

    International Nuclear Information System (INIS)

    Spekkens, R.W.

    2005-01-01

    The Bell-Kochen-Specker theorem establishes the impossibility of a noncontextual hidden variable model of quantum theory, or equivalently, that quantum theory is contextual. In this paper, an operational definition of contextuality is introduced which generalizes the standard notion in three ways: (i) it applies to arbitrary operational theories rather than just quantum theory (ii) it applies to arbitrary experimental procedures rather than just sharp measurements, and (iii) it applies to a broad class of ontological models of quantum theory rather than just deterministic hidden variable models. We derive three no-go theorems for ontological models, each based on an assumption of noncontextuality for a different sort of experimental procedure; one for preparation procedures, another for unsharp measurement procedures (that is, measurement procedures associated with positive-operator valued measures), and a third for transformation procedures. All three proofs apply to two-dimensional Hilbert spaces, and are therefore stronger than traditional proofs of contextuality

  15. Architecture and Knowledge-Driven Self-Adaptive Security in Smart Space

    Directory of Open Access Journals (Sweden)

    Antti Evesti

    2013-03-01

    Full Text Available Dynamic and heterogeneous smart spaces cause challenges for security because it is impossible to anticipate all the possible changes at design-time. Self-adaptive security is an applicable solution for this challenge. This paper presents an architectural approach for security adaptation in smart spaces. The approach combines an adaptation loop, Information Security Measuring Ontology (ISMO and a smart space security-control model. The adaptation loop includes phases to monitor, analyze, plan and execute changes in the smart space. The ISMO offers input knowledge for the adaptation loop and the security-control model enforces dynamic access control policies. The approach is novel because it defines the whole adaptation loop and knowledge required in each phase of the adaptation. The contributions are validated as a part of the smart space pilot implementation. The approach offers reusable and extensible means to achieve adaptive security in smart spaces and up-to-date access control for devices that appear in the space. Hence, the approach supports the work of smart space application developers.

  16. The roles of Eph receptors in contextual fear conditioning memory formation.

    Science.gov (United States)

    Dines, Monica; Grinberg, Svetlana; Vassiliev, Maria; Ram, Alon; Tamir, Tal; Lamprecht, Raphael

    2015-10-01

    Eph receptors regulate glutamate receptors functions, neuronal morphology and synaptic plasticity, cellular events believed to be involved in memory formation. In this study we aim to explore the roles of Eph receptors in learning and memory. Toward that end, we examined the roles of EphB2 and EphA4 receptors, key regulators of synaptic functions, in fear conditioning memory formation. We show that mice lacking EphB2 (EphB2(-/-)) are impaired in short- and long-term contextual fear conditioning memory. Mice that express a carboxy-terminally truncated form of EphB2 that lacks forward signaling, instead of the full EphB2, are impaired in long-term, but not short-term, contextual fear conditioning memory. Long-term contextual fear conditioning memory is attenuated in CaMKII-cre;EphA4(lx/-) mice where EphA4 is removed from all pyramidal neurons of the forebrain. Mutant mice with targeted kinase-dead EphA4 (EphA4(KD)) exhibit intact long-term contextual fear conditioning memory showing that EphA4 kinase-mediated forward signaling is not needed for contextual fear memory formation. The ability to form long-term conditioned taste aversion (CTA) memory is not impaired in the EphB2(-/-) and CaMKII-cre;EphA4(lx/-) mice. We conclude that EphB2 forward signaling is required for long-term contextual fear conditioning memory formation. In contrast, EphB2 mediates short-term contextual fear conditioning memory formation in a forward signaling-independent manner. EphA4 mediates long-term contextual fear conditioning memory formation in a kinase-independent manner. Copyright © 2015 Elsevier Inc. All rights reserved.

  17. The sheaf-theoretic structure of non-locality and contextuality

    International Nuclear Information System (INIS)

    Abramsky, Samson; Brandenburger, Adam

    2011-01-01

    We use the mathematical language of sheaf theory to give a unified treatment of non-locality and contextuality, in a setting that generalizes the familiar probability tables used in non-locality theory to arbitrary measurement covers; this includes Kochen-Specker configurations and more. We show that contextuality, and non-locality as a special case, correspond exactly to obstructions to the existence of global sections. We describe a linear algebraic approach to computing these obstructions, which allows a systematic treatment of arguments for non-locality and contextuality. We distinguish a proper hierarchy of strengths of no-go theorems, and show that three leading examples—due to Bell, Hardy and Greenberger, Horne and Zeilinger, respectively—occupy successively higher levels of this hierarchy. A general correspondence is shown between the existence of local hidden-variable realizations using negative probabilities, and no-signalling; this is based on a result showing that the linear subspaces generated by the non-contextual and no-signalling models, over an arbitrary measurement cover, coincide. Maximal non-locality is generalized to maximal contextuality, and characterized in purely qualitative terms, as the non-existence of global sections in the support. A general setting is developed for the Kochen-Specker-type results, as generic, model-independent proofs of maximal contextuality, and a new combinatorial condition is given, which generalizes the ‘parity proofs’ commonly found in the literature. We also show how our abstract setting can be represented in quantum mechanics. This leads to a strengthening of the usual no-signalling theorem, which shows that quantum mechanics obeys no-signalling for arbitrary families of commuting observables, not just those represented on different factors of a tensor product. (paper)

  18. A taxonomy for contextual information in electronic health records.

    Science.gov (United States)

    Weir, Charlene R; Staggers, Nancy; Doing-Harris, Kristina; Dunlea, Robert; McCormick, Teresa; Barrus, Robyn

    2012-01-01

    Contextual information is functional, social and financial information about patients and is central to many health-care decisions, including end-of-life care, living arrangements, and the aggressiveness of treatment. It is the language of patients when talking about their health and frequently the focus of nursing interventions. In this study, we report the results of a qualitative analysis of interviews of 17 clinicians focusing on their use of contextual information during the process of care, decision-making and documentation. We identified seven characteristics of contextual information relevant to its use in a clinical setting. Implications for Natural Language Processing and Ontology construction are discussed.

  19. Contextual Cueing Improves Attentional Guidance, Even When Guidance Is Supposedly Optimal

    OpenAIRE

    Harris, A. M.; Remington, R. W.

    2017-01-01

    Visual search through previously encountered contexts typically produces reduced reaction times compared with search through novel contexts. This contextual cueing benefit is well established, but there is debate regarding its underlying mechanisms. Eye-tracking studies have consistently shown reduced number of fixations with repetition, supporting improvements in attentional guidance as the source of contextual cueing. However, contextual cueing benefits have been shown in conditions in whic...

  20. Campus Area Network Wi-Fi Security

    Directory of Open Access Journals (Sweden)

    Arjun K. Pillay

    2017-07-01

    Full Text Available Wireless connectivity devices such as mobile phones and laptops are being increasingly used by University students to access learning resources on campus networks and the Internet. Each of the mobile devices offers security protocols for connection to a Wi-Fi router. This paper presents an overview of Wi-Fi security and recommendations in relation to free Wi-Fi service at The University of Fiji.

  1. Secure public cloud platform for medical images sharing.

    Science.gov (United States)

    Pan, Wei; Coatrieux, Gouenou; Bouslimi, Dalel; Prigent, Nicolas

    2015-01-01

    Cloud computing promises medical imaging services offering large storage and computing capabilities for limited costs. In this data outsourcing framework, one of the greatest issues to deal with is data security. To do so, we propose to secure a public cloud platform devoted to medical image sharing by defining and deploying a security policy so as to control various security mechanisms. This policy stands on a risk assessment we conducted so as to identify security objectives with a special interest for digital content protection. These objectives are addressed by means of different security mechanisms like access and usage control policy, partial-encryption and watermarking.

  2. 48 CFR 570.303-3 - Late offers, modifications of offers, and withdrawals of offers.

    Science.gov (United States)

    2010-10-01

    ... 48 Federal Acquisition Regulations System 4 2010-10-01 2010-10-01 false Late offers, modifications of offers, and withdrawals of offers. 570.303-3 Section 570.303-3 Federal Acquisition Regulations... PROPERTY Contracting Procedures for Leasehold Interests in Real Property 570.303-3 Late offers...

  3. Predicting Performance with Contextualized Inventories, No Frame-of-reference Effect?

    NARCIS (Netherlands)

    Holtrop, D.J.; Born, M.P.; de Vries, R.E.

    2014-01-01

    A recent meta-analysis showed that contextualized personality inventories have incremental predictive validity over generic personality inventories when predicting job performance. This study aimed to investigate the differences between two types of contextualization of items: Adding an 'at work'

  4. Secure Authentication of Cloud Data Mining API

    OpenAIRE

    Bhadauria, Rohit; Borgohain, Rajdeep; Biswas, Abirlal; Sanyal, Sugata

    2013-01-01

    Cloud computing is a revolutionary concept that has brought a paradigm shift in the IT world. This has made it possible to manage and run businesses without even setting up an IT infrastructure. It offers multi-fold benefits to the users moving to a cloud, while posing unknown security and privacy issues. User authentication is one such growing concern and is greatly needed in order to ensure privacy and security in a cloud computing environment. This paper discusses the security at different...

  5. Information security governance: a risk assessment approach to health information systems protection.

    Science.gov (United States)

    Williams, Patricia A H

    2013-01-01

    It is no small task to manage the protection of healthcare data and healthcare information systems. In an environment that is demanding adaptation to change for all information collection, storage and retrieval systems, including those for of e-health and information systems, it is imperative that good information security governance is in place. This includes understanding and meeting legislative and regulatory requirements. This chapter provides three models to educate and guide organisations in this complex area, and to simplify the process of information security governance and ensure appropriate and effective measures are put in place. The approach is risk based, adapted and contextualized for healthcare. In addition, specific considerations of the impact of cloud services, secondary use of data, big data and mobile health are discussed.

  6. Contextualization processes and the initial education of physics teachers

    Directory of Open Access Journals (Sweden)

    Cristina Cândida de Macedo

    2014-03-01

    Full Text Available Contextualization of school contents has been seen as a possibility of facilitating students’ learning, since it makes the educative process more significant to them. However, there is no agreement as to the meaning and the forms of applying such processes. Particularly in the area of Science teaching, the creation of thematic projects has been seen as a way of contextualizing school contents. It is noteworthy that the experience with the education of Physics teachers shows that the creation and execution of such projects brings many difficulties to teachers, the main obstacle being the understanding of what contextualized educative processes are. Having this in mind, a project has been elaborated with the objective of analyzing the comprehension Physics teachers that are going through teacher education courses have of the processes of contextualization. The data for this investigation has been obtained from students who attended a course of the Physics Teacher Education module at the Federal University of Itajubá. It is significant to mention that in this course students are asked to create three versions of a thematic project. In order to analyze the data, the procedure of Thematic Content and Category Analysis was adopted. This research shows that Physics teachers to be incorporate the discourses of the educative ideas throughout the course. However, there is a series of obstacles they face as they attempt to understand and carry out contextualized educative processes. Those difficulties are connected to their experience with this kind of educative process throughout the years they spend at school and in the teacher education course. We conclude thus that it is essential that contextualized educative activities be part of the reality of teacher education programs.

  7. Contextual Compression of Large-Scale Wind Turbine Array Simulations

    Energy Technology Data Exchange (ETDEWEB)

    Gruchalla, Kenny M [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Brunhart-Lupo, Nicholas J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Potter, Kristin C [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Clyne, John [National Center for Atmospheric Research (NCAR)

    2017-12-04

    Data sizes are becoming a critical issue particularly for HPC applications. We have developed a user-driven lossy wavelet-based storage model to facilitate the analysis and visualization of large-scale wind turbine array simulations. The model stores data as heterogeneous blocks of wavelet coefficients, providing high-fidelity access to user-defined data regions believed the most salient, while providing lower-fidelity access to less salient regions on a block-by-block basis. In practice, by retaining the wavelet coefficients as a function of feature saliency, we have seen data reductions in excess of 94 percent, while retaining lossless information in the turbine-wake regions most critical to analysis and providing enough (low-fidelity) contextual information in the upper atmosphere to track incoming coherent turbulent structures. Our contextual wavelet compression approach has allowed us to deliver interative visual analysis while providing the user control over where data loss, and thus reduction in accuracy, in the analysis occurs. We argue this reduced but contextualized representation is a valid approach and encourages contextual data management.

  8. Analysis of Some Recent Tests of Quantum Contextuality

    International Nuclear Information System (INIS)

    La Cour, Brian R.

    2010-01-01

    Contextuality plays a central role in many key proofs for the impossibility of hidden variables in quantum mechanics. The most famous among these is the Kochen-Specker theorem, which originally applied to a Hilbert space of three dimensions, but much simpler proofs in higher dimensions have since been found. In recent years there has been a resurgence of interest in contextuality, and a number of experiments have been performed to test it in the four-dimensional context. Recently, it has been shown that contextuality may be interpreted as the result of simple measurement disturbance if the set of measurements chosen are time-like separated [B. La Cour, Phys. Rev. A, 79, 012102 (2009)]. In this work, several such experiments will be reviewed, and it will be shown that none are capable of ruling out a realistic, local hidden variable interpretation.

  9. CLOUD COMPUTING SECURITY

    Directory of Open Access Journals (Sweden)

    Ştefan IOVAN

    2016-05-01

    Full Text Available Cloud computing reprentes the software applications offered as a service online, but also the software and hardware components from the data center.In the case of wide offerd services for any type of client, we are dealing with a public cloud. In the other case, in wich a cloud is exclusively available for an organization and is not available to the open public, this is consider a private cloud [1]. There is also a third type, called hibrid in which case an user or an organization might use both services available in the public and private cloud. One of the main challenges of cloud computing are to build the trust and ofer information privacy in every aspect of service offerd by cloud computingle. The variety of existing standards, just like the lack of clarity in sustenability certificationis not a real help in building trust. Also appear some questions marks regarding the efficiency of traditionsecurity means that are applied in the cloud domain. Beside the economic and technology advantages offered by cloud, also are some advantages in security area if the information is migrated to cloud. Shared resources available in cloud includes the survey, use of the "best practices" and technology for advance security level, above all the solutions offered by the majority of medium and small businesses, big companies and even some guvermental organizations [2].

  10. Contextual Approach with Guided Discovery Learning and Brain Based Learning in Geometry Learning

    Science.gov (United States)

    Kartikaningtyas, V.; Kusmayadi, T. A.; Riyadi

    2017-09-01

    The aim of this study was to combine the contextual approach with Guided Discovery Learning (GDL) and Brain Based Learning (BBL) in geometry learning of junior high school. Furthermore, this study analysed the effect of contextual approach with GDL and BBL in geometry learning. GDL-contextual and BBL-contextual was built from the steps of GDL and BBL that combined with the principles of contextual approach. To validate the models, it uses quasi experiment which used two experiment groups. The sample had been chosen by stratified cluster random sampling. The sample was 150 students of grade 8th in junior high school. The data were collected through the student’s mathematics achievement test that given after the treatment of each group. The data analysed by using one way ANOVA with different cell. The result shows that GDL-contextual has not different effect than BBL-contextual on mathematics achievement in geometry learning. It means both the two models could be used in mathematics learning as the innovative way in geometry learning.

  11. The Contextual Database of the Generations and Gender Programme: Concept, content, and research examples

    Directory of Open Access Journals (Sweden)

    Arianna Caporali

    2016-08-01

    Full Text Available Background: Differences in demographic behaviours across countries and subnational regions have stimulated interest in studying the relationships between individual characteristics and the contexts in which individuals are embedded. Analytical approaches that include contextual indicators in statistical analyses of demographic behaviour need well-documented comparative data at the national and the subnational regional level. The Contextual Database (CDB of the Generations and Gender Programme (GGP; http://www.ggp-i.org/data/ggp-contextual-database supports such analyses by providing comparative data on demographic and socio-economic contexts in up to 60 countries in Europe, North America, Asia, and Oceania. Objective: This paper presents conceptual considerations and an overview of the content and the functionality of the CDB. Research examples illustrate how data from this database can increase the analytical potential of demographic analyses. Conclusions: The CDB is a state-of-the-art research tool that provides well-documented comparative data at the national and the subnational regional level. Although it is conceptually linked to the Generations and Gender Survey (GGS, it can also be used to analyse data from other surveys, to study macro developments, and for teaching and lecturing. The CDB has a number of valuable features. First, it has a large number of indicators specifically geared towards demographic analyses, which provide extensive temporal and geographic coverage. Second, its dynamic web environment provides a high degree of transparency on data sources, as it offers meta-data for each individual entry. Finally, the CDB supports geocoding schemes that are used by the GGS and other surveys to denote region and country of residence.

  12. RFID security a lightweight paradigm

    CERN Document Server

    Khattab, Ahmed; Amini, Esmaeil; Bayoumi, Magdy

    2017-01-01

    This book provides a comprehensive treatment of security in the widely adopted, Radio Frequency Identification (RFID) technology. The authors present the fundamental principles of RFID cryptography in a manner accessible to a broad range of readers, enabling them to improve their RFID security design. This book also offers the reader a range of interesting topics portraying the current state-of-the-art in RFID technology and how it can be integrated with today’s Internet of Things (IoT) vision. The authors describe a first-of-its-kind, lightweight symmetric authenticated encryption cipher called Redundant Bit Security (RBS), which enables significant, multi-faceted performance improvements compared to existing cryptosystems. This book is a must-read for anyone aiming to overcome the constraints of practical implementation in RFID security technologies.

  13. Patronage, Contextual Flexibility, and Organisational Innovation in Lebanese Protected Areas Management

    Directory of Open Access Journals (Sweden)

    Mads Solberg

    2014-01-01

    Full Text Available The Lebanese Shouf Biosphere Reserve (SBR counts among the most successful Middle Eastern conservation projects today. This article describes the evolution and contemporary management of conservation in Shouf. Using SBR as the empirical foci it argues that mobilisation of customary political hierarchies to secure environmental protection is not bound to impede conservation agendas as suggested by Kingston (2001, but rather provided the SBR with managerial flexibility under a weak state. The case study shows how new environmental agendas articulated with traditional political regimes in building novel, stable institutions. From these emerged contextually flexible solutions for mediating resources and negotiating nature. The Shouf′s particular clientelist political structure gave rise to networks simultaneously civic and part of the Lebanese state. Explaining the apparent stability of conservation practice in Shouf requires shifting analytical frames away from polarised debates either for or against the roles of state, civil society, and patronage in conservation.

  14. Quantum contextuality in neutron interferometer experiments

    International Nuclear Information System (INIS)

    Hasegawa, Yuji; Loidl, Rudolf; Baron, Matthias; Badurek, Gerald; Rauch, Helmut

    2006-01-01

    Non-local correlations between sufficiently separated subsystems have been extensively discussed. Such a non-locality can be interpreted as a consequence of the correlation between commuting observables. A more general concept, i.e., contextuality, compared to non-locality can be introduced to describe striking phenomena predicted by quantum theory. As the first example, we report a neutron interferometer experiment, where the spin and the path degrees of freedom are used to exhibit the clear violation of a Bell-like inequality. Other aspects of the quantum contextuality is presented, e.g., a flavor of Kochen-Specker-like contradiction in neutron optical experiments, in addition to the quantum state tomography of the Bell-states which are used in the experiments

  15. Academic Training Lecture Regular Programme: Computer Security - Introduction to information and computer security (1/4)

    CERN Multimedia

    2012-01-01

    Computer Security: Introduction to information and computer security (1/4), by Sebastian Lopienski (CERN).   Monday, 21 May, 2012 from 11:00 to 12:00 (Europe/Zurich) at CERN ( 31-3-004 - IT Auditorium ) Sebastian Lopienski is CERN's Deputy Computer Security Officer. He works on security strategy and policies; offers internal consultancy and audit services; develops and maintains security tools for vulnerability assessment and intrusion detection; provides training and awareness raising; and does incident investigation and response. During his work at CERN since 2001, Sebastian has had various assignments, including designing and developing software to manage and support services hosted in the CERN Computer Centre; providing Central CVS Service for software projects at CERN; and development of applications for accelerator controls in Java. He graduated from the University of Warsaw (MSc in Computer Science) in 2002, and earned an MBA degree at the Enterprise Administration Institute in Ai...

  16. Information Security - A Growing Challenge for Online Business

    OpenAIRE

    Gabriela GHEORGHE; Ioana LUPASC

    2017-01-01

    In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.

  17. CompTIA security+ review guide exam SY0-401

    CERN Document Server

    Stewart , James M

    2014-01-01

    Focused review for the CompTIA Security+ certification exam The CompTIA Security+ certification offers tremendous opportunities for IT professionals. For those who want to take their careers to the next level, CompTIA Security+ Review Guide: Exam SY0-401 is here to serve as a great resource for certification preparation. This concise, focused guide is easy to use and is organized by each exam objective for quick review and reinforcement of key topics. You'll find information on network security, compliance and operational security, and threats and vulnerabilities. Additionally, this indispensa

  18. 12 CFR 563g.20 - Form for securities sale report.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Form for securities sale report. 563g.20 Section 563g.20 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.20 Form for securities sale report. Office of Thrift Supervision, 1700 G Street, NW...

  19. 17 CFR 230.236 - Exemption of shares offered in connection with certain transactions.

    Science.gov (United States)

    2010-04-01

    ... Exemptions § 230.236 Exemption of shares offered in connection with certain transactions. Shares of stock or... securities in lieu of issuing fractional shares, script certificates or order forms, in connection with a stock dividend, stock split, reverse stock split, conversion, merger or similar transaction, shall be...

  20. ONLINE BANKING SECURITY INDUSTRY IN EMERGING CHINA MARKET

    OpenAIRE

    Liu, Rui

    2009-01-01

    In China, although traditional banks are still taking a wait-and-see approach in terms of offering their customers authentication tokens, online security technology is gaining momentum among Internet banks. During the last 15 years, technology for online banking security has undergone remarkable progress. The number of online banking users and the volume of transactions are increasing daily. Moreover, Chinese customers are paying more attention to online banking security issues, and are gradu...

  1. Contextuality supplies the 'magic' for quantum computation.

    Science.gov (United States)

    Howard, Mark; Wallman, Joel; Veitch, Victor; Emerson, Joseph

    2014-06-19

    Quantum computers promise dramatic advantages over their classical counterparts, but the source of the power in quantum computing has remained elusive. Here we prove a remarkable equivalence between the onset of contextuality and the possibility of universal quantum computation via 'magic state' distillation, which is the leading model for experimentally realizing a fault-tolerant quantum computer. This is a conceptually satisfying link, because contextuality, which precludes a simple 'hidden variable' model of quantum mechanics, provides one of the fundamental characterizations of uniquely quantum phenomena. Furthermore, this connection suggests a unifying paradigm for the resources of quantum information: the non-locality of quantum theory is a particular kind of contextuality, and non-locality is already known to be a critical resource for achieving advantages with quantum communication. In addition to clarifying these fundamental issues, this work advances the resource framework for quantum computation, which has a number of practical applications, such as characterizing the efficiency and trade-offs between distinct theoretical and experimental schemes for achieving robust quantum computation, and putting bounds on the overhead cost for the classical simulation of quantum algorithms.

  2. Perpendicularity misjudgments caused by contextual stimulus elements.

    Science.gov (United States)

    Bulatov, Aleksandr; Bulatova, Natalija; Surkys, Tadas

    2012-10-15

    It has been demonstrated in previous studies that the illusions of extent of the Brentano type can be explained by the perceptual positional shifts of the stimulus terminators in direction of the centers-of-masses (centroids) of adjacent contextual flanks [Bulatov, A. et al. (2011). Contextual flanks' tilting and magnitude of illusion of extent. Vision Research, 51(1), 58-64]. In the present study, the applicability of the centroid approach to explain the right-angle misjudgments was tested psychophysically using stimuli composed of three small disks (dots) forming an imaginary rectangular triangle. Stimuli comprised the Müller-Lyer wings or line segments (bars) as the contextual distracters rotated around the vertices of the triangle, and changes in the magnitude of the illusion of perpendicularity were measured in a set of experiments. A good resemblance between the experimental data and theoretical predictions obtained strongly supports the suggestion regarding the common "centroid" origin of the illusions of extent of the Brentano type and misperception of the perpendicularity investigated. 2012 Elsevier Ltd. All rights reserved

  3. Contextual memory, psychosis-proneness, and the experience of intrusive imagery.

    Science.gov (United States)

    Glazer, Daniel A; Mason, Oliver; King, John A; Brewin, Chris R

    2013-01-01

    This study tested the hypothesis that the presence and characteristics of naturally occurring involuntary imagery would be related to poorer context-dependent spatial memory and higher levels of proneness to psychotic experiences. Poorer contextual memory was also predicted to be associated with a greater sense of "nowness". Participants completed a virtual environment task that assessed contextual memory through responses that required allocentric and egocentric processing of virtual stimuli. Two questionnaires assessing predisposition to psychotic experiences were employed. Finally, participants completed an interview that required details of recent, naturally occurring involuntary images. Reports of involuntary imagery were associated with greater proneness to psychotic experiences but not with memory. In those participants who reported imagery, however, poorer memory performance was associated with more vivid and detailed intrusive imagery. Poorer contextual memory was specifically associated with a greater sense of "nowness". Possible links between contextual memory and proneness to psychosis are discussed.

  4. Security Frameworks for Machine-to-Machine Devices and Networks

    Science.gov (United States)

    Demblewski, Michael

    Attacks against mobile systems have escalated over the past decade. There have been increases of fraud, platform attacks, and malware. The Internet of Things (IoT) offers a new attack vector for Cybercriminals. M2M contributes to the growing number of devices that use wireless systems for Internet connection. As new applications and platforms are created, old vulnerabilities are transferred to next-generation systems. There is a research gap that exists between the current approaches for security framework development and the understanding of how these new technologies are different and how they are similar. This gap exists because system designers, security architects, and users are not fully aware of security risks and how next-generation devices can jeopardize safety and personal privacy. Current techniques, for developing security requirements, do not adequately consider the use of new technologies, and this weakens countermeasure implementations. These techniques rely on security frameworks for requirements development. These frameworks lack a method for identifying next generation security concerns and processes for comparing, contrasting and evaluating non-human device security protections. This research presents a solution for this problem by offering a novel security framework that is focused on the study of the "functions and capabilities" of M2M devices and improves the systems development life cycle for the overall IoT ecosystem.

  5. [Relational frame theory - a theoretical framework for contextual behavioral science].

    Science.gov (United States)

    Kensche, M; Schweiger, U

    2015-05-01

    Therapists have to deal with verbal systems and often work with verbal exchange. Therefore, a psychological theory is required, which teaches the therapist how to accomplish this task. The BRT is a theory of human language and cognition that explains how people use their verbal behavior as stimuli in their interrelations and how they act and react, based on the resulting relationships. This behavior is learned very early in the course of language acquisition and functions as a generalized operant. A prerequisite for this is the ability of people to undergo mental simulation. This enables them to construct diverse relational frameworks between individual stimuli. Without relational frameworks, people cannot function. The ability to establish a relational framework is a prerequisite for the formation of rule-governed behavior. Rule-governed behavior economizes complex decision processes, creates interpersonal security and enables dealing with events before they take place. On the other hand, the same properties that enable people to solve problems effectively can also contribute to rigid adherence to rules and experience avoidance. Relational frameworks, once established, outweigh other sources of behavioral regulation. Thus, it can become the basis of psychopathology. Poor contextual control makes it difficult for people to devote flexible, focused and voluntary attention to the present and align their actions with the immediate present. Contextual psychotherapy methods that are based on the BRT start precisely at this point: Targeted establishment of new contingencies in the therapeutic interaction through systematic strengthening of metacognitive mode and through the establishment of new rules that make possible a change in the rule-governed behavior enable undermining of dysfunctional rule-governed behavior and build up desirable behavior. This allows any therapeutic process to be more effective - regardless of the patient's expressed symptoms. © Georg Thieme

  6. [Relational Frame Theory--A Theoretical Framework for Contextual Behavioral Science].

    Science.gov (United States)

    Kensche, M; Schweiger, U

    2015-07-01

    Therapists have to deal with verbal systems and often work with verbal exchange. Therefore, a psychological theory is required, which teaches the therapist how to accomplish this task. The BRT is a theory of human language and cognition that explains how people use their verbal behavior as stimuli in their interrelations and how they act and react, based on the resulting relationships. This behavior is learned very early in the course of language acquisition and functions as a generalized operant. A prerequisite for this is the ability of people to undergo mental simulation. This enables them to construct diverse relational frameworks between individual stimuli. Without relational frameworks, people cannot function. The ability to establish a relational framework is a prerequisite for the formation of rule-governed behavior. Rule-governed behavior economizes complex decision processes, creates interpersonal security and enables dealing with events before they take place. On the other hand, the same properties that enable people to solve problems effectively can also contribute to rigid adherence to rules and experience avoidance. Relational frameworks, once established, outweigh other sources of behavioral regulation. Thus, it can become the basis of psychopathology. Poor contextual control makes it difficult for people to devote flexible, focused and voluntary attention to the present and align their actions with the immediate present. Contextual psychotherapy methods that are based on the BRT start precisely at this point: Targeted establishment of new contingencies in the therapeutic interaction through systematic strengthening of metacognitive mode and through the establishment of new rules that make possible a change in the rule-governed behavior enable undermining of dysfunctional rule-governed behavior and build up desirable behavior. This allows any therapeutic process to be more effective--regardless of the patient's expressed symptoms. © Georg Thieme

  7. A Critical assesment of IS Security Research Between 1990-2004

    DEFF Research Database (Denmark)

    Willison, Robert Andrew; Siponen, Mikko

    This paper reviews the IS security literature for the period 1990-2004. More specifically three security journals and the top twenty IS journals were examined. In total 1280 papers were analysed in terms of theories, research methods and research topics. Our research found that 1043 of the papers...... with fourteen of these topics totaling 71.05% of the articles. This papers offers implications for future research directions on IS security, scholars to publish IS security research, tenure practice, and IS security classification schemas....

