WorldWideScience

Sample records for cryptographic construct called

  1. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  2. Enhanced Matrix Power Function for Cryptographic Primitive Construction

    Directory of Open Access Journals (Sweden)

    Eligijus Sakalauskas

    2018-02-01

    Full Text Available A new enhanced matrix power function (MPF is presented for the construction of cryptographic primitives. According to the definition in previously published papers, an MPF is an action of two matrices powering some base matrix on the left and right. The MPF inversion equations, corresponding to the MPF problem, are derived and have some structural similarity with classical multivariate quadratic (MQ problem equations. Unlike the MQ problem, the MPF problem seems to be more complicated, since its equations are not defined over the field, but are represented as left–right action of two matrices defined over the infinite near-semiring on the matrix defined over the certain infinite, additive, noncommuting semigroup. The main results are the following: (1 the proposition of infinite, nonsymmetric, and noncommuting algebraic structures for the construction of the enhanced MPF, satisfying associativity conditions, which are necessary for cryptographic applications; (2 the proof that MPF inversion is polynomially equivalent to the solution of a certain kind of generalized multivariate quadratic (MQ problem which can be reckoned as hard; (3 the estimation of the effectiveness of direct MPF value computation; and (4 the presentation of preliminary security analysis, the determination of the security parameter, and specification of its secure value. These results allow us to make a conjecture that enhanced MPF can be a candidate one-way function (OWF, since the effective (polynomial-time inversion algorithm for it is not yet known. An example of the application of the proposed MPF for the Key Agreement Protocol (KAP is presented. Since the direct MPF value is computed effectively, the proposed MPF is suitable for the realization of cryptographic protocols in devices with restricted computation resources.

  3. Elliptic net and its cryptographic application

    Science.gov (United States)

    Muslim, Norliana; Said, Mohamad Rushdan Md

    2017-11-01

    Elliptic net is a generalization of elliptic divisibility sequence and in cryptography field, most cryptographic pairings that are based on elliptic curve such as Tate pairing can be improved by applying elliptic nets algorithm. The elliptic net is constructed by using n dimensional array of values in rational number satisfying nonlinear recurrence relations that arise from elliptic divisibility sequences. The two main properties hold in the recurrence relations are for all positive integers m>n, hm +nhm -n=hm +1hm -1hn2-hn +1hn -1hm2 and hn divides hm whenever n divides m. In this research, we discuss elliptic divisibility sequence associated with elliptic nets based on cryptographic perspective and its possible research direction.

  4. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian

    2016-01-01

    and cryptographic hash functions is to reconsider and simplify the round function of the Knudsen-Nyberg cipher from 1995. The mapping F(x) := x3 is used as the main component there and is also the main component of our family of proposals called “MiMC”. We study various attack vectors for this construction and give...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  5. Cryptographic Boolean functions and applications

    CERN Document Server

    Cusick, Thomas W

    2009-01-01

    Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scient...

  6. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  7. Rationality in the Cryptographic Model

    DEFF Research Database (Denmark)

    Hubacek, Pavel

    This thesis presents results in the field of rational cryptography. In the first part we study the use of cryptographic protocols to avoid mediation and binding commitment when implementing game theoretic equilibrium concepts. First, we concentrate on the limits of cryptographic cheap talk...... to implement correlated equilibria of two-player strategic games in a sequentially rational way. We show that there exist two-player games for which no cryptographic protocol can implement the mediator in a sequentially rational way; that is, without introducing empty threats. In the context of computational...... with appealing economic applications. Our implementation puts forward a notion of cryptographically blinded games that exploits the power of encryption to selectively restrict the information available to players about sampled action profiles, such that these desirable equilibria can be stably achieved...

  8. On another two cryptographic identities in universal Osborn loops

    Directory of Open Access Journals (Sweden)

    T. G. Jaiyéolá

    2010-03-01

    Full Text Available In this study, by establishing an identity for universal Osborn loops, two other identities (of degrees 4 and 6 are deduced from it and they are recognized and recommended for cryptography in a similar spirit in which the cross inverse property (of degree 2 has been used by Keedwell following the fact that it was observed that universal Osborn loops that do not have the 3-power associative property or weaker forms of; inverse property, power associativity and diassociativity to mention a few, will have cycles (even long ones. These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. They were also found applicable to security patterns, arrangements and networks which the CIP may not be applicable to.

  9. Lightweight Cryptographic Techniques

    National Research Council Canada - National Science Library

    Yuen, Horace

    2004-01-01

    The objective of this project was to develop new cryptographic techniques, and to modify the important existing ones, for applications to encryption and authentication in energy-constrained sensors...

  10. Protecting Cryptographic Memory against Tampering Attack

    DEFF Research Database (Denmark)

    Mukherjee, Pratyay

    In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks. In prac......In this dissertation we investigate the question of protecting cryptographic devices from tampering attacks. Traditional theoretical analysis of cryptographic devices is based on black-box models which do not take into account the attacks on the implementations, known as physical attacks....... In practice such attacks can be executed easily, e.g. by heating the device, as substantiated by numerous works in the past decade. Tampering attacks are a class of such physical attacks where the attacker can change the memory/computation, gains additional (non-black-box) knowledge by interacting...... with the faulty device and then tries to break the security. Prior works show that generically approaching such problem is notoriously difficult. So, in this dissertation we attempt to solve an easier question, known as memory-tampering, where the attacker is allowed tamper only with the memory of the device...

  11. Multi-biometrics based cryptographic key regeneration scheme

    OpenAIRE

    Kanade , Sanjay Ganesh; Petrovska-Delacrétaz , Dijana; Dorizzi , Bernadette

    2009-01-01

    International audience; Biometrics lack revocability and privacy while cryptography cannot detect the user's identity. By obtaining cryptographic keys using biometrics, one can achieve the properties such as revocability, assurance about user's identity, and privacy. In this paper, we propose a multi-biometric based cryptographic key regeneration scheme. Since left and right irises of a person are uncorrelated, we treat them as two independent biometrics and combine in our system. We propose ...

  12. Review and Analysis of Cryptographic Schemes Implementing Threshold Signature

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-03-01

    Full Text Available This work is devoted to the study of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, ellipt ic curves and bilinear pairings were investigated. Different methods of generation and verification of threshold signatures were explored, e.g. used in a mobile agents, Internet banking and e-currency. The significance of the work is determined by the reduction of the level of counterfeit electronic documents, signed by certain group of users.

  13. An adaptive cryptographic accelerator for network storage security on dynamically reconfigurable platform

    Science.gov (United States)

    Tang, Li; Liu, Jing-Ning; Feng, Dan; Tong, Wei

    2008-12-01

    Existing security solutions in network storage environment perform poorly because cryptographic operations (encryption and decryption) implemented in software can dramatically reduce system performance. In this paper we propose a cryptographic hardware accelerator on dynamically reconfigurable platform for the security of high performance network storage system. We employ a dynamic reconfigurable platform based on a FPGA to implement a PowerPCbased embedded system, which executes cryptographic algorithms. To reduce the reconfiguration latency, we apply prefetch scheduling. Moreover, the processing elements could be dynamically configured to support different cryptographic algorithms according to the request received by the accelerator. In the experiment, we have implemented AES (Rijndael) and 3DES cryptographic algorithms in the reconfigurable accelerator. Our proposed reconfigurable cryptographic accelerator could dramatically increase the performance comparing with the traditional software-based network storage systems.

  14. Analysis and Implementation of Cryptographic Hash Functions in Programmable Logic Devices

    Directory of Open Access Journals (Sweden)

    Tautvydas Brukštus

    2016-06-01

    Full Text Available In this day’s world, more and more focused on data pro-tection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryp-tographic hash function. In this article has been selected the SHA-256 cryptographic hash function to implement and explore, based on fact that it is now a popular and safe. SHA-256 cryp-tographic function did not find any theoretical gaps or conflict situations. Also SHA-256 cryptographic hash function used cryptographic currencies. Currently cryptographic currency is popular and their value is high. For the measurements have been chosen programmable logic integrated circuits as they less effi-ciency then ASIC. We chose Altera Corporation produced prog-rammable logic integrated circuits. Counting speed will be inves-tigated by three programmable logic integrated circuit. We will use programmable logic integrated circuits belong to the same family, but different generations. Each programmable logic integ-rated circuit made using different dimension technology. Choo-sing these programmable logic integrated circuits: EP3C16, EP4CE115 and 5CSEMA5F31. To compare calculations perfor-mances parameters are provided in the tables and graphs. Re-search show the calculation speed and stability of different prog-rammable logic circuits.

  15. Designing an ASIP for cryptographic pairings over Barreto-Naehrig curves

    NARCIS (Netherlands)

    Kammler, D.; Zhang, D.; Schwabe, P.; Scharwaechter, H.; Langenberg, M.; Auras, D.; Ascheid, G.; Mathar, R.; Clavier, C.; Gaj, K.

    2009-01-01

    This paper presents a design-space exploration of an application-specific instruction-set processor (ASIP) for the computation of various cryptographic pairings over Barreto-Naehrig curves (BN curves). Cryptographic pairings are based on elliptic curves over finite fields—in the case of BN curves a

  16. Secure method for biometric-based recognition with integrated cryptographic functions.

    Science.gov (United States)

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  17. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    Directory of Open Access Journals (Sweden)

    Shin-Yan Chiou

    2013-01-01

    Full Text Available Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to combine cryptography and biometrics, but these methods require the synchronization of internal systems and are vulnerable to power analysis attacks, fault-based cryptanalysis, and replay attacks. This paper presents a new secure cryptographic authentication method using biometric features. The proposed system combines the advantages of biometric identification and cryptographic techniques. By adding a subsystem to existing biometric recognition systems, we can simultaneously achieve the security of cryptographic technology and the error tolerance of biometric recognition. This method can be used for biometric data encryption, signatures, and other types of cryptographic computation. The method offers a high degree of security with protection against power analysis attacks, fault-based cryptanalysis, and replay attacks. Moreover, it can be used to improve the confidentiality of biological data storage and biodata identification processes. Remote biometric authentication can also be safely applied.

  18. On Cryptographic Information Security in Cloud Infrastructures: PKI and IBE Methods

    Directory of Open Access Journals (Sweden)

    Konstantin Grigorevich Kogos

    2014-05-01

    Full Text Available The application of cryptographic security methods in cloud infrastructure information security is analyzed. The cryptographic problems in cloudy infrastructures are chosen; the appropriate protocols are investigated; the appropriate mathematical problems are examined.

  19. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security......Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of several primitives in this model. We show that a secret-sharing scheme that is secure with threshold $t$ in the standard model is secure against superposition attacks if and only if the threshold is lowered to $t/2$. We use this result to give zero-knowledge proofs for all of NP in the common reference...

  20. Physically Unclonable Cryptographic Primitives by Chemical Vapor Deposition of Layered MoS2.

    Science.gov (United States)

    Alharbi, Abdullah; Armstrong, Darren; Alharbi, Somayah; Shahrjerdi, Davood

    2017-12-26

    Physically unclonable cryptographic primitives are promising for securing the rapidly growing number of electronic devices. Here, we introduce physically unclonable primitives from layered molybdenum disulfide (MoS 2 ) by leveraging the natural randomness of their island growth during chemical vapor deposition (CVD). We synthesize a MoS 2 monolayer film covered with speckles of multilayer islands, where the growth process is engineered for an optimal speckle density. Using the Clark-Evans test, we confirm that the distribution of islands on the film exhibits complete spatial randomness, hence indicating the growth of multilayer speckles is a spatial Poisson process. Such a property is highly desirable for constructing unpredictable cryptographic primitives. The security primitive is an array of 2048 pixels fabricated from this film. The complex structure of the pixels makes the physical duplication of the array impossible (i.e., physically unclonable). A unique optical response is generated by applying an optical stimulus to the structure. The basis for this unique response is the dependence of the photoemission on the number of MoS 2 layers, which by design is random throughout the film. Using a threshold value for the photoemission, we convert the optical response into binary cryptographic keys. We show that the proper selection of this threshold is crucial for maximizing combination randomness and that the optimal value of the threshold is linked directly to the growth process. This study reveals an opportunity for generating robust and versatile security primitives from layered transition metal dichalcogenides.

  1. sPECTRA: a Precise framEwork for analyzing CrypTographic vulneRabilities in Android apps

    OpenAIRE

    Gajrani, J.; Tripathi, M.; Laxmi, V.; Gaur, M. S.; Conti, M.; Rajarajan, M.

    2017-01-01

    The majority of Android applications (apps) deals with user's personal data. Users trust these apps and allow them to access all sensitive data. Cryptography, when employed in an appropriate way, can be used to prevent misuse of data. Unfortunately, cryptographic libraries also include vulnerable cryptographic services. Since Android app developers may not be cryptographic experts, this makes apps become the target of various attacks due to cryptographic vulnerabilities. In this work, we pres...

  2. Cryptographic quantum hashing

    Science.gov (United States)

    Ablayev, F. M.; Vasiliev, A. V.

    2014-02-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol.

  3. Cryptographic quantum hashing

    International Nuclear Information System (INIS)

    Ablayev, F M; Vasiliev, A V

    2014-01-01

    We present a version of quantum hash functions based on non-binary discrete functions. The proposed quantum procedure is ‘classical-quantum’, that is, it takes a classical bit string as an input and produces a quantum state. The resulting function has the property of a one-way function (pre-image resistance); in addition it has properties analogous to classical cryptographic hash second pre-image resistance and collision resistance. We also show that the proposed function can be naturally used in a quantum digital signature protocol. (letter)

  4. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  5. Using Compilers to Enhance Cryptographic Product Development

    Science.gov (United States)

    Bangerter, E.; Barbosa, M.; Bernstein, D.; Damgård, I.; Page, D.; Pagter, J. I.; Sadeghi, A.-R.; Sovio, S.

    Developing high-quality software is hard in the general case, and it is significantly more challenging in the case of cryptographic software. A high degree of new skill and understanding must be learnt and applied without error to avoid vulnerability and inefficiency. This is often beyond the financial, manpower or intellectual resources avail-able. In this paper we present the motivation for the European funded CACE (Computer Aided Cryptography Engineering) project The main objective of CACE is to provide engineers (with limited or no expertise in cryptography) with a toolbox that allows them to generate robust and efficient implementations of cryptographic primitives. We also present some preliminary results already obtained in the early stages of this project, and discuss the relevance of the project as perceived by stakeholders in the mobile device arena.

  6. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... groups. In all cases, security follows from a well de ned complexity assumption (the strong root assumption), without relying on random oracles. A smooth natural number has no big prime factors. The probability, that a random natural number not greater than x has all prime factors smaller than x1/u...

  7. Multi-operation cryptographic engine: VLSI design and implementation

    International Nuclear Information System (INIS)

    Selimis, George; Koufopavlou, Odysseas

    2005-01-01

    The environment of smart card lacks of system resources but the commercial and economic transactions via smart cards demand the use of certificated and secure cryptographic methods. In this paper a cryptographic approach in hardware for smart cards is proposed. The proposed system supports two basic operations of cryptography, authentication and encryption. The basic component of system is the one round of DES algorithm which supports the DES, Triple DES and the ANSI X9.17 standards. The proposed system is efficient in terms of area resources and techniques for low power consumption have applied. Due to the fact that the system is for smart card applications the overall throughput outperforms the typical smart card throughput standards

  8. A novel, privacy-preserving cryptographic approach for sharing sequencing data

    Science.gov (United States)

    Cassa, Christopher A; Miller, Rachel A; Mandl, Kenneth D

    2013-01-01

    Objective DNA samples are often processed and sequenced in facilities external to the point of collection. These samples are routinely labeled with patient identifiers or pseudonyms, allowing for potential linkage to identity and private clinical information if intercepted during transmission. We present a cryptographic scheme to securely transmit externally generated sequence data which does not require any patient identifiers, public key infrastructure, or the transmission of passwords. Materials and methods This novel encryption scheme cryptographically protects participant sequence data using a shared secret key that is derived from a unique subset of an individual’s genetic sequence. This scheme requires access to a subset of an individual’s genetic sequence to acquire full access to the transmitted sequence data, which helps to prevent sample mismatch. Results We validate that the proposed encryption scheme is robust to sequencing errors, population uniqueness, and sibling disambiguation, and provides sufficient cryptographic key space. Discussion Access to a set of an individual’s genotypes and a mutually agreed cryptographic seed is needed to unlock the full sequence, which provides additional sample authentication and authorization security. We present modest fixed and marginal costs to implement this transmission architecture. Conclusions It is possible for genomics researchers who sequence participant samples externally to protect the transmission of sequence data using unique features of an individual’s genetic sequence. PMID:23125421

  9. Cryptographic Primitives with Quasigroup Transformations

    OpenAIRE

    Mileva, Aleksandra

    2010-01-01

    Cryptology is the science of secret communication, which consists of two complementary disciplines: cryptography and cryptanalysis. Cryptography is dealing with design and development of new primitives, algorithms and schemas for data enciphering and deciphering. For many centuries cryptographic technics have been applied in protection of secrecy and authentication in diplomatic, political and military correspondences and communications. Cryptanalysis is dealing with different attacks on c...

  10. A Threshold Pseudorandom Function Construction and Its Applications

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    2002-01-01

    We give the first construction of a practical threshold pseudo- random function.The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient...... cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model into a cryptographically secure protocol for the complexity theoretic model without loosing efficiency or resilience,thereby constructing an efficient and optimally resilient Byzantine agreement protocol...

  11. On Boolean functions with generalized cryptographic properties

    NARCIS (Netherlands)

    Braeken, A.; Nikov, V.S.; Nikova, S.I.; Preneel, B.; Canteaut, A.; Viswanathan, K.

    2004-01-01

    By considering a new metric, we generalize cryptographic properties of Boolean functions such as resiliency and propagation characteristics. These new definitions result in a better understanding of the properties of Boolean functions and provide a better insight in the space defined by this metric.

  12. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  13. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  14. Efficient key management for cryptographically enforced access control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  15. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    We present our work on using abstract models for formally analysing cryptographic protocols: First, we present an ecient method for verifying trace-based authenticity properties of protocols using nonces, symmetric encryption, and asymmetric encryption. The method is based on a type system...... of Gordon et al., which we modify to support fully-automated type inference. Tests conducted via an implementation of our algorithm found it to be very ecient. Second, we show how privacy may be captured in a symbolic model using an equivalencebased property and give a formal denition. We formalise...

  16. Cryptographic key generation using handwritten signature

    OpenAIRE

    Freire, Manuel R.; Fiérrez, Julián; Ortega-García, Javier

    2006-01-01

    M. Freire-Santos ; J. Fierrez-Aguilar ; J. Ortega-Garcia; "Cryptographic key generation using handwritten signature", Biometric Technology for Human Identification III, Proc. SPIE 6202 (April 17, 2006); doi:10.1117/12.665875. Copyright 2006 Society of Photo‑Optical Instrumentation Engineers. One print or electronic copy may be made for personal use only. Systematic reproduction and distribution, duplication of any material in this paper for a fee or for commercial purposes, or modification of...

  17. Automated detection and classification of cryptographic algorithms in binary programs through machine learning

    OpenAIRE

    Hosfelt, Diane Duros

    2015-01-01

    Threats from the internet, particularly malicious software (i.e., malware) often use cryptographic algorithms to disguise their actions and even to take control of a victim's system (as in the case of ransomware). Malware and other threats proliferate too quickly for the time-consuming traditional methods of binary analysis to be effective. By automating detection and classification of cryptographic algorithms, we can speed program analysis and more efficiently combat malware. This thesis wil...

  18. 75 FR 52798 - State-07, Cryptographic Clearance Records

    Science.gov (United States)

    2010-08-27

    ... Information Programs and Services, A/GIS/ IPS, Department of State, SA-2, 515 22nd Street, NW., Washington, DC... Department of State and Agency for International Development who have applied for cryptographic clearances as... that apply to all of its Privacy Act systems of records. These notices appear in the form of a...

  19. Modelling Cryptographic Keys in Dynamic Epistemic Logic with DEMO

    NARCIS (Netherlands)

    H. van Ditmarsch (Hans); D.J.N. van Eijck (Jan); F.A.G. Sietsma (Floor); S.E. Simon (Sunil); not CWI et al; J.B. Perez; not CWI et al

    2012-01-01

    textabstractIt is far from obvious to find logical counterparts to cryptographic protocol primitives. In logic, a common assumption is that agents are perfectly rational and have no computational limitations. This creates a dilemma. If one merely abstracts from computational aspects, protocols

  20. A Key Management Method for Cryptographically Enforced Access Control

    NARCIS (Netherlands)

    Zych, Anna; Petkovic, Milan; Jonker, Willem; Fernández-Medina, Eduardo; Yagüe, Mariemma I.

    Cryptographic enforcement of access control mechanisms relies on encrypting protected data with the keys stored by authorized users. This approach poses the problem of the distribution of secret keys. In this paper, a key management scheme is presented where each user stores a single key and is

  1. A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-Box Matrix

    OpenAIRE

    Subhranil Som; Soumasree Banerjee

    2014-01-01

    In this paper a symmetric key cryptographic algorithm named as “A Symmetric Key Cryptographic Technique Through Swapping Bits in Binary Field Using p-box Matrix“ is proposed. Secret sharing is a technique by which any information can be break down into small pieces. The secret can be reconstructed only when a sufficient number of pieces of shares are combined together; individual shares are of no use on their own. Traditional secret sharing scheme possesses high computational ...

  2. Generating cryptographic keys by radioactive decays

    International Nuclear Information System (INIS)

    Grupen, Claus; Maurer, Ingo; Schmidt, Dieter; Smolik, Ludek

    2001-01-01

    We are presenting a new method for the generation of statistically genuine random bitstream with very high frequency which can be employed for cryptographic purposes. The method uses the feature of statistically unpredictable radioactive decays as the source of randomness. The measured quantity is the time distance between the responses of a small ionisation chamber due to the recording of ionising decay products. This time measurement is converted into states representing 0o r 1. The data generated in our experiment successfully passed FIPS PUB 140-1 and die hard statistical tests. For the simulation of systematic effects Monte Carlo techniques were used

  3. Research on the Maritime Communication Cryptographic Chip’s Compiler Optimization

    Directory of Open Access Journals (Sweden)

    Sheng Li

    2017-08-01

    Full Text Available In the process of ocean development, the technology for maritime communication system is a hot research field, of which information security is vital for the normal operation of the whole system, and that is also one of the difficulties in the research of maritime communication system. In this paper, a kind of maritime communication cryptographic SOC(system on chip is introduced, and its compiler framework is put forward through analysis of working mode and problems faced by compiler front end. Then, a loop unrolling factor calculating algorithm based on queue theory, named UFBOQ (unrolling factor based on queue, is proposed to make parallel optimization in the compiler frontend with consideration of the instruction memory capacity limit. Finally, the scalar replacement method is used to optimize unrolled code to solve the memory access latency on the parallel computing efficiency, for continuous data storage characteristics of cryptographic algorithm. The UFBOQ algorithm and scalar replacement prove effective and appropriate, of which the effect achieves the linear speedup.

  4. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    Science.gov (United States)

    Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi

    This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.

  5. NESSIE: A European Approach to Evaluate Cryptographic Algorithms

    OpenAIRE

    Preneel, Bart

    2002-01-01

    The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. These primitives will offer a higher security level than existing primitives, and/or will offer a higher confidence level, built up by an open evaluation process. Moreover, they should be better suited for the constraints of future hardware and software environments. In order to reach this goal, the project has launche...

  6. The Cryptographic Implications of the LinkedIn Data Breach

    OpenAIRE

    Gune, Aditya

    2017-01-01

    Data security and personal privacy are difficult to maintain in the Internet age. In 2012, professional networking site LinkedIn suffered a breach, compromising the login of over 100 million accounts. The passwords were cracked and sold online, exposing the authentication credentials millions of users. This manuscript dissects the cryptographic failures implicated in the breach, and explores more secure methods of storing passwords.

  7. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

    Science.gov (United States)

    Hu, Zhaoying; Comeras, Jose Miguel M. Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S.; Hannon, James B.; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  8. Cryptographic applications of analytic number theory complexity lower bounds and pseudorandomness

    CERN Document Server

    2003-01-01

    The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Key topics and features: - various lower bounds on the complexity of some number theoretic and cryptographic problems, associated with classical schemes such as RSA, Diffie-Hellman, DSA as well as with relatively new schemes like XTR and NTRU - a series of very recent results about certain important characteristics (period, distribution, linear complexity) of several commonly used pseudorandom number generators, such as the RSA generator, Blum-Blum-Shub generator, Naor-Reingold generator, inversive generator, and others - one of the principal tools is bounds of exponential sums, which are combined with other number theoretic methods such as lattice reduction and sieving - a number of open problems of different level of difficulty and proposals for further research - an extensive and up-to-date bibliography Cryptographers and number theorists will find th...

  9. CWI cryptanalyst discovers new cryptographic attack variant in Flame spy malware

    NARCIS (Netherlands)

    M.M.J. Stevens (Marc); R.J.F. Cramer (Ronald)

    2012-01-01

    htmlabstractCryptanalyst Marc Stevens from the Centrum Wiskunde & Informatica (CWI) in Amsterdam, known for breaking the https security in 2008 using a cryptanalytic attack on MD5, analyzed the recent Flame virus this week. He discovered that for this spy malware an as yet unknown cryptographic

  10. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  11. Desirable and undesirable future thoughts call for different scene construction processes.

    Science.gov (United States)

    de Vito, S; Neroni, M A; Gamboz, N; Della Sala, S; Brandimonte, M A

    2015-01-01

    Despite the growing interest in the ability of foreseeing (episodic future thinking), it is still unclear how healthy people construct possible future scenarios. We suggest that different future thoughts require different processes of scene construction. Thirty-five participants were asked to imagine desirable and less desirable future events. Imagining desirable events increased the ease of scene construction, the frequency of life scripts, the number of internal details, and the clarity of sensorial and spatial temporal information. The initial description of general personal knowledge lasted longer in undesirable than in desirable anticipations. Finally, participants were more prone to explicitly indicate autobiographical memory as the main source of their simulations of undesirable episodes, whereas they equally related the simulations of desirable events to autobiographical events or semantic knowledge. These findings show that desirable and undesirable scenarios call for different mechanisms of scene construction. The present study emphasizes that future thinking cannot be considered as a monolithic entity.

  12. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...... type annotations or explicit type casts. We have implemented a protocol verifier SpiCa based on the algorithm, and confirmed its effectiveness....

  13. Secure Method for Biometric-Based Recognition with Integrated Cryptographic Functions

    OpenAIRE

    Chiou, Shin-Yan

    2013-01-01

    Biometric systems refer to biometric technologies which can be used to achieve authentication. Unlike cryptography-based technologies, the ratio for certification in biometric systems needs not to achieve 100% accuracy. However, biometric data can only be directly compared through proximal access to the scanning device and cannot be combined with cryptographic techniques. Moreover, repeated use, improper storage, or transmission leaks may compromise security. Prior studies have attempted to c...

  14. A brief history of cryptology and cryptographic algorithms

    CERN Document Server

    Dooley, John F

    2013-01-01

    The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to final

  15. BIX Certificates: Cryptographic Tokens for Anonymous Transactions Based on Certificates Public Ledger

    Directory of Open Access Journals (Sweden)

    Sead Muftic

    2016-12-01

    Full Text Available With the widespread use of Internet, Web, and mobile technologies, a new category of applications and transactions that requires anonymity is gaining increased interest and importance. Examples of such new applications are innovative payment systems, digital notaries, electronic voting, documents sharing, electronic auctions, medical applications, and many others. In addition to anonymity, these applications and transactions also require standard security services: identification, authentication, and authorization of users and protection of their transactions. Providing those services in combination with anonymity is an especially challenging issue, because all security services require explicit user identification and authentication. To solve this issue and enable applications with security and also anonymity we introduce a new type of cryptographically encapsulated objects called BIX certificates. “BIX” is an abbreviation for “Blockchain Information Exchange.” Their purpose is equivalent to X.509 certificates: to support security services for users and transactions, but also enhanced with anonymity. This paper describes the structure and attributes of BIX certificate objects and all related protocols for their creation, distribution, and use. The BIX Certification Infrastructure (BCI as a distributed public ledger is also briefly described.

  16. Analysis of cryptographic mechanisms used in ransomware CryptXXX v3

    Directory of Open Access Journals (Sweden)

    Michał Glet

    2016-12-01

    Full Text Available The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3. At the end were given some useful advices how to improve CryptXXX.[b]Keyword:[/b] ransomware, software engineering, reverse engineering, RC4, RSA, malicious software

  17. Analysis and improvement for the performance of Baptista's cryptographic scheme

    International Nuclear Information System (INIS)

    Wei Jun; Liao Xiaofeng; Wong, K.W.; Zhou Tsing; Deng Yigui

    2006-01-01

    Based on Baptista's chaotic cryptosystem, we propose a secure and robust chaotic cryptographic scheme after investigating the problems found in this cryptosystem as well as its variants. In this proposed scheme, a subkey array generated from the key and the plaintext is adopted to enhance the security. Some methods are introduced to increase the efficiency. Theoretical analyses and numerical simulations indicate that the proposed scheme is secure and efficient for practical use

  18. “Robots in Space” Multiagent Problem: Complexity, Information and Cryptographic Aspects

    Directory of Open Access Journals (Sweden)

    A. Yu. Bernstein

    2013-01-01

    Full Text Available We study a multiagent algorithmic problem that we call Robot in Space (RinS: There are n ≥ 2 autonomous robots, that need to agree without outside interference on distribution of shelters, so that straight pathes to the shelters will not intersect. The problem is closely related to the assignment problem in Graph Theory, to the convex hull problem in Combinatorial Geometry, or to the path-planning problem in Artificial Intelligence. Our algorithm grew up from a local search solution of the problem suggested by E.W. Dijkstra. We present a multiagent anonymous and scalable algorithm (protocol solving the problem, give an upper bound for the algorithm, prove (manually its correctness, and examine two communication aspects of the RinS problem — the informational and cryptographic. We proved that (1 there is no protocol that solves the RinS, which transfers a bounded number of bits, and (2 suggested the protocol that allows robots to check whether their paths intersect, without revealing additional information about their relative positions (with respect to shelters. The present paper continues the research presented in Mars Robot Puzzle (a Multiagent Approach to the Dijkstra Problem (by E.V. Bodin, N.O. Garanina, and N.V. Shilov, published in Modeling and analysis of information systems, 18(2, 2011.

  19. Cryptographic pseudo-random sequence from the spatial chaotic map

    International Nuclear Information System (INIS)

    Sun Fuyan; Liu Shutang

    2009-01-01

    A scheme for pseudo-random binary sequence generation based on the spatial chaotic map is proposed. In order to face the challenge of using the proposed PRBS in cryptography, the proposed PRBS is subjected to statistical tests which are the well-known FIPS-140-1 in the area of cryptography, and correlation properties of the proposed sequences are investigated. The proposed PRBS successfully passes all these tests. Results of statistical testing of the sequences are found encouraging. The results of statistical tests suggest strong candidature for cryptographic applications.

  20. Securing ad hoc wireless sensor networks under Byzantine attacks by implementing non-cryptographic method

    Directory of Open Access Journals (Sweden)

    Shabir Ahmad Sofi

    2017-05-01

    Full Text Available Ad Hoc wireless sensor network (WSN is a collection of nodes that do not need to rely on predefined infrastructure to keep the network connected. The level of security and performance are always somehow related to each other, therefore due to limited resources in WSN, cryptographic methods for securing the network against attacks is not feasible. Byzantine attacks disrupt the communication between nodes in the network without regard to its own resource consumption. This paper discusses the performance of cluster based WSN comparing LEACH with Advanced node based clusters under byzantine attacks. This paper also proposes an algorithm for detection and isolation of the compromised nodes to mitigate the attacks by non-cryptographic means. The throughput increases after using the algorithm for isolation of the malicious nodes, 33% in case of Gray Hole attack and 62% in case of Black Hole attack.

  1. SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knezevic, Miroslav; Leander, Gregor

    2013-01-01

    construction instantiated with present-type permutations. The resulting family of hash functions is called spongent. We propose 13 spongent variants--or different levels of collision and (second) preimage resistance as well as for various implementation constraints. For each of them, we provide several ASIC...

  2. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications

    Science.gov (United States)

    Rafi Ahamed, Shaik

    2016-01-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA2) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA2 based S-Box have comparatively better performance than that of conventional LUT based S-Box. PMID:27733924

  3. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    Science.gov (United States)

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA 2 ) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA 2 based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA 2 based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA 2 based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  4. Secure and Efficient Regression Analysis Using a Hybrid Cryptographic Framework: Development and Evaluation.

    Science.gov (United States)

    Sadat, Md Nazmus; Jiang, Xiaoqian; Aziz, Md Momin Al; Wang, Shuang; Mohammed, Noman

    2018-03-05

    Machine learning is an effective data-driven tool that is being widely used to extract valuable patterns and insights from data. Specifically, predictive machine learning models are very important in health care for clinical data analysis. The machine learning algorithms that generate predictive models often require pooling data from different sources to discover statistical patterns or correlations among different attributes of the input data. The primary challenge is to fulfill one major objective: preserving the privacy of individuals while discovering knowledge from data. Our objective was to develop a hybrid cryptographic framework for performing regression analysis over distributed data in a secure and efficient way. Existing secure computation schemes are not suitable for processing the large-scale data that are used in cutting-edge machine learning applications. We designed, developed, and evaluated a hybrid cryptographic framework, which can securely perform regression analysis, a fundamental machine learning algorithm using somewhat homomorphic encryption and a newly introduced secure hardware component of Intel Software Guard Extensions (Intel SGX) to ensure both privacy and efficiency at the same time. Experimental results demonstrate that our proposed method provides a better trade-off in terms of security and efficiency than solely secure hardware-based methods. Besides, there is no approximation error. Computed model parameters are exactly similar to plaintext results. To the best of our knowledge, this kind of secure computation model using a hybrid cryptographic framework, which leverages both somewhat homomorphic encryption and Intel SGX, is not proposed or evaluated to this date. Our proposed framework ensures data security and computational efficiency at the same time. ©Md Nazmus Sadat, Xiaoqian Jiang, Md Momin Al Aziz, Shuang Wang, Noman Mohammed. Originally published in JMIR Medical Informatics (http://medinform.jmir.org), 05.03.2018.

  5. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    Energy Technology Data Exchange (ETDEWEB)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited...

  7. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  8. Constructing a psychological coping profile in the call centre environment: Wellness-related dispositions in relation to resiliency-related behavioural capacities

    Directory of Open Access Journals (Sweden)

    Nisha Harry

    2015-08-01

    Full Text Available Orientation: The context of this research is the coping and wellness of call centre agents in a characteristically high-stress work environment. Research purpose: The purpose of the study was to construct a psychological coping profile by investigating the overall relationship between individuals’ wellness-related dispositional attributes and their resiliency-related behavioural capacities. Motivation of the study: It is important that coping in the call centre environment be understood in light of the complexity of the challenges that call centre agents experience in terms of their wellbeing. Research design, approach and method: A quantitative cross-sectional survey approach was followed, using a non-probability purposive sample (N = 409 comprising predominantly early career, permanently employed black females in call centres in Africa. Main findings: A canonical correlation analysis indicated a significant overall relationship between the wellness-related constructs (sense of coherence, emotional intelligence and burnout and the resiliency-related constructs (career adaptability and hardiness. Structural equation modelling indicated that managing own emotions and cynicism contributed significantly to explaining the participants’ resiliency-related behavioural capacities (hardicommitment and hardi-control. Practical/managerial implications: Enhancing call centre agents’ emotional intelligence and lowering cynicism will increase resiliency-related capacities, such as sense of control and commitment, and will significantly increase the resiliency and capacity of call centre agents to cope with pressure, which can lead to positive work attitudes. Contribution/value-add: The findings may provide valuable pointers for the design of wellness intervention practices and could potentially add to the body of knowledge concerned with employee wellness in call centres.