  8. Information Security - A Growing Challenge for Online Business

    Directory of Open Access Journals (Sweden)

    Gabriela GHEORGHE

    2017-06-01

    Full Text Available In present, the cyber attack move to a global scale, also the online business cyber threats have the effect of impeding and even huge losses. Security issues currently facing online commerce, online payment systems require finding solutions to improve the security solutions offered by the providers of Business Information solution.

  9. Social Security Number Verification Service (SSNVS)

    Data.gov (United States)

    Social Security Administration — SSNVS is a service offered by SSA's Business Services Online (BSO). It is used by employers and certain third-party submitters to verify the accuracy of the names...

  10. Focal Event, Contextualization, and Effective Communication in the Mathematics Classroom

    Science.gov (United States)

    Nilsson, Per; Ryve, Andreas

    2010-01-01

    The aim of this article is to develop analytical tools for studying mathematical communication in collaborative activities. The theoretical construct of contextualization is elaborated methodologically in order to study diversity in individual thinking in relation to effective communication. The construct of contextualization highlights issues of…

  11. Pigeons Exhibit Contextual Cueing to Both Simple and Complex Backgrounds

    Science.gov (United States)

    Wasserman, Edward A.; Teng, Yuejia; Castro, Leyre

    2014-01-01

    Repeated pairings of a particular visual context with a specific location of a target stimulus facilitate target search in humans. We explored an animal model of this contextual cueing effect using a novel Cueing-Miscueing design. Pigeons had to peck a target which could appear in one of four possible locations on four possible color backgrounds or four possible color photographs of real-world scenes. On 80% of the trials, each of the contexts was uniquely paired with one of the target locations; on the other 20% of the trials, each of the contexts was randomly paired with the remaining target locations. Pigeons came to exhibit robust contextual cueing when the context preceded the target by 2 s, with reaction times to the target being shorter on correctly-cued trials than on incorrectly-cued trials. Contextual cueing proved to be more robust with photographic backgrounds than with uniformly colored backgrounds. In addition, during the context-target delay, pigeons predominately pecked toward the location of the upcoming target, suggesting that attentional guidance contributes to contextual cueing. These findings confirm the effectiveness of animal models of contextual cueing and underscore the important part played by associative learning in producing the effect. PMID:24491468

  12. Independence of long-term contextual memory and short-term perceptual hypotheses: Evidence from contextual cueing of interrupted search.

    Science.gov (United States)

    Schlagbauer, Bernhard; Mink, Maurice; Müller, Hermann J; Geyer, Thomas

    2017-02-01

    Observers are able to resume an interrupted search trial faster relative to responding to a new, unseen display. This finding of rapid resumption is attributed to short-term perceptual hypotheses generated on the current look and confirmed upon subsequent looks at the same display. It has been suggested that the contents of perceptual hypotheses are similar to those of other forms of memory acquired long-term through repeated exposure to the same search displays over the course of several trials, that is, the memory supporting "contextual cueing." In three experiments, we investigated the relationship between short-term perceptual hypotheses and long-term contextual memory. The results indicated that long-term, contextual memory of repeated displays neither affected the generation nor the confirmation of short-term perceptual hypotheses for these displays. Furthermore, the analysis of eye movements suggests that long-term memory provides an initial benefit in guiding attention to the target, whereas in subsequent looks guidance is entirely based on short-term perceptual hypotheses. Overall, the results reveal a picture of both long- and short-term memory contributing to reliable performance gains in interrupted search, while exerting their effects in an independent manner.

  13. Contextual approach to quantum formalism

    CERN Document Server

    Khrennikov, Andrei

    2009-01-01

    The aim of this book is to show that the probabilistic formalisms of classical statistical mechanics and quantum mechanics can be unified on the basis of a general contextual probabilistic model. By taking into account the dependence of (classical) probabilities on contexts (i.e. complexes of physical conditions), one can reproduce all distinct features of quantum probabilities such as the interference of probabilities and the violation of Bell’s inequality. Moreover, by starting with a formula for the interference of probabilities (which generalizes the well known classical formula of total probability), one can construct the representation of contextual probabilities by complex probability amplitudes or, in the abstract formalism, by normalized vectors of the complex Hilbert space or its hyperbolic generalization. Thus the Hilbert space representation of probabilities can be naturally derived from classical probabilistic assumptions. An important chapter of the book critically reviews known no-go theorems...

  14. Identification of the Level of Financial Security of an Insurance Company

    Directory of Open Access Journals (Sweden)

    Kozmenko Serhiy M.

    2014-02-01

    Full Text Available The article is devoted to theoretical and practical aspects of identification of financial security of the insurer. The article justifies urgency of identification of the level of financial security of the insurer and its qualitative assessment. It offers a scientific and methodical approach to identification of the level of financial security of the insurer on the basis of the conducted analysis of advantages and shortcomings of the existing approaches. The basis of the developed methods is a generalised assessment of the level of financial security of the insurer, which is offered to be carried out on the basis of calculation of statistical and dynamic integral indicators of financial security of the insurance company. The obtained integral assessments allow making a conclusion about efficiency of the selected strategy of the insurer and its ability to oppose to negative influence of threats to financial security. Results of calculation of integral indicators of financial security of the insurer allow identification of influence of fraud as the main threat to financial security of domestic insurance companies. The proposed approach was realised in practice of Ukrainian insurers and proved its efficiency.

  15. Cultural and Contextual Influences on Parenting in Mexican American Families

    Science.gov (United States)

    White, Rebecca M. B.; Roosa, Mark W.; Weaver, Scott R.; Nair, Rajni L.

    2009-01-01

    Family stress theory can explain associations between contextual stressors and parenting. The theory, however, has not been tested among Mexican Americans or expanded to include cultural-contextual risks. This study examined associations between neighborhood, economic, and acculturative stressors and parenting behaviors in a sample of 570…

  16. The 'mindless' relationship between nursing homes and emergency departments: what do Bourdieu and Freire have to offer?

    Science.gov (United States)

    McCloskey, Rose

    2011-06-01

    The 'mindless' relationship between nursing homes and emergency departments: what do Bourdieu and Freire have to offer? This paper explicates the long-standing and largely unquestioned adversarial relationship between nurses working in the nursing home (NH) and the emergency department (ED). Drawing on the author's own research on resident ED transfers, this paper reports on the conflict and tension that can arise when residents transfer between the two settings. The theoretical concepts of mindlessness, habitus, social capital and oppression are deployed to understand the contextual nature of the social relations that exist between NH and ED practitioners and between practitioners and residents. This theoretical discussion offers the potential to uncover the social relations that give rise to problematic transfers which may lead to alternative and more productive NH to ED transfers. © 2011 Blackwell Publishing Ltd.

  17. Robust Actor-Critic Contextual Bandit for Mobile Health (mHealth) Interventions

    OpenAIRE

    Zhu, Feiyun; Guo, Jun; Li, Ruoyu; Huang, Junzhou

    2018-01-01

    We consider the actor-critic contextual bandit for the mobile health (mHealth) intervention. State-of-the-art decision-making algorithms generally ignore the outliers in the dataset. In this paper, we propose a novel robust contextual bandit method for the mHealth. It can achieve the conflicting goal of reducing the influence of outliers while seeking for a similar solution compared with the state-of-the-art contextual bandit methods on the datasets without outliers. Such performance relies o...

  18. 3-D contextual Bayesian classifiers

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    In this paper we will consider extensions of a series of Bayesian 2-D contextual classification pocedures proposed by Owen (1984) Hjort & Mohn (1984) and Welch & Salter (1971) and Haslett (1985) to 3 spatial dimensions. It is evident that compared to classical pixelwise classification further...

  19. Formal Analysis of Graphical Security Models

    DEFF Research Database (Denmark)

    Aslanyan, Zaruhi

    , software components and human actors interacting with each other to form so-called socio-technical systems. The importance of socio-technical systems to modern societies requires verifying their security properties formally, while their inherent complexity makes manual analyses impracticable. Graphical...... models for security offer an unrivalled opportunity to describe socio-technical systems, for they allow to represent different aspects like human behaviour, computation and physical phenomena in an abstract yet uniform manner. Moreover, these models can be assigned a formal semantics, thereby allowing...... formal verification of their properties. Finally, their appealing graphical notations enable to communicate security concerns in an understandable way also to non-experts, often in charge of the decision making. This dissertation argues that automated techniques can be developed on graphical security...

  20. 17 CFR 239.33 - Form F-3, for registration under the Securities Act of 1933 of securities of certain foreign...

    Science.gov (United States)

    2010-04-01

    ... holding company and that the assets and liabilities of the successor at the time of succession were... Commission and posted on its corporate Web site, if any, all Interactive Data Files required to be submitted...) Primary offerings by certain registrants. Securities to be offered for cash by or on behalf of a...

  1. Unilateral hippocampal inactivation or lesion selectively impairs remote contextual fear memory.

    Science.gov (United States)

    Zhou, Heng; Zhou, Qixin; Xu, Lin

    2016-10-01

    Contextual fear memory depends on the hippocampus, but the role of unilateral hippocampus in this type of memory remains unclear. Herein, pharmacological inactivation or excitotoxic lesions were used to study the role of unilateral hippocampus in the stages of contextual fear memory. The pharmacological experiments revealed that compared with the control groups, unilateral hippocampal blockade did not impair 1-day recent memory following learning, whereas bilateral hippocampal blockade significantly impaired this memory. The lesion experiments showed that compared with the control groups, the formed contextual fear memory was retained for 7 days and that 30-day remote memory was markedly reduced in unilateral hippocampal lesion groups. These results indicate that an intact bilateral hippocampus is required for the formation of remote memory and that unilateral hippocampus is sufficient for recent contextual fear memory.

  2. Contextual Stress and Health Risk Behaviors among African American Adolescents

    Science.gov (United States)

    Copeland-Linder, Nikeea; Lambert, Sharon F.; Chen, Yi-Fu; Ialongo, Nicholas S.

    2011-01-01

    This study examined the longitudinal association between contextual stress and health risk behaviors and the role of protective factors in a community epidemiologically-defined sample of urban African American adolescents (N = 500; 46.4% female). Structural equation modeling was used to create a latent variable measuring contextual stress…

  3. Long-term energy services security: What is it and how can it be measured and valued?

    International Nuclear Information System (INIS)

    Jansen, Jaap C.; Seebregts, Ad J.

    2010-01-01

    The paper reviews some recent approaches towards measuring the extent of long-term energy security and security externality valuation. It starts out to discuss the contextual connotations of notions of 'energy security' in medium to long-term time frames and reviews some indicators that have been proposed to quantify it. Special attention is paid to two of these approaches, which the authors helped to develop, i.e. diversity-based indices and the Supply/Demand Index. The paper takes issue with conventional welfare economic approaches that neglect: (i) the scope on the demand side for raising security and (ii) negative feedback mechanisms of socio-political impacts of international rent transfers in fossil fuels exporting countries. The concept of energy services security is proposed with a demand-side focus. This enables application of an integrated approach to gauge the resilience of a society to meet the needs of its population for energy services over longer timescales ahead from various interrelated perspectives. Propositions are made on the attribution of security externalities to the use of fossil fuels, policies, and suggestions for further improvements of measures for energy services security.

  4. Does Contextual Cueing Guide the Deployment of Attention?

    OpenAIRE

    Kunar, Melina A.; Flusberg, Stephen; Horowitz, Todd S.; Wolfe, Jeremy M.

    2007-01-01

    Contextual cueing experiments show that when displays are repeated, reaction times (RTs) to find a target decrease over time even when observers are not aware of the repetition. It has been thought that the context of the display guides attention to the target. We tested this hypothesis by comparing the effects of guidance in a standard search task to the effects of contextual cueing. Firstly, in standard search, an improvement in guidance causes search slopes (derived from RT × Set Size func...

  5. Information security becoming a priority for utilities

    Energy Technology Data Exchange (ETDEWEB)

    Nicolaides, S. [Numerex, Atlanta, GA (United States)

    2009-10-15

    As part of North America's national critical infrastructure, utilities are finding themselves at the forefront of a security issue. In October 2007, a leading security service provider reported a 90 per cent increase in the number of hackers attempting to attack its utility clients in just one year. Utilities are vulnerable to cyber attacks that could disrupt power production and the transmission system. This article discussed the need for intelligent technologies in securely enabling resource management and operational efficiency of the utilities market. It discussed the unique security challenges that utilities face at a time of greater regulatory activity, heightened environmental concerns, tighter data security requirements and an increasing need for remote monitoring and control. A new tool has emerged for cyber security in the form of an international standard that may offer a strong guideline to work toward 11 security domains. These include security policy; organization of information security; asset management; human resources security; physical and environmental security; communications and operations management; access control; information systems acquisition; development and maintenance; information security incident management; business continuity management; and compliance. 2 figs.

  6. 17 CFR 230.903 - Offers or sales of securities by the issuer, a distributor, any of their respective affiliates...

    Science.gov (United States)

    2010-04-01

    ... applicable) are denominated in a currency other than U.S. dollars and such securities are neither convertible into U.S. dollar-denominated securities nor linked to U.S. dollars (other than through related currency or interest rate swap transactions that are commercial in nature) in a manner that in effect converts...

  7. Cost and performance analysis of physical security systems

    International Nuclear Information System (INIS)

    Hicks, M.J.; Yates, D.; Jago, W.H.; Phillips, A.W.

    1998-04-01

    Analysis of cost and performance of physical security systems can be a complex, multi-dimensional problem. There are a number of point tools that address various aspects of cost and performance analysis. Increased interest in cost tradeoffs of physical security alternatives has motivated development of an architecture called Cost and Performance Analysis (CPA), which takes a top-down approach to aligning cost and performance metrics. CPA incorporates results generated by existing physical security system performance analysis tools, and utilizes an existing cost analysis tool. The objective of this architecture is to offer comprehensive visualization of complex data to security analysts and decision-makers

  8. Contextualizing Data Warehouses with Documents

    DEFF Research Database (Denmark)

    Perez, Juan Manuel; Berlanga, Rafael; Aramburu, Maria Jose

    2008-01-01

    warehouse with a document warehouse, resulting in a contextualized warehouse. Thus, the user first selects an analysis context by supplying some keywords. Then, the analysis is performed on a novel type of OLAP cube, called an R-cube, which is materialized by retrieving and ranking the documents...

  9. A 3-D Contextual Classifier

    DEFF Research Database (Denmark)

    Larsen, Rasmus

    1997-01-01

    In this paper we will consider an extension of the Bayesian 2-D contextual class ification routine developed by Owen, Hjort \\$\\backslash\\$& Mohn to 3 spatial dimensions. It is evident that compared to classical pixelwise classification further information can be obtained by tak ing into account...

  10. Suppression of neurotoxic lesion-induced seizure activity: evidence for a permanent role for the hippocampus in contextual memory.

    Directory of Open Access Journals (Sweden)

    Fraser T Sparks

    Full Text Available Damage to the hippocampus (HPC using the excitotoxin N-methyl-D-aspartate (NMDA can cause retrograde amnesia for contextual fear memory. This amnesia is typically attributed to loss of cells in the HPC. However, NMDA is also known to cause intense neuronal discharge (seizure activity during the hours that follow its injection. These seizures may have detrimental effects on retrieval of memories. Here we evaluate the possibility that retrograde amnesia is due to NMDA-induced seizure activity or cell damage per se. To assess the effects of NMDA induced activity on contextual memory, we developed a lesion technique that utilizes the neurotoxic effects of NMDA while at the same time suppressing possible associated seizure activity. NMDA and tetrodotoxin (TTX, a sodium channel blocker, are simultaneously infused into the rat HPC, resulting in extensive bilateral damage to the HPC. TTX, co-infused with NMDA, suppresses propagation of seizure activity. Rats received pairings of a novel context with foot shock, after which they received NMDA-induced, TTX+NMDA-induced, or no damage to the HPC at a recent (24 hours or remote (5 weeks time point. After recovery, the rats were placed into the shock context and freezing was scored as an index of fear memory. Rats with an intact HPC exhibited robust memory for the aversive context at both time points, whereas rats that received NMDA or NMDA+TTX lesions showed a significant reduction in learned fear of equal magnitude at both the recent and remote time points. Therefore, it is unlikely that observed retrograde amnesia in contextual fear conditioning are due to disruption of non-HPC networks by propagated seizure activity. Moreover, the memory deficit observed at both time points offers additional evidence supporting the proposition that the HPC has a continuing role in maintaining contextual memories.

  11. 17 CFR 239.13 - Form S-3, for registration under the Securities Act of 1933 of securities of certain issuers...

    Science.gov (United States)

    2010-04-01

    ... predecessor or forming a holding company and that the assets and liabilities of the successor at the time of... posted on its corporate Web site, if any, all Interactive Data Files required to be submitted and posted... offerings by certain registrants. Securities to be offered for cash by or on behalf of a registrant, or...

  12. Contextuality is about identity of random variables

    International Nuclear Information System (INIS)

    Dzhafarov, Ehtibar N; Kujala, Janne V

    2014-01-01

    Contextual situations are those in which seemingly ‘the same’ random variable changes its identity depending on the conditions under which it is recorded. Such a change of identity is observed whenever the assumption that the variable is one and the same under different conditions leads to contradictions when one considers its joint distribution with other random variables (this is the essence of all Bell-type theorems). In our Contextuality-by-Default approach, instead of asking why or how the conditions force ‘one and the same’ random variable to change ‘its’ identity, any two random variables recorded under different conditions are considered different ‘automatically.’ They are never the same, nor are they jointly distributed, but one can always impose on them a joint distribution (probabilistic coupling). The special situations when there is a coupling in which these random variables are equal with probability 1 are considered noncontextual. Contextuality means that such couplings do not exist. We argue that the determination of the identity of random variables by conditions under which they are recorded is not a causal relationship and cannot violate laws of physics. (paper)

  13. The interplay of contextual elements in implementation: an ethnographic case study.

    Science.gov (United States)

    McCullough, Megan B; Chou, Ann F; Solomon, Jeffrey L; Petrakis, Beth Ann; Kim, Bo; Park, Angela M; Benedict, Ashley J; Hamilton, Alison B; Rose, Adam J

    2015-02-14

    Contextual elements have significant impact on uptake of health care innovations. While existing conceptual frameworks in implementation science suggest contextual elements interact with each other, little research has described how this might look in practice. To bridge this gap, this study identifies the interconnected patterns among contextual elements that influence uptake of an anticoagulation clinic improvement initiative. We completed 51 semi-structured interviews and ethnographic observations across five case study sites involved in an evidence-based practice (EBP) quality improvement initiative. We analyzed data in NVivo 10 using an a priori approach based on the Promoting Action on Research Implementation in Health Services (PARIHS) model and an emergent thematic analysis. Key contextual elements, such as leadership, teamwork, and communication, interacted with each other in contributing to site-level uptake of the EBP, often yielding results that could not be predicted by looking at just one of these elements alone. Sites with context conducive to change in these areas predictably had high uptake, while sites with uniformly weak contextual elements had low uptake. Most sites presented a mixed picture, with contextual elements being strongly supportive of change in some areas and weak or moderate in others. In some cases, we found that sites with strong context in at least one area only needed to have adequate context in other areas to yield high uptake. At other sites, weak context in just one area had the potential to contribute to low uptake, despite countervailing strengths. Even a site with positive views of EBPs could not succeed when context was weak. Interrelationships among different contextual elements can act as barriers to uptake at some sites and as facilitators at others. Accounting for interconnections among elements enables PARIHS to more fully describe the determinants of successful implementation as they operate in real-world settings.

  14. Effects of Normal Aging on Memory for Multiple Contextual Features

    Science.gov (United States)

    Gagnon, Sylvain; Soulard, Kathleen; Brasgold, Melissa; Kreller, Joshua

    2007-01-01

    Twenty-four younger (18-35 years) and 24 older adult participants (65 or older) were exposed to three experimental conditions involving the memorization words and their associated contextual features, with contextual feature complexity increasing from Conditions 1 to 3. In Condition 1, words presented varied only on one binary feature (color,…

  15. Inhibition of Rac1 activity in the hippocampus impaired extinction of contextual fear.

    Science.gov (United States)

    Jiang, Lizhu; Mao, Rongrong; Tong, Jianbin; Li, Jinnan; Chai, Anping; Zhou, Qixin; Yang, Yuexiong; Wang, Liping; Li, Lingjiang; Xu, Lin

    2016-10-01

    Promoting extinction of fear memory is the main treatment of fear disorders, especially post-traumatic stress disorder (PTSD). However, fear extinction is often incomplete in these patients. Our previous study had shown that Rac1 activity in hippocampus plays a crucial role in the learning of contextual fear memory in rats. Here, we further investigated whether Rac1 activity also modulated the extinction of contextual fear memory. We found that massed extinction obviously upregulated hippocampal Rac1 activity and induced long-term extinction of contextual fear in rats. Intrahippocampal injection of the Rac1 inhibitor NSC23766 prevents extinction of contextual fear in massed extinction training rats. In contrast, long-spaced extinction downregulated Rac1 activity and caused less extinction. And Rac1 activator CN04-A promotes extinction of contextual fear in long-spaced extinction rats. Our study demonstrates that inhibition of Rac1 activity in the hippocampus impaired extinction of contextual fear, suggesting that modulating Rac1 activity of the hippocampus may be promising therapy of fear disorders. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Contextual Bandits for Information Retrieval

    NARCIS (Netherlands)

    Hofmann, K.; Whiteson, S.; de Rijke, M.

    2011-01-01

    In this paper we give an overview of and outlook on research at the intersection of information retrieval (IR) and contextual bandit problems. A critical problem in information retrieval is online learning to rank, where a search engine strives to improve the quality of the ranked result lists it

  17. The offerings from the Hyperboreans.

    Science.gov (United States)

    Ruck, C A

    1983-08-01

    The ancient Greeks believed that the fruits of agriculture could be harvested only if one first appeased the spirit of the primitive avatars from which the edible crop had been evolved over the centuries through hybridization and cultivation. On occasion, this appeasement was secured through the sacrifice of a human victim, a person who for various reasons could be considered to represent a similar primitivism. By the classical age, this extreme form of sacrificial appeasement appears to have been reserved for times of unusual crisis, such as pestilence or natural disaster, for at such times, the resurgent forces of primitivism seemed to threaten the entire civilization with regression back to its wilder origins. Other forms of appeasement were ordinarily substituted for the actual offering of a human victim. Amongst these was the enactment of puberty rites, for the natural growth and maturation of an individual could be thought to symbolize this same evolutionary process. Each infant is born as a wild creature who must develop into a socialized adult through the metaphoric death of its former self as it assumes the responsibilities of civilized life in crossing the threshold to sexual maturity. A similar symbolic victim was customarily represented by the offering of first fruits. A portion of the cultivated crop was prematurely cut and consecrated to redeem and release the ripening harvest from the dangerous contamination with the spirits of its pre-agricultural precedents. On the island of Delos, a special version of this consecration was performed. Each year, the various Greek cities would send a sheaf of unripened grain to the sanctuary of the god Apollo and his twin sister Artemis. Amongst these annual offerings, there was one that was supposed to have originated from the Hyperboreans, a mythical people who were thought to live in the original homeland of the two gods. This special Hyperborean offering differed from the others, for it was said to contain a

  18. A Contextual Fire Detection Algorithm for Simulated HJ-1B Imagery

    Directory of Open Access Journals (Sweden)

    Xiangsheng Kong

    2009-02-01

    Full Text Available The HJ-1B satellite, which was launched on September 6, 2008, is one of the small ones placed in the constellation for disaster prediction and monitoring. HJ-1B imagery was simulated in this paper, which contains fires of various sizes and temperatures in a wide range of terrestrial biomes and climates, including RED, NIR, MIR and TIR channels. Based on the MODIS version 4 contextual algorithm and the characteristics of HJ-1B sensor, a contextual fire detection algorithm was proposed and tested using simulated HJ-1B data. It was evaluated by the probability of fire detection and false alarm as functions of fire temperature and fire area. Results indicate that when the simulated fire area is larger than 45 m2 and the simulated fire temperature is larger than 800 K, the algorithm has a higher probability of detection. But if the simulated fire area is smaller than 10 m2, only when the simulated fire temperature is larger than 900 K, may the fire be detected. For fire areas about 100 m2, the proposed algorithm has a higher detection probability than that of the MODIS product. Finally, the omission and commission error were evaluated which are important factors to affect the performance of this algorithm. It has been demonstrated that HJ-1B satellite data are much sensitive to smaller and cooler fires than MODIS or AVHRR data and the improved capabilities of HJ-1B data will offer a fine opportunity for the fire detection.

  19. Study on Uncertainty and Contextual Modelling

    Czech Academy of Sciences Publication Activity Database

    Klimešová, Dana; Ocelíková, E.

    2007-01-01

    Roč. 1, č. 1 (2007), s. 12-15 ISSN 1998-0140 Institutional research plan: CEZ:AV0Z10750506 Keywords : Knowledge * contextual modelling * temporal modelling * uncertainty * knowledge management Subject RIV: BD - Theory of Information

  20. Ecological theories of systems and contextual change in medical education.

    Science.gov (United States)

    Ellaway, Rachel H; Bates, Joanna; Teunissen, Pim W

    2017-12-01

    Contemporary medical practice is subject to many kinds of change, to which both individuals and systems have to respond and adapt. Many medical education programmes have their learners rotating through different training contexts, which means that they too must learn to adapt to contextual change. Contextual change presents many challenges to medical education scholars and practitioners, not least because of a somewhat fractured and contested theoretical basis for responding to these challenges. There is a need for robust concepts to articulate and connect the various debates on contextual change in medical education. Ecological theories of systems encompass a range of concepts of how and why systems change and how and why they respond to change. The use of these concepts has the potential to help medical education scholars explore the nature of change and understand the role it plays in affording as well as limiting teaching and learning. This paper, aimed at health professional education scholars and policy makers, explores a number of key concepts from ecological theories of systems to present a comprehensive model of contextual change in medical education to inform theory and practice in all areas of medical education. The paper considers a range of concepts drawn from ecological theories of systems, including biotic and abiotic factors, panarchy, attractors and repellers, basins of attraction, homeostasis, resilience, adaptability, transformability and hysteresis. Each concept is grounded in practical examples from medical education. Ecological theories of systems consider change and response in terms of adaptive cycles functioning at different scales and speeds. This can afford opportunities for systematic consideration of responses to contextual change in medical education, which in turn can inform the design of education programmes, activities, evaluations, assessments and research that accommodates the dynamics and consequences of contextual change.

  1. A different paradigm for security planning

    International Nuclear Information System (INIS)

    Hagengruber, R.

    2002-01-01

    Full text: Security costs at nuclear facilities have been relatively high for many years. Since the 1970s, these expenditures in the United States have grown much faster than inflation. After the tragedy of September 11, the rate of increase appears to be exponential. Within the National Nuclear Security Administration, the cost of security now is about 10 % of the entire budget. Research and Development (R and D) has played a role in modern security, but the rate of advancement of security technology has not been sufficient to moderate the increasing costs and performance demands. Part of this problem is associated with both an inadequate investment level and the lack of a visionary roadmap for security technology. The other element of the problem is the lack of a strategic framework or architecture that would allow security technology to be effectively placed in an overall context of functionality. A new concept for an architecture for security will be presented. Within this architecture, a different approach to design, use of technology, and evaluation of effectiveness will be offered. Promising areas of technology and design will be illustrated by specific examples and suggestions for advanced R and D will be made. (author)

  2. The Influence of Contextual Diversity on Eye Movements in Reading

    Science.gov (United States)

    Plummer, Patrick; Perea, Manuel; Rayner, Keith

    2014-01-01

    Recent research has shown contextual diversity (i.e., the number of passages in which a given word appears) to be a reliable predictor of word processing difficulty. It has also been demonstrated that word-frequency has little or no effect on word recognition speed when accounting for contextual diversity in isolated word processing tasks. An…

  3. Post-Training Unilateral Amygdala Lesions Selectively Impair Contextual Fear Memories

    Science.gov (United States)

    Flavell, Charlotte R.; Lee, Jonathan L. C.