  9. Correlation Immunity, Avalanche Features, and Other Cryptographic Properties of Generalized Boolean Functions

    Science.gov (United States)

    2017-09-01

    satisfying the strict avalanche criterion,” Discrete Math ., vol. 185, pp. 29–39, 1998. [2] R.C. Bose, “On some connections between the design of... Discrete Appl. Math ., vol. 149, pp. 73–86, 2005. [11] T.W. Cusick and P. Stănică, Cryptographic Boolean Functions and Applications, 2nd ed., San Diego...Stănică, “Bisecting binomial coefficients,” Discrete Appl. Math ., vol. 227, pp. 70–83, 2017. [28] T. Martinsen, W. Meidl, and P. Stănică, “Generalized

  10. MEANING OF THE BITCOIN CRYPTOGRAPHIC CURRENCY AS A MEDIUM OF EXCHANGE

    Directory of Open Access Journals (Sweden)

    Łukasz Dopierała

    2014-06-01

    Full Text Available This article presents one of the new elements of virtual reality, which is the Bitcoin cryptocurrency. This thesis focuses on the condition and perspectives on development of the trading function of this instrument. The authors discuss the legal aspects of functioning of the Bitcoin, conduct a SWOT analysis of this cryptocurrency as a medium of exchange, and examin the scale of use of Bitcoin in transaction purposes. As of March 1, 2014 the trading system gradually develops and the strengths of this cryptographic currency outweigh its weaknesses, but the future of Bitcoin as a medium of exchange is difficult to determine.

  11. Cryptanalysis of Compact-LWE and Related Lightweight Public Key Encryption

    Directory of Open Access Journals (Sweden)

    Dianyan Xiao

    2018-01-01

    Full Text Available In the emerging Internet of Things (IoT, lightweight public key cryptography plays an essential role in security and privacy protection. With the approach of quantum computing era, it is important to design and evaluate lightweight quantum-resistant cryptographic algorithms applicable to IoT. LWE-based cryptography is a widely used and well-studied family of postquantum cryptographic constructions whose hardness is based on worst-case lattice problems. To make LWE friendly to resource-constrained IoT devices, a variant of LWE, named Compact-LWE, was proposed and used to design lightweight cryptographic schemes. In this paper, we study the so-called Compact-LWE problem and clarify that under certain parameter settings it can be solved in polynomial time. As a consequence, our result leads to a practical attack against an instantiated scheme based on Compact-LWE proposed by Liu et al. in 2017.

  12. Leakage-Resilient Circuits without Computational Assumptions

    DEFF Research Database (Denmark)

    Dziembowski, Stefan; Faust, Sebastian

    2012-01-01

    Physical cryptographic devices inadvertently leak information through numerous side-channels. Such leakage is exploited by so-called side-channel attacks, which often allow for a complete security breache. A recent trend in cryptography is to propose formal models to incorporate leakage...... on computational assumptions, our results are purely information-theoretic. In particular, we do not make use of public key encryption, which was required in all previous works...... into the model and to construct schemes that are provably secure within them. We design a general compiler that transforms any cryptographic scheme, e.g., a block-cipher, into a functionally equivalent scheme which is resilient to any continual leakage provided that the following three requirements are satisfied...

  13. Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    S. Sree Vivek

    2016-11-01

    Full Text Available Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals the committed value later during a decommit phase. In this paper, we explore the connection between commitment schemes, public key encryption, digital signatures and signcryption. We establish formal relationship between commitment and the other primitives. Our main result is that we show signcryption can be used as a commitment scheme with appropriate security notions. We show that if the underlying signcryption scheme is IND-CCA2 secure, then the hiding property of the commitment scheme is satisfied. Similarly, we show that if the underlying signcryption scheme is unforgeable, then the relaxed biding property of the commitment scheme is satisfied. Moreover, we prove that if the underlying signcryption scheme is NM-CCA2, then the commitment scheme is non-malleable.

  14. Low-power cryptographic coprocessor for autonomous wireless sensor networks

    Science.gov (United States)

    Olszyna, Jakub; Winiecki, Wiesław

    2013-10-01

    The concept of autonomous wireless sensor networks involves energy harvesting, as well as effective management of system resources. Public-key cryptography (PKC) offers the advantage of elegant key agreement schemes with which a secret key can be securely established over unsecure channels. In addition to solving the key management problem, the other major application of PKC is digital signatures, with which non-repudiation of messages exchanges can be achieved. The motivation for studying low-power and area efficient modular arithmetic algorithms comes from enabling public-key security for low-power devices that can perform under constrained environment like autonomous wireless sensor networks. This paper presents a cryptographic coprocessor tailored to the autonomous wireless sensor networks constraints. Such hardware circuit is aimed to support the implementation of different public-key cryptosystems based on modular arithmetic in GF(p) and GF(2m). Key components of the coprocessor are described as GEZEL models and can be easily transformed to VHDL and implemented in hardware.

  15. Cryptographic Key Management in Delay Tolerant Networks: A Survey

    Directory of Open Access Journals (Sweden)

    Sofia Anna Menesidou

    2017-06-01

    Full Text Available Since their appearance at the dawn of the second millennium, Delay or Disruption Tolerant Networks (DTNs have gradually evolved, spurring the development of a variety of methods and protocols for making them more secure and resilient. In this context, perhaps, the most challenging problem to deal with is that of cryptographic key management. To the best of our knowledge, the work at hand is the first to survey the relevant literature and classify the various so far proposed key management approaches in such a restricted and harsh environment. Towards this goal, we have grouped the surveyed key management methods into three major categories depending on whether the particular method copes with (a security initialization, (b key establishment, and (c key revocation. We have attempted to provide a concise but fairly complete evaluation of the proposed up-to-date methods in a generalized way with the aim of offering a central reference point for future research.

  16. Cryptographic robustness of a quantum cryptography system using phase-time coding

    International Nuclear Information System (INIS)

    Molotkov, S. N.

    2008-01-01

    A cryptographic analysis is presented of a new quantum key distribution protocol using phase-time coding. An upper bound is obtained for the error rate that guarantees secure key distribution. It is shown that the maximum tolerable error rate for this protocol depends on the counting rate in the control time slot. When no counts are detected in the control time slot, the protocol guarantees secure key distribution if the bit error rate in the sifted key does not exceed 50%. This protocol partially discriminates between errors due to system defects (e.g., imbalance of a fiber-optic interferometer) and eavesdropping. In the absence of eavesdropping, the counts detected in the control time slot are not caused by interferometer imbalance, which reduces the requirements for interferometer stability.

  17. Anonymity-Preserving Public-Key Encryption

    DEFF Research Database (Denmark)

    Kohlweiss, Markulf; Maurer, Ueli; Onete, Cristina

    2013-01-01

    security properties have been proposed. We investigate constructions as well as limitations for preserving receiver anonymity when using public-key encryption (PKE). We use the constructive cryptography approach by Maurer and Renner and interpret cryptographic schemes as constructions of a certain ideal...... literature (IND-CCA, key-privacy, weak robustness). We also show that a desirable stronger variant, preventing the adversary from selective ”trial-deliveries” of messages, is unfortunately unachievable by any PKE scheme, no matter how strong. The constructive approach makes the guarantees achieved...... by applying a cryptographic scheme explicit in the constructed (ideal) resource; this specifies the exact requirements for the applicability of a cryptographic scheme in a given context. It also allows to decide which of the existing security properties of such a cryptographic scheme are adequate...

  18. Lattice Based Mix Network for Location Privacy in Mobile System

    Directory of Open Access Journals (Sweden)

    Kunwar Singh

    2015-01-01

    Full Text Available In 1981, David Chaum proposed a cryptographic primitive for privacy called mix network (Mixnet. A mixnet is cryptographic construction that establishes anonymous communication channel through a set of servers. In 2004, Golle et al. proposed a new cryptographic primitive called universal reencryption which takes the input as encrypted messages under the public key of the recipients not the public key of the universal mixnet. In Eurocrypt 2010, Gentry, Halevi, and Vaikunthanathan presented a cryptosystem which is an additive homomorphic and a multiplicative homomorphic for only one multiplication. In MIST 2013, Singh et al. presented a lattice based universal reencryption scheme under learning with error (LWE assumption. In this paper, we have improved Singh et al.’s scheme using Fairbrother’s idea. LWE is a lattice hard problem for which till now there is no polynomial time quantum algorithm. Wiangsripanawan et al. proposed a protocol for location privacy in mobile system using universal reencryption whose security is reducible to Decision Diffie-Hellman assumption. Once quantum computer becomes a reality, universal reencryption can be broken in polynomial time by Shor’s algorithm. In postquantum cryptography, our scheme can replace universal reencryption scheme used in Wiangsripanawan et al. scheme for location privacy in mobile system.

  19. Detection of beamsplitting attack in a quantum cryptographic channel based on photon number statistics monitoring

    International Nuclear Information System (INIS)

    Gaidash, A A; Egorov, V I; Gleim, A V

    2014-01-01

    Quantum cryptography in theory allows distributing secure keys between two users so that any performed eavesdropping attempt would be immediately discovered. However, in practice an eavesdropper can obtain key information from multi-photon states when attenuated laser radiation is used as a source. In order to overcome this possibility, it is generally suggested to implement special cryptographic protocols, like decoy states or SARG04. We present an alternative method based on monitoring photon number statistics after detection. This method can therefore be used with any existing protocol

  20. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  1. Investigation of Current State of Crytpography and Theoretical Implementation of a Cryptographic System for the Combat Service Support Control System.

    Science.gov (United States)

    1987-05-01

    34 Advances in Crypt g: Proceedings of CRYPTO 84,r o ... .. .. _ __...o ... .. ... ....... ed. by G.R. Blakely and D. Chaum . [Wagn84b] Wagner, Neal R...in Distributed Computer Systems," IEEE Trans. on Computers, Vol. C-35, No. 7, Jul. 86, pp. 583-590. Gifford, David K., "Cryptographic Sealing for

  2. Energy efficient security in MANETs: a comparison of cryptographic and artificial immune systems

    International Nuclear Information System (INIS)

    Mazhar, N.

    2010-01-01

    MANET is characterized by a set of mobile nodes in an inherently insecure environment, having limited battery capacities. Provisioning of energy efficient security in MANETs is, therefore, an open problem for which a number of solutions have been proposed. In this paper, we present an overview and comparison of the MANET security at routing layer by using the cryptographic and Artificial Immune System (AIS) approaches. The BeeAdHoc protocol, which is a Bio-inspired MANET routing protocol based on the foraging principles of honey bee colony, is taken as case study. We carry out an analysis of the three security frameworks that we have proposed earlier for securing BeeAdHoc protocol; one based on asymmetric key encryption, i.e BeeSec, and the other two using the AIS approach, i.e BeeAIS based on self non-self discrimination from adaptive immune system and BeeAIS-DC based on Dendritic Cell (DC) behavior from innate immune system. We extensively evaluate the performance of the three protocols through network simulations in ns-2 and compare with BeeAdHoc, the base protocol, as well as with state-of-the-art MANET routing protocols DSR and AODV. Our results clearly indicate that AIS based systems provide security at much lower cost to energy as compared with the cryptographic systems. Moreover, the use of dendritic cells and danger signals instead of the classical self non-self discrimination allows to detect the non-self antigens with greater accuracy. Based on the results of this investigation, we also propose a composite AIS model for BeeAdHoc security by combining the concepts from both the adaptive and the innate immune systems by modelling the attributes and behavior of the B-cells and DCs. (author)

  3. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    functions, also called message authentication codes (MACs) serve data integrity and data origin authentication in the secret key setting. The building blocks of hash functions can be designed using block ciphers, modular arithmetic or from scratch. The design principles of the popular Merkle...

  4. Embedded Platform for Automatic Testing and Optimizing of FPGA Based Cryptographic True Random Number Generators

    Directory of Open Access Journals (Sweden)

    M. Varchola

    2009-12-01

    Full Text Available This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs based on the hardware implementation of statistical tests for FPGAs. It was developed in order to provide an automatic tool that helps to speed up the TRNG design process and can provide new insights on the TRNG behavior as it will be shown on a particular example in the paper. It enables to test sufficient statistical properties of various TRNG designs under various working conditions on the fly. Moreover, the tests are suitable to be embedded into cryptographic hardware products in order to recognize TRNG output of weak quality and thus increase its robustness and reliability. Tests are fully compatible with the FIPS 140 standard and are implemented by the VHDL language as an IP-Core for vendor independent FPGAs. A recent Flash based Actel Fusion FPGA was chosen for preliminary experiments. The Actel version of the tests possesses an interface to the Actel’s CoreMP7 softcore processor that is fully compatible with the industry standard ARM7TDMI. Moreover, identical tests suite was implemented to the Xilinx Virtex 2 and 5 in order to compare the performance of the proposed solution with the performance of already published one based on the same FPGAs. It was achieved 25% and 65% greater clock frequency respectively while consuming almost equal resources of the Xilinx FPGAs. On the top of it, the proposed FIPS 140 architecture is capable of processing one random bit per one clock cycle which results in 311.5 Mbps throughput for Virtex 5 FPGA.

  5. The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2014-01-01

    Full Text Available In the paper the author considers hardware implementation of the GRACE-H family general cellular automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform for hardware implementation. Performance and effectiveness of the FPGA implementations of GRACE-H hash functions were compared with Keccak (SHA-3, SHA-256, BLAKE, Groestl, JH, Skein hash functions. According to the performed tests, performance of the hardware implementation of GRACE-H family hash functions significantly (up to 12 times exceeded performance of the hardware implementation of previously known hash functions, and effectiveness of that hardware implementation was also better (up to 4 times.

  6. Cryptographically Secure Multiparty Computation and Distributed Auctions Using Homomorphic Encryption

    Directory of Open Access Journals (Sweden)

    Anunay Kulshrestha

    2017-12-01

    Full Text Available We introduce a robust framework that allows for cryptographically secure multiparty computations, such as distributed private value auctions. The security is guaranteed by two-sided authentication of all network connections, homomorphically encrypted bids, and the publication of zero-knowledge proofs of every computation. This also allows a non-participant verifier to verify the result of any such computation using only the information broadcasted on the network by each individual bidder. Building on previous work on such systems, we design and implement an extensible framework that puts the described ideas to practice. Apart from the actual implementation of the framework, our biggest contribution is the level of protection we are able to guarantee from attacks described in previous work. In order to provide guidance to users of the library, we analyze the use of zero knowledge proofs in ensuring the correct behavior of each node in a computation. We also describe the usage of the library to perform a private-value distributed auction, as well as the other challenges in implementing the protocol, such as auction registration and certificate distribution. Finally, we provide performance statistics on our implementation of the auction.

  7. Evaluating privacy-preserving record linkage using cryptographic long-term keys and multibit trees on large medical datasets.

    Science.gov (United States)

    Brown, Adrian P; Borgs, Christian; Randall, Sean M; Schnell, Rainer

    2017-06-08

    Integrating medical data using databases from different sources by record linkage is a powerful technique increasingly used in medical research. Under many jurisdictions, unique personal identifiers needed for linking the records are unavailable. Since sensitive attributes, such as names, have to be used instead, privacy regulations usually demand encrypting these identifiers. The corresponding set of techniques for privacy-preserving record linkage (PPRL) has received widespread attention. One recent method is based on Bloom filters. Due to superior resilience against cryptographic attacks, composite Bloom filters (cryptographic long-term keys, CLKs) are considered best practice for privacy in PPRL. Real-world performance of these techniques using large-scale data is unknown up to now. Using a large subset of Australian hospital admission data, we tested the performance of an innovative PPRL technique (CLKs using multibit trees) against a gold-standard derived from clear-text probabilistic record linkage. Linkage time and linkage quality (recall, precision and F-measure) were evaluated. Clear text probabilistic linkage resulted in marginally higher precision and recall than CLKs. PPRL required more computing time but 5 million records could still be de-duplicated within one day. However, the PPRL approach required fine tuning of parameters. We argue that increased privacy of PPRL comes with the price of small losses in precision and recall and a large increase in computational burden and setup time. These costs seem to be acceptable in most applied settings, but they have to be considered in the decision to apply PPRL. Further research on the optimal automatic choice of parameters is needed.

  8. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  9. A Construction System for CALL Materials from TV News with Captions

    Science.gov (United States)

    Kobayashi, Satoshi; Tanaka, Takashi; Mori, Kazumasa; Nakagawa, Seiichi

    Many language learning materials have been published. In language learning, although repetition training is obviously necessary, it is difficult to maintain the learner's interest/motivation using existing learning materials, because those materials are limited in their scope and contents. In addition, we doubt whether the speech sounds used in most materials are natural in various situations. Nowadays, some TV news programs (CNN, ABC, PBS, NHK, etc.) have closed/open captions corresponding to the announcer's speech. We have developed a system that makes Computer Assisted Language Learning (CALL) materials for both English learning by Japanese and Japanese learning by foreign students from such captioned newscasts. This system computes the synchronization between captions and speech by using HMMs and a forced alignment algorithm. Materials made by the system have following functions: full/partial text caption display, repetition listening, consulting an electronic dictionary, display of the user's/announcer's sound waveform and pitch contour, and automatic construction of a dictation test. Materials have following advantages: materials present polite and natural speech, various and timely topics. Furthermore, the materials have the following possibility: automatic creation of listening/understanding tests, and storage/retrieval of the many materials. In this paper, firstly, we present the organization of the system. Then, we describe results of questionnaires on trial use of the materials. As the result, we got enough accuracy on the synchronization between captions and speech. Speaking totally, we encouraged to research this system.

  10. On solving distributed CS(O)Ps with privacy

    OpenAIRE

    Silaghi, Marius Calin

    2002-01-01

    Cryptographic protocols can enforce privacy in distributed computation of functions [Goldwasser'96] and are a competitor of the distributed constructive search techniques. [Goldreich'87,Chaum'87,Chaum'88,Ben-or'88] show how cryptographic protocols can be compiled from protocols/functions for honest agents. For some combinations of concepts of security and types of attacks, cryptographic protocols obtained this way can be safe. We discuss their application to constraint satisfaction (and optim...

  11. Rational Multiparty Computation

    OpenAIRE

    Wallrabenstein, John Ross

    2014-01-01

    The field of rational cryptography considers the design of cryptographic protocols in the presence of rational agents seeking to maximize local utility functions. This departs from the standard secure multiparty computation setting, where players are assumed to be either honest or malicious. ^ We detail the construction of both a two-party and a multiparty game theoretic framework for constructing rational cryptographic protocols. Our framework specifies the utility function assumptions neces...