    2012-01-01

    The basolateral amygdala (BLA) and the dorsal hippocampus (dHPC) are both structures with key roles in contextual fear conditioning. During fear conditioning, it is postulated that contextual representations of the environment are formed in the hippocampus, which are then associated with foot shock in the amygdala. However, it is not known to what…

  4. The effects of acute nicotine on contextual safety discrimination.

    Science.gov (United States)

    Kutlu, Munir G; Oliver, Chicora; Gould, Thomas J

    2014-11-01

    Anxiety disorders, such as post-traumatic stress disorder (PTSD), may be related to an inability to distinguish safe versus threatening environments and to extinguish fear memories. Given the high rate of cigarette smoking in patients with PTSD, as well as the recent finding that an acute dose of nicotine impairs extinction of contextual fear memory, we conducted a series of experiments to investigate the effect of acute nicotine in an animal model of contextual safety discrimination. Following saline or nicotine (at 0.0275, 0.045, 0.09 and 0.18 mg/kg) administration, C57BL/6J mice were trained in a contextual discrimination paradigm, in which the subjects received presentations of conditioned stimuli (CS) that co-terminated with a foot-shock in one context (context A (CXA)) and only CS presentations without foot-shock in a different context (context B (CXB)). Therefore, CXA was designated as the 'dangerous context', whereas CXB was designated as the 'safe context'. Our results suggested that saline-treated animals showed a strong discrimination between dangerous and safe contexts, while acute nicotine dose-dependently impaired contextual safety discrimination (Experiment 1). Furthermore, our results demonstrate that nicotine-induced impairment of contextual safety discrimination learning was not a result of increased generalized freezing (Experiment 2) or contingent on the common CS presentations in both contexts (Experiment 3). Finally, our results show that increasing the temporal gap between CXA and CXB during training abolished the impairing effects of nicotine (Experiment 4). The findings of this study may help link nicotine exposure to the safety learning deficits seen in anxiety disorder and PTSD patients. © The Author(s) 2014.

  5. Reducing Maternal Mortality in Papua New Guinea: Contextualizing Access to Safe Surgery and Anesthesia.

    Science.gov (United States)

    Dennis, Alicia T

    2018-01-01

    Papua New Guinea has one of the world's highest maternal mortality rates with approximately 215 women dying per 100,000 live births. The sustainable development goals outline key priority areas for achieving a reduction in maternal mortality including a focus on universal health coverage with safe surgery and anesthesia for all pregnant women. This narrative review addresses the issue of reducing maternal mortality in Papua New Guinea by contextualizing the need for safe obstetric surgery and anesthesia within a structure of enabling environments at key times in a woman's life. The 3 pillars of enabling environments are as follows: a stable humanitarian government; a safe, secure, and clean environment; and a strong health system. Key times, and their associated specific issues, in a woman's life include prepregnancy, antenatal, birth and the postpartum period, childhood, adolescence and young womanhood, and the postchildbearing years.

  6. An Analysis of Students Enrolled to an Undergraduate University Course Offered Also Online

    Science.gov (United States)

    Scarabottolo, Nello

    2016-01-01

    This paper analyzes the main characteristics of the students enrolled to a three-years undergraduate course on Security of Computer Systems and Networks, offered in traditional, classroom based fashion as well as online at the University of Milan (Italy). This allows to compare classroom and online students from several points of view, and gives…

  7. 76 FR 54998 - Request for Information on Consumer Financial Products and Services Offered to Servicemembers

    Science.gov (United States)

    2011-09-06

    ... public disclosure. Sensitive personal information such as account numbers or Social Security numbers... in person and online? 4. What programs, policies, accommodations, or benefits do financial service... protections and fraud protections. 5. What unique assistance, if any, is currently offered by financial...

  8. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    Energy Technology Data Exchange (ETDEWEB)

    Castro, R., E-mail: rodrigo.castro@visite.es [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Barbato, P. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy); Vega, J. [Asociacion EURATOM/CIEMAT para Fusion, Madrid (Spain); Taliercio, C. [Consorzio RFX, Euratom ENEA Association, Corso Stati Uniti 4, 35127 Padova (Italy)

    2011-10-15

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  9. Securing remote services by integrating SecurID strong authentication technology in EFDA-Federation infrastructure

    International Nuclear Information System (INIS)

    Castro, R.; Barbato, P.; Vega, J.; Taliercio, C.

    2011-01-01

    Remote participation facilities among fusion laboratories require access control solutions with two main objectives: to preserve the usability of the systems and to guaranty the required level of security for accessing to shared services. On one hand, this security solution has to be: single-sign-on, transparent for users, compatible with user mobility, and compatible with used client applications. On the other hand, it has to be compatible with shared services and resources among organisations, providing in each case the required access security level. EFDA-Federation is a security infrastructure that integrates a set of fusion laboratories and enables to share resources and services fulfilling the requirements previously described. In EFDA community, JET and RFX have security access policies to some of their services that require strong authentication mechanisms. In both cases, strong authentication is based on RSA SecurID tokens. This is a hardware device that is supplied to and generates a new password every minute. The job presents two main results. The first one is the integration of RSA SecurID into EFDA-Federation. Thanks to it, federated organisations are able to offer SecurID to their users as an alternative strong authentication mechanism, with the corresponding increase of security level. The second result is the development of a new access control mechanism based on port knocking techniques and its integration into EFDA-Federation. Additionally, a real application in RFX is presented and includes the integration of its SecurID infrastructure as federated authentication mechanism, and the application of the new access control mechanism to its MDSplus server.

  10. Time-dependent effects of cortisol on the contextualization of emotional memories.

    Science.gov (United States)

    van Ast, Vanessa A; Cornelisse, Sandra; Meeter, Martijn; Joëls, Marian; Kindt, Merel

    2013-12-01

    The inability to store fearful memories into their original encoding context is considered to be an important vulnerability factor for the development of anxiety disorders like posttraumatic stress disorder. Altered memory contextualization most likely involves effects of the stress hormone cortisol, acting via receptors located in the memory neurocircuitry. Cortisol via these receptors induces rapid nongenomic effects followed by slower genomic effects, which are thought to modulate cognitive function in opposite, complementary ways. Here, we targeted these time-dependent effects of cortisol during memory encoding and tested subsequent contextualization of emotional and neutral memories. In a double-blind, placebo-controlled design, 64 men were randomly assigned to one of three groups: 1) received 10 mg hydrocortisone 30 minutes (rapid cortisol effects) before a memory encoding task; 2) received 10 mg hydrocortisone 210 minutes (slow cortisol) before a memory encoding task; or 3) received placebo at both times. During encoding, participants were presented with neutral and emotional words in unique background pictures. Approximately 24 hours later, context dependency of their memories was assessed. Recognition data revealed that cortisol's rapid effects impair emotional memory contextualization, while cortisol's slow effects enhance it. Neutral memory contextualization remained unaltered by cortisol, irrespective of the timing of the drug. This study shows distinct time-dependent effects of cortisol on the contextualization of specifically emotional memories. The results suggest that rapid effects of cortisol may lead to impaired emotional memory contextualization, while slow effects of cortisol may confer protection against emotional memory generalization. © 2013 Society of Biological Psychiatry.

  11. Toward a Theory of Human Security

    OpenAIRE

    Tanaka, Akihiko

    2015-01-01

    “Human security” has occupied a significant place in the global discourses of peace, development, and diplomacy, despite often made criticisms of its conceptual ambiguity. Arguing for the merit of a broader definition of human security, i.e. “the right of people to live in freedom and dignity, free from poverty and despair” (UN Resolution A/RES/66/290), this paper offers an interdisciplinary theoretical framework in which key aspects of human security are systematically laid out: types of thr...

  12. Hypobaric hypoxia impairs cued and contextual fear memory in rats.

    Science.gov (United States)

    Kumari, Punita; Kauser, Hina; Wadhwa, Meetu; Roy, Koustav; Alam, Shahnawaz; Sahu, Surajit; Kishore, Krishna; Ray, Koushik; Panjwani, Usha

    2018-04-26

    Fear memory is essential for survival, and its dysregulation leads to disorders. High altitude hypobaric hypoxia (HH) is known to induce cognitive decline. However, its effect on fear memory is still an enigma. We aimed to investigate the temporal effect of HH on fear conditioning and the underlying mechanism. Adult male Sprague-Dawley rats were trained for fear conditioning and exposed to simulated HH equivalent to 25,000 ft for different durations (1, 3, 7, 14 and 21 days). Subsequently, rats were tested for cued and contextual fear conditioning. Neuronal morphology, apoptosis and DNA fragmentation were studied in the medial prefrontal cortex (mPFC), hippocampus and basolateral amygdala (BLA). We observed significant deficit in cued and contextual fear acquisition (at 1, 3 and 7 days) and consolidation (cued at 1 and 3 days and contextual fear at 1, 3 and 7 days) under HH. HH exposure with retraining showed the earlier restoration of contextual fear memory. Further, we found a gradual increase in the number of pyknotic and apoptotic neurons together with the increase in DNA fragmentation in mPFC, hippocampus, and BLA up to 7 days of HH exposure. The present study concludes that HH exposure equivalent to 25000 ft induced cued and contextual fear memory deficit (acquisition and consolidation) which is found to be correlated with the neurodegenerative changes in the limbic brain regions. Copyright © 2018. Published by Elsevier B.V.

  13. FS-OpenSecurity: A Taxonomic Modeling of Security Threats in SDN for Future Sustainable Computing

    Directory of Open Access Journals (Sweden)

    Yunsick Sung

    2016-09-01

    Full Text Available Software Defined Networking (SDN has brought many changes in terms of the interaction processes between systems and humans. It has become the key enabler of software defined architecture, which allows enterprises to build a highly agile Information Technology (IT infrastructure. For Future Sustainability Computing (FSC, SDN needs to deliver on many information technology commitments—more automation, simplified design, increased agility, policy-based management, and network management bond to more liberal IT workflow systems. To address the sustainability problems, SDN needs to provide greater collaboration and tighter integration with networks, servers, and security teams that will have an impact on how enterprises design, plan, deploy and manage networks. In this paper, we propose FS-OpenSecurity, which is a new and pragmatic security architecture model. It consists of two novel methodologies, Software Defined Orchestrator (SDO and SQUEAK, which offer a robust and secure architecture. The secure architecture is required for protection from diverse threats. Usually, security administrators need to handle each threat individually. However, handling threats automatically by adapting to the threat landscape is a critical demand. Therefore, the architecture must handle defensive processes automatically that are collaboratively based on intelligent external and internal information.

  14. Differential patterns of contextual organization of memory in first-episode psychosis.

    Science.gov (United States)

    Murty, Vishnu P; McKinney, Rachel A; DuBrow, Sarah; Jalbrzikowski, Maria; Haas, Gretchen L; Luna, Beatriz

    2018-02-15

    Contextual information is used to support and organize episodic memory. Prior research has reliably shown memory deficits in psychosis; however, little research has characterized how this population uses contextual information during memory recall. We employed an approach founded in a computational framework of free recall to quantify how individuals with first episode of psychosis (FEP, N = 97) and controls (CON, N = 55) use temporal and semantic context to organize memory recall. Free recall was characterized using the Hopkins Verbal Learning Test-Revised (HVLT-R). We compared FEP and CON on three measures of free recall: proportion recalled, temporal clustering, and semantic clustering. Measures of temporal/semantic clustering quantified how individuals use contextual information to organize memory recall. We also assessed to what extent these measures relate to antipsychotic use and differentiated between different types of psychosis. We also explored the relationship between these measures and intelligence. In comparison to CON, FEP had reduced recall and less temporal clustering during free recall (p contextual organization of memory. IQ was related to free recall accuracy, but not the use of contextual information during recall in either group (p < 0.05, Bonferroni-corrected). These results show that in addition to deficits in memory recall, FEP differed in how they organize memories compared to CON.

  15. Graphs for information security control in software defined networks

    Science.gov (United States)

    Grusho, Alexander A.; Abaev, Pavel O.; Shorgin, Sergey Ya.; Timonina, Elena E.

    2017-07-01

    Information security control in software defined networks (SDN) is connected with execution of the security policy rules regulating information accesses and protection against distribution of the malicious code and harmful influences. The paper offers a representation of a security policy in the form of hierarchical structure which in case of distribution of resources for the solution of tasks defines graphs of admissible interactions in a networks. These graphs define commutation tables of switches via the SDN controller.

  16. Contextualizing Smoking Behaviour over Time: A Smoking Journey from Pleasuring to Suffering

    Directory of Open Access Journals (Sweden)

    Khaldoun Aldiabat

    2012-01-01

    Full Text Available This paper reports a qualitative study describing the basic psychosocial process of contextualizing smoking behaviour in the life fabric of Jordanian psychiatric nurses (JPNs. A classical grounded theory method was used to collect and analyze the data derived from a theoretical (purposeful sample of eight Jordanian psychiatric nurses in 2009-2010. The constant comparative method of data analysis was used; thus, data collection, coding and analysis occurred simultaneously. Strategies were used throughout the study to ensure trustworthiness; that is, fulfill the requirements for credibility, transferability, dependability and confirmability. “Contextualizing smoking behaviour over time” was the core concept that explained how JPNs integrate smoking behaviour into their life fabric. For these nurses, smoking is contextualized in four phases: becoming a novice smoker, becoming a formal smoker as a nursing student, becoming a heavy smoking psychiatric nurse, and becoming an exhausted smoker. Contextualizing smoking among JPNs demonstrates that those nurses frequently normalize smoking as part of the fabric of everyday life. Participants described their smoking as a journey in a manner that reflected how it started with pleasuring and ended with suffering. Although this study presents a deep understanding of smoking behaviour, further studies are required to develop the theory of contextualized smoking. A developed contextualized theory of smoking is required to guide culturally sensitive smoking cessation and prevention programmes capable of influencing smoking behaviours.

  17. Contextualizing Smoking Behaviour over Time: A Smoking Journey from Pleasuring to Suffering

    Directory of Open Access Journals (Sweden)

    Khaldoun Aldiabat

    2012-01-01

    Full Text Available This paper reports a qualitative study describing the basic psychosocial process of contextualizing smoking behaviour in the life fabric of Jordanian psychiatric nurses (JPNs. A classical grounded theory method was used to collect and analyze the data derived from a theoretical (purposeful sample of eight Jordanian psychiatric nurses in 2009-2010. The constant comparative method of data analysis was used; thus, data collection, coding and analysis occurred simultaneously. Strategies were used throughout the study to ensure trustworthiness; that is, fulfill the requirements for credibility, transferability, dependability and confirmability. “Contextualizing smoking behaviour over time” was the core concept that explained how JPNs integrate smoking behaviour into their life fabric. For these nurses, smoking is contextualized in four phases: becoming a novice smoker, becoming a formal smoker as a nursing student, becoming a heavy smoking psychiatric nurse, and becoming an exhausted smoker. Contextualizing smoking among JPNs demonstrates that those nurses frequently normalize smoking as part of the fabric of everyday life. Participants described their smoking as a journey in a manner that reflected how it started with pleasuring and ended with suffering. Although this study presents a deep understanding of smoking behaviour, further studies are required to develop the theory of contextualized smoking. A developed contextualized theory of smoking is required to guide culturally sensitive smoking cessation and prevention programmes capable of influencing smoking behaviours

  18. Generation and memory for contextual detail.

    Science.gov (United States)

    Mulligan, Neil W

    2004-07-01

    Generation enhances item memory but may not enhance other aspects of memory. In 12 experiments, the author investigated the effect of generation on context memory, motivated in part by the hypothesis that generation produces a trade-off in encoding item and contextual information. Participants generated some study words (e.g., hot-c__) and read others (e.g., hot-cold). Generation consistently enhanced item memory but did not enhance context memory. More specifically, generation disrupted context memory for the color of the target word but did not affect context memory for location, background color, and cue-word color. The specificity of the negative generation effect in context memory argues against a general item-context trade-off. A processing account of generation meets greater success. In addition, the results provide no evidence that generation enhances recollection of contextual details. Copyright 2004 APA, all rights reserved

  19. Crude oil–corn–ethanol – nexus: A contextual approach

    International Nuclear Information System (INIS)

    Natanelov, Valeri; McKenzie, Andrew M.; Van Huylenbroeck, Guido

    2013-01-01

    This paper offers a holistic study on the complex relationships between crude oil, corn and ethanol during a turbulent period between 2006 and end of 2011. Through a holistic mapping of the current market situation and a contextual analytical design we show that there exists a strong relationship between crude oil and corn markets on one side, and crude oil and ethanol on the other. However, the price relationship between corn and ethanol was revealed to be less straightforward, and is driven by the US government fuel policy. Furthermore the study indicates that corn markets have became more prone to volatility due to ethanol production, especially when the demand for corn is high and/or the crude oil prices are high enough to create a competitive market for ethanol. - Highlights: • Strong relationship between crude oil–corn and crude oil–ethanol. • Corn–ethanol connected through a by-pass of crude oil markets. • Ethanol market has no direct impact on the price levels of corn. • Corn markets became more prone to volatility due to ethanol production

  20. Secure Architectures in the Cloud

    NARCIS (Netherlands)

    De Capitani di Vimercati, Sabrina; Pieters, Wolter; Probst, Christian W.

    2011-01-01

    This report documents the outcomes of Dagstuhl Seminar 11492 “Secure Architectures in the Cloud‿. In cloud computing, data storage and processing are offered as services, and data are managed by external providers that reside outside the control of the data owner. The use of such services reduces

  1. Secure Storage Architectures

    Energy Technology Data Exchange (ETDEWEB)

    Aderholdt, Ferrol [Tennessee Technological University; Caldwell, Blake A [ORNL; Hicks, Susan Elaine [ORNL; Koch, Scott M [ORNL; Naughton, III, Thomas J [ORNL; Pogge, James R [Tennessee Technological University; Scott, Stephen L [Tennessee Technological University; Shipman, Galen M [ORNL; Sorrillo, Lawrence [ORNL

    2015-01-01

    help with this issue, which are a particular instances of the more general challenge of efficient host/guest IO that is the focus of interfaces like virtio. A collection of bridging technologies have been identified in Chapter 4, which can be helpful to overcome the limitations and challenges of supporting efficient storage for secure enclaves. The synthesis of native filesystem security mechanisms and bridging technologies led to an isolation-centric storage architecture that is proposed in Chapter 5, which leverages isolation mechanisms from different layers to facilitate secure storage for an enclave. Recommendations: The following highlights recommendations from the investigations done thus far. - The Lustre filesystem offers excellent performance but does not support some security related features, e.g., encryption, that are included in GPFS. If encryption is of paramount importance, then GPFS may be a more suitable choice. - There are several possible Lustre related enhancements that may provide functionality of use for secure-enclaves. However, since these features are not currently integrated, the use of Lustre as a secure storage system may require more direct involvement (support). (*The network that connects the storage subsystem and users, e.g., Lustre s LNET.) - The use of OpenStack with GPFS will be more streamlined than with Lustre, as there are available drivers for GPFS. - The Manilla project offers Filesystem as a Service for OpenStack and is worth further investigation. Manilla has some support for GPFS. - The proposed Lustre enhancement of Dynamic-LNET should be further investigated to provide more dynamic changes to the storage network which could be used to isolate hosts and their tenants. - The Linux namespaces offer a good solution for creating efficient restrictions to shared HPC filesystems. However, we still need to conduct a thorough round of storage/filesystem benchmarks. - Vendor products should be more closely reviewed, possibly to

  2. Optimizing ZigBee Security using Stochastic Model Checking

    DEFF Research Database (Denmark)

    Yuksel, Ender; Nielson, Hanne Riis; Nielson, Flemming

    , we identify an important gap in the specification on key updates, and present a methodology for determining optimal key update policies and security parameters. We exploit the stochastic model checking approach using the probabilistic model checker PRISM, and assess the security needs for realistic......ZigBee is a fairly new but promising wireless sensor network standard that offers the advantages of simple and low resource communication. Nevertheless, security is of great concern to ZigBee, and enhancements are prescribed in the latest ZigBee specication: ZigBee-2007. In this technical report...

  3. The Impact of Contextual Clue Selection on Inference

    Directory of Open Access Journals (Sweden)

    Leila Barati

    2010-05-01

    Full Text Available Linguistic information can be conveyed in the form of speech and written text, but it is the content of the message that is ultimately essential for higher-level processes in language comprehension, such as making inferences and associations between text information and knowledge about the world. Linguistically, inference is the shovel that allows receivers to dig meaning out from the text with selecting different embedded contextual clues. Naturally, people with different world experiences infer similar contextual situations differently. Lack of contextual knowledge of the target language can present an obstacle to comprehension (Anderson & Lynch, 2003. This paper tries to investigate how true contextual clue selection from the text can influence listener’s inference. In the present study 60 male and female teenagers (13-19 and 60 male and female young adults (20-26 were selected randomly based on Oxford Placement Test (OPT. During the study two fiction and two non-fiction passages were read to the participants in the experimental and control groups respectively and they were given scores according to Lexile’s Score (LS[1] based on their correct inference and logical thinking ability. In general the results show that participants’ clue selection based on their personal schematic references and background knowledge differ between teenagers and young adults and influence inference and listening comprehension. [1]- This is a framework for reading and listening which matches the appropriate score to each text based on degree of difficulty of text and each text was given a Lexile score from zero to four.

  4. The Coming Challenge: Are Community Colleges Ready for the New Wave of Contextual Learners?

    Science.gov (United States)

    Hull, Dan; Souders, John C., Jr.

    1996-01-01

    Defines contextual learning, or presenting new information to students in familiar contexts. Argues that community colleges must be ready for an anticipated increase in contextual learners due to its use in tech prep programs. Describes elements of contextual learning, its application in the classroom, and ways that colleges can prepare for…

  5. Clarifying Resilience in the Context of Homeland Security

    Science.gov (United States)

    2013-03-01

    Resilience Is a Complex Adaptive System of Systems ( CASoS ) ....60 4. Resilience Is Experienced and Demonstrated in Different Ways ..60 5. Resilience Is...The inclusion of a resilience module into existing homeland security training programs broadens the practitioner’s knowledge base from a basic level...psychology offer several considerations for the homeland security practitioner. The first consideration maintains that a de -emphasis on the

  6. Rapid contextual conditioning in autoshaping.

    Science.gov (United States)

    Balsam, P D; Schwartz, A L

    1981-10-01

    Two experiments are reported which investigate the speed of contextual conditioning in autoshaping. In both experiments, a procedure was employed in which ring doves were magazine trained in one context prior to the manipulation of background values in a second context. In Experiment 1, subjects were exposed to 4, 8, 64, 128, or 256 US-only presentations prior to autoshaping. Acquisition speed and maintained response measures were monotonically related to the number of pretraining trials. Subjects in Group 4 acquired the key-peck response fastest, and retardation was maximal within 64 pretraining trials. In Experiment 2, subjects given 20 pretraining trials were significantly more retarded than subjects given 2 pretraining trials, but only when pretraining and testing were conducted in the same context. Overall, the results of these experiments show that in autoshaping, contextual conditioning is very rapid; this demonstrates the plausibility of theoretical accounts of Pavlovian conditioning which assert that the development of the conditioned response depends on the associative values of both the CS and background stimuli.

  7. Restaurant owners' perspectives on a voluntary program to recognize restaurants for offering reduced-size portions, Los Angeles County, 2012.

    Science.gov (United States)

    Gase, Lauren; Dunning, Lauren; Kuo, Tony; Simon, Paul; Fielding, Jonathan E

    2014-03-20

    Reducing the portion size of food and beverages served at restaurants has emerged as a strategy for addressing the obesity epidemic; however, barriers and facilitators to achieving this goal are not well characterized. In fall 2012, the Los Angeles County Department of Public Health conducted semistructured interviews with restaurant owners to better understand contextual factors that may impede or facilitate participation in a voluntary program to recognize restaurants for offering reduced-size portions. Interviews were completed with 18 restaurant owners (representing nearly 350 restaurants). Analyses of qualitative data revealed 6 themes related to portion size: 1) perceived customer demand is central to menu planning; 2) multiple portion sizes are already being offered for at least some food items; 3) numerous logistical barriers exist for offering reduced-size portions; 4) restaurant owners have concerns about potential revenue losses from offering reduced-size portions; 5) healthful eating is the responsibility of the customer; and 6) a few owners want to be socially responsible industry leaders. A program to recognize restaurants for offering reduced-size portions may be a feasible approach in Los Angeles County. These findings may have applications for jurisdictions interested in engaging restaurants as partners in reducing the obesity epidemic.

  8. Restaurant Owners’ Perspectives on a Voluntary Program to Recognize Restaurants for Offering Reduced-Size Portions, Los Angeles County, 2012

    Science.gov (United States)

    Dunning, Lauren; Kuo, Tony; Simon, Paul; Fielding, Jonathan E.

    2014-01-01

    Introduction Reducing the portion size of food and beverages served at restaurants has emerged as a strategy for addressing the obesity epidemic; however, barriers and facilitators to achieving this goal are not well characterized. Methods In fall 2012, the Los Angeles County Department of Public Health conducted semistructured interviews with restaurant owners to better understand contextual factors that may impede or facilitate participation in a voluntary program to recognize restaurants for offering reduced-size portions. Results Interviews were completed with 18 restaurant owners (representing nearly 350 restaurants). Analyses of qualitative data revealed 6 themes related to portion size: 1) perceived customer demand is central to menu planning; 2) multiple portion sizes are already being offered for at least some food items; 3) numerous logistical barriers exist for offering reduced-size portions; 4) restaurant owners have concerns about potential revenue losses from offering reduced-size portions; 5) healthful eating is the responsibility of the customer; and 6) a few owners want to be socially responsible industry leaders. Conclusion A program to recognize restaurants for offering reduced-size portions may be a feasible approach in Los Angeles County. These findings may have applications for jurisdictions interested in engaging restaurants as partners in reducing the obesity epidemic. PMID:24650622

  9. Offers

    CERN Multimedia

    Staff Association

    2012-01-01

    L'Occitane en Provence proposes the following offer: 10 % discount on all products in all L'Occitane shops in Metropolitan France upon presentation of your Staff Association membership card and a valid ID. This offer is valid only for one person, is non-transferable and cannot be combined with other promotions.

  10. Context-specific attentional sampling: Intentional control as a pre-requisite for contextual control.

    Science.gov (United States)

    Brosowsky, Nicholaus P; Crump, Matthew J C

    2016-08-01

    Recent work suggests that environmental cues associated with previous attentional control settings can rapidly and involuntarily adjust attentional priorities. The current study tests predictions from adaptive-learning and memory-based theories of contextual control about the role of intentions for setting attentional priorities. To extend the empirical boundaries of contextual control phenomena, and to determine whether theoretical principles of contextual control are generalizable we used a novel bi-dimensional stimulus sampling task. Subjects viewed briefly presented arrays of letters and colors presented above or below fixation, and identified specific stimuli according to a dimensional (letter or color) and positional cue. Location was predictive of the cued dimension, but not the position or identity. In contrast to previous findings, contextual control failed to develop through automatic, adaptive-learning processes. Instead, previous experience with intentionally changing attentional sampling priorities between different contexts was required for contextual control to develop. Copyright © 2016 Elsevier Inc. All rights reserved.

  11. Improving Tamper Detection for Hazardous Waste Security

    International Nuclear Information System (INIS)

    Johnston, R. G.; Garcia, A. R. E.; Pacheco, N.; Martinez, R. K.; Martinez, D. D.; Trujillo, S. J.; Lopez, L. N.

    2003-01-01

    Since September 11, waste managers are increasingly expected to provide effective security for their hazardous wastes. Tamper-indicating seals can help. This paper discusses seals, and offers recommendations for how to choose and use them

  12. Teaching Information Security with Workflow Technology--A Case Study Approach

    Science.gov (United States)

    He, Wu; Kshirsagar, Ashish; Nwala, Alexander; Li, Yaohang

    2014-01-01

    In recent years, there has been a significant increase in the demand from professionals in different areas for improving the curricula regarding information security. The use of authentic case studies in teaching information security offers the potential to effectively engage students in active learning. In this paper, the authors introduce the…

  13. A Pilot Study of a Functional Contextual Treatment for Bulimia Nervosa

    Science.gov (United States)

    Anderson, Drew A.; Simmons, Angela M.

    2008-01-01

    This paper describes the initial development of a treatment for bulimia nervosa using a functional contextual treatment approach. Seven women (6 with a diagnosis of bulimia nervosa and 1 with a diagnosis of eating disorder not otherwise specified) completed 12 sessions of functional contextual treatment. Participants were assessed with the Eating…

  14. Robust Contextual Bandit via the Capped-$\\ell_{2}$ norm

    OpenAIRE

    Zhu, Feiyun; Zhu, Xinliang; Wang, Sheng; Yao, Jiawen; Huang, Junzhou

    2017-01-01

    This paper considers the actor-critic contextual bandit for the mobile health (mHealth) intervention. The state-of-the-art decision-making methods in mHealth generally assume that the noise in the dynamic system follows the Gaussian distribution. Those methods use the least-square-based algorithm to estimate the expected reward, which is prone to the existence of outliers. To deal with the issue of outliers, we propose a novel robust actor-critic contextual bandit method for the mHealth inter...

  15. Social enterprises in Denmark: Historical, contextual and conceptual aspects

    DEFF Research Database (Denmark)

    Andersen, Linda Lundgaard; Hulgård, Lars; Jacobsen, Gurli

    Social enterprises in Denmark: Historical, contextual and conceptual aspectsLinda Lundgaard Andersen & Lars Hulgård, Center for Social Enterprise, Roskilde UniversityGurli Jakobsen, Copenhagen Business SchoolCOST Action (EMPOWER‐SE)Working Group 1, Lisbon 28. february & 1. march 2018......Social enterprises in Denmark: Historical, contextual and conceptual aspectsLinda Lundgaard Andersen & Lars Hulgård, Center for Social Enterprise, Roskilde UniversityGurli Jakobsen, Copenhagen Business SchoolCOST Action (EMPOWER‐SE)Working Group 1, Lisbon 28. february & 1. march 2018...

  16. Sleep modulates the neural substrates of both spatial and contextual memory consolidation.

    Directory of Open Access Journals (Sweden)

    Géraldine Rauchs

    Full Text Available It is known that sleep reshapes the neural representations that subtend the memories acquired while navigating in a virtual environment. However, navigation is not process-pure, as manifold learning components contribute to performance, notably the spatial and contextual memory constituents. In this context, it remains unclear whether post-training sleep globally promotes consolidation of all of the memory components embedded in virtual navigation, or rather favors the development of specific representations. Here, we investigated the effect of post-training sleep on the neural substrates of the consolidation of spatial and contextual memories acquired while navigating in a complex 3D, naturalistic virtual town. Using fMRI, we mapped regional cerebral activity during various tasks designed to tap either the spatial or the contextual memory component, or both, 72 h after encoding with or without sleep deprivation during the first post-training night. Behavioral performance was not dependent upon post-training sleep deprivation, neither in a natural setting that engages both spatial and contextual memory processes nor when looking more specifically at each of these memory representations. At the neuronal level however, analyses that focused on contextual memory revealed distinct correlations between performance and neuronal activity in frontal areas associated with recollection processes after post-training sleep, and in the parahippocampal gyrus associated with familiarity processes in sleep-deprived participants. Likewise, efficient spatial memory was associated with posterior cortical activity after sleep whereas it correlated with parahippocampal/medial temporal activity after sleep deprivation. Finally, variations in place-finding efficiency in a natural setting encompassing spatial and contextual elements were associated with caudate activity after post-training sleep, suggesting the automation of navigation. These data indicate that post

  17. Secure quantum private information retrieval using phase-encoded queries

    Energy Technology Data Exchange (ETDEWEB)

    Olejnik, Lukasz [CERN, 1211 Geneva 23, Switzerland and Poznan Supercomputing and Networking Center, Noskowskiego 12/14, PL-61-704 Poznan (Poland)

    2011-08-15

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  18. Secure quantum private information retrieval using phase-encoded queries

    International Nuclear Information System (INIS)

    Olejnik, Lukasz

    2011-01-01

    We propose a quantum solution to the classical private information retrieval (PIR) problem, which allows one to query a database in a private manner. The protocol offers privacy thresholds and allows the user to obtain information from a database in a way that offers the potential adversary, in this model the database owner, no possibility of deterministically establishing the query contents. This protocol may also be viewed as a solution to the symmetrically private information retrieval problem in that it can offer database security (inability for a querying user to steal its contents). Compared to classical solutions, the protocol offers substantial improvement in terms of communication complexity. In comparison with the recent quantum private queries [Phys. Rev. Lett. 100, 230502 (2008)] protocol, it is more efficient in terms of communication complexity and the number of rounds, while offering a clear privacy parameter. We discuss the security of the protocol and analyze its strengths and conclude that using this technique makes it challenging to obtain the unconditional (in the information-theoretic sense) privacy degree; nevertheless, in addition to being simple, the protocol still offers a privacy level. The oracle used in the protocol is inspired both by the classical computational PIR solutions as well as the Deutsch-Jozsa oracle.

  19. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  20. Dense Iterative Contextual Pixel Classification using Kriging

    DEFF Research Database (Denmark)

    Ganz, Melanie; Loog, Marco; Brandt, Sami

    2009-01-01

    have been proposed to this end, e.g., iterative contextual pixel classification, iterated conditional modes, and other approaches related to Markov random fields. A problem of these methods, however, is their computational complexity, especially when dealing with high-resolution images in which......In medical applications, segmentation has become an ever more important task. One of the competitive schemes to perform such segmentation is by means of pixel classification. Simple pixel-based classification schemes can be improved by incorporating contextual label information. Various methods...... relatively long range interactions may play a role. We propose a new method based on Kriging that makes it possible to include such long range interactions, while keeping the computations manageable when dealing with large medical images....

  1. Emotional valence and contextual affordances flexibly shape approach-avoidance movements

    Directory of Open Access Journals (Sweden)

    Ana Carolina eSaraiva

    2013-12-01

    Full Text Available Behaviour is influenced by the emotional content – or valence – of stimuli in our environment. Positive stimuli facilitate approach, whereas negative stimuli facilitate defensive actions such as avoidance (flight and attack (fight. Facilitation of approach or avoidance movements may also be influenced by whether it is the self that moves relative to a stimulus (self-reference or the stimulus that moves relative to the self (object-reference, adding flexibility and context-dependence to behaviour. Alternatively, facilitation of approach avoidance movements may happen in a predefined and muscle-specific way, whereby arm flexion is faster to approach positive (e.g. flexing the arm brings a stimulus closer and arm extension faster to avoid negative stimuli (e.g. extending the arm moves the stimulus away. While this allows for relatively fast responses, it may compromise the flexibility offered by contextual influences. Here we asked under which conditions approach-avoidance actions are influenced by contextual factors (i.e. reference-frame. We manipulated the reference-frame in which actions occurred by asking participants to move a symbolic manikin (representing the self towards or away from a positive or negative stimulus, and move a stimulus towards or away from the manikin. We also controlled for the type of movements used to approach or avoid in each reference. We show that the reference-frame influences approach-avoidance actions to emotional stimuli, but additionally we find muscle-specificity for negative stimuli in self-reference contexts. We speculate this muscle-specificity may be a fast and adaptive response to threatening stimuli. Our results confirm that approach-avoidance behaviour is flexible and reference-frame dependent, but can be muscle-specific depending on the context and valence of the stimulus. Reference-frame and stimulus-evaluation are key factors in guiding approach-avoidance behaviour towards emotional stimuli in our

  2. 76 FR 49698 - Covered Securities Pursuant to Section 18 of the Securities Act of 1933

    Science.gov (United States)

    2011-08-11

    ... listed on the Nasdaq Capital Market (``NCM'') as Covered Securities for purposes of Section 18(b) of the... posed above, commenters are welcome to offer their views on any other matter raised by the proposed..., competition and capital formation. We have considered, and discuss below, the effects of the proposed...

  3. Quantum contextual phenomena observed in single-neutron interferometer experiments

    International Nuclear Information System (INIS)

    Hasegawa, Yuji; Rauch, Helmut

    2006-01-01

    Neutron optical experiments are presented, which exhibit quantum contextual phenomena. Entanglement is achieved not between particles, but between degrees of freedom, in this case, for a single-particle. Appropriate combinations of the direction of spin analysis and the position of the phase shifter allow an experimental verification of the violation of a Bell-like inequality. Our experiments manifest the fact that manipulation of the wavefunction in one Hilbert space influences the result of the measurement in the other Hilbert space: manipulation without touch! Next, we report another experiment which exhibits other peculiarity of quantum contextuality, e.g., originally intended to show a Kochen-Specker-like phenomenon. We have introduced inequalities for quantitative analysis of the experiments. The value obtained in the experiments clearly showed violations of prediction by non-contextual theory. Finally, we have accomplished a tomographic determination of entangled quantum state in single-neutrons. There, characteristics of the Bell-sate are confirmed: four poles for the real part of the density matrix are clearly seen

  4. Optimization of calculation models of maintenance offers for new civil engines

    OpenAIRE

    Pechoutre, Jean-Baptiste

    2011-01-01

    The sales support department performs calculations concerning maintenance offerings for civil engines based on the use of complex tools. This report describes the missions conducted during my Master's thesis: firstly, the establishment of a monitoring and security tool in the process of calculating maintenance costs. The second achievement is the creation of a tool for decision support in order to estimate and compare some of the maintenance costs associated with the use of the new commercial...

  5. Contextual advertisement placement in printed media

    Science.gov (United States)

    Liu, Sam; Joshi, Parag

    2010-02-01

    Advertisements today provide the necessary revenue model supporting the WWW ecosystem. Targeted or contextual ad insertion plays an important role in optimizing the financial return of this model. Nearly all the current ads that appear on web sites are geared for display purposes such as banner and "pay-per-click". Little attention, however, is focused on deriving additional ad revenues when the content is repurposed for alternative mean of presentation, e.g. being printed. Although more and more content is moving to the Web, there are still many occasions where printed output of web content is desirable, such as maps and articles; thus printed ad insertion can potentially be lucrative. In this paper, we describe a contextual ad insertion network aimed to realize new revenue for print service providers for web printing. We introduce a cloud print service that enables contextual ads insertion, with respect to the main web page content, when a printout of the page is requested. To encourage service utilization, it would provide higher quality printouts than what is possible from current browser print drivers, which generally produce poor outputs, e.g. ill formatted pages. At this juncture we will limit the scope to only article-related web pages although the concept can be extended to arbitrary web pages. The key components of this system include (1) the extraction of article from web pages, (2) the extraction of semantics from article, (3) querying the ad database for matching advertisement or coupon, and (4) joint content and ad layout for print outputs.

  6. A New Paradigm for Secure Social Lending

    Science.gov (United States)

    Serrelis, Emmanouil; Alexandris, Nikolaos

    Social Lending is one of the latest trends in Social Networking, offering a communication and financial channel between individual borrowers and lenders. The various Social Lending transaction schemes could be subject to multiple security threats, in both financial and technical terms, which could affect the integrity of the service as well as the trust of citizens. This paper provides an overview of the basic characteristics of Social Lending as well as an analysis the potential security issues suggesting some appropriate corrective measures. The ultimate target is to enforce the Social Lending effort with an information security foundation that could become an appreciable alternative to the "traditional" lending system.

  7. 17 CFR 230.504 - Exemption for limited offerings and sales of securities not exceeding $1,000,000.

    Science.gov (United States)

    2010-04-01

    ... require the public filing and delivery to investors of a substantive disclosure document before sale, and... only to “accredited investors” as defined in § 230.501(a). (2) The aggregate offering price for an... § 230.504 fails to meet the limitation on the aggregate offering price, it does not affect the...

  8. Human-Technology Centric In Cyber Security Maintenance For Digital Transformation Era

    Science.gov (United States)

    Ali, Firkhan Ali Bin Hamid; Zalisham Jali, Mohd, Dr

    2018-05-01

    The development of the digital transformation in the organizations has become more expanding in these present and future years. This is because of the active demand to use the ICT services among all the organizations whether in the government agencies or private sectors. While digital transformation has led manufacturers to incorporate sensors and software analytics into their offerings, the same innovation has also brought pressure to offer clients more accommodating appliance deployment options. So, their needs a well plan to implement the cyber infrastructures and equipment. The cyber security play important role to ensure that the ICT components or infrastructures execute well along the organization’s business successful. This paper will present a study of security management models to guideline the security maintenance on existing cyber infrastructures. In order to perform security model for the currently existing cyber infrastructures, combination of the some security workforces and security process of extracting the security maintenance in cyber infrastructures. In the assessment, the focused on the cyber security maintenance within security models in cyber infrastructures and presented a way for the theoretical and practical analysis based on the selected security management models. Then, the proposed model does evaluation for the analysis which can be used to obtain insights into the configuration and to specify desired and undesired configurations. The implemented cyber security maintenance within security management model in a prototype and evaluated it for practical and theoretical scenarios. Furthermore, a framework model is presented which allows the evaluation of configuration changes in the agile and dynamic cyber infrastructure environments with regard to properties like vulnerabilities or expected availability. In case of a security perspective, this evaluation can be used to monitor the security levels of the configuration over its lifetime and

  9. Exploring Hardware-Based Primitives to Enhance Parallel Security Monitoring in a Novel Computing Architecture

    National Research Council Canada - National Science Library

    Mott, Stephen

    2007-01-01

    This research explores how hardware-based primitives can be implemented to perform security-related monitoring in real-time, offer better security, and increase performance compared to software-based approaches...

  10. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  11. Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Special offers for our members       Go Sport in Val Thoiry is offering 15% discount on all purchases made in the shop upon presentation of the Staff Association membership card (excluding promotions, sale items and bargain corner, and excluding purchases using Go Sport  and Kadéos gift cards. Only one discount can be applied to each purchase).  

  12. Contextual determinants of induced abortion: a panel analysis

    Directory of Open Access Journals (Sweden)

    Mar Llorente-Marrón

    2016-01-01

    Full Text Available ABSTRACT OBJECTIVE Analyze the contextual and individual characteristics that explain the differences in the induced abortion rate, temporally and territorially. METHODS We conducted an econometric analysis with panel data of the influence of public investment in health and per capita income on induced abortion as well as a measurement of the effect of social and economic factors related to the labor market and reproduction: female employment, immigration, adolescent fertility and marriage rate. The empirical exercise was conducted with a sample of 22 countries in Europe for the 2001-2009 period. RESULTS The great territorial variability of induced abortion was the result of contextual and individual socioeconomic factors. Higher levels of national income and investments in public health reduce its incidence. The following sociodemographic characteristics were also significant regressors of induced abortion: female employment, civil status, migration, and adolescent fertility. CONCLUSIONS Induced abortion responds to sociodemographic patterns, in which the characteristics of each country are essential. The individual and contextual socioeconomic inequalities impact significantly on its incidence. Further research on the relationship between economic growth, labor market, institutions and social norms is required to better understand its transnational variability and to reduce its incidence.

  13. Contextual determinants of induced abortion: a panel analysis.

    Science.gov (United States)

    Llorente-Marrón, Mar; Díaz-Fernández, Montserrat; Méndez-Rodríguez, Paz

    2016-01-01

    Analyze the contextual and individual characteristics that explain the differences in the induced abortion rate, temporally and territorially. We conducted an econometric analysis with panel data of the influence of public investment in health and per capita income on induced abortion as well as a measurement of the effect of social and economic factors related to the labor market and reproduction: female employment, immigration, adolescent fertility and marriage rate. The empirical exercise was conducted with a sample of 22 countries in Europe for the 2001-2009 period. The great territorial variability of induced abortion was the result of contextual and individual socioeconomic factors. Higher levels of national income and investments in public health reduce its incidence. The following sociodemographic characteristics were also significant regressors of induced abortion: female employment, civil status, migration, and adolescent fertility. Induced abortion responds to sociodemographic patterns, in which the characteristics of each country are essential. The individual and contextual socioeconomic inequalities impact significantly on its incidence. Further research on the relationship between economic growth, labor market, institutions and social norms is required to better understand its transnational variability and to reduce its incidence.

  14. What does an experimental test of quantum contextuality prove or disprove?

    International Nuclear Information System (INIS)

    Winter, Andreas

    2014-01-01

    The possibility of experimentally testing the Bell–Kochen–Specker theorem is investigated critically, following the demonstrations by Meyer, Kent, and Clifton–Kent that the predictions of quantum mechanics are indistinguishable (up to arbitrary precision) from those of a non-contextual model, and the subsequent debate about the extent to which these models are actually classical or non-contextual. The present analysis starts from a careful consideration of these ‘finite-precision’ approximations. A stronger condition for non-contextual models, dubbed ontological faithfulness, is exhibited. It is shown that this allows us to approximately formulate the constraints in Bell–Kochen–Specker theorems, such as to render the usual proofs robust. Consequently, one can experimentally test to finite precision ontologically faithful non-contextuality, and thus experimentally refute explanations from this smaller class. We include a discussion of the relation of ontological faithfulness to other proposals to overcome the finite precision objection. This article is part of a special issue of Journal of Physics A: Mathematical and Theoretical devoted to ‘50 years of Bell’s theorem’. (paper)

  15. Handbook of space security policies, applications and programs

    CERN Document Server

    Hays, Peter; Robinson, Jana; Moura, Denis; Giannopapa, Christina

    2015-01-01

    Space Security involves the use of space (in particular communication, navigation, earth observation, and electronic intelligence satellites) for military and security purposes on earth and also the maintenance of space (in particular the earth orbits) as safe and secure areas for conducting peaceful activities. The two aspects can be summarized as "space for security on earth" and “the safeguarding of space for peaceful endeavors.” The Handbook will provide a sophisticated, cutting-edge resource on the space security policy portfolio and the associated assets, assisting fellow members of the global space community and other interested policy-making and academic audiences in keeping abreast of the current and future directions of this vital dimension of international space policy. The debate on coordinated space security measures, including relevant 'Transparency and Confidence-Building Measures,' remains at a relatively early stage of development. The book offers a comprehensive description of the variou...

  16. Contextual learning and context effects during infancy: 30 years of controversial research revisited.

    Science.gov (United States)

    Revillo, D A; Cotella, E; Paglini, M G; Arias, C

    2015-09-01

    Over the last 30years a considerable number of reports have explored learning about context during infancy in both humans and rats. This research was stimulated by two different theoretical frameworks. The first, known as the neuromaturational model, postulates that learning and behavior are context-independent during early ontogeny, a hypothesis based on the idea that contextual learning is dependent on the hippocampal function, and that this brain structure does not reach full maturity until late in infancy. The second theoretical framework views infants not as immature organisms, but rather as perfectly matured ones, given that their behavioral and cognitive capacities allow them to adapt appropriately to the demands of their specific environment in accordance with their maturational level. This model predicts significant ontogenetic variations in learning and memory due to developmental differences in what is perceived and attended to during learning episodes, which can result in ontogenetic differences in contextual learning depending on the specific demands of the task. The present manuscript reviews those studies that have examined potential developmental differences in contextual learning and context effects in rats. The reviewed results show that, during infancy, context can exert a similar influence over learning and memory as that described for the adult rat. Moreover, in some cases, contextual learning and context effects were greater in infants than in adults. In contrast, under other experimental conditions, no evidence of contextual learning or context effects was observed. We analyzed the procedural factors of these studies with the aim of detecting those that favor or impede contextual learning during infancy, and we discussed whether existing empirical evidence supports the claim that the functionality of the hippocampus is a limiting factor for this type of learning during infancy. Finally, conclusions from human research into contextual learning

  17. Nuclear security education and training at Naif Arab University for Security Sciences

    International Nuclear Information System (INIS)

    Amjad Fataftah

    2009-01-01

    Naif Arab University for Security Sciences (NAUSS) was established in 1978 as an Arab institution specialized in security sciences to fulfill the needs of the Arab law enforcement agencies for an academic institution that promotes research in security sciences, offers graduate education programs and conduct short-term training courses, which should contribute to the prevention and control of crimes in the Arab world. NAUSS and the IAEA organized the first workshop on nuclear security on November, 2006, which aimed to explore and improve the nuclear security culture awareness through the definitions of the nuclear security main pillars, Prevention, Detection and Response. In addition, NAUSS and IAEA organized a very important training course on April, 2008 on combating nuclear terrorism titled P rotection against nuclear terrorism: Protection of radioactive sources . In the past two years, IAEA has put tremendous efforts to develop an education program in nuclear security, which may lead into Master's degree in nuclear security, where NAUSS helped in this project through the participation in the IAEA organized consultancy and technical meetings for the development of this program along with many other academic, security and law enfacement experts and lawyers from many different institution in the world. NAUSS and IAEA drafted a work plan for the next coming two years which should lead into the gradual implementation of these educational programs at NAUSS. NAUSS also continues to participate in several local conferences and symposiums related to the peaceful application of nuclear power in the gulf region, and the need for a human resources development programs to fulfill the scientific and security needs which will arise from building nuclear power plants. NAUSS participated in the International Symposium on the Peaceful Application of Nuclear Technology in the GCC countries, organized by King Abdulaziz University in the city of Jeddah, Saudi Arabia. Also NAUSS

  18. Maternal secure-base scripts and children's attachment security in an adopted sample.

    Science.gov (United States)

    Veríssimo, Manuela; Salvaterra, Fernanda

    2006-09-01

    . These results complement the findings and conceptual arguments offered by Bowlby and Ainsworth concerning the critical influence of maternal representations of attachment to the quality of attachment security in children.

  19. Machine Learning for Security

    CERN Multimedia

    CERN. Geneva

    2015-01-01

    Applied statistics, aka ‘Machine Learning’, offers a wealth of techniques for answering security questions. It’s a much hyped topic in the big data world, with many companies now providing machine learning as a service. This talk will demystify these techniques, explain the math, and demonstrate their application to security problems. The presentation will include how-to’s on classifying malware, looking into encrypted tunnels, and finding botnets in DNS data. About the speaker Josiah is a security researcher with HP TippingPoint DVLabs Research Group. He has over 15 years of professional software development experience. Josiah used to do AI, with work focused on graph theory, search, and deductive inference on large knowledge bases. As rules only get you so far, he moved from AI to using machine learning techniques identifying failure modes in email traffic. There followed digressions into clustered data storage and later integrated control systems. Current ...

  20. DISCOURSE STYLISTICS AS CONTEXTUALIZED STYLISTICS

    OpenAIRE

    Marina Katnić-Bakaršić

    2003-01-01

    The focus of the paper is on discourse stylistics, viewed as contextualized discipline. Context includes various factors (sociohistorical, cognitive, cultural and intertextual). The paper investigates the most important approaches to discourse stylistics: pragmatic stylistics, discourse and/ or conversational analysis, cognitive stylistics, critical stylistics, feminists stylistics. In discourse stylistics analysis is always combined with interpretation, and description is followed by explana...

  1. Contextualizing Asian American College Student Psychological Health

    Science.gov (United States)

    Liang, Christopher T. H.; Liu, Jessica; Nguyen, David; Song, Ge

    2017-01-01

    With attention to race, culture, and gender, this chapter contextualizes the help-seeking behaviors and psychological aspects of health facing Asian American college students. Recommendations are provided to student affairs professionals and counselors.

  2. Implicit Motives, Explicit Traits, and Task and Contextual Performance at Work

    DEFF Research Database (Denmark)

    Lang, J.W.B.; Zettler, Ingo; Ewen, C.

    2012-01-01

    for implicit achievement). As a test of these theoretical ideas, we report a study in which employees (N = 241) filled out a questionnaire booklet and worked on an improved modern implicit motive measure, the operant motive test. Their supervisors rated their task and contextual performance. Results support 4...... apply these ideas in the context of industrial and organizational psychology and propose that 2 explicit traits work as channels for the expression of 3 core implicit motives in task and contextual job performance (extraversion for implicit affiliation and implicit power; explicit achievement...... of the 6 theoretical predictions and show that interactions between implicit motives and explicit traits increase the explained criterion variance in both task and contextual performance....

  3. Inhibition of Rac1 Activity in the Hippocampus Impairs the Forgetting of Contextual Fear Memory.

    Science.gov (United States)

    Jiang, Lizhu; Mao, Rongrong; Zhou, Qixin; Yang, Yuexiong; Cao, Jun; Ding, Yuqiang; Yang, Yuan; Zhang, Xia; Li, Lingjiang; Xu, Lin

    2016-03-01

    Fear is crucial for survival, whereas hypermnesia of fear can be detrimental. Inhibition of the Rac GTPase is recently reported to impair the forgetting of initially acquired memory in Drosophila. Here, we investigated whether inhibition of Rac1 activity in rat hippocampus could contribute to the hypermnesia of contextual fear. We found that spaced but not massed training of contextual fear conditioning caused inhibition of Rac1 activity in the hippocampus and heightened contextual fear. Furthermore, intrahippocampal injection of the Rac1 inhibitor NSC23766 heightened contextual fear in massed training, while Rac1 activator CN04-A weakened contextual fear in spaced training rats. Our study firstly demonstrates that contextual fear memory in rats is actively regulated by Rac1 activity in the hippocampus, which suggests that the forgetting impairment of traumatic events in posttraumatic stress disorder may be contributed to the pathological inhibition of Rac1 activity in the hippocampus.

  4. The Role of Search Speed in the Contextual Cueing of Children's Attention.

    Science.gov (United States)

    Darby, Kevin; Burling, Joseph; Yoshida, Hanako

    2014-01-01

    The contextual cueing effect is a robust phenomenon in which repeated exposure to the same arrangement of random elements guides attention to relevant information by constraining search. The effect is measured using an object search task in which a target (e.g., the letter T) is located within repeated or nonrepeated visual contexts (e.g., configurations of the letter L). Decreasing response times for the repeated configurations indicates that contextual information has facilitated search. Although the effect is robust among adult participants, recent attempts to document the effect in children have yielded mixed results. We examined the effect of search speed on contextual cueing with school-aged children, comparing three types of stimuli that promote different search times in order to observe how speed modulates this effect. Reliable effects of search time were found, suggesting that visual search speed uniquely constrains the role of attention toward contextually cued information.

  5. Private Security Companies (PSCs) as a Piracy Countermeasure

    DEFF Research Database (Denmark)

    Struwe, Lars Bangert

    2012-01-01

    Private Security Companies (PSC) are a part of the Best Management Practice in the shipping industry. The ship owners are using PSCs to protect their vessels against pirates, but protection of the vessels is just a part of the services that PSCs can provide. The services can be divided in four main...... groups: (1) security intelligence, risk assessment and consulting; (2) security services; (3) crisis response; and (4) intervention. While the use of PSCs may offer some deterrent value, the potential costs of hiring these firms would appear to outweigh the benefits. The argument in this article...

  6. Contextual Risk Profiles and Trajectories of Adolescent Dating Violence Perpetration.

    Science.gov (United States)

    Reyes, H Luz McNaughton; Foshee, Vangie A; Markiewitz, Nathan; Chen, May S; Ennett, Susan T

    2018-04-09

    Social ecological and developmental system perspectives suggest that interactions among factors within and across multiple contexts (e.g., neighborhood, peer, family) must be considered in explaining dating violence perpetration. Yet, to date, most extant research on dating violence has focused on individual, rather than contextual predictors, and used variable-centered approaches that fail to capture the configurations of factors that may jointly explain involvement in dating violence. The current study used a person-centered approach, latent profile analysis, to identify key configurations (or profiles) of contextual risk and protective factors for dating violence perpetration across the neighborhood, school, friend and family contexts. We then examine the longitudinal associations between these contextual risk profiles, assessed during middle school, and trajectories of psychological and physical dating violence perpetration across grades 8 through 12. Five contextual risk profiles were identified: school, neighborhood, and family risk; school and family risk; school and friend risk; school and neighborhood risk; and low risk. The highest levels of psychological and physical perpetration across grades 8 through 12 were among adolescents in the profile characterized by high levels of school, neighborhood, and family risk. Results suggest that early interventions to reduce violence exposure and increase social regulation across multiple social contexts may be effective in reducing dating violence perpetration across adolescence.

  7. Migrant Women, Economic Security and the Challenge of ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Migrant Women, Economic Security and the Challenge of Reintegration ... women's migration, is a growing feature of economic development in Asia. ... with training in confidence-building, money management and entrepreneurship, and offers ...

  8. Cloud Security and Privacy An Enterprise Perspective on Risks and Compliance

    CERN Document Server

    Mather, Tim; Latif, Shahed

    2009-01-01

    You may regard cloud computing as an ideal way for your company to control IT costs, but do you know how private and secure this service really is? Not many people do. With Cloud Security and Privacy, you'll learn what's at stake when you trust your data to the cloud, and what you can do to keep your virtual infrastructure and web applications secure. Ideal for IT staffers, information security and privacy practitioners, business managers, service providers, and investors alike, this book offers you sound advice from three well-known authorities in the tech security world. You'll learn deta

  9. POWERING AIRPOWER: IS THE AIR FORCES ENERGY SECURE

    Science.gov (United States)

    2016-02-01

    overhead transmission and distribution conductors are exposed. Microgrids offer a control method for utility systems that allow operators to control ... microgrids offer an additional level of control that installations would not otherwise have. For instance, an incident affecting one part of the grid...could cause undue strain on another part that is experiencing a higher power demand. With secure microgrid controls , technicians have the ability to de

  10. Anchoring contextual analysis in health policy and systems research: A narrative review of contextual factors influencing health committees in low and middle income countries.