  12. An adaptive secret key-directed cryptographic scheme for secure transmission in wireless sensor networks

    International Nuclear Information System (INIS)

    Muhammad, K.; Jan, Z.; Khan, Z

    2015-01-01

    Wireless Sensor Networks (WSNs) are memory and bandwidth limited networks whose main goals are to maximize the network lifetime and minimize the energy consumption and transmission cost. To achieve these goals, different techniques of compression and clustering have been used. However, security is an open and major issue in WSNs for which different approaches are used, both in centralized and distributed WSNs' environments. This paper presents an adaptive cryptographic scheme for secure transmission of various sensitive parameters, sensed by wireless sensors to the fusion center for further processing in WSNs such as military networks. The proposed method encrypts the sensitive captured data of sensor nodes using various encryption procedures (bitxor operation, bits shuffling, and secret key based encryption) and then sends it to the fusion center. At the fusion center, the received encrypted data is decrypted for taking further necessary actions. The experimental results with complexity analysis, validate the effectiveness and feasibility of the proposed method in terms of security in WSNs. (author)

  13. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    Science.gov (United States)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  14. A proof theory for constructive default logic

    NARCIS (Netherlands)

    Y-H. Tan (Yao-Hua)

    1993-01-01

    textabstractWe present what we call Constructive Default Logic (CDL) - a default logic in which the fixed-point definition of extensions is replaced by a constructive definition which yield so-called constructive extensions. Selection functions are used to represent explicitly the control of the

  15. Public key cryptography from weaker assumptions

    DEFF Research Database (Denmark)

    Zottarel, Angela

    This dissertation is focused on the construction of public key cryptographic primitives and on the relative security analysis in a meaningful theoretic model. This work takes two orthogonal directions. In the first part, we study cryptographic constructions preserving their security properties also...... in the case the adversary is granted access to partial information about the secret state of the primitive. To do so, we work in an extension of the standard black-box model, a new framework where possible leakage from the secret state is taken into account. In particular, we give the first construction...

  16. Cryptographic framework for document-objects resulting from multiparty collaborative transactions.

    Science.gov (United States)

    Goh, A

    2000-01-01

    Multiparty transactional frameworks--i.e. Electronic Data Interchange (EDI) or Health Level (HL) 7--often result in composite documents which can be accurately modelled using hyperlinked document-objects. The structural complexity arising from multiauthor involvement and transaction-specific sequencing would be poorly handled by conventional digital signature schemes based on a single evaluation of a one-way hash function and asymmetric cryptography. In this paper we outline the generation of structure-specific authentication hash-trees for the the authentication of transactional document-objects, followed by asymmetric signature generation on the hash-tree value. Server-side multi-client signature verification would probably constitute the single most compute-intensive task, hence the motivation for our usage of the Rabin signature protocol which results in significantly reduced verification workloads compared to the more commonly applied Rivest-Shamir-Adleman (RSA) protocol. Data privacy is handled via symmetric encryption of message traffic using session-specific keys obtained through key-negotiation mechanisms based on discrete-logarithm cryptography. Individual client-to-server channels can be secured using a double key-pair variation of Diffie-Hellman (DH) key negotiation, usage of which also enables bidirectional node authentication. The reciprocal server-to-client multicast channel is secured through Burmester-Desmedt (BD) key-negotiation which enjoys significant advantages over the usual multiparty extensions to the DH protocol. The implementation of hash-tree signatures and bi/multidirectional key negotiation results in a comprehensive cryptographic framework for multiparty document-objects satisfying both authentication and data privacy requirements.

  17. Cryptographically supported NFC tags in medication for better inpatient safety.

    Science.gov (United States)

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  18. Uncertain call likelihood negatively affects sleep and next-day cognitive performance while on-call in a laboratory environment.

    Science.gov (United States)

    Sprajcer, Madeline; Jay, Sarah M; Vincent, Grace E; Vakulin, Andrew; Lack, Leon; Ferguson, Sally A

    2018-05-11

    On-call working arrangements are employed in a number of industries to manage unpredictable events, and often involve tasks that are safety- or time-critical. This study investigated the effects of call likelihood during an overnight on-call shift on self-reported pre-bed anxiety, sleep and next-day cognitive performance. A four-night laboratory-based protocol was employed, with an adaptation, a control and two counterbalanced on-call nights. On one on-call night, participants were instructed that they would definitely be called during the night, while on the other on-call night they were told they may be called. The State-Trait Anxiety Inventory form x-1 was used to investigate pre-bed anxiety, and sleep was assessed using polysomnography and power spectral analysis of the sleep electroencephalographic analysis. Cognitive performance was assessed four times daily using a 10-min psychomotor vigilance task. Participants felt more anxious before bed when they were definitely going to be called, compared with the control and maybe conditions. Conversely, participants experienced significantly less non-rapid eye movement and stage two sleep and poorer cognitive performance when told they may be called. Further, participants had significantly more rapid eye movement sleep in the maybe condition, which may be an adaptive response to the stress associated with this on-call condition. It appears that self-reported anxiety may not be linked with sleep outcomes while on-call. However, this research indicates that it is important to take call likelihood into consideration when constructing rosters and risk-management systems for on-call workers.

  19. On cryptographic security of end-to-end encrypted connections in WhatsApp and Telegram messengers

    Directory of Open Access Journals (Sweden)

    Sergey V. Zapechnikov

    2017-11-01

    Full Text Available The aim of this work is to analyze the available possibilities for improving secure messaging with end-to-end connections under conditions of external violator actions and distrusted service provider. We made a comparative analysis of cryptographic security mechanisms for two widely used messengers: Telegram and WhatsApp. It was found that Telegram is based on MTProto protocol, while WhatsApp is based on the alternative Signal protocol. We examine the specific features of messengers implementation associated with random number generation on the most popular Android mobile platform. It was shown that Signal has better security properties. It is used in several other popular messengers such as TextSecure, RedPhone, GoogleAllo, FacebookMessenger, Signal along with WhatsApp. A number of possible attacks on both messengers were analyzed in details. In particular, we demonstrate that the metadata are poorly protected in both messengers. Metadata security may be one of the goals for further studies.

  20. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  1. Quantum Security of Cryptographic Primitives

    OpenAIRE

    Gagliardoni, Tommaso

    2017-01-01

    We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). Moreover, there exist also hybrid models, where traditional crypto...

  2. Call Forecasting for Inbound Call Center

    Directory of Open Access Journals (Sweden)

    Peter Vinje

    2009-01-01

    Full Text Available In a scenario of inbound call center customer service, the ability to forecast calls is a key element and advantage. By forecasting the correct number of calls a company can predict staffing needs, meet service level requirements, improve customer satisfaction, and benefit from many other optimizations. This project will show how elementary statistics can be used to predict calls for a specific company, forecast the rate at which calls are increasing/decreasing, and determine if the calls may stop at some point.

  3. A Group Action Method for Construction of Strong Substitution Box

    Science.gov (United States)

    Jamal, Sajjad Shaukat; Shah, Tariq; Attaullah, Atta

    2017-06-01

    In this paper, the method to develop cryptographically strong substitution box is presented which can be used in multimedia security and data hiding techniques. The algorithm of construction depends on the action of a projective general linear group over the set of units of the finite commutative ring. The strength of substitution box and ability to create confusion is assessed with different available analyses. Moreover, the ability of resistance against malicious attacks is also evaluated. The substitution box is examined by bit independent criterion, strict avalanche criterion, nonlinearity test, linear approximation probability test and differential approximation probability test. This substitution box is equated with well-recognized substitution boxes such as AES, Gray, APA, S8, prime of residue, Xyi and Skipjack. The comparison shows encouraging results about the strength of the proposed box. The majority logic criterion is also calculated to analyze the strength and its practical implementation.

  4. Distributed protocols for digital signatures and public key encryption.

    OpenAIRE

    Kuchta, Veronika

    2016-01-01

    Distributed protocols allow a cryptographic scheme to distribute its operation among a group of participants (servers). This new concept of cryptosystems was introduced by Desmedt [56]. We consider two different flavours of distributed protocols. One of them considers a distributed model with n parties where all of these parties are honest. The other allows up to t − 1 parties to be faulty. Such cryptosystems are called threshold cryptosystems. The distribution of cryptographic process is ...

  5. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  6. Cryptography in constant parallel time

    CERN Document Server

    Applebaum, Benny

    2013-01-01

    Locally computable (NC0) functions are 'simple' functions for which every bit of the output can be computed by reading a small number of bits of their input. The study of locally computable cryptography attempts to construct cryptographic functions that achieve this strong notion of simplicity and simultaneously provide a high level of security. Such constructions are highly parallelizable and they can be realized by Boolean circuits of constant depth.This book establishes, for the first time, the possibility of local implementations for many basic cryptographic primitives such as one-way func

  7. Eight Leadership Emergency Codes Worth Calling.

    Science.gov (United States)

    Freed, David H

    Hospitals have a contemporary opportunity to change themselves before attempting to transform the larger US health care system. However, actually implementing change is much more easily described than accomplished in practice. This article calls out 8 dysfunctional behaviors that compromise professional standards at the ground level of the hospital. The construct of calling a code when one witnesses such behaviors is intended to make it safe for leaders to "See something, say something" and confront them in real time. The coordinated continuum of services that health care reform seeks to attain will not emerge until individual hospital organizations prepare themselves to operate better in their own spaces and the ones that immediately surround them.

  8. Using pseudo-random number generator for making iterative algorithms of hashing data

    International Nuclear Information System (INIS)

    Ivanov, M.A.; Vasil'ev, N.P.; Kozyrskij, B.L.

    2014-01-01

    The method of stochastic data transformation made for usage in cryptographic methods of information protection has been analyzed. The authors prove the usage of cryptographically strong pseudo-random number generators as a basis for Sponge construction. This means that the analysis of the quality of the known methods and tools for assessing the statistical security of pseudo-random number generators can be used effectively [ru

  9. Continuous Non-malleable Codes

    DEFF Research Database (Denmark)

    Faust, Sebastian; Mukherjee, Pratyay; Nielsen, Jesper Buus

    2014-01-01

    or modify it to the encoding of a completely unrelated value. This paper introduces an extension of the standard non-malleability security notion - so-called continuous non-malleability - where we allow the adversary to tamper continuously with an encoding. This is in contrast to the standard notion of non...... is necessary to achieve continuous non-malleability in the split-state model. Moreover, we illustrate that none of the existing constructions satisfies our uniqueness property and hence is not secure in the continuous setting. We construct a split-state code satisfying continuous non-malleability. Our scheme...... is based on the inner product function, collision-resistant hashing and non-interactive zero-knowledge proofs of knowledge and requires an untamperable common reference string. We apply continuous non-malleable codes to protect arbitrary cryptographic primitives against tampering attacks. Previous...

  10. Matrix Encryption Scheme

    Directory of Open Access Journals (Sweden)

    Abdelhakim Chillali

    2017-05-01

    Full Text Available In classical cryptography, the Hill cipher is a polygraphic substitution cipher based on linear algebra. In this work, we proposed a new problem applicable to the public key cryptography, based on the Matrices, called “Matrix discrete logarithm problem”, it uses certain elements formed by matrices whose coefficients are elements in a finite field. We have constructed an abelian group and, for the cryptographic part in this unreliable group, we then perform the computation corresponding to the algebraic equations, Returning the encrypted result to a receiver. Upon receipt of the result, the receiver can retrieve the sender’s clear message by performing the inverse calculation.

  11. A Relational Account of Call-by-Value Sequentiality

    DEFF Research Database (Denmark)

    Riecke, Jon Gary; Sandholm, Anders Bo

    2002-01-01

    We construct a model for FPC, a purely functional, sequential, call-by-value language. The model is built from partial continuous functions, in the style of Plotkin, further constrained to be uniform with respect to a class of logical relations. We prove that the model is fully abstract....

  12. Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions

    Science.gov (United States)

    2013-09-01

    Math. Dissertation Supervisor Jon T. Butler Distinguished Professor Department of Elec. and Comp. Eng. David R. Canright Associate Professor...Linear structures in blockciphers,” in Advances in Cryptology, EU- ROCRYPT’87, ser. Lecture Notes in Computer Science, D. Chaum and W. L. Price, Eds

  13. A Construction of Boolean Functions with Good Cryptographic Properties

    Science.gov (United States)

    2014-01-01

    be subject to a penalty for failing to comply with a collection of information if it does not display a currently valid OMB control number. 1. REPORT...2008, LNCS 5350, Springer–Verlag, 2008, pp. 425–440. [10] C. Carlet and K. Feng, “An Infinite Class of Balanced Vectorial Boolean Functions with Optimum

  14. Interaction à deux joueurs en informatique quantique : primitives cryptographiques et complexité en requêtes

    OpenAIRE

    Magnin , Loïck

    2011-01-01

    This dissertation studies two different aspects of two-player interaction in the model of quantum communication and quantum computation.First, we study two cryptographic primitives, that are used as basic blocks to construct sophisticated cryptographic protocols between two players, e.g. identification protocols.The first primitive is ``quantum bit commitment''. This primitive cannot be done in an unconditionally secure way. However, security can be obtained by restraining the power of the tw...

  15. Performance of multi-service system with retrials due to blocking and called-party-busy

    DEFF Research Database (Denmark)

    Stepanov, S.N.; Kokina, O.A.; Iversen, Villy Bæk

    2008-01-01

    In this paper we construct a model of a multi-service system with an arbitrary number of bandwidth flow demands, taking into account retrials due to both blocking along the route and to called-party-busy. An approximate algorithm for estimation of key performance measures is proposed, and the pro......In this paper we construct a model of a multi-service system with an arbitrary number of bandwidth flow demands, taking into account retrials due to both blocking along the route and to called-party-busy. An approximate algorithm for estimation of key performance measures is proposed...

  16. Applying Formal Methods to an Information Security Device: An Experience Report

    National Research Council Canada - National Science Library

    Kirby, Jr, James; Archer, Myla; Heitmeyer, Constance

    1999-01-01

    .... This paper describes a case study in which the SCR method was used to specify and analyze a different class of system, a cryptographic system called CD, which must satisfy a large set of security properties...

  17. Construction of Nijenhuis operators and dendriform trialgebras

    Directory of Open Access Journals (Sweden)

    Philippe Leroux

    2004-01-01

    Full Text Available We construct Nijenhuis operators from particular bialgebras called dendriform-Nijenhuis bialgebras. It turns out that such Nijenhuis operators commute with TD-operators, a kind of Baxter-Rota operators, and are therefore closely related to dendriform trialgebras. This allows the construction of associative algebras, called dendriform-Nijenhuis algebras, made out of nine operations and presenting an exotic combinatorial property. We also show that the augmented free dendriform-Nijenhuis algebra and its commutative version have a structure of connected Hopf algebras. Examples are given.

  18. The Role of Hypothesis in Constructive Design Research

    DEFF Research Database (Denmark)

    Bang, Anne Louise; Krogh, Peter; Ludvigsen, Martin

    2012-01-01

    It is, today, widely appreciated that Research-through-Design – or Constructive Design Research as we will call it in this paper – allows for designers to produce knowledge based on the skills and capacities of the design field itself. However, most of the research fails to bridge the gap between...... the general notions of constructive design research and the detailed research activities of the field. We therefore suggest bridging this methodological gap in the academic discussion with what we have ended up calling the “entrance level of constructive design research”. As a step towards to a more nuanced...... and solid perspective on how to keep constructive design research on track, this paper offers a model for understanding the role of hypothesis in constructive design research. The model allows for understanding the hypothesis’s relation to research motivation, questions, experiments, evaluation...

  19. Protecting privacy in a clinical data warehouse.

    Science.gov (United States)

    Kong, Guilan; Xiao, Zhichun

    2015-06-01

    Peking University has several prestigious teaching hospitals in China. To make secondary use of massive medical data for research purposes, construction of a clinical data warehouse is imperative in Peking University. However, a big concern for clinical data warehouse construction is how to protect patient privacy. In this project, we propose to use a combination of symmetric block ciphers, asymmetric ciphers, and cryptographic hashing algorithms to protect patient privacy information. The novelty of our privacy protection approach lies in message-level data encryption, the key caching system, and the cryptographic key management system. The proposed privacy protection approach is scalable to clinical data warehouse construction with any size of medical data. With the composite privacy protection approach, the clinical data warehouse can be secure enough to keep the confidential data from leaking to the outside world. © The Author(s) 2014.

  20. Number Theory and Public-Key Cryptography.

    Science.gov (United States)

    Lefton, Phyllis

    1991-01-01

    Described are activities in the study of techniques used to conceal the meanings of messages and data. Some background information and two BASIC programs that illustrate the algorithms used in a new cryptographic system called "public-key cryptography" are included. (CW)

  1. A comparative analysis of the statistical properties of large mobile phone calling networks.

    Science.gov (United States)

    Li, Ming-Xia; Jiang, Zhi-Qiang; Xie, Wen-Jie; Miccichè, Salvatore; Tumminello, Michele; Zhou, Wei-Xing; Mantegna, Rosario N

    2014-05-30

    Mobile phone calling is one of the most widely used communication methods in modern society. The records of calls among mobile phone users provide us a valuable proxy for the understanding of human communication patterns embedded in social networks. Mobile phone users call each other forming a directed calling network. If only reciprocal calls are considered, we obtain an undirected mutual calling network. The preferential communication behavior between two connected users can be statistically tested and it results in two Bonferroni networks with statistically validated edges. We perform a comparative analysis of the statistical properties of these four networks, which are constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that these networks share many common structural properties and also exhibit idiosyncratic features when compared with previously studied large mobile calling networks. The empirical findings provide us an intriguing picture of a representative large social network that might shed new lights on the modelling of large social networks.

  2. Blended call center with idling times during the call service

    NARCIS (Netherlands)

    Legros, Benjamin; Jouini, Oualid; Koole, Ger

    We consider a blended call center with calls arriving over time and an infinitely backlogged amount of outbound jobs. Inbound calls have a non-preemptive priority over outbound jobs. The inbound call service is characterized by three successive stages where the second one is a break; i.e., there is

  3. Construction of a low-cost luximeter

    Science.gov (United States)

    Pedroso, L. S.; de Macedo, J. A.; de Araújo, M. S. T.; Voelzke, M. R.

    2016-04-01

    This paper proposes the construction of an electronic instrument called digital luximeter, combining simplicity and low cost, making it simpler and cheaper than those on the market. Its construction tends to facilitate dissemination and access to this type of measuring instrument between high school teachers and educational institutions, making it ideal to be a science lab.

  4. Hardware random number generator base on monostable multivibrators dedicated for distributed measurement and control systems

    Science.gov (United States)

    Czernik, Pawel

    2013-10-01

    The hardware random number generator based on the 74121 monostable multivibrators for applications in cryptographically secure distributed measurement and control systems with asymmetric resources was presented. This device was implemented on the basis of the physical electronic vibration generator in which the circuit is composed of two "loop" 74121 monostable multivibrators, D flip-flop and external clock signal source. The clock signal, witch control D flip-flop was generated by a computer on one of the parallel port pins. There was presented programmed the author's acquisition process of random data from the measuring system to a computer. The presented system was designed, builded and thoroughly tested in the term of cryptographic security in our laboratory, what there is the most important part of this publication. Real cryptographic security was tested based on the author's software and the software environment called RDieHarder. The obtained results was here presented and analyzed in detail with particular reference to the specificity of distributed measurement and control systems with asymmetric resources.

  5. The 'golden' matrices and a new kind of cryptography

    International Nuclear Information System (INIS)

    Stakhov, A.P.

    2007-01-01

    We consider a new class of square matrices called the 'golden' matrices. They are a generalization of the classical Fibonacci Q-matrix for continuous domain. The 'golden' matrices can be used for creation of a new kind of cryptography called the 'golden' cryptography. The method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals (telecommunication and measurement systems)

  6. An Expressive, Lightweight and Secure Construction of Key Policy Attribute-Based Cloud Data Sharing Access Control

    Science.gov (United States)

    Lin, Guofen; Hong, Hanshu; Xia, Yunhao; Sun, Zhixin

    2017-10-01

    Attribute-based encryption (ABE) is an interesting cryptographic technique for flexible cloud data sharing access control. However, some open challenges hinder its practical application. In previous schemes, all attributes are considered as in the same status while they are not in most of practical scenarios. Meanwhile, the size of access policy increases dramatically with the raise of its expressiveness complexity. In addition, current research hardly notices that mobile front-end devices, such as smartphones, are poor in computational performance while too much bilinear pairing computation is needed for ABE. In this paper, we propose a key-policy weighted attribute-based encryption without bilinear pairing computation (KP-WABE-WB) for secure cloud data sharing access control. A simple weighted mechanism is presented to describe different importance of each attribute. We introduce a novel construction of ABE without executing any bilinear pairing computation. Compared to previous schemes, our scheme has a better performance in expressiveness of access policy and computational efficiency.

  7. Optimized quantization in Zero Leakage Helper data systems

    NARCIS (Netherlands)

    Stanko, T.; Andini, F.N.; Skoric, B.

    2017-01-01

    Helper data systems are a cryptographic primitive that allows for the reproducible extraction of secrets from noisy measurements. Redundancy data called helper data makes it possible to do error correction while leaking little or nothing (Zero Leakage) about the extracted secret string. We study the

  8. A reflection through cinema about the meaning of what we call home

    Directory of Open Access Journals (Sweden)

    Luciana Helena Mussi

    2011-09-01

    Full Text Available This article aims to reflect on the meaning of "emotional" what we call home through the short film "Tsumiki no ie" (translation: The House in small cubes. The film poses questions perceived as a foundation / base for understanding the importance of this “material made of bricks, lime and memory whose final product is called "home”. Our memory is constructed from the memories built by affective ties, joys, desires, addiction, bereavement and many other materials of the heart and soul. The research shows that art done through cinema, with a constructed language with images, can contribute a lot in understanding where an aging housing means much more than a safe place to live. Backed by the conceptual literature is intended to immerse yourself in the charms and enchantments of this art to understand what a "house, our house staff” reminds us that special meaning and it is replaced in old age.

  9. Bäcklund transformations and divisor doubling

    Science.gov (United States)

    Tsiganov, A. V.

    2018-03-01

    In classical mechanics well-known cryptographic algorithms and protocols can be very useful for construction of canonical transformations preserving form of Hamiltonians. We consider application of a standard generic divisor doubling for construction of new auto Bäcklund transformations for the Lagrange top and Hénon-Heiles system separable in parabolic coordinates.

  10. Experimental study on rapid embankment construction methods

    International Nuclear Information System (INIS)

    Hirano, Hideaki; Egawa, Kikuji; Hyodo, Kazuya; Kannoto, Yasuo; Sekimoto, Tsuyoshi; Kobayashi, Kokichi.

    1982-01-01

    In the construction of a thermal or nuclear power plant in a coastal area, shorter embankment construction period has come to be called for recently. This tendency is remarkable where construction period is limited due to meteorological or sea conditions. To meet this requirement, the authors have been conducting basic experimental studies on two methods for the rapid execution of embankment construction, that is, Steel Plate Cellular Bulkhead Embedding Method and Ship Hull Caisson Method. This paper presents an outline of the results of the experimental study on these two methods. (author)

  11. Construct Measurement in Management Research

    DEFF Research Database (Denmark)

    Nielsen, Bo Bernhard

    2014-01-01

    Far too often do management scholars resort to crude and often inappropriate measures of fundamental constructs in their research; an approach which calls in question the interpretation and validity of their findings. Scholars often legitimize poor choices in measurement with a lack of availability......, this research note raises important questions about the use of proxies in management research and argues for greater care in operationalizing constructs with particular attention to matching levels of theory and measurement....

  12. Dynamic call center routing policies using call waiting and agent idle times

    NARCIS (Netherlands)

    Chan, W.; Koole, G.M.; L'Ecuyer, P.

    2014-01-01

    We study call routing policies for call centers with multiple call types and multiple agent groups. We introduce new weight-based routing policies where each pair (call type, agent group) is given a matching priority defined as an affine combination of the longest waiting time for that call type and

  13. Theologia and the Ideologica of Language: The calling of a theology ...

    African Journals Online (AJOL)

    The article argues that texts, and theology faculties as texts, are just as any structure or construction haunted by their sacred secret. Haunted by the ghosts in the texts from the past to be inspired for the calling of a theology and religion faculty in a time of populism and the 'renaissance of (neo)nationalism', according to Van ...

  14. Privacy-Free Garbled Circuits with Applications To Efficient Zero-Knowledge

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus; Orlandi, Claudio

    In the last few years garbled circuits (GC) have been elevated from being merely a component in Yao’s protocol for secure two-party computation, to a cryptographic primitive in its own right, following the growing number applications that use GCs. Zero-Knowledge (ZK) protocols is one...... of these examples: In a recent paper Jawurek et al. [JKO13] showed that GCs can be used to construct efficient ZK for unstructured languages. In this work we show that due to the property of this particular scenario (i.e., one of the party knows all the secret input bits, and therefore all intermediate values...... in the computation), we can construct more efficient garbled schemes specifically tailored to this goal. As a highlight of our result, in one of our constructions only one encryption per gate needs to be communicated and XOR gates never require any cryptographic operation. In addition to making a step forward...

  15. Salivary alpha amylase in on-call from home fire and emergency service personnel

    Directory of Open Access Journals (Sweden)

    Sarah J Hall

    2017-10-01

    Full Text Available The effect of working on-call from home on the sympatho-adrenal medullary system activity is currently unknown. This study had two aims, Aim 1: examine salivary alpha amylase awakening response (AAR and diurnal salivary alpha amylase (sAA profile in fire and emergency service workers who operate on-call from home following a night on-call with a call (NIGHT-CALL, a night on-call without a call (NO-CALL and an off-call night (OFF-CALL, and Aim 2: explore whether there was an anticipatory effect of working on-call from home (ON compared to when there was an off-call (OFF on the diurnal sAA profile. Participants wore activity monitors, completed sleep and work diaries and collected seven saliva samples a day for one week. AAR area under the curve with respect to ground (AUCG, AAR area under the curve with respect to increase (AUCI, AAR reactivity, diurnal sAA slope, diurnal sAA AUCG and mean 12-h sAA concentrations were calculated. Separate generalised estimating equation models were constructed for each variable of interest for each aim. For Aim 1, there were no differences between NIGHT-CALL or NO-CALL and OFF-CALL for any response variable. For Aim 2, there was no difference between any response variable of interest when ON the following night compared to when OFF the following night (n = 14. These findings suggest that there is no effect of working on-call from home on sAA, but should be interpreted with caution, as overnight data were not collected. Future research, using overnight heart rate monitoring, could help confirm these findings.

  16. Sense of coherence, career adaptability and burnout of early-career Black staff in the call centre environment

    Directory of Open Access Journals (Sweden)

    Nisha Harry

    2013-11-01

    Research purpose: This study explored whether call centre agents’ sense of coherence significantly influences their career adaptability and whether their burnout levels significantly moderate the sense of coherence–career adaptability relationship. The research also investigated whether age, gender and years of service (as control variables, along with sense of coherence, predicted career adaptability. Motivation for the study: The positive psychological construct of career adaptability and its association with call centre agents’ sense of coherence, burnout, age, gender and years of service have not yet been investigated in the call centre environment. Research design, approach and method: A cross-sectional quantitative survey design was used. The Orientation to Life, Career Adapt-Abilities Scale and Maslach Burnout Inventory General Scale were administered to a non-probability purposive sample of 409 early-career Black staff employed in three of the largest outsourced financial call centres in Africa. Main findings: Multiple regression analyses revealed that age, gender and meaningfulness significantly predicted call centre agents’ career adaptability, but that their burnout levels do not significantly moderate the sense of coherence–career adaptability relationship. Practical/managerial implications: Enhancing call centre agents’ sense of meaningfulness will increase their levels of career adaptability and career wellbeing. Contribution/value-add: This research is the first to investigate the construct of career adaptability in the call centre environment and adds new knowledge and insights to the existing wellness and positive psychology literature.

  17. Automatic Construction of Java Programs from Functional Program Specifications

    OpenAIRE

    Md. Humayun Kabir

    2015-01-01

    This paper presents a novel approach to construct Java programs automatically from the input functional program specifications on natural numbers from the constructive proofs of the input specifications using an inductive theorem prover called Poiti'n. The construction of a Java program from the input functional program specification involves two phases. The theorem prover is used to construct a higher order functional (HOF) program from the input specification expressed as an existential the...

  18. Unique voices in harmony: Call-and-response to address race and physics teaching

    Science.gov (United States)

    Cochran, Geraldine L.; White, Gary D.

    2017-09-01

    In the February 2016 issue of The Physics Teacher, we announced a call for papers on race and physics teaching. The response was muted at first, but has now grown to a respectable chorale-sized volume. As the manuscripts began to come in and the review process progressed, Geraldine Cochran graciously agreed to come on board as co-editor for this remarkable collection of papers, to be published throughout the fall of 2017 in TPT. Upon reviewing the original call and the responses from the physics community, the parallels between generating this collection and the grand call-and-response tradition became compelling. What follows is a conversation constructed by the co-editors that is intended to introduce the reader to the swell of voices that responded to the original call. The authors would like to thank Pam Aycock for providing many useful contributions to this editorial.

  19. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

    Directory of Open Access Journals (Sweden)

    Amioy Kumar

    2009-01-01

    Full Text Available The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

  20. 47 CFR 22.921 - 911 call processing procedures; 911-only calling mode.

    Science.gov (United States)

    2010-10-01

    ... programming in the mobile unit that determines the handling of a non-911 call and permit the call to be... CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.921 911 call processing procedures; 911-only calling mode. Mobile telephones manufactured after February 13, 2000 that are capable of...

  1. The construction of work-life balance: the experience of black employees in a call-centre environment

    OpenAIRE

    Potgieter, Sónia C.B.; Barnard, Antoni

    2010-01-01

    ORIENTATION: Work-life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile. RESEARCH PURPOSE: The objective of the study was to explore Black employees' construction of work-life balance in a customer care environment. MOTIVATION FOR THE STUDY: The conceptual debate regarding the construct of work-life balance in general as well as limited qualitative research with regard to...

  2. Sustainable house construction and green financing. Explanation for 'green mortgages'

    International Nuclear Information System (INIS)

    1997-05-01

    The Dutch government finances the sustainable construction of new houses by means of so-called 'green loans'. Extra costs for the construction of a sustainable house are compensated by a lower interest rate for a green loan. In this brochure it is explained when green financing of house construction is possible and how to apply for such loans

  3. Computer aided fault tree construction for electrical systems

    International Nuclear Information System (INIS)

    Fussell, J.B.

    1975-01-01

    A technique is presented for automated construction of the Boolean failure logic diagram, called the fault tree, for electrical systems. The method is a technique for synthesizing a fault tree from system-independent component characteristics. Terminology is defined and heuristic examples are given for all phases of the model. The computer constructed fault trees are in conventional format, use conventional symbols, and are deductively constructed from the main failure of interest to the individual component failures. The synthesis technique is generally applicable to automated fault tree construction for other types of systems

  4. The construction of work–life balance: The experience of Black employees in a call-centre environment

    Directory of Open Access Journals (Sweden)

    Sonia C.B. Potgieter

    2010-08-01

    Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment. Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to Black employees’ experience of work–life balance in a South African context motivated the study. Research design, approach and method: This qualitative study was designed from an interpretivist perspective. Ten employees, selected through purposeful sampling, participated in the study. Data was gathered through in-depth interviews and grounded theory was applied during data analysis. Main findings: The grounded theory analysis of the data yielded six themes central to participants’ construction of work–life balance. The findings suggest that work–life balance is conceptualised as a continuous, subjective and holistic valuation of satisfaction derived from multiple roles in relation to the importance to the individual at a given point in time. Practical/managerial implications: Findings provide valuable managerial information to guide suitable strategies enhancing the work–life balance experience and by implication employees’ general wellbeing, job satisfaction and commitment. Contributions/value-add: This study contributes to the evolving body of knowledge with regard to work–life balance and provides a unique context-specific perspective to the conceptual understanding of the construct.

  5. Know Thy Neighbor: Crypto Library Detection in Cloud

    Directory of Open Access Journals (Sweden)

    Irazoqui Gorka

    2015-04-01

    Full Text Available Software updates and security patches have become a standard method to fix known and recently discovered security vulnerabilities in deployed software. In server applications, outdated cryptographic libraries allow adversaries to exploit weaknesses and launch attacks with significant security results. The proposed technique exploits leakages at the hardware level to first, determine if a specific cryptographic library is running inside (or not a co-located virtual machine (VM and second to discover the IP of the co-located target. To this end, we use a Flush+Reload cache side-channel technique to measure the time it takes to call (load a cryptographic library function. Shorter loading times are indicative of the library already residing in memory and shared by the VM manager through deduplication. We demonstrate the viability of the proposed technique by detecting and distinguishing various cryptographic libraries, including MatrixSSL, PolarSSL, GnuTLS, OpenSSL and CyaSSL along with the IP of the VM running these libraries. In addition, we show how to differentiate between various versions of libraries to better select an attack target as well as the applicable exploit. Our experiments show a complete attack setup scenario with single-trial success rates of up to 90% under light load and up to 50% under heavy load for libraries running in KVM.

  6. Biomimetic agent based modelling using male Frog calling behaviour as a case study

    DEFF Research Database (Denmark)

    Jørgensen, Søren V.; Demazeau, Yves; Christensen-Dalsgaard, Jakob

    2014-01-01

    by individuals to generate their observed population behaviour. A number of existing agent-modelling frameworks are considered, but none have the ability to handle large numbers of time-dependent event-generating agents; hence the construction of a new tool, RANA. The calling behaviour of the Puerto Rican Tree...... Frog, E. coqui, is implemented as a case study for the presentation and discussion of the tool, and results from this model are presented. RANA, in its present stage of development, is shown to be able to handle the problem of modelling calling frogs, and several fruitful extensions are proposed...

  7. Career Construction with a Gay Client: A Case Study

    Science.gov (United States)

    Maree, Jacobus Gideon

    2014-01-01

    This article reports on the value of career construction counselling (CCC) with a gay person. The participant was selected purposively, with the selection criteria calling for a mid-career woman who had sought career counselling. The intervention involved administration of the "Career Construction Interview" (CCI) and the creation of a…

  8. Preassembly method for construction of nuclear power station

    International Nuclear Information System (INIS)

    Shimazaki, Yasuyoshi

    1986-01-01

    Recently preassembly method for construction are generally popular in Japan and this trend is prevailing all over the world. They provide good solutions to the problems that the Japanese construction industry faces and also they meet the needs for construction of nuclear power plants having heavily reinforced concrete structures. We have already established basic technologies for the methods, developing more advanced methods (more systematic, larger sized, more applicable, etc.). In the near future, they will be further developed up to a complete system called 'Industrialized construction method'. This system will include the use of precast concrete component, steel concrete composit structures and construction robots. (author)

  9. The construction of work–life balance: The experience of Black employees in a call-centre environment

    Directory of Open Access Journals (Sweden)

    Sonia C.B. Potgieter

    2010-03-01

    Full Text Available Orientation: Work–life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile.Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment.Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to Black employees’ experience of work–life balance in a South African context motivated the study.Research design, approach and method: This qualitative study was designed from an interpretivist perspective. Ten employees, selected through purposeful sampling, participated in the study. Data was gathered through in-depth interviews and grounded theory was applied during data analysis.Main findings: The grounded theory analysis of the data yielded six themes central to participants’ construction of work–life balance. The findings suggest that work–life balance is conceptualised as a continuous, subjective and holistic valuation of satisfaction derived from multiple roles in relation to the importance to the individual at a given point in time.Practical/managerial implications: Findings provide valuable managerial information to guide suitable strategies enhancing the work–life balance experience and by implication employees’ general wellbeing, job satisfaction and commitment.Contributions/value-add: This study contributes to the evolving body of knowledge with regard to work–life balance and provides a unique context-specific perspective to the conceptual understanding of the construct.