    Science.gov (United States)

    George, Asha; Scott, Kerry; Garimella, Surekha; Mondal, Shinjini; Ved, Rajani; Sheikh, Kabir

    2015-05-01

    Health committees, councils or boards (HCs) mediate between communities and health services in many health systems. Despite their widespread prevalence, HC functions vary due to their diversity and complexity, not least because of their context specific nature. We undertook a narrative review to better understand the contextual features relevant to HCs, drawing from Scopus and the internet. We found 390 English language articles from journals and grey literature since 1996 on health committees, councils and boards. After screening with inclusion and exclusion criteria, we focused on 44 articles. Through an iterative process of exploring previous attempts at understanding context in health policy and systems research (HPSR) and the HC literature, we developed a conceptual framework that delineates these contextual factors into four overlapping spheres (community, health facilities, health administration, society) with cross-cutting issues (awareness, trust, benefits, resources, legal mandates, capacity-building, the role of political parties, non-governmental organizations, markets, media, social movements and inequalities). While many attempts at describing context in HPSR result in empty arenas, generic lists or amorphous detail, we suggest anchoring an understanding of context to a conceptual framework specific to the phenomena of interest. By doing so, our review distinguishes between contextual elements that are relatively well understood and those that are not. In addition, our review found that contextual elements are dynamic and porous in nature, influencing HCs but also being influenced by them due to the permeability of HCs. While reforms focus on tangible HC inputs and outputs (training, guidelines, number of meetings held), our review of contextual factors highlights the dynamic relationships and broader structural elements that facilitate and/or hinder the role of health committees in health systems. Such an understanding of context points to its

  11. Self-verification and contextualized self-views.

    Science.gov (United States)

    Chen, Serena; English, Tammy; Peng, Kaiping

    2006-07-01

    Whereas most self-verification research has focused on people's desire to verify their global self-conceptions, the present studies examined self-verification with regard to contextualized selfviews-views of the self in particular situations and relationships. It was hypothesized that individuals whose core self-conceptions include contextualized self-views should seek to verify these self-views. In Study 1, the more individuals defined the self in dialectical terms, the more their judgments were biased in favor of verifying over nonverifying feedback about a negative, situation-specific self-view. In Study 2, consistent with research on gender differences in the importance of relationships to the self-concept, women but not men showed a similar bias toward feedback about a negative, relationship-specific self-view, a pattern not seen for global self-views. Together, the results support the notion that self-verification occurs for core self-conceptions, whatever form(s) they may take. Individual differences in self-verification and the nature of selfhood and authenticity are discussed.

  12. Recovery from equipment failures in ATC: Determination of contextual factors

    International Nuclear Information System (INIS)

    Subotic, Branka; Ochieng, Washington Y.; Straeter, Oliver

    2007-01-01

    Human reliability assessment (HRA) currently uses various approaches to determine and quantify human error. These approaches are increasingly being employed in various safety-critical domains, such as air traffic management and its ground component air traffic control. HRA research over the years has shown the important role of the context in which human errors take place. Recent techniques now put more emphasis on the definition of key contextual factors and their impact on the reliability of human performance. This paper presents a review of the current understanding of contextual factors in various industries. It uses this together with results from controller interviews to identify the contextual factors relevant to controller recovery from equipment failures in air traffic control. These factors should be used in conjunction with an appropriate method to analyse the performance of a controller during the process of recovery from failures

  13. Contextual mediation of perceptions during hauntings and poltergeist-like experiences: a replication and extension.

    Science.gov (United States)

    Harte, T M

    2000-10-01

    This study is a replication of the experiment by Lange, Houran, Harte, and Havens (1996 on contextual variables, in which hallucinations appear to be affected by the environmental context. These contextual variables are influential in the reporting of haunting and poltergeist-like episodes. This study extended the previous study by adding new factors of time of day, climactic conditions, and emotional feelings. These were analyzed for a different sample, looking for further congruency between experiential content and the context. The sample (N=8431 were reports found on the Internet and in one book. The Lange, et al. study was replicated in that contextual variables were identified in 99.2% of the reports, the content of the reports was judged to be consistent with the nature of the contextual variables in 58.8% of the reports, and contextual variables were related to the percipients' state of arousal and the modalities of experience.

  14. Re-designing the PhEDEx Security Model

    Science.gov (United States)

    C-H, Huang; Wildish, T.; X, Zhang

    2014-06-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  15. Re-designing the PhEDEx security model

    International Nuclear Information System (INIS)

    Huang C-H; Wildish, T; Zhang X

    2014-01-01

    PhEDEx, the data-placement tool used by the CMS experiment at the LHC, was conceived in a more trusting time. The security model provided a safe environment for site agents and operators, but offerred little more protection than that. Data was not sufficiently protected against loss caused by operator error or software bugs or by deliberate manipulation of the database. Operators were given high levels of access to the database, beyond what was actually needed to accomplish their tasks. This exposed them to the risk of suspicion should an incident occur. Multiple implementations of the security model led to difficulties maintaining code, which can lead to degredation of security over time. In order to meet the simultaneous goals of protecting CMS data, protecting the operators from undue exposure to risk, increasing monitoring capabilities and improving maintainability of the security model, the PhEDEx security model was redesigned and re-implemented. Security was moved from the application layer into the database itself, fine-grained access roles were established, and tools and procedures created to control the evolution of the security model over time. In this paper we describe this work, we describe the deployment of the new security model, and we show how these enhancements improve security on several fronts simultaneously.

  16. Data Mediation with Enterprise Level Security

    Directory of Open Access Journals (Sweden)

    Kevin E. Foltz

    2017-10-01

    Full Text Available Enterprise Level Security (ELS is an architecture for enabling information sharing with strong security guarantees. It is built upon basic tenets and concepts that shape its component technologies and implementation. One challenge in sharing information is that the source and recipient of the information may use different units, protocols, data formats, or tools to process information. As a result, a transformation of the data is needed before the recipient can use the information. These conversions introduce potential security weaknesses into an ELS system, so an approach for enterprise-wide mediation is required. Methods in common use today, such as a man-in-the-middle (MITM translation and an online mediation service, do not preserve the basic ELS tenets and concepts. This paper examines these existing approaches and compares them with two new approaches designed to preserve ELS security. It looks at the complete picture of security, performance, and ease of implementation, offering a framework for choosing the best mediation approach based on the data sharing context.

  17. Locality and realism in contextual theories

    International Nuclear Information System (INIS)

    Hoekzema, D.

    1987-01-01

    Two types of contextual theories are distinguished and shown to be related. For theories of each type a criterion of locality is formulated which is weaker than the classical requirement of separability at spacelike intervals. The relations between the concepts of locality, realism, and ontic chance are discussed

  18. Cloud Security Audit for Migration and Continuous Monitoring

    OpenAIRE

    Ismail, Umar Mukhtar; Islam, Shareeful; Mouratidis, Haralambos

    2015-01-01

    Security assurance in cloud computing is one of the main barriers for wider cloud adoption. Potential cloud computing consumers like to know whether the controls in cloud environments can adequately protect critical assets migrated into the cloud. We present a cloud security audit approach to enable users' evaluate cloud service provider offerings before migration, as well as monitoring of events after migration. Our approach entails a set of concepts such as actor, goals, monitoring, conditi...

  19. Creating energy security indexes with decision matrices and quantitative criteria

    Energy Technology Data Exchange (ETDEWEB)

    Hughes, Larry; Shupe, Darren

    2010-09-15

    Energy security is becoming an important policy issue in a growing number of jurisdictions because of volatile energy markets and production challenges faced by many producers. As a result, policymakers and politicians are looking for tools or methods that can create an energy security index with results that are justifiable, understandable, and reproducible. This paper describes a method which employs a decision matrix to produce an energy security index using quantitative criteria and metrics. The method allows a range of indexes to be produced, thereby offering further insight into the state of a jurisdiction's energy security.

  20. Contextual Admissions and Affirmative Action: Developments in Higher Education Policy in England

    Science.gov (United States)

    Lane, Laura; Birds, Rachel

    2013-01-01

    This paper explores the value of explaining contextual admissions policy directives through the conceptual lenses of meritocracy and social reproduction. It is suggested that examining these concepts can assist in highlighting some of the ideological and practical complexities associated with contextual admissions whilst providing opportunities to…

  1. The impact of signal-to-noise ratio on contextual cueing in children and adults.

    Science.gov (United States)

    Yang, Yingying; Merrill, Edward C

    2015-04-01

    Contextual cueing refers to a form of implicit spatial learning where participants incidentally learn to associate a target location with its repeated spatial context. Successful contextual learning produces an efficient visual search through familiar environments. Despite the fact that children exhibit the basic ability of implicit spatial learning, their general effectiveness in this form of learning can be compromised by other development-dependent factors. Learning to extract useful information (signal) in the presence of various amounts of irrelevant or distracting information (noise) characterizes one of the most important changes that occur with cognitive development. This research investigated whether signal-to-noise ratio (S/N) affects contextual cueing differently in children and adults. S/N was operationally defined as the ratio of repeated versus new displays encountered over time. Three ratio conditions were created: high (100%), medium (67%), and low (33%) conditions. Results suggested no difference in the acquisition of contextual learning effects in the high and medium conditions across three age groups (6- to 8-year-olds, 10- to 12-year-olds, and young adults). However, a significant developmental difference emerged in the low S/N condition. As predicted, adults exhibited significant contextual cueing effects, whereas older children showed marginally significant contextual cueing and younger children did not show cueing effects. Group differences in the ability to exhibit implicit contextual learning under low S/N conditions and the implications of this difference are discussed. Copyright © 2015 Elsevier Inc. All rights reserved.

  2. 75 FR 68560 - Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based Swaps

    Science.gov (United States)

    2010-11-08

    ... 3235-AK77 Prohibition Against Fraud, Manipulation, and Deception in Connection With Security-Based... fraud, manipulation, and deception in connection with the offer, purchase or sale of any security-based... measured and reasonable means to prevent fraud, manipulation, and deception in connection with security...

  3. Dimensions of organizational learning: contextual variables in companies under lean manufacturing implementation

    Directory of Open Access Journals (Sweden)

    Guilherme Luz Tortorella

    2014-08-01

    Full Text Available The Lean Production (LP is an approach that encompasses a variety of management practices to reduce losses and improve operational efficiency. Due to this fact, the ability to innovate, change and learn continuously presents itself as a key element in the implementation of the LP. Several contextual variables were mentioned in the literature as potential impediments to implementing lean. However, little is known about the influence of these variables on the dimensions of Organizational Learning (OL. This study aims to examine the relationship between six contextual variables and the frequency of occurrence of problems in companies that are implementing the LP. Furthermore, the identification of relevant relationships between dimensions of OL and contextual variables contribute to the identification of the contexts in which problems can be expected to occur. The sample contains thirteen companies implementing the LP. The results indicate that the same contextual variables, which are deemed as influential to implement LP, have a different influence on the ability of organizational learning.

  4. Generalized anxiety disorder in racial and ethnic minorities: a case of nativity and contextual factors.

    Science.gov (United States)

    Budhwani, Henna; Hearld, Kristine Ria; Chavez-Yenter, Daniel

    2015-04-01

    Minorities comprise more than one third of the U.S., and research on the correlates and causes of depression, anxiety, and other mental illnesses have yielded mixed results in minority groups necessitating an understanding of causes and correlates of health. Thus, the aim of this paper is to evaluate the relationship between minority status, contextual factors, and lifetime Generalized Anxiety Disorder. Logistic regression models were implemented, comparing immigrants to their American-born counterparts as well as to American-born Whites. Foreign-born Afro-Caribbeans exhibited lower rates of lifetime GAD. A lower percentage of foreign-born minorities met the criteria for GAD as compared to their American-born counterparts, and all racial and ethnic groups met the criteria for lifetime GAD at a lower rate as compared to American-born Whites. By using theory proactively and including contextual factors, this multi-faceted approach to health disparities research yielded findings which both supported historic beliefs but created opportunities for supplemental research looking at immigrants and GAD. Key findings were that health lifestyle choices and exposure to discrimination significantly affected the chance of having GAD. Nativity was protective; however, its effect was ameliorated by exposure to discrimination or engagement in alcohol abuse. Thus, this study offers practical insight into environmental factors for clinicians caring for racial and ethnic minorities diagnosed with GAD. Copyright © 2015 Elsevier B.V. All rights reserved.

  5. The Role of the Basal Ganglia in Implicit Contextual Learning: A Study of Parkinson's Disease

    Science.gov (United States)

    van Asselen, Marieke; Almeida, Ines; Andre, Rui; Januario, Cristina; Goncalves, Antonio Freire; Castelo-Branco, Miguel

    2009-01-01

    Implicit contextual learning refers to the ability to memorize contextual information from our environment. This contextual information can then be used to guide our attention to a specific location. Although the medial temporal lobe is important for this type of learning, the basal ganglia might also be involved considering its role in many…

  6. 31 CFR 375.23 - How does the securities delivery process work?

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 2 2010-07-01 2010-07-01 false How does the securities delivery process work? 375.23 Section 375.23 Money and Finance: Treasury Regulations Relating to Money and Finance... the securities delivery process work? If any of the offers you submitted are accepted, you must...

  7. DISCOURSE STYLISTICS AS CONTEXTUALIZED STYLISTICS

    Directory of Open Access Journals (Sweden)

    Marina Katnić-Bakaršić

    2003-01-01

    Full Text Available The focus of the paper is on discourse stylistics, viewed as contextualized discipline. Context includes various factors (sociohistorical, cognitive, cultural and intertextual. The paper investigates the most important approaches to discourse stylistics: pragmatic stylistics, discourse and/ or conversational analysis, cognitive stylistics, critical stylistics, feminists stylistics. In discourse stylistics analysis is always combined with interpretation, and description is followed by explanation and critique.

  8. Are C-reps contextual representations? A reply to Brewin and Burgess.

    Science.gov (United States)

    Pearson, David G

    2014-03-01

    Brewin and Burgess (2013) argue that our recent papers investigating the role of contextual representations in intrusive memories do not pose a challenge to dual-representation theory as originally claimed (Pearson, 2012; Pearson, Ross, & Webster, 2012). Here I point out that their alternative explanation for our results can be rejected using data already published in both papers. I also argue that their definition of what constitutes a contextual representation renders their revised dual-representation theory incompatible with experimental results that have previously been argued in the literature to support it. Valuable though their contribution is, it does not impact on our main conclusion that abstract contextual representations serve to increase intrusive memories for traumatic material. Copyright © 2013 Elsevier Ltd. All rights reserved.

  9. Don't Drop Your Guard: Securing Nuclear Facilities

    International Nuclear Information System (INIS)

    Lööf, Susanna

    2013-01-01

    You're never quite finished with nuclear security. ''Even the most advanced security system for radioactive or nuclear material needs to be continuously updated to ensure that it remains effective,'' says Arvydas Stadalnikas, an IAEA Senior Nuclear Security Officer. ''Security can always be improved. Even if you think you have the best system for today, it may require enhancements because of the changing environment,'' he said. To help States with this daunting task, the IAEA offers support through its International Physical Protection Advisory Service (IPPAS) which includes in-depth analysis of the physical protection and nuclear security followed by expert advice. The IAEA has carried out 58 missions to 37 countries since the IPPAS programme was launched in 1996, helping States translate international conventions, codes and guidance on nuclear security into practice. Although each mission focuses on improving the security in a specific country, ''the programme has benefits that reach far beyond the recipient State's national borders,'' Stadalnikas noted. ''Each IPPAS mission helps improve global nuclear security because enhanced security in one country means that you improve globally. Deficiencies in one country could open the way for malicious acts, which can have worldwide effects,'' he said

  10. Unconditionally Secure Credit/Debit Card Chip Scheme and Physical Unclonable Function

    Science.gov (United States)

    Kish, Laszlo B.; Entesari, Kamran; Granqvist, Claes-Göran; Kwan, Chiman

    The statistical-physics-based Kirchhoff-law-Johnson-noise (KLJN) key exchange offers a new and simple unclonable system for credit/debit card chip authentication and payment. The key exchange, the authentication and the communication are unconditionally secure so that neither mathematics- nor statistics-based attacks are able to crack the scheme. The ohmic connection and the short wiring lengths between the chips in the card and the terminal constitute an ideal setting for the KLJN protocol, and even its simplest versions offer unprecedented security and privacy for credit/debit card chips and applications of physical unclonable functions (PUFs).

  11. CONTEXTUAL APPROACH TO LITERARY CRITICISM: DOSTOEVSKY AND PSYCHOANALYSIS

    Directory of Open Access Journals (Sweden)

    V. G. Kalashnikov

    2016-01-01

    Full Text Available The aim of this article is to demonstrate the possibilities of application of the contextual approach, developed in pedagogy and psychology, in the process of literary analysis. Initially contextual approach was developed by A. A. Verbitsky as a methodology of education. A key category of this approach was the context, interpreted A. A. Verbitsky as a psychological phenomenon. Accordingly, in this paper on the basis of later research context is understood as a psychological mechanism of semantic, objectified in external forms of test patches, social and communicative situations, etc. Now contextual approach became general psychological methodology, which led to the possibility of its application in various fields of the humanities in particular – in psycholinguistic literary studies, where the notion of «context » is used in-depth psychological interpretation. Methods. The contextual approach developed by A. A. Verbitsky as the main component of methodology of education became the main instrument of the research stated in the publication. Besides a field of the general education, this approach is applicable to various private spheres – to educational aspect of education, and also to methodology of teaching various subject matters – mathematicians, biology, foreign languages, etc. The contextual approach at the level of allpsychological methodology has allowed to apply it in various fields of humanitarian knowledge, in particular in literary researches with a strongly pronounced psychological perspective. The contextual analysis corresponding to approach has been chosen as a method of work.Results. Based on A. A. Verbitsky’s interpretation and results of the latest researches the author shows that the context is a semantic mechanism, objectified in external forms of test fragments, social and communicative situations, etc. The following types of contexts are allocated: microcontext of a personality and works of an author, a mesocontext

  12. Representing idioms: syntactic and contextual effects on idiom processing.

    Science.gov (United States)

    Holsinger, Edward

    2013-09-01

    Recent work on the processing of idiomatic expressions argues against the idea that idioms are simply big words. For example, hybrid models of idiom representation, originally investigated in the context of idiom production, propose a priority of literal computation, and a principled relationship between the conceptual meaning of an idiom, its literal lemmas and its syntactic structure. We examined the predictions of the hybrid representation hypothesis in the domain of idiom comprehension. We conducted two experiments to examine the role of syntactic, lexical and contextual factors on the interpretation of idiomatic expressions. Experiment I examines the role of syntactic compatibility and lexical compatibility on the real-time processing of potentially idiomatic strings. Experiment 2 examines the role of contextual information on idiom processing and how context interacts with lexical information during processing. We find evidence that literal computation plays a causal role in the retrieval of idiomatic meaning and that contextual, lexical and structural information influence the processing of idiomatic strings at early stages during processing, which provide support for the hybrid model of idiom representation in the domain of idiom comprehension.

  13. MULTI-DIMENSIONAL PATTERN DISCOVERY OF TRAJECTORIES USING CONTEXTUAL INFORMATION

    Directory of Open Access Journals (Sweden)

    M. Sharif

    2017-10-01

    Full Text Available Movement of point objects are highly sensitive to the underlying situations and conditions during the movement, which are known as contexts. Analyzing movement patterns, while accounting the contextual information, helps to better understand how point objects behave in various contexts and how contexts affect their trajectories. One potential solution for discovering moving objects patterns is analyzing the similarities of their trajectories. This article, therefore, contextualizes the similarity measure of trajectories by not only their spatial footprints but also a notion of internal and external contexts. The dynamic time warping (DTW method is employed to assess the multi-dimensional similarities of trajectories. Then, the results of similarity searches are utilized in discovering the relative movement patterns of the moving point objects. Several experiments are conducted on real datasets that were obtained from commercial airplanes and the weather information during the flights. The results yielded the robustness of DTW method in quantifying the commonalities of trajectories and discovering movement patterns with 80 % accuracy. Moreover, the results revealed the importance of exploiting contextual information because it can enhance and restrict movements.

  14. Multi-Dimensional Pattern Discovery of Trajectories Using Contextual Information

    Science.gov (United States)

    Sharif, M.; Alesheikh, A. A.

    2017-10-01

    Movement of point objects are highly sensitive to the underlying situations and conditions during the movement, which are known as contexts. Analyzing movement patterns, while accounting the contextual information, helps to better understand how point objects behave in various contexts and how contexts affect their trajectories. One potential solution for discovering moving objects patterns is analyzing the similarities of their trajectories. This article, therefore, contextualizes the similarity measure of trajectories by not only their spatial footprints but also a notion of internal and external contexts. The dynamic time warping (DTW) method is employed to assess the multi-dimensional similarities of trajectories. Then, the results of similarity searches are utilized in discovering the relative movement patterns of the moving point objects. Several experiments are conducted on real datasets that were obtained from commercial airplanes and the weather information during the flights. The results yielded the robustness of DTW method in quantifying the commonalities of trajectories and discovering movement patterns with 80 % accuracy. Moreover, the results revealed the importance of exploiting contextual information because it can enhance and restrict movements.

  15. Correlates of Parental Differential Treatment: Parental and Contextual Factors during Middle Childhood

    Science.gov (United States)

    Atzaba-Poria, Naama; Pike, Alison

    2008-01-01

    The current study examined whether parental and contextual risk factors contribute to mothers' and fathers' differential treatment (MDT/FDT) when accounting for sibling dyad characteristics. Also explored was whether family type (single mothers vs. 2 parents) moderated the links between the parental and contextual correlates and MDT. One hundred…

  16. Existential contextuality and the models of Meyer, Kent, and Clifton

    International Nuclear Information System (INIS)

    Appleby, D.M.

    2002-01-01

    It is shown that the models recently proposed by Meyer, Kent, and Clifton (MKC) exhibit a novel kind of contextuality, which we term existential contextuality. In this phenomenon it is not simply the pre-existing value but the actual existence of an observable which is context dependent. This result confirms the point made elsewhere, that the MKC models do not, as the authors claim, 'nullify' the Kochen-Specker theorem. It may also be of some independent interest

  17. Predicting Contextual Informativeness for Vocabulary Learning

    Science.gov (United States)

    Kapelner, Adam; Soterwood, Jeanine; Nessaiver, Shalev; Adlof, Suzanne

    2018-01-01

    Vocabulary knowledge is essential to educational progress. High quality vocabulary instruction requires supportive contextual examples to teach word meaning and proper usage. Identifying such contexts by hand for a large number of words can be difficult. In this work, we take a statistical learning approach to engineer a system that predicts…

  18. Neutron polarimetric test of Leggett's contextual model of quantum mechanics

    International Nuclear Information System (INIS)

    Schmitzer, C.; Bartosik, H.; Klepp, J.; Sponar, S.; Badurek, G.; Hasegawa, J.

    2009-01-01

    Full text: The Einstein-Podolsky-Rosen (EPR) argument attempted to dispute quantum theory. With the Bell inequality it was possible to set up an experimental test of the EPR argument. Here, we describe the rebuilding of the measurement station at the tangential beam exit of the TRIGA reactor of the Atominstitut in Vienna. A new polarimeter setup was constructed and adjusted to generate Bell states by entangling a neutron's energy and spin. After accomplishing visibilities of up to 98.7 %, it was possible to test a Leggett-type inequality, which challenges a 'contextual' hidden variable theory. Such a contextual model would have been capable of reproducing former Bell inequality violations. Measurement results of this Leggett inequality and a generalized Clauser-Horne-Shimony-Holt (CHSH) inequality show violations of this hidden variable model. Hence noncontextual and contextual hidden variable theories can be excluded simultaneously and quantum mechanical predictions are confirmed. (author)

  19. Types of adaptation of the system of enterprise economic security to the impact of subjects of tax regulation

    Directory of Open Access Journals (Sweden)

    Pohorelov Yurii S.

    2014-01-01

    Full Text Available The article offers the authors’ approach to identification of types of adaptation of the system of enterprise economic security to negative influence of subjects of tax regulation. It determines composition of these subjects and, separately, regulation subjects that form fundamental grounds of the tax sphere and subjects of effective influence, which directly interact with entrepreneurial structures and realise tax regulation of their activity in practice. As regards direct adaptation of the system of enterprise economic security, the article offers to mark out its individual types with respect to the set goal, essence of changes in the system of economic security, degree of its manageability and nature of accumulated changes. Moreover, the article offers a list of catalysts and inhibitors of adaptation of the system of enterprise economic security to impact of subjects of tax regulation. It also marks out adaptation parameters of the system of enterprise economic security to the impact of subjects of tax regulation and provides their gradations.

  20. Synchronous contextual irregularities affect early scene processing: replication and extension.

    Science.gov (United States)

    Mudrik, Liad; Shalgi, Shani; Lamy, Dominique; Deouell, Leon Y

    2014-04-01

    Whether contextual regularities facilitate perceptual stages of scene processing is widely debated, and empirical evidence is still inconclusive. Specifically, it was recently suggested that contextual violations affect early processing of a scene only when the incongruent object and the scene are presented a-synchronously, creating expectations. We compared event-related potentials (ERPs) evoked by scenes that depicted a person performing an action using either a congruent or an incongruent object (e.g., a man shaving with a razor or with a fork) when scene and object were presented simultaneously. We also explored the role of attention in contextual processing by using a pre-cue to direct subjects׳ attention towards or away from the congruent/incongruent object. Subjects׳ task was to determine how many hands the person in the picture used in order to perform the action. We replicated our previous findings of frontocentral negativity for incongruent scenes that started ~ 210 ms post stimulus presentation, even earlier than previously found. Surprisingly, this incongruency ERP effect was negatively correlated with the reaction times cost on incongruent scenes. The results did not allow us to draw conclusions about the role of attention in detecting the regularity, due to a weak attention manipulation. By replicating the 200-300 ms incongruity effect with a new group of subjects at even earlier latencies than previously reported, the results strengthen the evidence for contextual processing during this time window even when simultaneous presentation of the scene and object prevent the formation of prior expectations. We discuss possible methodological limitations that may account for previous failures to find this an effect, and conclude that contextual information affects object model selection processes prior to full object identification, with semantic knowledge activation stages unfolding only later on. Copyright © 2014 Elsevier Ltd. All rights reserved.

  1. Computer Security Day

    CERN Multimedia

    CERN Bulletin

    2010-01-01

      Viruses, phishing, malware and cyber-criminals can all threaten your computer and your data, even at CERN! Experts will share their experience with you and offer solutions to keep your computer secure. Thursday, 10 June 2010, 9.30, Council Chamber Make a note in your diary! Presentations in French and English: How do hackers break into your computer? Quels sont les enjeux et conséquences des attaques informatiques contre le CERN ? How so criminals steal your money on the Internet? Comment utiliser votre ordinateur de manière sécurisée ? and a quiz: test your knowledge and win one of the many prizes that will be on offer! For more information and to follow the day's events via a live webcast go to: http://cern.ch/SecDay.  

  2. Contextualizing aquired brain damage

    DEFF Research Database (Denmark)

    Nielsen, Charlotte Marie Bisgaard

    2014-01-01

    Contextualizing aquired brain damage Traditional approaches study ’communicational problems’ often in a discourse of disabledness or deficitness. With an ontology of communcation as something unique and a presupposed uniqueness of each one of us, how could an integrational approach (Integrational...... for people with aquired brain injuries will be presented and comparatively discussed in a traditional versus an integrational perspective. Preliminary results and considerations on ”methods” and ”participation” from this study will be presented along with an overview of the project's empirical data....

  3. Contextual and individual determinants of periodontal disease: Multilevel analysis based on Andersen's model.

    Science.gov (United States)

    Valente, Maria I B; Vettore, Mario V

    2018-04-01

    To investigate the relationship of contextual and individual factors with periodontal disease in dentate adults and older people using the Andersen's behavioural model. Secondary individual data from 6011 adults and 2369 older people from the Brazilian Oral Health Survey (2010) were combined with contextual data for 27 cities. Attachment loss (AL) categories for each sextant were coded and summed to obtain the periodontal disease measure. The association of predisposing, enabling and need characteristics at city and individual level with periodontal disease was assessed using an adapted version of the Andersen's behavioural model. Multilevel Poisson regression was used to estimate rate ratios (RR) and 95% CIs. Periodontal disease was associated with contextual predisposing (RR 0.93; 95% CI = 0.87-0.99) and enabling factors (RR 0.99; 95% CI = 0.98-0.99) in adults. Contextual predisposing was also associated with periodontal disease in older people (RR 0.82; 95% CI = 0.73-0.92). Individual predisposing (age, sex and schooling) and need characteristics (perceived treatment need) were common predictors of periodontal disease in adults and older people. Periodontal disease was also associated with behaviours in the latter age group. Contextual predisposing factors and individual characteristics influenced periodontal disease experience in adults and older people. Contextual enabling factors were also meaningful determinants of periodontal disease in the former age group. © 2017 John Wiley & Sons A/S. Published by John Wiley & Sons Ltd.

  4. Contextual learning theory: Concrete form and a software prototype to improve early education.

    NARCIS (Netherlands)

    Mooij, Ton

    2016-01-01

    In 'contextual learning theory' three types of contextual conditions (differentiation of learning procedures and materials, integrated ICT support, and improvement of development and learning progress) are related to four aspects of the learning process (diagnostic, instructional, managerial, and

  5. Engaging Pre-Service Teachers to Teach Science Contextually with Scientific Approach Instructional Video

    Science.gov (United States)

    Susantini, E.; Kurniasari, I.; Fauziah, A. N. M.; Prastowo, T.; Kholiq, A.; Rosdiana, L.

    2018-01-01

    Contextual teaching and learning/CTL presents new concepts in real-life experiences and situations where students can find out the meaningful relationship between abstract ideas and practical applications. Implementing contextual teaching by using scientific approach will foster teachers to find the constructive ways of delivering and organizing science content. This research developed an instructional video that represented a modeling of using a scientific approach in CTL. The aim of this research are to engage pre-service teachers in learning how to teach CTL and to show how pre-service teachers’ responses about learning how to teach CTL using an instructional video. The subjects of this research were ten pre-service teachers in Department of Natural Sciences, Universitas Negeri Surabaya, Indonesia. All subjects observed the instructional video which demonstrated contextual teaching and learning combined with the scientific approach as they completed a worksheet to analyze the video content. The results showed that pre-service teachers could learn to teach contextually as well as applying the scientific approach in science classroom through a modeling in the instructional video. They also responded that the instructional video could help them to learn to teach each component contextual teaching as well as scientific approach.