  10. Preimage Selective Trapdoor Function: How to Repair an Easy Problem

    Directory of Open Access Journals (Sweden)

    Baocang Wang

    2014-01-01

    Full Text Available Public key cryptosystems are constructed by embedding a trapdoor into a one-way function. So, the one-wayness and the trapdoorness are vital to public key cryptography. In this paper, we propose a novel public key cryptographic primitive called preimage selective trapdoor function. This scenario allows to use exponentially many preimage to hide a plaintext even if the underlying function is not one-way. The compact knapsack problem is used to construct a probabilistic public key cryptosystem, the underlying encryption function of which is proven to be preimage selective trapdoor one-way functions under some linearization attack models. The constructive method can guarantee the noninjectivity of the underlying encryption function and the unique decipherability for ciphertexts simultaneously. It is heuristically argued that the security of the proposal cannot be compromised by a polynomial-time adversary even if the compact knapsack is easy to solve. We failed to provide any provable security results about the proposal; however, heuristic illustrations show that the proposal is secure against some known attacks including brute force attacks, linearization attacks, and key-recovery attacks. The proposal turns out to have acceptable key sizes and performs efficiently and hence is practical.

  11. RITUAL AND IDENTITY CONSTRUCTION IN NIGERIAN IGBO ...

    African Journals Online (AJOL)

    NGOZI

    Against this background, video films that showcase the language and social attitudes of the Igbo people are seen ... Ritual and Identity Construction in Nigerian Igbo Video Films: A Call for policy .... emphasis on certain themes, the mass media.

  12. Memory and the Construction of Perseption toward Magic Call in the novel The First Phone Call From Heaven by Mitch Albom

    Directory of Open Access Journals (Sweden)

    Rosmah Tami

    2016-06-01

    Full Text Available Artikel ini bertujuan untuk mengungkapkan persepsi penerima telepon magis dari surga tentang kebenaran sebuah peristiwa magis dalam novel The First Phone Call from Heaven karya Mitch Albom. Novel ini dianggap menggunakan format realisme magis yang mencampurkan antara kenyataan dan fantasi. Pergerakan persepsi karakter novel dari tidak mempercayainya sebagai kebenaran menjadi sebagai kebenaran yang mutlak menjadi fokus penelitian ini. Permasalahan yang diangkat dalam penelitian ini ditelusuri dengan menggunakan kerangka teori yang dikemukakan oleh Linda Hutcheon tentang representasikan masa lalu dalam narasi. Penelitian ini menemukan bahwa penerimaan tokoh dalam novel terhadap kejadian magis yang tidak dapat dipercaya menjadi sebuah kemutlakan yang tak terbantahkan melalui proses dialektika yang logis melalui ingatan masa lalu yang kemudian membangkitkan perasaan tokoh. Ketidakrasionalan suatu peristiwa dapat dirasionalkan dan diterima oleh akal dengan menampilkan masa lalu melalui ingatan tokoh. Ingatan memancing sentimental sehingga peristiwa yang rasional dapat diterima karena dukungan dari domain rasa bukan nalar. Sentimentalitas adalah strategi dalam narasi untuk mengaburkan antara real dan yang tidak real.

  13. A new construction of bent functions based on Z-bent functions

    DEFF Research Database (Denmark)

    Gangopadhyay, Sugata; Joshi, Anand; Leander, Gregor

    2013-01-01

    Dobbertin has embedded the problem of construction of bent functions in a recursive framework by using a generalization of bent functions called -bent functions. Following his ideas, we generalize the construction of partial spreads bent functions to partial spreads -bent functions of arbitrary...

  14. Perceiving a calling, living a calling, and job satisfaction: testing a moderated, multiple mediator model.

    Science.gov (United States)

    Duffy, Ryan D; Bott, Elizabeth M; Allan, Blake A; Torrey, Carrie L; Dik, Bryan J

    2012-01-01

    The current study examined the relation between perceiving a calling, living a calling, and job satisfaction among a diverse group of employed adults who completed an online survey (N = 201). Perceiving a calling and living a calling were positively correlated with career commitment, work meaning, and job satisfaction. Living a calling moderated the relations of perceiving a calling with career commitment and work meaning, such that these relations were more robust for those with a stronger sense they were living their calling. Additionally, a moderated, multiple mediator model was run to examine the mediating role of career commitment and work meaning in the relation of perceiving a calling and job satisfaction, while accounting for the moderating role of living a calling. Results indicated that work meaning and career commitment fully mediated the relation between perceiving a calling and job satisfaction. However, the indirect effects of work meaning and career commitment were only significant for individuals with high levels of living a calling, indicating the importance of living a calling in the link between perceiving a calling and job satisfaction. Implications for research and practice are discussed. (c) 2012 APA, all rights reserved.

  15. Call Center Capacity Planning

    DEFF Research Database (Denmark)

    Nielsen, Thomas Bang

    in order to relate the results to the service levels used in call centers. Furthermore, the generic nature of the approximation is demonstrated by applying it to a system incorporating a dynamic priority scheme. In the last paper Optimization of overflow policies in call centers, overflows between agent......The main topics of the thesis are theoretical and applied queueing theory within a call center setting. Call centers have in recent years become the main means of communication between customers and companies, and between citizens and public institutions. The extensively computerized infrastructure...... in modern call centers allows for a high level of customization, but also induces complicated operational processes. The size of the industry together with the complex and labor intensive nature of large call centers motivates the research carried out to understand the underlying processes. The customizable...

  16. Efficient Fair Exchange from Identity-Based Signature

    Science.gov (United States)

    Yum, Dae Hyun; Lee, Pil Joong

    A fair exchange scheme is a protocol by which two parties Alice and Bob exchange items or services without allowing either party to gain advantages by quitting prematurely or otherwise misbehaving. To this end, modern cryptographic solutions use a semi-trusted arbitrator who involves only in cases where one party attempts to cheat or simply crashes. We call such a fair exchange scheme optimistic. When no registration is required between the signer and the arbitrator, we say that the fair exchange scheme is setup free. To date, the setup-free optimist fair exchange scheme under the standard RSA assumption was only possible from the generic construction of [12], which uses ring signatures. In this paper, we introduce a new setup-free optimistic fair exchange scheme under the standard RSA assumption. Our scheme uses the GQ identity-based signature and is more efficient than [12]. The construction can also be generalized by using various identity-based signature schemes. Our main technique is to allow each user to choose his (or her) own “random” public key in the identitybased signature scheme.

  17. Potential of Progressive Construction Systems in Slovakia

    Science.gov (United States)

    Kozlovska, Maria; Spisakova, Marcela; Mackova, Daniela

    2017-10-01

    Construction industry is a sector with rapid development. Progressive technologies of construction and new construction materials also called modern methods of construction (MMC) are developed constantly. MMC represent the adoption of construction industrialisation and the use of prefabrication of components in building construction. One of these modern methods is also system Varianthaus, which is based on, insulated concrete forms principle and provides complete production plant for wall, ceiling and roof elements for a high thermal insulation house construction. Another progressive construction system is EcoB, which represents an insulated precast concrete panel based on combination of two layers, insulation and concrete, produced in a factory as a whole. Both modern methods of construction are not yet known and wide-spread in the Slovak construction market. The aim of this paper is focused on demonstration of MMC using potential in Slovakia. MMC potential is proved based on comparison of the selected parameters of construction process - construction costs and construction time. The subject of this study is family house modelled in three material variants - masonry construction (as a representative of traditional methods of construction), Varianthaus and EcoB (as the representatives of modern methods of construction). The results of this study provide the useful information in decision-making process for potential investors of construction.

  18. Calle Blanco

    Directory of Open Access Journals (Sweden)

    Gonzalo Cerda Brintrup

    1988-06-01

    Full Text Available Importante arteria, que comunica el sector del puerto con la plaza. Las más imponentes construcciones se sucedían de un modo continuo, encaramándose a ambos lados de la empinada calle. Antes del gran incendio de 1936 grandes casonas de madera destacaban en calle Irarrázabal y en la esquina de ésta con calle Blanco, la más hermosa construcción pertenecía a don Alberto Oyarzún y la casa vecina hacia Blanco era de don Mateo Miserda, limitada por arriba con la casa de don Augusto Van Der Steldt y ésta era seguida de la casa de don David Barrientos provista de cuatro cúpulas en las esquinas y de un amplio corredor en el frontis. Todas estas construcciones de madera fueron destruidas en el gran incendio de 1936.

  19. An Algebraic Construction of the First Integrals of the Stationary KdV Hierarchy

    Science.gov (United States)

    Matsushima, Masatomo; Ohmiya, Mayumi

    2009-09-01

    The stationary KdV hierarchy is constructed using a kind of recursion operator called Λ-operator. The notion of the maximal solution of the n-th stationary KdV equation is introduced. Using this maximal solution, a specific differential polynomial with the auxiliary spectral parameter called the spectral M-function is constructed as the quadratic form of the fundamental system of the eigenvalue problem for the 2-nd order linear ordinary differential equation which is related to the linearizing operator of the hierarchy. By calculating a perfect square condition of the quadratic form by an elementary algebraic method, the complete set of first integrals of this hierarchy is constructed.

  20. Construction practices: Pulse builder survey results

    Energy Technology Data Exchange (ETDEWEB)

    Kadulski, R

    This paper discusses the results of a nationwide builder survey on common building techniques, such as framing, insulation, airtight construction practices, testing for airtightness, windows, furnaces and water heaters, and ventilation. Results indicate that changes in construction were mainly influenced by the R-2000 program. The spread of R-2000 technology is reflected in the use of higher insulation levels than are called for by codes or than is normal practice, sealing of joints, and attention to air and vapour retarders as well as air tight drywall techniques combined with mechanical ventilation systems.

  1. The use of production management techniques in the construction of large scale physics detectors

    International Nuclear Information System (INIS)

    Bazan, A.; Chevenier, G.; Estrella, F.

    1999-01-01

    The construction process of detectors for the Large Hadron Collider (LHC) experiments is large scale, heavily constrained by resource availability and evolves with time. As a consequence, changes in detector component design need to be tracked and quickly reflected in the construction process. With similar problems in industry engineers employ so-called Product Data Management (PDM) systems to control access to documented versions of designs and managers employ so-called Product Data Management (PDM) systems to control access to documented versions of designs and managers employ so-called Workflow Management Software (WfMS) to coordinate production work processes. However, PDM and WfMS software are not generally integrated in industry. The scale of LHC experiments, like CMS, demands that industrial production techniques be applied in detector construction. This paper outlines the major functions and applications of the CRISTAL system (Cooperating Repositories and an Information System for Tracking Assembly Lifecycles) in use in CMS which successfully integrates PDM and WfMS techniques in managing large scale physics detector construction. This is the first time industrial production techniques have been deployed to this extent in detector construction

  2. Can Measured Synergy Excitations Accurately Construct Unmeasured Muscle Excitations?

    Science.gov (United States)

    Bianco, Nicholas A; Patten, Carolynn; Fregly, Benjamin J

    2018-01-01

    Accurate prediction of muscle and joint contact forces during human movement could improve treatment planning for disorders such as osteoarthritis, stroke, Parkinson's disease, and cerebral palsy. Recent studies suggest that muscle synergies, a low-dimensional representation of a large set of muscle electromyographic (EMG) signals (henceforth called "muscle excitations"), may reduce the redundancy of muscle excitation solutions predicted by optimization methods. This study explores the feasibility of using muscle synergy information extracted from eight muscle EMG signals (henceforth called "included" muscle excitations) to accurately construct muscle excitations from up to 16 additional EMG signals (henceforth called "excluded" muscle excitations). Using treadmill walking data collected at multiple speeds from two subjects (one healthy, one poststroke), we performed muscle synergy analysis on all possible subsets of eight included muscle excitations and evaluated how well the calculated time-varying synergy excitations could construct the remaining excluded muscle excitations (henceforth called "synergy extrapolation"). We found that some, but not all, eight-muscle subsets yielded synergy excitations that achieved >90% extrapolation variance accounted for (VAF). Using the top 10% of subsets, we developed muscle selection heuristics to identify included muscle combinations whose synergy excitations achieved high extrapolation accuracy. For 3, 4, and 5 synergies, these heuristics yielded extrapolation VAF values approximately 5% lower than corresponding reconstruction VAF values for each associated eight-muscle subset. These results suggest that synergy excitations obtained from experimentally measured muscle excitations can accurately construct unmeasured muscle excitations, which could help limit muscle excitations predicted by muscle force optimizations.

  3. Perceiving a Calling, Living a Calling, and Job Satisfaction: Testing a Moderated, Multiple Mediator Model

    Science.gov (United States)

    Duffy, Ryan D.; Bott, Elizabeth M.; Allan, Blake A.; Torrey, Carrie L.; Dik, Bryan J.

    2012-01-01

    The current study examined the relation between perceiving a calling, living a calling, and job satisfaction among a diverse group of employed adults who completed an online survey (N = 201). Perceiving a calling and living a calling were positively correlated with career commitment, work meaning, and job satisfaction. Living a calling moderated…

  4. Behavioral Preferences for Individual Securities : The Case for Call Warrants and Call Options

    NARCIS (Netherlands)

    Ter Horst, J.R.; Veld, C.H.

    2002-01-01

    Since 1998, large investment banks have flooded the European capital markets with issues of call warrants.This has led to a unique situation in the Netherlands, where now call warrants, traded on the stock exchange, and long-term call options, traded on the options exchange, exist.Both entitle their

  5. Dakota - hashing from a combination of modular arithmetic and symmetric cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    In this paper a cryptographic hash function is proposed, where collision resistance is based upon an assumption that involves squaring modulo an RSA modulus in combination with a one-way function that does not compress its input, and may therefore be constructed from standard techniques and assum...

  6. Dakota – Hashing from a Combination of Modular Arithmetic and Symmetric Cryptography

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    In this paper a cryptographic hash function is proposed, where collision resistance is based upon an assumption that involves squaring modulo an RSA modulus in combination with a one-way function that does not compress its input, and may therefore be constructed from standard techniques and assum...

  7. CONSTRUCTED WETLAND TECHNOLOGY TO PREVENT WATER RESOURCES POLLUTION

    OpenAIRE

    Zeki Gökalp; Sedat Karaman; Ismail Taş; Halil Kirnak

    2016-01-01

    Discharge of untreated waste waters into surface waters creates significant pollution in these resources. Wastewaters are most of the time discharged into seas, rivers and other water bodies without any treatments due to high treatment costs both in Turkey and throughout the world. Constructed wetlands, also called as natural treatment systems, are used as an alternative treatment system to conventional high-cost treatment systems because of their low construction, operation and maintenance c...

  8. Construction of a combinatorial pipeline using two somatic variant  calling  methods  for whole exome sequence data of gastric cancer.

    Science.gov (United States)

    Kohmoto, Tomohiro; Masuda, Kiyoshi; Naruto, Takuya; Tange, Shoichiro; Shoda, Katsutoshi; Hamada, Junichi; Saito, Masako; Ichikawa, Daisuke; Tajima, Atsushi; Otsuji, Eigo; Imoto, Issei

    2017-01-01

    High-throughput next-generation sequencing is a powerful tool to identify the genotypic landscapes of somatic variants and therapeutic targets in various cancers including gastric cancer, forming the basis for personalized medicine in the clinical setting. Although the advent of many computational algorithms leads to higher accuracy in somatic variant calling, no standard method exists due to the limitations of each method. Here, we constructed a new pipeline. We combined two different somatic variant callers with different algorithms, Strelka and VarScan 2, and evaluated performance using whole exome sequencing data obtained from 19 Japanese cases with gastric cancer (GC); then, we characterized these tumors based on identified driver molecular alterations. More single nucleotide variants (SNVs) and small insertions/deletions were detected by Strelka and VarScan 2, respectively. SNVs detected by both tools showed higher accuracy for estimating somatic variants compared with those detected by only one of the two tools and accurately showed the mutation signature and mutations of driver genes reported for GC. Our combinatorial pipeline may have an advantage in detection of somatic mutations in GC and may be useful for further genomic characterization of Japanese patients with GC to improve the efficacy of GC treatments. J. Med. Invest. 64: 233-240, August, 2017.

  9. The Work Calls for Men: The Social Construction of Professionalism and Professional Education for Librarianship

    Science.gov (United States)

    Stauffer, Suzanne M.

    2016-01-01

    The leaders of the library profession in the United States in the 19th century were white, middle-class, college-educated men. They attempted to construct librarianship in the United States as an equivalent profession to the other white, masculine professions of their day. They also created education for librarianship in the same mold. They…

  10. Lightweight Cryptography for Passive RFID Tags

    DEFF Research Database (Denmark)

    David, Mathieu

    2012-01-01

    were mostly unsatisfactory. As a conclusion, a new branch of cryptography, commonly called Lightweight Cryptography, emerged to address the issues of these tiny ubiquitous devices. This Thesis presents a comprehensive engineering to lightweight cryptography, proposes a classification and explores its...... various ramifications by giving key examples in each of them. We select two of these branches, ultralightweight cryptography and symmetric-key cryptography, and propose a cryptographic primitive in each of them. In the case of symmetric-key cryptography, we propose a stream cipher that has a footprint...... of an integrator for a particular application. Finally, we conclude that the research for finding robust cryptographic primitive in the branch of lightweight cryptography still has some nice days ahead, and that providing a secure cryptosystem for printed electronics RFID tags remains an open research topic....

  11. Cryptanalysis of Some Lightweight Symmetric Ciphers

    DEFF Research Database (Denmark)

    Abdelraheem, Mohamed Ahmed Awadelkareem Mohamed Ahmed

    In recent years, the need for lightweight encryption systems has been increasing as many applications use RFID and sensor networks which have a very low computational power and thus incapable of performing standard cryptographic operations. In response to this problem, the cryptographic community...... on a variant of PRESENT with identical round keys. We propose a new attack named the Invariant Subspace Attack that was specifically mounted against the lightweight block cipher PRINTcipher. Furthermore, we mount several attacks on a recently proposed stream cipher called A2U2....... of the international standards in lightweight cryptography. This thesis aims at analyzing and evaluating the security of some the recently proposed lightweight symmetric ciphers with a focus on PRESENT-like ciphers, namely, the block cipher PRESENT and the block cipher PRINTcipher. We provide an approach to estimate...

  12. Occupational voice demands and their impact on the call-centre industry

    Directory of Open Access Journals (Sweden)

    Duffy OM

    2009-04-01

    Full Text Available Abstract Background Within the last decade there has been a growth in the call-centre industry in the UK, with a growing awareness of the voice as an important tool for successful communication. Occupational voice problems such as occupational dysphonia, in a business which relies on healthy, effective voice as the primary professional communication tool, may threaten working ability and occupational health and safety of workers. While previous studies of telephone call-agents have reported a range of voice symptoms and functional vocal health problems, there have been no studies investigating the use and impact of vocal performance in the communication industry within the UK. This study aims to address a significant gap in the evidence-base of occupational health and safety research. The objectives of the study are: 1. to investigate the work context and vocal communication demands for call-agents; 2. to evaluate call-agents' vocal health, awareness and performance; and 3. to identify key risks and training needs for employees and employers within call-centres. Methods and design This is an occupational epidemiological study, which plans to recruit call-centres throughout the UK and Ireland. Data collection will consist of three components: 1. interviews with managers from each participating call-centre to assess their communication and training needs; 2. an online biopsychosocial questionnaire will be administered to investigate the work environment and vocal demands of call-agents; and 3. voice acoustic measurements of a random sample of participants using the Multi-dimensional Voice Program (MDVP. Qualitative content analysis from the interviews will identify underlying themes and issues. A multivariate analysis approach will be adopted using Structural Equation Modelling (SEM, to develop voice measurement models in determining the construct validity of potential factors contributing to occupational dysphonia. Quantitative data will be

  13. New Construction of PVPKE Scheme and Its Application in Information Systems and Mobile Communication

    OpenAIRE

    Minqing Zhang; Xu An Wang; Xiaoyuan Yang; Weihua Li

    2015-01-01

    In SCN12, Nieto et al. discussed an interesting property of public key encryption with chosen ciphertext security, that is, ciphertexts with public verifiability. Independently, we introduced a new cryptographic primitive, CCA-secure publicly verifiable public key encryption without pairings in the standard model (PVPKE), and discussed its application in proxy reencryption (PRE) and threshold public key encryption (TPKE). In Crypto’09, Hofheiz and Kiltz introduced the group of signed quadrati...

  14. Emotional labor and dysmenorrhea in women working in sales and call centers.

    Science.gov (United States)

    Cho, In-Jung; Kim, Hyunjoo; Lim, Sinye; Oh, Sung-Soo; Park, Sungjin; Kang, Hee-Tae

    2014-01-01

    This study was conducted to investigate the association between emotional labor and dysmenorrhea among women working in sales and call centers in Seoul, South Korea. Working women in sales jobs and call centers in Seoul were interviewed face-to-face by well-trained interviewers. In total, 975 participants were analyzed in the final model. Emotional labor was measured using a constructed questionnaire with two components: an emotive effort component with three questions and an emotive dissonance component with five questions. To examine the association between emotional labor and dysmenorrhea, chi-squared tests and logistic regression were applied. The prevalence of dysmenorrhea among sales workers and call center workers were 43.0% and 61.1%, respectively. The adjusted odds ratios (OR) of emotive effort and emotive dissonance for dysmenorrhea in call center workers were 1.88 (95% confidence interval [CI], 1.07-3.28) and 1.72 (95% CI, 1.13-2.63), respectively. The adjusted OR of emotive effort and emotive dissonance for dysmenorrhea in sales workers were 1.71 (95% CI, 0.92-3.16) and 1.15 (95% CI, 0.67-1.98), respectively. Emotional labor was found to be associated with dysmenorrhea in call center workers. Further studies to investigate other factors, such as management strategies and the relationship between emotional labor and dysmenorrhea, are needed to support interventions to prevent dysmenorrhea that will further promote the quality of health and life of working women.

  15. Constructing a logical, regular axis topology from an irregular topology

    Science.gov (United States)

    Faraj, Daniel A.

    2014-07-01

    Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.

  16. Collapse simulation of building constructions

    Directory of Open Access Journals (Sweden)

    Nekrest'yanov Viktor Nikolaevich

    Full Text Available The physical reasons for building structures destruction are both the forces arising at stress-strain state of construction elements and external influences arising at emergency situations, as well as their moments, impulses and periodic impulses with the frequencies close to of fluctuations frequencies of construction elements. We shall call the mathematical calculation models for the parameters-reasons of destructions the basic models. The basic models of destruction of building structures elements allow not only providing necessary level of reliability and survivability of the elements and the construction as a whole already at the stage of their design, but also giving the chance, at their corresponding completion, to provide rational decisions on the general need of recovery works and their volume depending on destruction level. Especially important for rational design decisions development, which ensure the demanded constructional safety of building structures, is library creation of the basic mathematical models of standard processes of bearing elements destructions for standard construction designs for the purpose of the further forecast (assessment of the level and probabilities of standard destructions. Some basic mathematical models of destructions processes of the standard elements of building structures are presented in the present article. A model of accounting for construction defects and a model of obtaining requirements to probabilities of partial destructions of a construction are given. Both of these models are probabilistic.

  17. Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking

    Directory of Open Access Journals (Sweden)

    Rong Ma

    2017-01-01

    Full Text Available Content Centric Networking (CCN is an effective communication paradigm that well matches the features of wireless environments. To be considered a viable candidate in the emerging wireless networks, despite the clear benefits of location-independent security, CCN must at least have parity with existing solutions for confidential and anonymous communication. This paper designs a new cryptographic scheme, called Asymmetric Index Encapsulation (AIE, that enables the router to test whether an encapsulated header matches the token without learning anything else about both of them. We suggest using the AIE as the core protocol of anonymous Content Centric Networking. A construction of AIE which strikes a balance between efficiency and security is given. The scheme is proved to be secure based on the DBDH assumption in the random oracle with tight reduction, while the encapsulated header and the token in our system consist of only three elements.

  18. Investigation of the Practical Possibility of Solving Problems on Generalized Cellular Automata Associated with Cryptanalysis by Mean Algebraic Methods

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2017-01-01

    Full Text Available A number of previous author’s papers proposed methods for constructing various cryptographic algorithms, including block ciphers and cryptographic hash functions, based on generalized cellular automata. This one is aimed at studying a possibility to use the algebraic cryptanalysis methods related to the construction of Gröbner bases for the generalized cellular automata to be applied in cryptography, i.e. this paper studies the possibility for using algebraic cryptanalysis methods to solve the problems of inversion of a generalized cellular automaton and recovering the key of such an automaton.If the cryptographic algorithm is represented as a system of polynomial equations over a certain finite field, then its breach is reduced to solving this system with respect to the key. Although the problem of solving a system of polynomial equations in a finite field is NP-difficult in the general case, the solution of a particular system can have low computational cost.Cryptanalysis based on the construction of a system of polynomial equations that links plain text, cipher-text and key, and its solution by algebraic methods, is usually called algebraic cryptanalysis. Among the main methods to solve systems of polynomial equations are those to construct Gröbner bases.Cryptanalysis of ciphers and hash functions based on generalized cellular automata can be reduced to various problems. We will consider two such problems: the problem of inversion of a generalized cellular automaton, which, in case we know the values of the cells after k iterations, enables us to find the initial values. And the task of recovering the key, which is to find the initial values of the remaining cells, using the cell values after k steps and the initial values of a part of the cells.A computational experiment was carried out to solve the two problems above stated in order to determine the maximum size of a generalized cellular automaton for which the solution of these

  19. Validation of the Cognitive Assessment of Later Life Status (CALLS instrument: a computerized telephonic measure

    Directory of Open Access Journals (Sweden)

    Parsons Thomas D

    2007-05-01

    Full Text Available Abstract Background Brief screening tests have been developed to measure cognitive performance and dementia, yet they measure limited cognitive domains and often lack construct validity. Neuropsychological assessments, while comprehensive, are too costly and time-consuming for epidemiological studies. This study's aim was to develop a psychometrically valid telephone administered test of cognitive function in aging. Methods Using a sequential hierarchical strategy, each stage of test development did not proceed until specified criteria were met. The 30 minute Cognitive Assessment of Later Life Status (CALLS measure and a 2.5 hour in-person neuropsychological assessment were conducted with a randomly selected sample of 211 participants 65 years and older that included equivalent distributions of men and women from ethnically diverse populations. Results Overall Cronbach's coefficient alpha for the CALLS test was 0.81. A principal component analysis of the CALLS tests yielded five components. The CALLS total score was significantly correlated with four neuropsychological assessment components. Older age and having a high school education or less was significantly correlated with lower CALLS total scores. Females scored better overall than males. There were no score differences based on race. Conclusion The CALLS test is a valid measure that provides a unique opportunity to reliably and efficiently study cognitive function in large populations.

  20. Validation of Multilevel Constructs: Validation Methods and Empirical Findings for the EDI

    Science.gov (United States)

    Forer, Barry; Zumbo, Bruno D.

    2011-01-01

    The purposes of this paper are to highlight the foundations of multilevel construct validation, describe two methodological approaches and associated analytic techniques, and then apply these approaches and techniques to the multilevel construct validation of a widely-used school readiness measure called the Early Development Instrument (EDI;…

  1. Call Centre- Computer Telephone Integration

    Directory of Open Access Journals (Sweden)

    Dražen Kovačević

    2012-10-01

    Full Text Available Call centre largely came into being as a result of consumerneeds converging with enabling technology- and by the companiesrecognising the revenue opportunities generated by meetingthose needs thereby increasing customer satisfaction. Regardlessof the specific application or activity of a Call centre, customersatisfaction with the interaction is critical to the revenuegenerated or protected by the Call centre. Physical(v, Call centreset up is a place that includes computer, telephone and supervisorstation. Call centre can be available 24 hours a day - whenthe customer wants to make a purchase, needs information, orsimply wishes to register a complaint.

  2. The Role of Hypothesis in Constructive Design Research

    OpenAIRE

    Bang, Anne Louise; Krogh, Peter; Ludvigsen, Martin; Markussen, Thomas

    2012-01-01

    It is, today, widely appreciated that Research-through-Design – or Constructive Design Research as we will call it in this paper – allows for designers to produce knowledge based on the skills and capacities of the design field itself.However, most of the research fails to bridge the gap between the general notions of constructive design research and the detailed research activities of the field. We therefore suggest bridging this methodological gap in the academic discussion with what we hav...

  3. On Notions of Security for Deterministic Encryption, and Efficient Constructions Without Random Oracles

    NARCIS (Netherlands)

    S. Boldyreva; S. Fehr (Serge); A. O'Neill; D. Wagner

    2008-01-01

    textabstractThe study of deterministic public-key encryption was initiated by Bellare et al. (CRYPTO ’07), who provided the “strongest possible” notion of security for this primitive (called PRIV) and constructions in the random oracle (RO) model. We focus on constructing efficient deterministic

  4. REPNET: project scheduling and workflow optimization for Construction Projects

    Directory of Open Access Journals (Sweden)

    Marco Alvise Bragadin

    2013-10-01

    Full Text Available Project planning and control are core processes for construction management. In practice project planning is achieved by network - based techniques like Precedence Diagramming Method (PDM.Indeed many researchers and practitioners claims that networking techniques as such do not provide a suitable model for construction projects. Construction process modeling should incorporate for specific features of resource flows through project activities. So an improved resource scheduling method for construction is developed, called REPNET, based on a precedence network plotted on a resource–space chart and presented with a flow-line chart. The heuristics of REPNET are used to carry out resource timing while optimizing processes flows and resource usage. The method has been tested on a sample project.

  5. A Novel Method for Generating Encryption Keys

    Directory of Open Access Journals (Sweden)

    Dascalescu Ana Cristina

    2009-12-01

    Full Text Available The development of the informational society, which has led to an impressive growth of the information volume circulating in the computer networks, has accelerated the evolution and especially the use of modern cryptography instruments. Today, the commercial products use standard cryptographic libraries that implement certified and tested cryptographic algorithms. Instead, the fragility ofencryption algorithms is given by compositional operations like key handling or key generation. In this sense, the article proposes an innovative method to generate pseudorandom numbers which can be used for the construction of secure stream encryption keys. The proposed method is based on the mathematical complements based on the algebra of the finite fields and uses a particularized structure of the linear feedback shift registers.

  6. Institutional dynamic of the call center industry in Denmark and France

    DEFF Research Database (Denmark)

    Sørensen, Ole H.; Beraud, Mathieu; Colin, Thierry

    2005-01-01

    The call centre development is substantially increasing in the most part of industrialized countries. Coming to the fore and seeking for staff, this sector is still looking for benchmarks, especially in terms of employment. Currently it can be said that the sector is under construction since its ...... to the specific micro and meso dynamic of this emerging industry. We base on a part of the first results obtained in a research on low wage initiated by the Russell Rage Foundation. More precisely we use the results from sectoral survey....

  7. Call cultures in orang-utans?

    Directory of Open Access Journals (Sweden)

    Serge A Wich

    Full Text Available BACKGROUND: Several studies suggested great ape cultures, arguing that human cumulative culture presumably evolved from such a foundation. These focused on conspicuous behaviours, and showed rich geographic variation, which could not be attributed to known ecological or genetic differences. Although geographic variation within call types (accents has previously been reported for orang-utans and other primate species, we examine geographic variation in the presence/absence of discrete call types (dialects. Because orang-utans have been shown to have geographic variation that is not completely explicable by genetic or ecological factors we hypothesized that this will be similar in the call domain and predict that discrete call type variation between populations will be found. METHODOLOGY/PRINCIPAL FINDINGS: We examined long-term behavioural data from five orang-utan populations and collected fecal samples for genetic analyses. We show that there is geographic variation in the presence of discrete types of calls. In exactly the same behavioural context (nest building and infant retrieval, individuals in different wild populations customarily emit either qualitatively different calls or calls in some but not in others. By comparing patterns in call-type and genetic similarity, we suggest that the observed variation is not likely to be explained by genetic or ecological differences. CONCLUSION/SIGNIFICANCE: These results are consistent with the potential presence of 'call cultures' and suggest that wild orang-utans possess the ability to invent arbitrary calls, which spread through social learning. These findings differ substantially from those that have been reported for primates before. First, the results reported here are on dialect and not on accent. Second, this study presents cases of production learning whereas most primate studies on vocal learning were cases of contextual learning. We conclude with speculating on how these findings might

  8. PRIMITIVE MATRICES AND GENERATORS OF PSEUDO RANDOM SEQUENCES OF GALOIS

    Directory of Open Access Journals (Sweden)

    A. Beletsky

    2014-04-01

    Full Text Available In theory and practice of information cryptographic protection one of the key problems is the forming a binary pseudo-random sequences (PRS with a maximum length with acceptable statistical characteristics. PRS generators are usually implemented by linear shift register (LSR of maximum period with linear feedback [1]. In this paper we extend the concept of LSR, assuming that each of its rank (memory cell can be in one of the following condition. Let’s call such registers “generalized linear shift register.” The research goal is to develop algorithms for constructing Galois and Fibonacci generalized matrix of n-order over the field , which uniquely determined both the structure of corresponding generalized of n-order LSR maximal period, and formed on their basis Galois PRS generators of maximum length. Thus the article presents the questions of formation the primitive generalized Fibonacci and Galois arbitrary order matrix over the prime field . The synthesis of matrices is based on the use of irreducible polynomials of degree and primitive elements of the extended field generated by polynomial. The constructing methods of Galois and Fibonacci conjugated primitive matrices are suggested. The using possibilities of such matrices in solving the problem of constructing generalized generators of Galois pseudo-random sequences are discussed.

  9. The dramatic extraction construction in French

    Directory of Open Access Journals (Sweden)

    Anne Abeillé

    2009-01-01

    Full Text Available Relying on spoken corpora (Corpaix, CRFP and on previous studies (Sabio 1995, 1996, we identify a construction common in spoken French, which we analyze as a particular case of extraction:a. dix sept ans il a. (Seventeen years he has [Corpaix]b. deux cigarettes j'ai fumé. (Two cigarettes I smoked [on the fly]The construction can only be a root clause and a declarative clause. Its interpretation is that of a thetic proposition. On the other hand, it is not associated with a unique information structure, since it is compatible with a focus-ground partition, with the extracted constotunet as a narrow focus, or with an all focus interpretation. We call this construction ‘dramatic extraction’, and the extracted element a ‘center’ (i.e. a focus or a figure. We formalize our analysis in the HPSG grammar.

  10. One Step Construction of Agrobacterium Recombination-ready-plasmids (OSCAR), an efficient and robust tool for ATMT based gene deletion construction in fungi

    Science.gov (United States)

    Increasing availability of genomic data and sophistication of analytical methodology in fungi has elevated the need for functional genomics tools in these organisms. Previously we reported a method called DelsGate for rapid preparation of deletion constructs for protoplast-mediated fungal transforma...

  11. Chaos-based hash function (CBHF) for cryptographic applications

    International Nuclear Information System (INIS)

    Amin, Mohamed; Faragallah, Osama S.; Abd El-Latif, Ahmed A.

    2009-01-01

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  12. Chaos-based hash function (CBHF) for cryptographic applications

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mohamed [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: mamin04@yahoo.com; Faragallah, Osama S. [Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952 (Egypt)], E-mail: osam_sal@yahoo.com; Abd El-Latif, Ahmed A. [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: ahmed_rahiem@yahoo.com

    2009-10-30

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  13. Improving the Healthiness of Sustainable Construction: Example of Polyvinyl Chloride (PVC

    Directory of Open Access Journals (Sweden)

    Emina Kristina Petrović

    2018-02-01

    Full Text Available With the increasing emphasis on sustainable construction, it has become important to better understand the impacts of common materials. This is especially paramount with the introduction of the United Nations (UN Sustainable Development Goals (SDGs which call for more comprehensive evaluations, adding many aspects of social consideration to the issues of environmental sustainability, including human health. Polyvinyl chloride (PVC/vinyl can be seen as a material with potential for significant adverse effects on a multiplicity of levels, and the construction industry is its single most significant consumer. This article presents a transdisciplinary review of adverse health impacts associated with PVC showing a number of issues: some that could be eliminated through design, but also some which appear inherent to the material itself and therefore unavoidable. The totality of issues revealed in relation to PVC presents a compelling case for a call for complete elimination of use of this material in sustainable construction.