  6. Socio-contextual Network Mining for User Assistance in Web-based Knowledge Gathering Tasks

    Science.gov (United States)

    Rajendran, Balaji; Kombiah, Iyakutti

    Web-based Knowledge Gathering (WKG) is a specialized and complex information seeking task carried out by many users on the web, for their various learning, and decision-making requirements. We construct a contextual semantic structure by observing the actions of the users involved in WKG task, in order to gain an understanding of their task and requirement. We also build a knowledge warehouse in the form of a master Semantic Link Network (SLX) that accommodates and assimilates all the contextual semantic structures. This master SLX, which is a socio-contextual network, is then mined to provide contextual inputs to the current users through their agents. We validated our approach through experiments and analyzed the benefits to the users in terms of resource explorations and the time saved. The results are positive enough to motivate us to implement in a larger scale.

  7. General conditions for maximal violation of non-contextuality in discrete and continuous variables

    International Nuclear Information System (INIS)

    Laversanne-Finot, A; Ketterer, A; Coudreau, T; Keller, A; Milman, P; Barros, M R; Walborn, S P

    2017-01-01

    The contextuality of quantum mechanics can be shown by the violation of inequalities based on measurements of well chosen observables. An important property of such observables is that their expectation value can be expressed in terms of probabilities for obtaining two exclusive outcomes. Examples of such inequalities have been constructed using either observables with a dichotomic spectrum or using periodic functions obtained from displacement operators in phase space. Here we identify the general conditions on the spectral decomposition of observables demonstrating state independent contextuality of quantum mechanics. Our results not only unify existing strategies for maximal violation of state independent non-contextuality inequalities but also lead to new scenarios enabling such violations. Among the consequences of our results is the impossibility of having a state independent maximal violation of non-contextuality in the Peres–Mermin scenario with discrete observables of odd dimensions. (paper)

  8. The effect of contextual cues on the encoding of motor memories.

    Science.gov (United States)

    Howard, Ian S; Wolpert, Daniel M; Franklin, David W

    2013-05-01

    Several studies have shown that sensory contextual cues can reduce the interference observed during learning of opposing force fields. However, because each study examined a small set of cues, often in a unique paradigm, the relative efficacy of different sensory contextual cues is unclear. In the present study we quantify how seven contextual cues, some investigated previously and some novel, affect the formation and recall of motor memories. Subjects made movements in a velocity-dependent curl field, with direction varying randomly from trial to trial but always associated with a unique contextual cue. Linking field direction to the cursor or background color, or to peripheral visual motion cues, did not reduce interference. In contrast, the orientation of a visual object attached to the hand cursor significantly reduced interference, albeit by a small amount. When the fields were associated with movement in different locations in the workspace, a substantial reduction in interference was observed. We tested whether this reduction in interference was due to the different locations of the visual feedback (targets and cursor) or the movements (proprioceptive). When the fields were associated only with changes in visual display location (movements always made centrally) or only with changes in the movement location (visual feedback always displayed centrally), a substantial reduction in interference was observed. These results show that although some visual cues can lead to the formation and recall of distinct representations in motor memory, changes in spatial visual and proprioceptive states of the movement are far more effective than changes in simple visual contextual cues.

  9. Security, privacy, and confidentiality issues on the Internet

    OpenAIRE

    Kelly, Grant; McKenzie, Bruce

    2002-01-01

    We introduce the issues around protecting information about patients and related data sent via the Internet. We begin by reviewing three concepts necessary to any discussion about data security in a healthcare environment: privacy, confidentiality, and consent. We are giving some advice on how to protect local data. Authentication and privacy of e-mail via encryption is offered by Pretty Good Privacy (PGP) and Secure Multipurpose Internet Mail Extensions (S/MIME). The de facto Internet standa...

  10. A Comparative Study of Paper-based and Computer-based Contextualization in Vocabulary Learning of EFL Students

    Directory of Open Access Journals (Sweden)

    Mousa Ahmadian

    2015-04-01

    Full Text Available Vocabulary acquisition is one of the largest and most important tasks in language classes. New technologies, such as computers, have helped a lot in this way. The importance of the issue led the researchers to do the present study which concerns the comparison of contextualized vocabulary learning on paper and through Computer Assisted Language Learning (CALL. To this end, 52 Pre-university EFL learners were randomly assigned in two groups: a paper-based group (PB and a computer-based (CB group each with 26 learners. The PB group received PB contextualization of vocabulary items, while the CB group received CB contextualization of the vocabulary items thorough PowerPoint (PP software. One pretest, posttest, along with an immediate and a delayed posttest were given to the learners. Paired samples t-test of pretest and posttest and independent samples t-test of the delayed and immediate posttest were executed by SPSS software. The results revealed that computer-based contextualization had more effects on vocabulary learning of Iranian EFL learners than paper-based contextualization of the words. Keywords: Computer-based contextualization, Paper-based contextualization, Vocabulary learning, CALL

  11. Contextualized B2B Registries

    OpenAIRE

    Radetzki, U; Boniface, M.J.; Surridge, M.

    2007-01-01

    Abstract. Service discovery is a fundamental concept underpinning the move towards dynamic service-oriented business partnerships. The business process for integrating service discovery and underlying registry technologies into busi-ness relationships, procurement and project management functions has not been examined and hence existing Web Service registries lack capabilities required by business today. In this paper we present a novel contextualized B2B registry that supports dynamic regist...

  12. Adolescent prosocial behavior: the role of self-processes and contextual cues.

    Science.gov (United States)

    Wentzel, Kathryn R; Filisetti, Laurence; Looney, Lisa

    2007-01-01

    Peer- and teacher-reported prosocial behavior of 339 6th-grade (11-12 years) and 8th-grade (13-14 years) students was examined in relation to prosocial goals, self-processes (reasons for behavior, empathy, perspective taking, depressive affect, perceived competence), and contextual cues (expectations of peers and teachers). Goal pursuit significantly predicted prosocial behavior, and goal pursuit provided a pathway by which reasons for behavior were related to behavior. Reasons reflected external, other-focused, self-focused, and internal justifications for behavior; each reason was related to a unique set of self-processes and contextual cues. Associations between prosocial outcomes and sex and race (Caucasian and African American) were mediated in part by self-processes and contextual cues. The implications of studying prosocial behavior from a motivational perspective are discussed.

  13. Entering into dialogue about the mathematical value of contextual mathematising tasks

    Science.gov (United States)

    Yoon, Caroline; Chin, Sze Looi; Moala, John Griffith; Choy, Ban Heng

    2018-03-01

    Our project seeks to draw attention to the rich mathematical thinking that is generated when students work on contextual mathematising tasks. We use a design-based research approach to create ways of reporting that raise the visibility of this rich mathematical thinking while retaining and respecting its complexity. These reports will be aimed for three classroom stakeholders: (1) students, who wish to reflect on and enhance their mathematical learning; (2) teachers, who wish to integrate contextual mathematising tasks into their teaching practice and (3) researchers, who seek rich tasks for generating observable instances of mathematical thinking and learning. We anticipate that these reports and the underlying theoretical framework for creating them will contribute to greater awareness of and appreciation for the mathematical value of contextual mathematising tasks in learning, teaching and research.

  14. Securing the energy industry : perspectives in security risk management

    Energy Technology Data Exchange (ETDEWEB)

    Hurd, G.L. [Anadarko Canada Corp., Calgary, AB (Canada)

    2003-07-01

    This presentation offered some perspectives in security risk management as it relates to the energy sector. Since the events of September 11, 2001 much attention has been given to terrorism and the business is reviewing protection strategies. The paper made reference to each of the following vulnerabilities in the energy sector: information technology, globalization, business restructuring, interdependencies, political/regulatory change, and physical/human factors. The vulnerability of information technology is that it can be subject to cyber and virus attacks. Dangers of globalization lie in privacy and information security, forced nationalization, organized crime, and anti-globalization efforts. It was noted that the Y2K phenomenon provided valuable lessons regarding interdependencies and the effects of power outages, water availability, transportation disruption, common utility corridor accidents, and compounding incidents. The paper also noted the conflict between the government's desire to have a resilient infrastructure that can withstand and recover from attacks versus a company's ability to afford this capability. The physical/human factors that need to be considered in risk management include crime, domestic terrorism, and disasters such as natural disasters, industrial disasters and crisis. The energy industry has geographically dispersed vulnerable systems. It has done a fair job of physical security and has good emergency management practices, but it was noted that the industry cannot protect against all threats. A strategy of vigilance and awareness is needed to deal with threats. Other strategies include contingency planning, physical security, employee communication, and emergency response plans. tabs., figs.

  15. Diversification of oil import sources and energy security. A key strategy or an elusive objective?

    International Nuclear Information System (INIS)

    Vivoda, Vlado

    2009-01-01

    This paper explores the relationship between the diversification of sources of imported oil and energy security of oil-importing countries. It examines the importance of diversification policy for oil importers, explains why oil importers implement oil diversification policy, and contextualizes the oil import diversification strategy in the overall energy security policy of oil importers. The paper analyzes the factors and the contexts that affect the level of importance assigned to oil import diversification policy in oil-importing countries, and the limitations that may affect the successful implication of oil import diversification policy. The examples are drawn from the world's top three oil importers, the United States, Japan, and China. The policymakers in these and other oil-importing countries place much importance on energy security. The diversification of oil import sources is used as one of the strategies to enhance energy security in oil-importing countries. This paper is important for policymakers in oil-importing countries as it provides them with a qualitative conceptual framework with which to evaluate the need to diversify their countries' sources of imported oil, and with which to identify the likely limitations to the successful implementation of oil import diversification policy. (author)

  16. Threat Prioritization Process for the Czech Security Strategy Making

    Directory of Open Access Journals (Sweden)

    Milos Balaban

    2012-06-01

    Full Text Available This article offers systematic view of a process of identification of security threats and, subsequently, their use in the making of strategic documents, notably the Security Strategy of the Czech Republic. It is not the aim of the authors to name or define such threats, but to present the process itself. It is paramount to any credible security strategy that it deals with the threat identification in the most precise fashion. The authors take reservations against the “catalogue” approach and claim the processes of prioritization and categorization to be essential for any policies derived from the security strategy, especially in times of economic need. It is also the 2011 final paper of the project “Trends, Risks, and Scenarios of the Security Developments in the World, Europe, and the Czech Republic – Impacts on the Policy and Security System of the Czech Republic” (TRS / VG20102013009.

  17. Contextual profiles of young adult Ecstasy users: a multisite study

    Science.gov (United States)

    Ramtekkar, Ujjwal P.; Striley, Catherine W; Cottler, Linda B

    2010-01-01

    These analyses assess contextual profiles of 612 young adult Ecstasy users, 18–30 years of age, from St. Louis (USA), Miami (USA) and Sydney (Australia). Bivariate analyses revealed different contextual factors influencing Ecstasy use. Friends were the most common sources of Ecstasy at all sites and most used with friends. St. Louis and Miami use mostly occurred in residences, whereas in Sydney use was mostly at clubs, bars or restaurants. Ecstasy consumption at public places and in cars, trains or ferries was significantly higher in Miami (89% and 77%) than in St. Louis (67% and 65%) and Sydney (67% and 61%). At all sites, simultaneous use of LSD/mushroom and nitrous oxide with Ecstasy was common; concurrent amphetamines predominated in Sydney and heroin/opiates in St. Louis Contextual factors influencing Ecstasy use among young adults vary by geographic region. Their inclusion may help tailor effective prevention programs to reduce or ameliorate Ecstasy use. PMID:21094585

  18. Windows Server 2012 vulnerabilities and security

    Directory of Open Access Journals (Sweden)

    Gabriel R. López

    2015-09-01

    Full Text Available This investigation analyses the history of the vulnerabilities of the base system Windows Server 2012 highlighting the most critic vulnerabilities given every 4 months since its creation until the current date of the research. It was organized by the type of vulnerabilities based on the classification of the NIST. Next, given the official vulnerabilities of the system, the authors show how a critical vulnerability is treated by Microsoft in order to countermeasure the security flaw. Then, the authors present the recommended security approaches for Windows Server 2012, which focus on the baseline software given by Microsoft, update, patch and change management, hardening practices and the application of Active Directory Rights Management Services (AD RMS. AD RMS is considered as an important feature since it is able to protect the system even though it is compromised using access lists at a document level. Finally, the investigation of the state of the art related to the security of Windows Server 2012 shows an analysis of solutions given by third parties vendors, which offer security products to secure the base system objective of this study. The recommended solution given by the authors present the security vendor Symantec with its successful features and also characteristics that the authors considered that may have to be improved in future versions of the security solution.

  19. Intelligent techniques in signal processing for multimedia security

    CERN Document Server

    Santhi, V

    2017-01-01

    This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face condi...

  20. The Role of Search Speed in the Contextual Cueing of Children’s Attention

    Science.gov (United States)

    Darby, Kevin; Burling, Joseph; Yoshida, Hanako

    2013-01-01

    The contextual cueing effect is a robust phenomenon in which repeated exposure to the same arrangement of random elements guides attention to relevant information by constraining search. The effect is measured using an object search task in which a target (e.g., the letter T) is located within repeated or nonrepeated visual contexts (e.g., configurations of the letter L). Decreasing response times for the repeated configurations indicates that contextual information has facilitated search. Although the effect is robust among adult participants, recent attempts to document the effect in children have yielded mixed results. We examined the effect of search speed on contextual cueing with school-aged children, comparing three types of stimuli that promote different search times in order to observe how speed modulates this effect. Reliable effects of search time were found, suggesting that visual search speed uniquely constrains the role of attention toward contextually cued information. PMID:24505167

  1. Offers

    CERN Multimedia

    Staff Association

    2014-01-01

    New offers : Discover the theater Galpon in Geneva. The Staff Association is happy to offer to its members a discount of 8.00 CHF on a full-price ticket (tickets of 15.00 CHF instead of 22.00 CHF) so do not hesitate anymore (mandatory reservation by phone + 4122 321  21 76 as tickets are quickly sold out!). For further information, please see our website: http://staff-association.web.cern.ch/fr/content/th%C3%A9%C3%A2tre-du-galpon  

  2. Controle de injúrias sob a ótica da pediatria contextual Injury control from the perspective of contextual pediatrics

    Directory of Open Access Journals (Sweden)

    Danilo Blank

    2005-11-01

    Full Text Available OBJETIVO: Descrever relações entre controle de injúrias e pediatria contextual. FONTES DOS DADOS: Revisão quase-sistemática dos bancos MEDLINE, SciELO e LILACS, usando combinações das seguintes palavras: contextual, comunidade, injúria, acidente e violência; revisão não-sistemática de capítulos de livros e artigos clássicos. SÍNTESE DOS DADOS: A segurança depende de uma interação entre hábitos familiares, normas culturais e entorno. A pediatria contextual vê a criança, a família e a comunidade como um conjunto contínuo. Um de seus pontos-chave é o diagnóstico de saúde (observação seqüencial dos problemas e trunfos. Alterar fatores intrapessoais de injúrias requer a aplicação de estratégias passivas e ativas. Fatores familiares e culturais de risco de injúria: superpopulação do domicílio, mudanças de endereço, pobreza, pais jovens, analfabetos e desempregados. Principais fatores da vizinhança: privação material e trânsito. Fatores culturais: analfabetismo, produtos inseguros, transporte de massa insuficiente, armas de mão, ambientes de trabalho sem normas de segurança, organização comunitária precária, falta de comunicação entre setores sociais, legislação inadequada, baixa prioridade da segurança entre as ações do governo, escassez de recursos econômicos e baixo comprometimento acadêmico com o campo da segurança. CONCLUSÕES: Os papéis do pediatra são reforçar o relacionamento longitudinal com as famílias, trabalho interdisciplinar integrado, intervenção construtiva, parceria com a comunidade, orientação sobre os riscos de injúria inerentes a cada etapa do desenvolvimento, por meio de listas com processo e conteúdo explícitos e entrega de material escrito. Advogar ativamente pela promoção da segurança, em instâncias variadas, além do âmbito clínico.OBJECTIVE: To describe the relationship between injury control and contextual pediatrics. SOURCES OF DATA: Quasi

  3. Contextualization in hypermedia news report: narrative and immersion

    Directory of Open Access Journals (Sweden)

    João Canavilhas

    2015-09-01

    Full Text Available The mobile journalism and, particularly, hypermedia stories get new possibilities for making narratives, boosted by the mobility itself, and also by the use of touchable screens, accelerometer, GPS receiver and permanent connection to the internet. Due to these potentials, tablets, smartphones and wearables reconfigure processes and journalistic narratives for the web. From this premise, the article focuses the research in hypermedia storytelling for mobile devices, aiming to observe how the hypertext resources are used in the contextualization of journalistic narratives published at mobile devices (tablets and smartphones. To achieve this aim, we realized a systematic analysis from newspaper editions of Globo A Mais journal for two months. This was done by selecting a case exemplifying the way the hypertext features can serve the contextualization.

  4. Impact of Contextuality on Mobile Learning Acceptance: An Empirical Study Based on a Language Learning App

    Science.gov (United States)

    Böhm, Stephan; Constantine, Georges Philip

    2016-01-01

    Purpose: This paper aims to focus on contextualized features for mobile language learning apps. The scope of this paper is to explore students' perceptions of contextualized mobile language learning. Design/Methodology/Approach: An extended Technology Acceptance Model was developed to analyze the effect of contextual app features on students'…

  5. Towards a service centric contextualized vehicular cloud

    NARCIS (Netherlands)

    Hu, Xiping; Wang, Lei; Sheng, Zhengguo; TalebiFard, Peyman; Zhou, Li; Liu, Jia; Leung, Victor C.M.

    2014-01-01

    This paper proposes a service-centric contextualized vehicular (SCCV) cloud platform to facilitate the deployment and delivery of cloud-based mobile applications over vehicular networks. SCCV cloud employs a multi-tier architecture that consists of the network, mobile device, and cloud tiers. Based

  6. The impact of distracter-target similarity on contextual cueing effects of children and adults.

    Science.gov (United States)

    Yang, Yingying; Merrill, Edward C

    2014-05-01

    Contextual cueing reflects a memory-based attentional guidance process that develops through repeated exposure to displays in which a target location has been consistently paired with a specific context. In two experiments, we compared 20 younger children's (6-7 years old), 20 older children's (9-10 years old), and 20 young adults' (18-21 years old) abilities to acquire contextual cueing effects from displays in which half of the distracters predicted the location of the target and half did not. Across experiments, we varied the similarity between the predictive and nonpredictive distracters and the target. In Experiment 1, the predictive distracters were visually similar to the target and dissimilar from the nonpredictive distracters. In Experiment 2, the nonpredictive distracters were also similar to the target and predictive distracters. All three age groups exhibited contextual cueing in Experiment 1, although the effect was not as strong for the younger children relative to older children and adults. All participants exhibited weaker contextual cueing effects in Experiment 2, with the younger children not exhibiting significant contextual cueing at all. Apparently, when search processes could not be guided to the predictive distracters on the basis of salient stimulus features, younger children in particular experienced difficulty in implicitly identifying and using aspects of the context to facilitate with the acquisition of contextual cueing effects. Copyright © 2013 Elsevier Inc. All rights reserved.

  7. Special offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  8. Integration of contextual cues into memory depends on "prefrontal" N-methyl-D-aspartate receptors.

    Science.gov (United States)

    Starosta, Sarah; Bartetzko, Isabelle; Stüttgen, Maik C; Güntürkün, Onur

    2017-10-01

    Every learning event is embedded in a context, but not always does the context become an integral part of the memory; however, for extinction learning it usually does, resulting in context-specific conditioned responding. The neuronal mechanisms underlying contextual control have been mainly investigated for Pavlovian fear extinction with a focus on hippocampal structures. However, the initial acquisition of novel responses can be subject to contextual control as well, although the neuronal mechanisms are mostly unknown. Here, we tested the hypothesis that contextual control of acquisition depends on glutamatergic transmission underlying executive functions in forebrain areas, e.g. by shifting attention to critical cues. Thus, we antagonized N-methyl-D-aspartate (NMDA) receptors with 2-amino-5-phosphonovaleric acid (AP5) in the pigeon nidopallium caudolaterale, the functional analogue of mammalian prefrontal cortex, during the concomitant acquisition and extinction of conditioned responding to two different stimuli. This paradigm has previously been shown to lead to contextual control over extinguished as well as non-extinguished responding. NMDA receptor blockade resulted in an impairment of extinction learning, but left the acquisition of responses to a novel stimulus unaffected. Critically, when responses were tested in a different context in the retrieval phase, we observed that NMDA receptor blockade led to the abolishment of contextual control over acquisition performance. This result is predicted by a model describing response inclination as the product of associative strength and contextual gain. In this model, learning under AP5 leads to a change in the contextual gain on the learned association, possibly via the modulation of attentional mechanisms. Copyright © 2017 Elsevier Inc. All rights reserved.

  9. Involvement of the prelimbic cortex in contextual fear conditioning with temporal and spatial discontinuity.

    Science.gov (United States)

    Santos, Thays Brenner; Kramer-Soares, Juliana Carlota; Favaro, Vanessa Manchim; Oliveira, Maria Gabriela Menezes

    2017-10-01

    Time plays an important role in conditioning, it is not only possible to associate stimuli with events that overlap, as in delay fear conditioning, but it is also possible to associate stimuli that are discontinuous in time, as shown in trace conditioning for a discrete stimuli. The environment itself can be a powerful conditioned stimulus (CS) and be associated to unconditioned stimulus (US). Thus, the aim of the present study was to determine the parameters in which contextual fear conditioning occurs by the maintenance of a contextual representation over short and long time intervals. The results showed that a contextual representation can be maintained and associated after 5s, even in the absence of a 15s re-exposure to the training context before US delivery. The same effect was not observed with a 24h interval of discontinuity. Furthermore, optimal conditioned response with a 5s interval is produced only when the contexts (of pre-exposure and shock) match. As the pre-limbic cortex (PL) is necessary for the maintenance of a continuous representation of a stimulus, the involvement of the PL in this temporal and contextual processing was investigated. The reversible inactivation of the PL by muscimol infusion impaired the acquisition of contextual fear conditioning with a 5s interval, but not with a 24h interval, and did not impair delay fear conditioning. The data provided evidence that short and long intervals of discontinuity have different mechanisms, thus contributing to a better understanding of PL involvement in contextual fear conditioning and providing a model that considers both temporal and contextual factors in fear conditioning. Copyright © 2017 Elsevier Inc. All rights reserved.

  10. E-Commerce and Security Governance in Developing Countries

    Science.gov (United States)

    Sanayei, Ali.; Rajabion, Lila

    Security is very often mentioned as one of the preconditions for the faster growth of e-commerce. Without a secure and reliable internet, customer will continue to be reluctant to provide confidential information online, such as credit card number. Moreover, organizations of all types and sizes around the world rely heavily on technologies of electronic commerce (e-commerce) for conducting their day-to-day business transaction. Providing organizations with a secure e-commerce environment is a major issue and challenging one especially in Middle Eastern countries. Without secure e-commerce, it is almost impossible to take advantage of the opportunities offered by e-commerce technologies. E-commerce can create opportunities for small entrepreneurs in Middle Eastern countries. This requires removing infrastructure blockages in telecommunications and logistics alongside the governance of e-commerce with policies on consumer protection, security of transactions, privacy of records and intellectual property. In this paper, we will explore the legal implications of e-commerce security governance by establishing who is responsible for ensuring compliance with this discipline, demonstrating the value to be derived from information security governance, the methodology of applying information security governance, and liability for non-compliance with this discipline. Our main focus will be on analyzing the importance and implication of e-commerce security governance in developing countries.

  11. NNSA Program Develops the Next Generation of Nuclear Security Experts

    Energy Technology Data Exchange (ETDEWEB)

    Brim, Cornelia P.; Disney, Maren V.

    2015-09-02

    NNSA is fostering the next generation of nuclear security experts is through its successful NNSA Graduate Fellowship Program (NGFP). NGFP offers its Fellows an exceptional career development opportunity through hands-on experience supporting NNSA mission areas across policy and technology disciplines. The one-year assignments give tomorrow’s leaders in global nuclear security and nonproliferation unparalleled exposure through assignments to Program Offices across NNSA.

  12. Contextually guided very-high-resolution imagery classification with semantic segments

    Science.gov (United States)

    Zhao, Wenzhi; Du, Shihong; Wang, Qiao; Emery, William J.

    2017-10-01

    Contextual information, revealing relationships and dependencies between image objects, is one of the most important information for the successful interpretation of very-high-resolution (VHR) remote sensing imagery. Over the last decade, geographic object-based image analysis (GEOBIA) technique has been widely used to first divide images into homogeneous parts, and then to assign semantic labels according to the properties of image segments. However, due to the complexity and heterogeneity of VHR images, segments without semantic labels (i.e., semantic-free segments) generated with low-level features often fail to represent geographic entities (such as building roofs usually be partitioned into chimney/antenna/shadow parts). As a result, it is hard to capture contextual information across geographic entities when using semantic-free segments. In contrast to low-level features, "deep" features can be used to build robust segments with accurate labels (i.e., semantic segments) in order to represent geographic entities at higher levels. Based on these semantic segments, semantic graphs can be constructed to capture contextual information in VHR images. In this paper, semantic segments were first explored with convolutional neural networks (CNN) and a conditional random field (CRF) model was then applied to model the contextual information between semantic segments. Experimental results on two challenging VHR datasets (i.e., the Vaihingen and Beijing scenes) indicate that the proposed method is an improvement over existing image classification techniques in classification performance (overall accuracy ranges from 82% to 96%).

  13. Consumer Attitudes and Perceptions on mHealth Privacy and Security: Findings From a Mixed-Methods Study.

    Science.gov (United States)

    Atienza, Audie A; Zarcadoolas, Christina; Vaughon, Wendy; Hughes, Penelope; Patel, Vaishali; Chou, Wen-Ying Sylvia; Pritts, Joy

    2015-01-01

    This study examined consumers' attitudes and perceptions regarding mobile health (mHealth) technology use in health care. Twenty-four focus groups with 256 participants were conducted in 5 geographically diverse locations. Participants were also diverse in age, education, race/ethnicity, gender, and rural versus urban settings. Several key themes emerged from the focus groups. Findings suggest that consumer attitudes regarding mHealth privacy/security are highly contextualized, with concerns depending on the type of information being communicated, where and when the information is being accessed, who is accessing or seeing the information, and for what reasons. Consumers frequently considered the tradeoffs between the privacy/security of using mHealth technologies and the potential benefits. Having control over mHealth privacy/security features and trust in providers were important issues for consumers. Overall, this study found significant diversity in attitudes regarding mHealth privacy/security both within and between traditional demographic groups. Thus, to address consumers' concerns regarding mHealth privacy and security, a one-size-fits-all approach may not be adequate. Health care providers and technology developers should consider tailoring mHealth technology according to how various types of information are communicated in the health care setting, as well as according to the comfort, skills, and concerns individuals may have with mHealth technology.

  14. Contextual and social influences on valuation and choice.

    Science.gov (United States)

    Engelmann, Jan B; Hein, Grit

    2013-01-01

    To survive in our complex environment, we have to adapt to changing contexts. Prior research that investigated how contextual changes are processed in the human brain has demonstrated important modulatory influences on multiple cognitive processes underlying decision-making, including perceptual judgments, working memory, as well as cognitive and attentional control. However, in everyday life, the importance of context is even more obvious during economic and social interactions, which often have implicit rule sets that need to be recognized by a decision-maker. Here, we review recent evidence from an increasing number of studies in the fields of Neuroeconomics and Social Neuroscience that investigate the neurobiological basis of contextual effects on valuation and social choice. Contrary to the assumptions of rational choice theory, multiple contextual factors, such as the availability of alternative choice options, shifts in reference point, and social context, have been shown to modulate behavior, as well as signals in task-relevant neural networks. A consistent picture that emerges from neurobiological results is that valuation-related activity in striatum and ventromedial prefrontal cortex is highly context dependent during both social and nonsocial choice. Alternative approaches to model and explain choice behavior, such as comparison-based choice models, as well as implications for future research are discussed. Copyright © 2013 Elsevier B.V. All rights reserved.

  15. Discriminative latent models for recognizing contextual group activities.

    Science.gov (United States)

    Lan, Tian; Wang, Yang; Yang, Weilong; Robinovitch, Stephen N; Mori, Greg

    2012-08-01

    In this paper, we go beyond recognizing the actions of individuals and focus on group activities. This is motivated from the observation that human actions are rarely performed in isolation; the contextual information of what other people in the scene are doing provides a useful cue for understanding high-level activities. We propose a novel framework for recognizing group activities which jointly captures the group activity, the individual person actions, and the interactions among them. Two types of contextual information, group-person interaction and person-person interaction, are explored in a latent variable framework. In particular, we propose three different approaches to model the person-person interaction. One approach is to explore the structures of person-person interaction. Differently from most of the previous latent structured models, which assume a predefined structure for the hidden layer, e.g., a tree structure, we treat the structure of the hidden layer as a latent variable and implicitly infer it during learning and inference. The second approach explores person-person interaction in the feature level. We introduce a new feature representation called the action context (AC) descriptor. The AC descriptor encodes information about not only the action of an individual person in the video, but also the behavior of other people nearby. The third approach combines the above two. Our experimental results demonstrate the benefit of using contextual information for disambiguating group activities.

  16. Hippocampal Regulation of Contextual Cue-Induced Reinstatement of Cocaine-Seeking Behavior

    OpenAIRE

    Atkins, Alison L.; Mashhoon, Yasmin; Kantak, Kathleen M.

    2008-01-01

    Associations between cocaine and cues facilitate development and maintenance of addiction. We hypothesized that the ventral hippocampus is important for acquisition of these associations. Rats were trained to self-administer cocaine, with or without pre-exposure to distinct sets of cocaine- and saline-paired contextual cues. Next, rats were conditioned for 3 days with the distinct sets of contextual cues paired with cocaine and saline along with distinct discrete cues. Vehicle or lidocaine wa...

  17. A qualitative study of contextual factors' impact on measures to reduce surgery cancellations.

    Science.gov (United States)

    Hovlid, Einar; Bukve, Oddbjørn

    2014-05-13

    Contextual factors influence quality improvement outcomes. Understanding this influence is important when adapting and implementing interventions and translating improvements into new settings. To date, there is limited knowledge about how contextual factors influence quality improvement processes. In this study, we explore how contextual factors affected measures to reduce surgery cancellations, which are a persistent problem in healthcare. We discuss the usefulness of the theoretical framework provided by the model for understanding success in quality (MUSIQ) for this kind of research. We performed a qualitative case study at Førde Hospital, Norway, where we had previously demonstrated a reduction in surgery cancellations. We interviewed 20 clinicians and performed content analysis to explore how contextual factors affected measures to reduce cancellations of planned surgeries. We identified three common themes concerning how contextual factors influenced the change process: 1) identifying a need to change, 2) facilitating system-wide improvement, and 3) leader involvement and support. Input from patients helped identify a need to change and contributed to the consensus that change was necessary. Reducing cancellations required improving the clinical system. This improvement process was based on a strategy that emphasized the involvement of frontline clinicians in detecting and improving system problems. Clinicians shared information about their work by participating in improvement teams to develop a more complete understanding of the clinical system and its interdependencies. This new understanding allowed clinicians to detect system problems and design adequate interventions. Middle managers' participation in the improvement teams and in regular work processes was important for successfully implementing and adapting interventions. Contextual factors interacted with one another and with the interventions to facilitate changes in the clinical system, reducing

  18. Quantitative analysis of the security performance in wireless LANs

    Directory of Open Access Journals (Sweden)

    Poonam Jindal

    2017-07-01

    Full Text Available A comprehensive experimental study to analyze the security performance of a WLAN based on IEEE 802.11 b/g/n standards in various network scenarios is presented in this paper. By setting-up an experimental testbed we have measured results for a layered security model in terms of throughput, response time, encryption overheads, frame loss and jitter. Through numerical results obtained from the testbed, we have presented quantitative as well as realistic findings for both security mechanisms and network performance. It establishes the fact that there is always a tradeoff between the security strength and the associated network performance. It is observed that the non-roaming network always performs better than the roaming network under all network scenarios. To analyze the benefits offered by a particular security protocol a relative security strength index model is demonstrated. Further we have presented the statistical analysis of our experimental data. We found that different security protocols have different robustness against mobility. By choosing the robust security protocol, network performance can be improved. The presented analysis is significant and useful with reference to the assessment of the suitability of security protocols for given real time application.

  19. CLASSIFICATION OF THREATS OF ECONOMIC SECURITY OF TAJIKISTAN

    Directory of Open Access Journals (Sweden)

    Blinichkina N. Yu.

    2016-06-01

    Full Text Available Ensuring of the state economic security suggests the fight against threats to such security. At the same time it is extremely important, firstly, to understand the essence of a threat to economic security and, secondly, to identify the common characteristics of threats allowing to systematize them and to determine the necessary measures to neutralize them on this basis. The traditional approach offers a classification of economic security threats depending on areas of their origin but it is impossible to determine the gravity of the threat to the economy and ways of neutralizing it.In this context we propose allocation of the economic threats to five groups depends on a number of characteristics that determine the level of their negative impact to the economy. Such classification of threats to economic security of Tajikistan helped to determine neutralization of which of them requires outside support, what requires priority within the framework of the strategy of economic security and national economic policy, and what does not require serious government efforts and may be neutralized automatically during neutralization of the other threats.

  20. Study of career development in children from a developmental-contextual perspective Estudio del desarrollo de la orientación vocacional en la infancia desde la perspectiva evolutivo-contextual

    Directory of Open Access Journals (Sweden)

    Alexandra M. Araújo

    2009-06-01

    Full Text Available Career development is a longitudinal process, from childhood to adulthood, which is influenced by personal and contextual factors. Vocational literature has described childhood as a formative period for career development, as the bases of career exploration and vocational interests, values, attitudes and skills are established in the first years of life. This study starts with an overview of the major theoretical approaches and research trends in the study of children’s career development. A particular focus on the developmental-contextual approach to career development is adopted, as an integrative framework to capture the complexity of career developmental processes and results that occur in the first years of life. The application of such a perspective to the study of children’s career development leads to a discussion of the nature of change in the first years of life, of the child as a shaper of development and context, and of the impact of contexts on children’s development. Finally, we present implications of the adoption of a developmental-contextual approach to the study of children’s career development for future research.

    Keywords: Career development, vocational guidance, childhood, contextual theories.
    El desarrollo de la orientación vocacional debemos entenderlo como un proceso longitudinal, que se extiende desde la infancia hasta la edad adulta y que está influido por factores personales y contextuales. La literatura existente, ha descrito la infancia como un período clave para este proceso, pues las bases de la exploración profesional, los intereses, los valores, las actitudes y las habilidades vocacionales, se forman en los primeros años de vida. Este estudio, describe los principales enfoques teóricos y las tendencias de la investigación en la actualidad sobre este tema y su relación con la infancia, poniendo especial énfasis en el enfoque contextual, como marco integrador explicativo de la

  1. Cultural and Contextual Issues in Exemplar Research

    Science.gov (United States)

    King, Pamela Ebstyne; Oakes Mueller, Ross A.; Furrow, James

    2013-01-01

    This chapter specifically addresses how exemplar methods are especially relevant to examining cultural and contextual issues. Cross-cultural, cultural, and indigenous psychologies are discussed in order to highlight how studying actual exemplars in their unique and complex developmental contexts has the potential to identify themes that either…

  2. Optimal Classical Simulation of State-Independent Quantum Contextuality

    Science.gov (United States)

    Cabello, Adán; Gu, Mile; Gühne, Otfried; Xu, Zhen-Peng

    2018-03-01

    Simulating quantum contextuality with classical systems requires memory. A fundamental yet open question is what is the minimum memory needed and, therefore, the precise sense in which quantum systems outperform classical ones. Here, we make rigorous the notion of classically simulating quantum state-independent contextuality (QSIC) in the case of a single quantum system submitted to an infinite sequence of measurements randomly chosen from a finite QSIC set. We obtain the minimum memory needed to simulate arbitrary QSIC sets via classical systems under the assumption that the simulation should not contain any oracular information. In particular, we show that, while classically simulating two qubits tested with the Peres-Mermin set requires log224 ≈4.585 bits, simulating a single qutrit tested with the Yu-Oh set requires, at least, 5.740 bits.

  3. A survey of visualization systems for network security.

    Science.gov (United States)

    Shiravi, Hadi; Shiravi, Ali; Ghorbani, Ali A

    2012-08-01

    Security Visualization is a very young term. It expresses the idea that common visualization techniques have been designed for use cases that are not supportive of security-related data, demanding novel techniques fine tuned for the purpose of thorough analysis. Significant amount of work has been published in this area, but little work has been done to study this emerging visualization discipline. We offer a comprehensive review of network security visualization and provide a taxonomy in the form of five use-case classes encompassing nearly all recent works in this area. We outline the incorporated visualization techniques and data sources and provide an informative table to display our findings. From the analysis of these systems, we examine issues and concerns regarding network security visualization and provide guidelines and directions for future researchers and visual system developers.

  4. Is the Secure Base Phenomenon Evident Here, There, and Anywhere? A Cross-Cultural Study of Child Behavior and Experts' Definitions

    Science.gov (United States)

    Posada, German; Lu, Ting; Trumbell, Jill; Kaloustian, Garene; Trudel, Marcel; Plata, Sandra J.; Peña, Paola P.; Perez, Jennifer; Tereno, Susana; Dugravier, Romain; Coppola, Gabrielle; Constantini, Alessandro; Cassibba, Rosalinda; Kondo-Ikemura, Kiyomi; Nóblega, Magaly; Haya, Ines M.; Pedraglio, Claudia; Verissimo, Manuela; Santos, Antonio J.; Monteiro, Ligia; Lay, Keng-Ling

    2013-01-01

    The evolutionary rationale offered by Bowlby implies that secure base relationships are common in child-caregiver dyads and thus, child secure behavior observable across diverse social contexts and cultures. This study offers a test of the universality hypothesis. Trained observers in nine countries used the Attachment Q-set to describe the…

  5. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Walibi Rhône-Alpes is open until 31 October. Reduced prices for children and adults at this French attraction park in Les Avenières. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  6. Coming to Terms: A conflict analysis of the usage, in official and unofficial sources, of 'security fence', 'apartheid wall', and other terms for the structure between Israel and the Palestinian Territories

    NARCIS (Netherlands)

    Rogers, R.A.; Ben-David, A.

    2010-01-01

    The official terms for the dividing wall are ‘security fence’ on the Israeli side and ‘apartheid wall’ on the Palestinian side. Both terms fuse two contextually charged notions to describe the construction project. Beyond the two official terms, the structure has been given other names by sources

  7. Quantum contextuality in N-boson systems

    International Nuclear Information System (INIS)

    Benatti, Fabio; Floreanini, Roberto; Genovese, Marco; Olivares, Stefano

    2011-01-01

    Quantum contextuality in systems of identical bosonic particles is explicitly exhibited via the maximum violation of a suitable inequality of Clauser-Horne-Shimony-Holt type. Unlike the approaches considered so far, which make use of single-particle observables, our analysis involves collective observables constructed using multiboson operators. An exemplifying scheme to test this violation with a quantum optical setup is also discussed.

  8. Moderating effects of contextual factors on relationship between ...

    African Journals Online (AJOL)

    Decision–making by physicians on patients' treatment has received increased research attention. ... The main objective of this paper is to review the influence of the marketing strategies by pharmaceutical firms and contextual factors on ...

  9. Two (or three) is one too many: testing the flexibility of contextual cueing with multiple target locations.

    Science.gov (United States)

    Zellin, Martina; Conci, Markus; von Mühlenen, Adrian; Müller, Hermann J

    2011-10-01

    Visual search for a target object is facilitated when the object is repeatedly presented within an invariant context of surrounding items ("contextual cueing"; Chun & Jiang, Cognitive Psychology, 36, 28-71, 1998). The present study investigated whether such invariant contexts can cue more than one target location. In a series of three experiments, we showed that contextual cueing is significantly reduced when invariant contexts are paired with two rather than one possible target location, whereas no contextual cueing occurs with three distinct target locations. Closer data inspection revealed that one "dominant" target always exhibited substantially more contextual cueing than did the other, "minor" target(s), which caused negative contextual-cueing effects. However, minor targets could benefit from the invariant context when they were spatially close to the dominant target. In sum, our experiments suggest that contextual cueing can guide visual attention to a spatially limited region of the display, only enhancing the detection of targets presented inside that region.

  10. Design of a Construction Safety Training System using Contextual Design Methodology

    OpenAIRE

    Baldev, Darshan H.

    2006-01-01

    In the U.S., the majority of construction companies are small companies with 10 or fewer employees (BLS, 2004). The fatality rate in the construction industry is high, indicating a need for implementing safety training to a greater extent. This research addresses two main goals: to make recommendations and design a safety training system for small construction companies, and to use Contextual Design to design the training system. Contextual Design was developed by Holtzblatt (Beyer and Holtzb...

  11. Contextual cueing based on specific and categorical properties of the environment

    OpenAIRE

    Goujon , A.; Didierjean , A.; Marmeche , E.

    2007-01-01

    During the analysis of a visual scene, top-down processing is constantly directing the subject's attention to the zones of interest in the scene. The contextual cueing paradigm developed by Chun and Jiang (1998) shows how contextual regularities can facilitate the search for a particular element via implicit learning mechanisms. The study presented here reports three experiments that used this paradigm. Experiment 1 showed that regularities in the specific elements of the context can act as c...

  12. TRPC3 channels critically regulate hippocampal excitability and contextual fear memory.

    Science.gov (United States)

    Neuner, Sarah M; Wilmott, Lynda A; Hope, Kevin A; Hoffmann, Brian; Chong, Jayhong A; Abramowitz, Joel; Birnbaumer, Lutz; O'Connell, Kristen M; Tryba, Andrew K; Greene, Andrew S; Savio Chan, C; Kaczorowski, Catherine C

    2015-03-15

    Memory formation requires de novo protein synthesis, and memory disorders may result from misregulated synthesis of critical proteins that remain largely unidentified. Plasma membrane ion channels and receptors are likely candidates given their role in regulating neuron excitability, a candidate memory mechanism. Here we conduct targeted molecular monitoring and quantitation of hippocampal plasma membrane proteins from mice with intact or impaired contextual fear memory to identify putative candidates. Here we report contextual fear memory deficits correspond to increased Trpc3 gene and protein expression, and demonstrate TRPC3 regulates hippocampal neuron excitability associated with memory function. These data provide a mechanistic explanation for enhanced contextual fear memory reported herein following knockdown of TRPC3 in hippocampus. Collectively, TRPC3 modulates memory and may be a feasible target to enhance memory and treat memory disorders. Copyright © 2014 The Authors. Published by Elsevier B.V. All rights reserved.

  13. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions. TPG: reduced rates on annual transport passes for active and retired staff. Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret. Walibi: reduced prices for children and adults at this French attraction park in Les Avenières. FNAC: 5% reduction on FNAC vouchers. For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  14. 12 CFR 563g.17 - Sales of securities at an office of a savings association.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 5 2010-01-01 2010-01-01 false Sales of securities at an office of a savings association. 563g.17 Section 563g.17 Banks and Banking OFFICE OF THRIFT SUPERVISION, DEPARTMENT OF THE TREASURY SECURITIES OFFERINGS § 563g.17 Sales of securities at an office of a savings association. Sales of...

  15. Taking in account of contextual parameters in post accidental radioecology

    International Nuclear Information System (INIS)

    Renaud, Ph.; Maubert, H.; Bernie, J.C.

    1997-01-01

    The consequences on agricultural or breeding products of a radioactive accidental release are strongly linked to the context in which radioactive deposits occur: for example conditions of deposition in relation with agricultural and feeding schedules. These contextual parameters lead to a variation of results given by models greater than transfer factors uncertainties. For example, cow milk contamination stretches on several decades during the months following deposit as a function of feeding practices. In the same way, if a wheat plant receives the deposit during grain development, harvested grains will have a contamination level 10 3 to 10 4 times higher that if deposition occurs before the growing stage. To create a decision support system like the ASTRAL software, the need to realize a modelling of these contextual parameters has been encountered. Moreover, to help experts for evaluations, default informations relative to agricultural and breeding practices for France are given through databases. However, in case of a real accident, it would be important to re-initialize these contextual parameters which change from year to year, in order to obtain more precise assessments. (authors)

  16. Contextual Compression of Large-Scale Wind Turbine Array Simulations: Preprint

    Energy Technology Data Exchange (ETDEWEB)

    Gruchalla, Kenny M [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Brunhart-Lupo, Nicholas J [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Potter, Kristin C [National Renewable Energy Laboratory (NREL), Golden, CO (United States); Clyne, John [National Center for Atmospheric Research

    2017-11-03

    Data sizes are becoming a critical issue particularly for HPC applications. We have developed a user-driven lossy wavelet-based storage model to facilitate the analysis and visualization of large-scale wind turbine array simulations. The model stores data as heterogeneous blocks of wavelet coefficients, providing high-fidelity access to user-defined data regions believed the most salient, while providing lower-fidelity access to less salient regions on a block-by-block basis. In practice, by retaining the wavelet coefficients as a function of feature saliency, we have seen data reductions in excess of 94 percent, while retaining lossless information in the turbine-wake regions most critical to analysis and providing enough (low-fidelity) contextual information in the upper atmosphere to track incoming coherent turbulent structures. Our contextual wavelet compression approach has allowed us to deliver interactive visual analysis while providing the user control over where data loss, and thus reduction in accuracy, in the analysis occurs. We argue this reduced but contexualized representation is a valid approach and encourages contextual data management.

  17. Network Security Hacks Tips & Tools for Protecting Your Privacy

    CERN Document Server

    Lockhart, Andrew

    2009-01-01

    This second edition of Network Security Hacks offers 125 concise and practical hacks, including more information for Windows administrators, hacks for wireless networking (such as setting up a captive portal and securing against rogue hotspots), and techniques to ensure privacy and anonymity, including ways to evade network traffic analysis, encrypt email and files, and protect against phishing attacks. System administrators looking for reliable answers will also find concise examples of applied encryption, intrusion detection, logging, trending, and incident response.

  18. High-affinity α4β2 nicotinic receptors mediate the impairing effects of acute nicotine on contextual fear extinction.

    Science.gov (United States)

    Kutlu, Munir Gunes; Holliday, Erica; Gould, Thomas J

    2016-02-01

    Previously, studies from our lab have shown that while acute nicotine administered prior to training and testing enhances contextual fear conditioning, acute nicotine injections prior to extinction sessions impair extinction of contextual fear. Although there is also strong evidence showing that the acute nicotine's enhancing effects on contextual fear conditioning require high-affinity α4β2 nicotinic acetylcholine receptors (nAChRs), it is unknown which nAChR subtypes are involved in the acute nicotine-induced impairment of contextual fear extinction. In this study, we investigated the effects of acute nicotine administration on contextual fear extinction in knock-out (KO) mice lacking α4, β2 or α7 subtypes of nAChRs and their wild-type (WT) littermates. Both KO and WT mice were first trained and tested for contextual fear conditioning and received a daily contextual extinction session for 4 days. Subjects received intraperitoneal injections of nicotine (0.18 mg/kg) or saline 2-4 min prior to each extinction session. Our results showed that the mice that lack α4 and β2 subtypes of nAChRs showed normal contextual fear extinction but not the acute nicotine-induced impairment while the mice that lack the α7 subtype showed both normal contextual extinction and nicotine-induced impairment of contextual extinction. In addition, control experiments showed that acute nicotine-induced impairment of contextual fear extinction persisted when nicotine administration was ceased and repeated acute nicotine administrations alone did not induce freezing behavior in the absence of context-shock learning. These results clearly demonstrate that high-affinity α4β2 nAChRs are necessary for the effects of acute nicotine on contextual fear extinction. Copyright © 2015 Elsevier Inc. All rights reserved.

  19. Tailoring NIST Security Controls for the Ground System: Selection and Implementation -- Recommendations for Information System Owners

    Science.gov (United States)

    Takamura, Eduardo; Mangum, Kevin

    2016-01-01

    The National Aeronautics and Space Administration (NASA) invests millions of dollars in spacecraft and ground system development, and in mission operations in the pursuit of scientific knowledge of the universe. In recent years, NASA sent a probe to Mars to study the Red Planet's upper atmosphere, obtained high resolution images of Pluto, and it is currently preparing to find new exoplanets, rendezvous with an asteroid, and bring a sample of the asteroid back to Earth for analysis. The success of these missions is enabled by mission assurance. In turn, mission assurance is backed by information assurance. The information systems supporting NASA missions must be reliable as well as secure. NASA - like every other U.S. Federal Government agency - is required to manage the security of its information systems according to federal mandates, the most prominent being the Federal Information Security Management Act (FISMA) of 2002 and the legislative updates that followed it. Like the management of enterprise information technology (IT), federal information security management takes a "one-size fits all" approach for protecting IT systems. While this approach works for most organizations, it does not effectively translate into security of highly specialized systems such as those supporting NASA missions. These systems include command and control (C&C) systems, spacecraft and instrument simulators, and other elements comprising the ground segment. They must be carefully configured, monitored and maintained, sometimes for several years past the missions' initially planned life expectancy, to ensure the ground system is protected and remains operational without any compromise of its confidentiality, integrity and availability. Enterprise policies, processes, procedures and products, if not effectively tailored to meet mission requirements, may not offer the needed security for protecting the information system, and they may even become disruptive to mission operations

  20. Descriptive survey of the contextual support for nursing research in 15 countries.

    Science.gov (United States)

    Uys, Leana R; Newhouse, Robin P; Oweis, Arwa; Liang, Xiaokun

    2013-01-01

    Global research productivity depends on the presence of contextual factors, such as a doctorally prepared faculty, graduate programmes, publication options, that enable the conduct and publication of studies to generate knowledge to inform nursing practice. The current study aimed to develop and test an instrument that measures the level of contextual support for nursing research within a specific country, allowing comparisons between countries. After development of a 20-item survey with seven factors and 11 criteria based on a literature review, a quantitative descriptive e-mail survey design was used. Nurse researchers (N=100) from 22 countries were invited to participate. The response rate was 39% from 15 countries. Ethics approval was obtained by investigators in their country of origin. Results showed wide variation in the level of contextual support. The average total level of support across all countries was 26.8% (standard deviation [SD]=14.97). The greatest variability was in the area of availability of publishing opportunities (ranging between no suitable journals in a country to over 100). The least variability was in the area of availability of local enabling support (SD=7.22). This research showed wide differences in the level of contextual support for nursing research. The survey instrument can be utilised as a country assessment that can be used to strategically plan the building of infrastructure needed to support nursing research. Contextual support for nursing research is an antecedent of strong science. Building infrastructure for nursing science is a priority for global health.

  1. CDinFusion--submission-ready, on-line integration of sequence and contextual data.

    Science.gov (United States)

    Hankeln, Wolfgang; Wendel, Norma Johanna; Gerken, Jan; Waldmann, Jost; Buttigieg, Pier Luigi; Kostadinov, Ivaylo; Kottmann, Renzo; Yilmaz, Pelin; Glöckner, Frank Oliver

    2011-01-01

    State of the art (DNA) sequencing methods applied in "Omics" studies grant insight into the 'blueprints' of organisms from all domains of life. Sequencing is carried out around the globe and the data is submitted to the public repositories of the International Nucleotide Sequence Database Collaboration. However, the context in which these studies are conducted often gets lost, because experimental data, as well as information about the environment are rarely submitted along with the sequence data. If these contextual or metadata are missing, key opportunities of comparison and analysis across studies and habitats are hampered or even impossible. To address this problem, the Genomic Standards Consortium (GSC) promotes checklists and standards to better describe our sequence data collection and to promote the capturing, exchange and integration of sequence data with contextual data. In a recent community effort the GSC has developed a series of recommendations for contextual data that should be submitted along with sequence data. To support the scientific community to significantly enhance the quality and quantity of contextual data in the public sequence data repositories, specialized software tools are needed. In this work we present CDinFusion, a web-based tool to integrate contextual and sequence data in (Multi)FASTA format prior to submission. The tool is open source and available under the Lesser GNU Public License 3. A public installation is hosted and maintained at the Max Planck Institute for Marine Microbiology at http://www.megx.net/cdinfusion. The tool may also be installed locally using the open source code available at http://code.google.com/p/cdinfusion.

  2. Significant Statistics: Viewed with a Contextual Lens

    Science.gov (United States)

    Tait-McCutcheon, Sandi

    2010-01-01

    This paper examines the pedagogical and organisational changes three lead teachers made to their statistics teaching and learning programs. The lead teachers posed the research question: What would the effect of contextually integrating statistical investigations and literacies into other curriculum areas be on student achievement? By finding the…

  3. Using the Virtual Reality-Cognitive Rehabilitation Approach to Improve Contextual Processing in Children with Autism

    Directory of Open Access Journals (Sweden)

    Michelle Wang

    2013-01-01

    Full Text Available Background. This pilot study investigated the efficacy of a novel virtual reality-cognitive rehabilitation (VR-CR intervention to improve contextual processing of objects in children with autism. Previous research supports that children with autism show deficits in contextual processing, as well as deficits in its elementary components: abstraction and cognitive flexibility. Methods. Four children with autism participated in a multiple-baseline, single-subject study. The children were taught how to see objects in context by reinforcing attention to pivotal contextual information. Results. All children demonstrated statistically significant improvements in contextual processing and cognitive flexibility. Mixed results were found on the control test and changes in context-related behaviours. Conclusions. Larger-scale studies are warranted to determine the effectiveness and usability in comprehensive educational programs.

  4. Using the Virtual Reality-Cognitive Rehabilitation Approach to Improve Contextual Processing in Children with Autism

    Science.gov (United States)

    Reid, Denise

    2013-01-01

    Background. This pilot study investigated the efficacy of a novel virtual reality-cognitive rehabilitation (VR-CR) intervention to improve contextual processing of objects in children with autism. Previous research supports that children with autism show deficits in contextual processing, as well as deficits in its elementary components: abstraction and cognitive flexibility. Methods. Four children with autism participated in a multiple-baseline, single-subject study. The children were taught how to see objects in context by reinforcing attention to pivotal contextual information. Results. All children demonstrated statistically significant improvements in contextual processing and cognitive flexibility. Mixed results were found on the control test and changes in context-related behaviours. Conclusions. Larger-scale studies are warranted to determine the effectiveness and usability in comprehensive educational programs. PMID:24324379

  5. Innovative gas offers

    International Nuclear Information System (INIS)

    Sala, O.; Mela, P.; Chatelain, F.

    2007-01-01

    New energy offers are progressively made available as the opening of gas market to competition becomes broader. How are organized the combined offers: gas, electricity, renewable energies and energy services? What are the marketing strategies implemented? Three participants at this round table present their offer and answer these questions. (J.S.)

  6. Security aspects of 3G-WLAN interworking

    DEFF Research Database (Denmark)

    Køien, Geir M.

    2003-01-01

    to roaming and mobility support. In short, WLAN systems are great for hot spot coverage, while 3G systems provide global coverage and the necessary network and management infrastructure to cater for security, roaming, and charging requirements. The focus of the article is on security aspects of 3GPP......Third-generation cellular systems will provide wide coverage and nearly universal roaming, but will not realistically live up to the bit rate expectations placed on them. On the other hand, WLAN systems already offer bit rates surpassing those of 3G systems, but are often found lacking with respect...

  7. Simulation and Evaluation of CTP and Secure-CTP Protocols

    Directory of Open Access Journals (Sweden)

    P. Pecho

    2010-04-01

    Full Text Available The paper discusses characteristics and qualities of two routing protocols – Collection Tree Protocol and its secure modification. The original protocol, as well as other protocols for wireless sensors, solves only problems of ra- dio communication and limited resources. Our design of the secure protocol tries to solve also the essential security ob- jectives. For the evaluation of properties of our protocol in large networks, a TOSSIM simulator was used. Our effort was to show the influence of the modification of the routing protocol to its behavior and quality of routing trees. We have proved that adding security into protocol design does not necessarily mean higher demands for data transfer, power consumption or worse protocol efficiency. In the paper, we manifest that security in the protocol may be achieved with low cost and may offer similar performance as the original protocol.

  8. Neural correlates of contextual cueing are modulated by explicit learning.

    Science.gov (United States)

    Westerberg, Carmen E; Miller, Brennan B; Reber, Paul J; Cohen, Neal J; Paller, Ken A

    2011-10-01

    Contextual cueing refers to the facilitated ability to locate a particular visual element in a scene due to prior exposure to the same scene. This facilitation is thought to reflect implicit learning, as it typically occurs without the observer's knowledge that scenes repeat. Unlike most other implicit learning effects, contextual cueing can be impaired following damage to the medial temporal lobe. Here we investigated neural correlates of contextual cueing and explicit scene memory in two participant groups. Only one group was explicitly instructed about scene repetition. Participants viewed a sequence of complex scenes that depicted a landscape with five abstract geometric objects. Superimposed on each object was a letter T or L rotated left or right by 90°. Participants responded according to the target letter (T) orientation. Responses were highly accurate for all scenes. Response speeds were faster for repeated versus novel scenes. The magnitude of this contextual cueing did not differ between the two groups. Also, in both groups repeated scenes yielded reduced hemodynamic activation compared with novel scenes in several regions involved in visual perception and attention, and reductions in some of these areas were correlated with response-time facilitation. In the group given instructions about scene repetition, recognition memory for scenes was superior and was accompanied by medial temporal and more anterior activation. Thus, strategic factors can promote explicit memorization of visual scene information, which appears to engage additional neural processing beyond what is required for implicit learning of object configurations and target locations in a scene. Copyright © 2011 Elsevier Ltd. All rights reserved.

  9. Contextual risk factors for low birth weight: a multilevel analysis.

    Directory of Open Access Journals (Sweden)

    Gbenga A Kayode

    Full Text Available Low birth weight (LBW remains to be a leading cause of neonatal death and a major contributor to infant and under-five mortality. Its prevalence has not declined in the last decade in sub-Saharan Africa (SSA and Asia. Some individual level factors have been identified as risk factors for LBW but knowledge is limited on contextual risk factors for LBW especially in SSA.Contextual risk factors for LBW in Ghana were identified by performing multivariable multilevel logistic regression analysis of 6,900 mothers dwelling in 412 communities that participated in the 2003 and 2008 Demographic and Health Surveys in Ghana.Contextual-level factors were significantly associated with LBW: Being a rural dweller increased the likelihood of having a LBW infant by 43% (OR 1.43; 95% CI 1.01-2.01; P-value <0.05 while living in poverty-concentrated communities increased the risk of having a LBW infant twofold (OR 2.16; 95% CI 1.29-3.61; P-value <0.01. In neighbourhoods with a high coverage of safe water supply the odds of having a LBW infant reduced by 28% (OR 0.74; 95% CI 0.57-0.96; P-value <0.05.This study showed contextual risk factors to have independent effects on the prevalence of LBW infants. Being a rural dweller, living in a community with a high concentration of poverty and a low coverage of safe water supply were found to increase the prevalence of LBW infants. Implementing appropriate community-based intervention programmes will likely reduce the occurrence of LBW infants.

  10. Offer

    CERN Multimedia

    Staff Association

    2016-01-01

    CERN was selected and participated in the ranking "Best Employers" organized by the magazine Bilan. To thank CERN for its collaboration, the magazine offers a reduction to the subscription fee for all employed members of personnel. 25% off the annual subscription: CHF 149.25 instead of CHF 199 .— The subscription includes the magazine delivered to your home for a year, every other Wednesday, as well as special editions and access to the e-paper. To benefit from this offer, simply fill out the form provided for this purpose. To get the form, please contact the secretariat of the Staff Association (Staff.Association@cern.ch).

  11. A conceptual framework for cyber security awareness and education in SA

    Directory of Open Access Journals (Sweden)

    Noluxolo Kortjan

    2014-06-01

    Full Text Available The Internet is becoming increasingly interwoven in the daily lives of many individuals, organisations and nations. It has, to a large extent, had a positive effect on the way people communicate. It has also introduced new avenues for business; and it has offered nations an opportunity to govern online. Nevertheless, although cyberspace offers an endless list of services and opportunities, it is also accompanied by many risks, of which many Internet users are not aware. As such, various countries have developed and implemented cyber-security awareness and education measures to counter the perceived ignorance of the Internet users. However, there is currently a definite lack in South Africa (SA in this regard; as there are currently, little government-led and sponsored cyber-security awareness and education initiatives. The primary research objective of this paper, therefore, is to propose a cyber-security awareness and education framework for SA that would assist in creating a cyber-secure culture in SA among all of the users of the Internet. This framework will be developed on the basis of key factors extrapolated from a comparative analysis of relevant developed countries.

  12. International Perspectives on Grandparents Raising Grandchildren: Contextual Considerations for Advancing Global Discourse.

    Science.gov (United States)

    Dolbin-MacNab, Megan L; Yancura, Loriena A

    2018-01-01

    Globally, it is common for grandparents to serve as surrogate parents to their grandchildren, often in response to family crises and other challenges such as poverty, disease epidemics, and migration. Despite the global nature of this intergenerational caregiving arrangement, there have been few contextually focused examinations of how grandparents' surrogate parenting roles are enacted across countries and cultures. This analytic review addresses this issue by exploring demographic and cultural contexts, needs and experiences, and formal and informal supports for grandparents raising grandchildren in four diverse countries: China, New Zealand, Romania, and South Africa. We conclude our analysis by discussing key contextual factors, and their associated interrelationships, from which future research may elucidate how cultural, historical, and sociopolitical factors uniquely shape grandparents' experiences. We also make recommendations for contextually informed policies and practice.

  13. Psychological distress among children and adolescents. Do individual or contextual factors matter?

    DEFF Research Database (Denmark)

    Meilstrup, Charlotte; Ersbøll, Annette Kjær; Nielsen, Line

    Psychological distress among children and adolescents. Do individual or contextual factors matter? Authors Meilstrup C, Ersbøll AK, Nielsen L, Due P, Holstein BE Background A large minority of children and adolescents suffer from mental distress and it is important to identify contributing factors......% across schools. Individual level variables such as low socio-economic position and family composition explained much of the variation across schools. Still, class level variables also contributed to this variation. In classes where many students reported that the class-mates doesn´t like being together...... (compositional effects), this study suggest that contextual factors are important to take into account in the research on psychological complaints among children and adolescents. This analytical model presents a way for future studies about contextual influences on psychological complaints....

  14. Case Study: Creation of a Degree Program in Computer Security. White Paper.

    Science.gov (United States)

    Belon, Barbara; Wright, Marie

    This paper reports on research into the field of computer security, and undergraduate degrees offered in that field. Research described in the paper reveals only one computer security program at the associate's degree level in the entire country. That program, at Texas State Technical College in Waco, is a 71-credit-hour program leading to an…

  15. The influence of group membership on cross-contextual imitation.

    Science.gov (United States)

    Genschow, Oliver; Schindler, Simon

    2016-08-01

    Research on mimicry has demonstrated that individuals imitate in-group members more strongly than out-group members. In the present study, we tested whether such top-down modulation also applies for more extreme forms of direct mapping, such as for cross-contextual imitation settings, in which individuals imitate others' movements without sharing a common goal or context. Models on self-other control suggest that top-down modulations are based merely on a direct link between social sensory processing and imitation. That is, perceived similarities between oneself and another person is sufficient to amplify a shared representation between own and others' actions, which then trigger imitation. However, motivational accounts explain such findings with the assumption that individuals are motivated to affiliate with others. Because imitation is linked to positive social consequences, individuals should imitate in-group members more strongly than out-group members. We tested these two theoretical accounts against each other by applying a cross-contextual imitation paradigm. The results demonstrate that in-group members are more strongly cross-contextually imitated than out-group members the higher individuals' motivation to affiliate with the in-group is. This supports motivational models but not self-other control accounts. Further theoretical implications are discussed.

  16. A SECURE MESSAGE TRANSMISSION SYSTEM ARCHITECTURE FOR COMPUTER NETWORKS EMPLOYING SMART CARDS

    Directory of Open Access Journals (Sweden)

    Geylani KARDAŞ

    2008-01-01

    Full Text Available In this study, we introduce a mobile system architecture which employs smart cards for secure message transmission in computer networks. The use of smart card provides two security services as authentication and confidentiality in our design. The security of the system is provided by asymmetric encryption. Hence, smart cards are used to store personal account information as well as private key of each user for encryption / decryption operations. This offers further security, authentication and mobility to the system architecture. A real implementation of the proposed architecture which utilizes the JavaCard technology is also discussed in this study.

  17. Big Data Challenges : Society, Security, Innovation and Ethics

    NARCIS (Netherlands)

    Bunnik, Anno; Cawley, Anthony; Mulqueen, Michael; Zwitter, Andrej

    2016-01-01

    This book brings together an impressive range of academic and intelligence professional perspectives to interrogate the social, ethical and security upheavals in a world increasingly driven by data. Written in a clear and accessible style, it offers fresh insights to the deep reaching implications

  18. Negative emotional stimuli reduce contextual cueing but not response times in inefficient search.

    Science.gov (United States)

    Kunar, Melina A; Watson, Derrick G; Cole, Louise; Cox, Angeline

    2014-02-01

    In visual search, previous work has shown that negative stimuli narrow the focus of attention and speed reaction times (RTs). This paper investigates these two effects by first asking whether negative emotional stimuli narrow the focus of attention to reduce the learning of a display context in a contextual cueing task and, second, whether exposure to negative stimuli also reduces RTs in inefficient search tasks. In Experiment 1, participants viewed either negative or neutral images (faces or scenes) prior to a contextual cueing task. In a typical contextual cueing experiment, RTs are reduced if displays are repeated across the experiment compared with novel displays that are not repeated. The results showed that a smaller contextual cueing effect was obtained after participants viewed negative stimuli than when they viewed neutral stimuli. However, in contrast to previous work, overall search RTs were not faster after viewing negative stimuli (Experiments 2 to 4). The findings are discussed in terms of the impact of emotional content on visual processing and the ability to use scene context to help facilitate search.

  19. Fearful contextual expression impairs the encoding and recognition of target faces: an ERP study

    Directory of Open Access Journals (Sweden)

    Huiyan eLin

    2015-09-01

    Full Text Available Previous event-related potential (ERP studies have shown that the N170 to faces is modulated by the emotion of the face and its context. However, it is unclear how the encoding of emotional target faces as reflected in the N170 is modulated by the preceding contextual facial expression when temporal onset and identity of target faces are unpredictable. In addition, no study as yet has investigated whether contextual facial expression modulates later recognition of target faces. To address these issues, participants in the present study were asked to identify target faces (fearful or neutral that were presented after a sequence of fearful or neutral contextual faces. The number of sequential contextual faces was random and contextual and target faces were of different identities so that temporal onset and identity of target faces were unpredictable. Electroencephalography (EEG data was recorded during the encoding phase. Subsequently, participants had to perform an unexpected old/new recognition task in which target face identities were presented in either the encoded or the non-encoded expression. ERP data showed a reduced N170 to target faces in fearful as compared to neutral context regardless of target facial expression. In the later recognition phase, recognition rates were reduced for target faces in the encoded expression when they had been encountered in fearful as compared to neutral context. The present findings suggest that fearful compared to neutral contextual faces reduce the allocation of attentional resources towards target faces, which results in limited encoding and recognition of target faces.

  20. Risk assessment of climate systems for national security.

    Energy Technology Data Exchange (ETDEWEB)

    Backus, George A.; Boslough, Mark Bruce Elrick; Brown, Theresa Jean; Cai, Ximing; Conrad, Stephen Hamilton; Constantine, Paul G; Dalbey, Keith R.; Debusschere, Bert J.; Fields, Richard; Hart, David Blaine; Kalinina, Elena Arkadievna; Kerstein, Alan R.; Levy, Michael; Lowry, Thomas Stephen; Malczynski, Leonard A.; Najm, Habib N.; Overfelt, James Robert; Parks, Mancel Jordan; Peplinski, William J.; Safta, Cosmin; Sargsyan, Khachik; Stubblefield, William Anthony; Taylor, Mark A.; Tidwell, Vincent Carroll; Trucano, Timothy Guy; Villa, Daniel L.

    2012-10-01

    Climate change, through drought, flooding, storms, heat waves, and melting Arctic ice, affects the production and flow of resource within and among geographical regions. The interactions among governments, populations, and sectors of the economy require integrated assessment based on risk, through uncertainty quantification (UQ). This project evaluated the capabilities with Sandia National Laboratories to perform such integrated analyses, as they relate to (inter)national security. The combining of the UQ results from climate models with hydrological and economic/infrastructure impact modeling appears to offer the best capability for national security risk assessments.

  1. The Impacts of Demographic Variables on Technological and Contextual Challenges of E-learning Implementation

    Science.gov (United States)

    Aldowah, Hanan; Ghazal, Samar; Naufal Umar, Irfan; Muniandy, Balakrishnan

    2017-09-01

    Information technology has achieved robust growth which has made it possible for learning to occur quickly. The rapid development of information, communication and technologies (ICT) has initiated an unparalleled transformation in universities all over the world. This development of technology and learning is offering new techniques to represent knowledge, new practices, and new global communities of learners. As a result, today’s economic and social changes force universities to try to find new learning approaches and systems. E-learning seems to be an appropriate approach in this aspect. However, the implementation of e-learning systems in universities is not an easy task because of some challenges related to context, technology, and other challenges. This paper studied the impacts of demographic data and reported the critical points for the decision makers to consider when planning and implementing e-learning in universities. A quantitative approach was used to study the effects of technological and contextual challenges on e-learning implementation in which a questionnaire was used for the data collection. According to the findings of the study, the most important challenges of the implementation of e-learning are related either to organizational (Contextual) and technological (technical) issues. The demographic variables have been found to play a direct and indirect role with the technological and contextual challenges of implementing e-learning. This paper showed that there are some significant differences in the two challenges faced by instructors in terms of the demographic variables. The result revealed that some significant differences exist between demographic variables and the two challenges of e-learning in terms of gender, age, teaching experience, ICT experience and e-learning experience. However, there is no significant difference in terms of e-learning experience. The obtained data, from such study, can provide information about what academic

  2. Stochastic Relational Presheaves and Dynamic Logic for Contextuality

    Directory of Open Access Journals (Sweden)

    Kohei Kishida

    2014-12-01

    Full Text Available Presheaf models provide a formulation of labelled transition systems that is useful for, among other things, modelling concurrent computation. This paper aims to extend such models further to represent stochastic dynamics such as shown in quantum systems. After reviewing what presheaf models represent and what certain operations on them mean in terms of notions such as internal and external choices, composition of systems, and so on, I will show how to extend those models and ideas by combining them with ideas from other category-theoretic approaches to relational models and to stochastic processes. It turns out that my extension yields a transitional formulation of sheaf-theoretic structures that Abramsky and Brandenburger proposed to characterize non-locality and contextuality. An alternative characterization of contextuality will then be given in terms of a dynamic modal logic of the models I put forward.

  3. Evaluating physician performance at individualizing care: a pilot study tracking contextual errors in medical decision making.

    Science.gov (United States)

    Weiner, Saul J; Schwartz, Alan; Yudkowsky, Rachel; Schiff, Gordon D; Weaver, Frances M; Goldberg, Julie; Weiss, Kevin B

    2007-01-01

    Clinical decision making requires 2 distinct cognitive skills: the ability to classify patients' conditions into diagnostic and management categories that permit the application of research evidence and the ability to individualize or-more specifically-to contextualize care for patients whose circumstances and needs require variation from the standard approach to care. The purpose of this study was to develop and test a methodology for measuring physicians' performance at contextualizing care and compare it to their performance at planning biomedically appropriate care. First, the authors drafted 3 cases, each with 4 variations, 3 of which are embedded with biomedical and/or contextual information that is essential to planning care. Once the cases were validated as instruments for assessing physician performance, 54 internal medicine residents were then presented with opportunities to make these preidentified biomedical or contextual errors, and data were collected on information elicitation and error making. The case validation process was successful in that, in the final iteration, the physicians who received the contextual variant of cases proposed an alternate plan of care to those who received the baseline variant 100% of the time. The subsequent piloting of these validated cases unmasked previously unmeasured differences in physician performance at contextualizing care. The findings, which reflect the performance characteristics of the study population, are presented. This pilot study demonstrates a methodology for measuring physician performance at contextualizing care and illustrates the contribution of such information to an overall assessment of physician practice.

  4. The ecology of team science: understanding contextual influences on transdisciplinary collaboration.

    Science.gov (United States)

    Stokols, Daniel; Misra, Shalini; Moser, Richard P; Hall, Kara L; Taylor, Brandie K

    2008-08-01

    Increased public and private investments in large-scale team science initiatives over the past two decades have underscored the need to better understand how contextual factors influence the effectiveness of transdisciplinary scientific collaboration. Toward that goal, the findings from four distinct areas of research on team performance and collaboration are reviewed: (1) social psychological and management research on the effectiveness of teams in organizational and institutional settings; (2) studies of cyber-infrastructures (i.e., computer-based infrastructures) designed to support transdisciplinary collaboration across remote research sites; (3) investigations of community-based coalitions for health promotion; and (4) studies focusing directly on the antecedents, processes, and outcomes of scientific collaboration within transdisciplinary research centers and training programs. The empirical literature within these four domains reveals several contextual circumstances that either facilitate or hinder team performance and collaboration. A typology of contextual influences on transdisciplinary collaboration is proposed as a basis for deriving practical guidelines for designing, managing, and evaluating successful team science initiatives.

  5. Contextual Mobile Learning Strongly Related to Industrial Activities: Principles and Case Study

    OpenAIRE

    David, Bertrand; Yin, Chuantao; Chalon, René

    2010-01-01

    M-learning (mobile learning) can take various forms. We are interested in contextualized M-learning, i.e. the training related to the situation physically or logically localized. Contextualization and pervasivity are important aspects of our approach. We propose in particular MOCOCO principles (Mobility - COntextualisation - COoperation) using IMERA platform (Mobile Interaction in the Augmented Real Environment) covering our university campus in which we prototype and test our approach. We ar...

  6. Security in Distributed Collaborative Environments: Limitations and Solutions

    Science.gov (United States)

    Saadi, Rachid; Pierson, Jean-Marc; Brunie, Lionel

    The main goal of establishing collaboration between heterogeneous environment is to create such as Pervasive context which provide nomadic users with ubiquitous access to digital information and surrounding resources. However, the constraints of mobility and heterogeneity arise a number of crucial issues related to security, especially authentication access control and privacy. First of all, in this chapter we explore the trust paradigm, specially the transitive capability to enable a trust peer to peer collaboration. In this manner, when each organization sets its own security policy to recognize (authenticate) users members of a trusted community and provide them a local access (access control), the trust transitivity between peers will allows users to gain a broad, larger and controlled access inside the pervasive environment. Next, we study the problem of user's privacy. In fact in pervasive and ubiquitous environments, nomadic users gather and exchange certificates or credential which providing them rights to access by transitivity unknown and trusted environments. These signed documents embeds increasing number of attribute that require to be filtered according to such contextual situation. In this chapter, we propose a new morph signature enabling each certificate owner to preserve his privacy by discloses or blinds some sensitive attributes according to faced situation.

  7. Chasing Moby Dick Across Every Sea and Ocean? Contextual Choices in Fighting Corruption

    DEFF Research Database (Denmark)

    Mungiu-Pippidi, Alina; Jensen, Mette Frisk

    2011-01-01

    Draft report commissioned by Norad, c/o ANKOR (the Anti-corruption Project) in cooperation with the Evaluation Department ("Contextual Choices for Results in Fighting Corruption", Referende number 1001232)......Draft report commissioned by Norad, c/o ANKOR (the Anti-corruption Project) in cooperation with the Evaluation Department ("Contextual Choices for Results in Fighting Corruption", Referende number 1001232)...

  8. Innovation in small and mediumsized firms in the security service industry

    DEFF Research Database (Denmark)

    Langergaard, Luise Li; Møller, Jørn Kjølseth; Hansen, Anne Vorre

    2014-01-01

    This article is a study of innovation in the security sector based on an analysis of three Danish security companies. It uncovers the logics and dynamics of innovation in the security business, which is part of the operational service sector. Operational service companies are forced to choose...... activities. In order to overcome this general ‘service squeeze’ and break with a mature market, security companies use different strategies for innovation. These strategies depend on the ability of the individual security companies to activate the innovative resources among employees in order to move...... the business activities further up in the market hierarchy of security services by offering more complex and knowledge-intensive solutions to the customers, thereby reducing price competition and increasing the profits of the business activity in the same way as known from other industries...

  9. Servitization in a Security Business: Changing the Logic of Value Creation

    Directory of Open Access Journals (Sweden)

    Arto Rajala

    2013-08-01

    Full Text Available How can a firm change its value-creation logic from providing technology to selling technology-based services? This is a question many security companies face today when trying to apply a solutions-based business model in response to recent macro- and microeconomic trends. The fact that customers increasingly demand security as a service, rather than technical equipment, challenges the basis of a security firm's value provision and alters the logic of its operation. In this article, we investigate a technology- and product-oriented security business that is now rapidly transforming into a service business. We use data from a case study to propose a 4C model (conceptualization, calculation, communication, and co-creation of value that can help security providers to objectify their service offerings and succeed in the servitization of their security businesses.

  10. Special Offers

    CERN Multimedia

    Association du personnel

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  11. Special Offers

    CERN Multimedia

    Staff Association

    2011-01-01

    Are you a member of the Staff Association? Did you know that as a member you can benefit from the following special offers: BCGE (Banque Cantonale de Genève): personalized banking solutions with preferential conditions.     TPG: reduced rates on annual transport passes for all active and retired staff.     Aquaparc: reduced ticket prices for children and adults at this Swiss waterpark in Le Bouveret.     Walibi: reduced prices for children and adults at this French attraction park in Les Avenières.       FNAC: 5% reduction on FNAC vouchers.       For more information about all these offers, please consult our web site: http://association.web.cern.ch/association/en/OtherActivities/Offers.html

  12. Equivalence between contextuality and negativity of the Wigner function for qudits

    Science.gov (United States)

    Delfosse, Nicolas; Okay, Cihan; Bermejo-Vega, Juan; Browne, Dan E.; Raussendorf, Robert

    2017-12-01

    Understanding what distinguishes quantum mechanics from classical mechanics is crucial for quantum information processing applications. In this work, we consider two notions of non-classicality for quantum systems, negativity of the Wigner function and contextuality for Pauli measurements. We prove that these two notions are equivalent for multi-qudit systems with odd local dimension. For a single qudit, the equivalence breaks down. We show that there exist single qudit states that admit a non-contextual hidden variable model description and whose Wigner functions are negative.

  13. Context matters: the experience of 14 research teams in systematically reporting contextual factors important for practice change.

    Science.gov (United States)

    Tomoaia-Cotisel, Andrada; Scammon, Debra L; Waitzman, Norman J; Cronholm, Peter F; Halladay, Jacqueline R; Driscoll, David L; Solberg, Leif I; Hsu, Clarissa; Tai-Seale, Ming; Hiratsuka, Vanessa; Shih, Sarah C; Fetters, Michael D; Wise, Christopher G; Alexander, Jeffrey A; Hauser, Diane; McMullen, Carmit K; Scholle, Sarah Hudson; Tirodkar, Manasi A; Schmidt, Laura; Donahue, Katrina E; Parchman, Michael L; Stange, Kurt C

    2013-01-01

    We aimed to advance the internal and external validity of research by sharing our empirical experience and recommendations for systematically reporting contextual factors. Fourteen teams conducting research on primary care practice transformation retrospectively considered contextual factors important to interpreting their findings (internal validity) and transporting or reinventing their findings in other settings/situations (external validity). Each team provided a table or list of important contextual factors and interpretive text included as appendices to the articles in this supplement. Team members identified the most important contextual factors for their studies. We grouped the findings thematically and developed recommendations for reporting context. The most important contextual factors sorted into 5 domains: (1) the practice setting, (2) the larger organization, (3) the external environment, (4) implementation pathway, and (5) the motivation for implementation. To understand context, investigators recommend (1) engaging diverse perspectives and data sources, (2) considering multiple levels, (3) evaluating history and evolution over time, (4) looking at formal and informal systems and culture, and (5) assessing the (often nonlinear) interactions between contextual factors and both the process and outcome of studies. We include a template with tabular and interpretive elements to help study teams engage research participants in reporting relevant context. These findings demonstrate the feasibility and potential utility of identifying and reporting contextual factors. Involving diverse stakeholders in assessing context at multiple stages of the research process, examining their association with outcomes, and consistently reporting critical contextual factors are important challenges for a field interested in improving the internal and external validity and impact of health care research.

  14. CMS Security Handbook The Comprehensive Guide for WordPress, Joomla, Drupal, and Plone

    CERN Document Server

    Canavan, Tom

    2011-01-01

    Learn to secure Web sites built on open source CMSs Web sites built on Joomla!, WordPress, Drupal, or Plone face some unique security threats. If you're responsible for one of them, this comprehensive security guide, the first of its kind, offers detailed guidance to help you prevent attacks, develop secure CMS-site operations, and restore your site if an attack does occur. You'll learn a strong, foundational approach to CMS operations and security from an expert in the field.More and more Web sites are being built on open source CMSs, making them a popular target, thus making you vulnerable t

  15. CDinFusion--submission-ready, on-line integration of sequence and contextual data.

    Directory of Open Access Journals (Sweden)

    Wolfgang Hankeln

    Full Text Available State of the art (DNA sequencing methods applied in "Omics" studies grant insight into the 'blueprints' of organisms from all domains of life. Sequencing is carried out around the globe and the data is submitted to the public repositories of the International Nucleotide Sequence Database Collaboration. However, the context in which these studies are conducted often gets lost, because experimental data, as well as information about the environment are rarely submitted along with the sequence data. If these contextual or metadata are missing, key opportunities of comparison and analysis across studies and habitats are hampered or even impossible. To address this problem, the Genomic Standards Consortium (GSC promotes checklists and standards to better describe our sequence data collection and to promote the capturing, exchange and integration of sequence data with contextual data. In a recent community effort the GSC has developed a series of recommendations for contextual data that should be submitted along with sequence data. To support the scientific community to significantly enhance the quality and quantity of contextual data in the public sequence data repositories, specialized software tools are needed. In this work we present CDinFusion, a web-based tool to integrate contextual and sequence data in (MultiFASTA format prior to submission. The tool is open source and available under the Lesser GNU Public License 3. A public installation is hosted and maintained at the Max Planck Institute for Marine Microbiology at http://www.megx.net/cdinfusion. The tool may also be installed locally using the open source code available at http://code.google.com/p/cdinfusion.

  16. The Formation of Conservation-Based Behaviour of Mechanical Engineering Students through Contextual Learning Approach

    Science.gov (United States)

    Sudarman; Djuniadi; Sutopo, Yeri

    2017-01-01

    This study was aimed to figure out: (1) the implementation of contextual learning approaches; (2) the learning outcome of conservation education using contextual approach on the internship program preparation class; (3) the conservation-based behaviour of the internship program participants; (4) the contribution of conservation education results…

  17. The influence of contextual factors on patient involvement during follow-up consultations after colorectal cancer surgery

    DEFF Research Database (Denmark)

    Thomsen, Thora G; Soelver, Lisbeth; Hølge-Hazelton, Bibi

    2017-01-01

    AIMS AND OBJECTIVES: To identify the contextual factors that influence individual patient involvement during colorectal cancer surgical follow-up consultations. BACKGROUND: The healthcare system is subject to the requirement and expectation of greater involvement of patients and relatives...... the identification of current contextual factors. RESULTS: The results showed five contextual factors that seemed to have an impact on patient involvement. The first, 'Two dimensions of patient involvement: treatment-oriented and person-oriented' highlighted a dual interpretation of patient involvement....... Increased patient involvement requires the development and implementation of new communication initiatives. Research shows that it is also necessary to consider the contextual circumstances surrounding patient involvement in specific situations. DESIGN: Case study of a single Danish outpatient clinic, which...

  18. Security Modeling on the Supply Chain Networks

    Directory of Open Access Journals (Sweden)

    Marn-Ling Shing

    2007-10-01

    Full Text Available In order to keep the price down, a purchaser sends out the request for quotation to a group of suppliers in a supply chain network. The purchaser will then choose a supplier with the best combination of price and quality. A potential supplier will try to collect the related information about other suppliers so he/she can offer the best bid to the purchaser. Therefore, confidentiality becomes an important consideration for the design of a supply chain network. Chen et al. have proposed the application of the Bell-LaPadula model in the design of a secured supply chain network. In the Bell-LaPadula model, a subject can be in one of different security clearances and an object can be in one of various security classifications. All the possible combinations of (Security Clearance, Classification pair in the Bell-LaPadula model can be thought as different states in the Markov Chain model. This paper extends the work done by Chen et al., provides more details on the Markov Chain model and illustrates how to use it to monitor the security state transition in the supply chain network.

  19. An Enhanced Erasure Code-Based Security Mechanism for Cloud Storage

    Directory of Open Access Journals (Sweden)

    Wenfeng Wang

    2014-01-01

    Full Text Available Cloud computing offers a wide range of luxuries, such as high performance, rapid elasticity, on-demand self-service, and low cost. However, data security continues to be a significant impediment in the promotion and popularization of cloud computing. To address the problem of data leakage caused by unreliable service providers and external cyber attacks, an enhanced erasure code-based security mechanism is proposed and elaborated in terms of four aspects: data encoding, data transmission, data placement, and data reconstruction, which ensure data security throughout the whole traversing into cloud storage. Based on the mechanism, we implement a secure cloud storage system (SCSS. The key design issues, including data division, construction of generator matrix, data encoding, fragment naming, and data decoding, are also described in detail. Finally, we conduct an analysis of data availability and security and performance evaluation. Experimental results and analysis demonstrate that SCSS achieves high availability, strong security, and excellent performance.

  20. Cognitive processes facilitated by contextual cueing: evidence from event-related brain potentials.

    Science.gov (United States)

    Schankin, Andrea; Schubö, Anna

    2009-05-01

    Finding a target in repeated search displays is faster than finding the same target in novel ones (contextual cueing). It is assumed that the visual context (the arrangement of the distracting objects) is used to guide attention efficiently to the target location. Alternatively, other factors, e.g., facilitation in early visual processing or in response selection, may play a role as well. In a contextual cueing experiment, participant's electrophysiological brain activity was recorded. Participants identified the target faster and more accurately in repeatedly presented displays. In this condition, the N2pc, a component reflecting the allocation of visual-spatial attention, was enhanced, indicating that attention was allocated more efficiently to those targets. However, also response-related processes, reflected by the LRP, were facilitated, indicating that guidance of attention cannot account for the entire contextual cueing benefit.