  14. Recognition method of construction conflict based on driver's eye movement.

    Science.gov (United States)

    Xu, Yi; Li, Shiwu; Gao, Song; Tan, Derong; Guo, Dong; Wang, Yuqiong

    2018-04-01

    Drivers eye movement data in simulated construction conflicts at different speeds were collected and analyzed to find the relationship between the drivers' eye movement and the construction conflict. On the basis of the relationship between the drivers' eye movement and the construction conflict, the peak point of wavelet processed pupil diameter, the first point on the left side of the peak point and the first blink point after the peak point are selected as key points for locating construction conflict periods. On the basis of the key points and the GSA, a construction conflict recognition method so called the CCFRM is proposed. And the construction conflict recognition speed and location accuracy of the CCFRM are verified. The good performance of the CCFRM verified the feasibility of proposed key points in construction conflict recognition. Copyright © 2018 Elsevier Ltd. All rights reserved.

  15. The difficult medical emergency call

    DEFF Research Database (Denmark)

    Møller, Thea Palsgaard; Kjærulff, Thora Majlund; Viereck, Søren

    2017-01-01

    BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories and the ......BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories...... and the effect of categorization on mortality. METHODS: Register-based study in a 2-year period based on emergency call data from the emergency medical dispatch center in Copenhagen combined with nationwide register data. Logistic regression analysis (N = 78,040 individuals) was used for identification...

  16. BUSINESS MODELS FOR EXTENDING OF 112 EMERGENCY CALL CENTER CAPABILITIES WITH E-CALL FUNCTION INSERTION

    Directory of Open Access Journals (Sweden)

    Pop Dragos Paul

    2010-12-01

    Full Text Available The present article concerns present status of implementation in Romania and Europe of eCall service and the proposed business models regarding eCall function implementation in Romania. eCall system is used for reliable transmission in case of crush between In Vehicle System and Public Service Answering Point, via the voice channel of cellular and Public Switched Telephone Network (PSTN. eCall service could be initiated automatically or manual the driver. All data presented in this article are part of researches made by authors in the Sectorial Contract Implementation study regarding eCall system, having as partners ITS Romania and Electronic Solution, with the Romanian Ministry of Communication and Information Technology as beneficiary.

  17. Construction of the mathematical concept of pseudo thinking students

    Science.gov (United States)

    Anggraini, D.; Kusmayadi, T. A.; Pramudya, I.

    2018-05-01

    Thinking process is a process that begins with the acceptance of information, information processing and information calling in memory with structural changes that include concepts or knowledges. The concept or knowledge is individually constructed by each individual. While, students construct a mathematical concept, students may experience pseudo thinking. Pseudo thinking is a thinking process that results in an answer to a problem or construction to a concept “that is not true”. Pseudo thinking can be classified into two forms there are true pseudo and false pseudo. The construction of mathematical concepts in students of pseudo thinking should be immediately known because the error will have an impact on the next construction of mathematical concepts and to correct the errors it requires knowledge of the source of the error. Therefore, in this article will be discussed thinking process in constructing of mathematical concepts in students who experience pseudo thinking.

  18. Assessing call centers’ success:

    Directory of Open Access Journals (Sweden)

    Hesham A. Baraka

    2013-07-01

    This paper introduces a model to evaluate the performance of call centers based on the Delone and McLean Information Systems success model. A number of indicators are identified to track the call center’s performance. Mapping of the proposed indicators to the six dimensions of the D&M model is presented. A Weighted Call Center Performance Index is proposed to assess the call center performance; the index is used to analyze the effect of the identified indicators. Policy-Weighted approach was used to assume the weights with an analysis of different weights for each dimension. The analysis of the different weights cases gave priority to the User satisfaction and net Benefits dimension as the two outcomes from the system. For the input dimensions, higher priority was given to the system quality and the service quality dimension. Call centers decision makers can use the tool to tune the different weights in order to reach the objectives set by the organization. Multiple linear regression analysis was used in order to provide a linear formula for the User Satisfaction dimension and the Net Benefits dimension in order to be able to forecast the values for these two dimensions as function of the other dimensions

  19. Path Hopping: An MTD Strategy for Long-Term Quantum-Safe Communication

    Directory of Open Access Journals (Sweden)

    Reihaneh Safavi-Naini

    2018-01-01

    Full Text Available Moving target defense (MTD strategies have been widely studied for securing computer systems. We consider using MTD strategies to provide long-term cryptographic security for message transmission against an eavesdropping adversary who has access to a quantum computer. In such a setting, today’s widely used cryptographic systems including Diffie-Hellman key agreement protocol and RSA cryptosystem will be insecure and alternative solutions are needed. We will use a physical assumption, existence of multiple communication paths between the sender and the receiver, as the basis of security, and propose a cryptographic system that uses this assumption and an MTD strategy to guarantee efficient long-term information theoretic security even when only a single path is not eavesdropped. Following the approach of Maleki et al., we model the system using a Markov chain, derive its transition probabilities, propose two security measures, and prove results that show how to calculate these measures using transition probabilities. We define two types of attackers that we call risk-taking and risk-averse and compute our proposed measures for the two types of adversaries for a concrete MTD strategy. We will use numerical analysis to study tradeoffs between system parameters, discuss our results, and propose directions for future research.

  20. 78 FR 76218 - Rural Call Completion

    Science.gov (United States)

    2013-12-17

    ... calls to rural areas, and enforce restrictions against blocking, choking, reducing, or restricting calls... to alert the Commission of systemic problems receiving calls from a particular originating long... associated with completing calls to rural areas. These rules will also enhance our ability to enforce...

  1. Construction de définitions / construction de concept : vers une situation fondamentale pour la construction de définitions en mathématiques

    OpenAIRE

    Ouvrier-Buffet , Cécile

    2003-01-01

    Nicolas BALACHEFF – DR CNRS – Grenoble (président) Pierre DUCHET – DR CNRS – Paris 6 (rapporteur) Denise GRENIER – MCF – UJF, Grenoble (co-directrice) Sylvette MAURY – Professeur en Sciences de l'Education – Paris 5 Sorbonne (examinateur) Alain MERCIER – Professeur en Sciences de l'Education – INRP (rapporteur) Charles PAYAN – DR CNRS – Grenoble (co-directeur); Our research is interesting in situations of definitions-construction (called SDC); it plays a leading role in the usual mathematical...

  2. Long-distance calls in Neotropical primates

    Directory of Open Access Journals (Sweden)

    Oliveira Dilmar A.G.

    2004-01-01

    Full Text Available Long-distance calls are widespread among primates. Several studies concentrate on such calls in just one or in few species, while few studies have treated more general trends within the order. The common features that usually characterize these vocalizations are related to long-distance propagation of sounds. The proposed functions of primate long-distance calls can be divided into extragroup and intragroup ones. Extragroup functions relate to mate defense, mate attraction or resource defense, while intragroup functions involve group coordination or alarm. Among Neotropical primates, several species perform long-distance calls that seem more related to intragroup coordination, markedly in atelines. Callitrichids present long-distance calls that are employed both in intragroup coordination and intergroup contests or spacing. Examples of extragroup directed long-distance calls are the duets of titi monkeys and the roars and barks of howler monkeys. Considerable complexity and gradation exist in the long-distance call repertoires of some Neotropical primates, and female long-distance calls are probably more important in non-duetting species than usually thought. Future research must focus on larger trends in the evolution of primate long-distance calls, including the phylogeny of calling repertoires and the relationships between form and function in these signals.

  3. Proposals for Iterated Hash Functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2008-01-01

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against...... some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  4. Proposals for iterated hash functions

    DEFF Research Database (Denmark)

    Knudsen, Lars Ramkilde; Thomsen, Søren Steffen

    2006-01-01

    The past few years have seen an increase in the number of attacks on cryptographic hash functions. These include attacks directed at specific hash functions, and generic attacks on the typical method of constructing hash functions. In this paper we discuss possible methods for protecting against...... some generic attacks. We also give a concrete proposal for a new hash function construction, given a secure compression function which, unlike in typical existing constructions, is not required to be resistant to all types of collisions. Finally, we show how members of the SHA-family can be turned...

  5. Vectorial Resilient PC(l) of Order k Boolean Functions from AG-Codes

    Institute of Scientific and Technical Information of China (English)

    Hao CHEN; Liang MA; Jianhua LI

    2011-01-01

    Propagation criteria and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1- 4, 7, 8, 10, 11, 16]). Kurosawa, Stoh [8] and Carlet [1]gave a construction of Boolean functions satisfying PC(l) of order k from binary linear or nonlinear codes. In this paper, the algebraic-geometric codes over GF(2m) are used to modify the Carlet and Kurosawa-Satoh's construction for giving vectorial resilient Boolean functions satisfying PC(l) of order k criterion. This new construction is compared with previously known results.

  6. Hydromechanical properties of some mortars used in some ecologic construction techniques

    OpenAIRE

    Hoxha , Dashnor; Vladimir Nicolae , Ungureanu; Belayachi , Naima; Duc Phi , Do

    2012-01-01

    International audience; This paper presents results of hydromechanical characterization tests performed on some mortars used in eco-construction practice. Typically, such mortars could be found in buildings constructed following so called GREB technique that uses straw bales as structural and insulating elements in addition to a wood frame. The full experimental program includes thermal, mechanical and hydraulic - hygroscopic tests. Mechanical tests, including uniaxial compression test and th...

  7. CONSTRUCTED WETLAND TECHNOLOGY TO PREVENT WATER RESOURCES POLLUTION

    Directory of Open Access Journals (Sweden)

    Zeki Gökalp

    2016-07-01

    Full Text Available Discharge of untreated waste waters into surface waters creates significant pollution in these resources. Wastewaters are most of the time discharged into seas, rivers and other water bodies without any treatments due to high treatment costs both in Turkey and throughout the world. Constructed wetlands, also called as natural treatment systems, are used as an alternative treatment system to conventional high-cost treatment systems because of their low construction, operation and maintenance costs, energy demands, easy operation and low sludge generation. Today, constructed wetland systems are largely used to treat domestic wastewaters, agricultural wastewaters, industrial wastewater and runoff waters and ultimately to prevent water pollution and to improve water quality of receiving water bodies. In present study, currently implemented practices in design, construction, operation and maintenance of constructed wetlands were assessed and potential mistakes made in different phases these systems were pointed out and possible solutions were proposed to overcome these problems.

  8. Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Robert Brumnik

    2014-01-01

    Full Text Available The problem of arithmetic operations performance in number fields is actively researched by many scientists, as evidenced by significant publications in this field. In this work, we offer some techniques to increase performance of software implementation of finite field multiplication algorithm, for both 32-bit and 64-bit platforms. The developed technique, called “delayed carry mechanism,” allows to preventing necessity to consider a significant bit carry at each iteration of the sum accumulation loop. This mechanism enables reducing the total number of additions and applies the modern parallelization technologies effectively.

  9. A flexible framework for secure and efficient program obfuscation.

    Energy Technology Data Exchange (ETDEWEB)

    Solis, John Hector

    2013-03-01

    In this paper, we present a modular framework for constructing a secure and efficient program obfuscation scheme. Our approach, inspired by the obfuscation with respect to oracle machines model of [4], retains an interactive online protocol with an oracle, but relaxes the original computational and storage restrictions. We argue this is reasonable given the computational resources of modern personal devices. Furthermore, we relax the information-theoretic security requirement for computational security to utilize established cryptographic primitives. With this additional flexibility we are free to explore different cryptographic buildingblocks. Our approach combines authenticated encryption with private information retrieval to construct a secure program obfuscation framework. We give a formal specification of our framework, based on desired functionality and security properties, and provide an example instantiation. In particular, we implement AES in Galois/Counter Mode for authenticated encryption and the Gentry-Ramzan [13]constant communication-rate private information retrieval scheme. We present our implementation results and show that non-trivial sized programs can be realized, but scalability is quickly limited by computational overhead. Finally, we include a discussion on security considerations when instantiating specific modules.

  10. Sleep Quality of Call Handlers Employed in International Call Centers in National Capital Region of Delhi, India.

    Science.gov (United States)

    Raja, J D; Bhasin, S K

    2016-10-01

    Call center sector in India is a relatively new and fast growing industry driving employment and growth in modern India today. Most international call centers in National Capital Region (NCR) of Delhi operate at odd work hours corresponding to a time suitable fortheir international customers. The sleep quality of call handlers employed in these call centers is in jeopardy owing to their altered sleep schedule. To assess the sleep quality and determine its independent predictors among call handlers employed in international call centers in NCR of Delhi. A cross-sectional questionnaire-based study was conducted on 375 call handlers aged 18-39 years employed in international call centers in NCR of Delhi. Sleep quality was assessed using Athens Insomnia scale along with a pre-tested, structured questionnaire. The mean age of respondents was 24.6 (SD 2.4) years. 78% of participants were male. 83.5% of respondents were unmarried. 44.3% of call handlers were cigarette smokers. Physical ailments were reported by 37% call handlers. 77.6% of call handlers had somesuspicion of insomnia or suspected insomnia; the rest had no sleep problem. Smoking, poor social support, heavy workload, lack of relaxation facility at office, and prolonged travel time to office were independent predictors of sleep quality (pSafeguarding their health becomes an occupational health challenge to public health specialists.

  11. Doubts raised on the validity of construction and payment guarantees

    African Journals Online (AJOL)

    A construction company had been liquidated and the employer had called up the guarantee .... Due to the small size of the target populations in both the quantitative and qualitative ..... contingent liability that remains in terms of the guarantee.

  12. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Science.gov (United States)

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  13. Callings and Organizational Behavior

    Science.gov (United States)

    Elangovan, A. R.; Pinder, Craig C.; McLean, Murdith

    2010-01-01

    Current literature on careers, social identity and meaning in work tends to understate the multiplicity, historical significance, and nuances of the concept of calling(s). In this article, we trace the evolution of the concept from its religious roots into secular realms and develop a typology of interpretations using occupation and religious…

  14. Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph

    Directory of Open Access Journals (Sweden)

    Jae-wook Jang

    2015-01-01

    Full Text Available As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using features driven from the graph structure of their system calls. To achieve that, we first construct a system call graph that consists of system calls found in the execution of the individual malware families. To explore distinguishing features of various malware species, we study social network properties as applied to the call graph, including the degree distribution, degree centrality, average distance, clustering coefficient, network density, and component ratio. We utilize features driven from those properties to build a classifier for malware families. Our experimental results show that “influence-based” graph metrics such as the degree centrality are effective for classifying malware, whereas the general structural metrics of malware are less effective for classifying malware. Our experiments demonstrate that the proposed system performs well in detecting and classifying malware families within each malware class with accuracy greater than 96%.

  15. Probabilistic analysis in the life cycle management of construction deficiencies

    International Nuclear Information System (INIS)

    Zebroski, E.; Starr, C.

    1985-01-01

    The author discusses the urgent need for better systems and procedures for evaluating actual or suspected construction deficiencies in nuclear power plants. The following topics of interest are discussed: summary of tools available, use of plant-specific probabilistic risk assessments, general process for the rational management of construction deficiencies, rationales for the timing of required corrective actions, example of deficiency management in France, proposed screening process, deficiencies calling for corrective actions, institutional obstacles, and specific recommendations

  16. Spatio-Temporal Data Construction

    Directory of Open Access Journals (Sweden)

    Hai Ha Le

    2013-08-01

    Full Text Available On the route to a spatio-temporal geoscience information system, an appropriate data model for geo-objects in space and time has been developed. In this model, geo-objects are represented as sequences of geometries and properties with continuous evolution in each time interval. Because geomodeling software systems usually model objects at specific time instances, we want to interpolate the geometry and properties from two models of an object with only geometrical constraints (no physical or mechanical constraints. This process is called spatio-temporal data construction or morphological interpolation of intermediate geometries. This paper is strictly related to shape morphing, shape deformation, cross-parameterization and compatible remeshing and is only concerned with geological surfaces. In this study, two main sub-solutions construct compatible meshes and find trajectories in which vertices of the mesh evolve. This research aims to find an algorithm to construct spatio-temporal data with some constraints from the geosciences, such as cutting surfaces by faulting or fracturing phenomena and evolving boundaries attached to other surfaces. Another goal of this research is the implementation of the algorithm in a software product, namely a gOcad plug-in. The four main procedures of the algorithm are cutting the surfaces, setting up constraints, partitioning and calculating the parameterizations and trajectories. The software has been tested to construct data for a salt dome and other surfaces in regard to the geological processes of faulting, deposition and erosion. The result of this research is an algorithm and software for the construction of spatio-temporal data.

  17. Care and calls

    DEFF Research Database (Denmark)

    Paasch, Bettina Sletten

    -centred care through the use of tactile resources and embodied orientations while they attend to the phone call. Experienced nurses Thus perform multiactivity by distributing attention towards both the patient and the phone, and the analysis shows that their concrete ways of doing so depend on the complex...... they are telephoned during interactions with patients are not universal. Indeed different strategies have evolved in other hospital departments. Not only does this thesis contribute insights into the way nurses manage phone calls during interactions with patients, but by subscribing to a growing body of embodied...... of human interaction....

  18. Cryptanalysis of Tav-128 hash function

    DEFF Research Database (Denmark)

    Many RFID protocols use cryptographic hash functions for their security. The resource constrained nature of RFID systems forces the use of light weight cryptographic algorithms. Tav-128 is one such 128-bit light weight hash function proposed by Peris-Lopez et al. for a low-cost RFID tag...... authentication protocol. Apart from some statistical tests for randomness by the designers themselves, Tav-128 has not undergone any other thorough security analysis. Based on these tests, the designers claimed that Tav-128 does not posses any trivial weaknesses. In this article, we carry out the first third...... party security analysis of Tav-128 and show that this hash function is neither collision resistant nor second preimage resistant. Firstly, we show a practical collision attack on Tav-128 having a complexity of 237 calls to the compression function and produce message pairs of arbitrary length which...

  19. IMPLEMENTATION OF NEURAL - CRYPTOGRAPHIC SYSTEM USING FPGA

    Directory of Open Access Journals (Sweden)

    KARAM M. Z. OTHMAN

    2011-08-01

    Full Text Available Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. The design of the cryptography system is a conventional cryptography that uses one key for encryption and decryption process. The chosen cryptography algorithm is stream cipher algorithm that encrypt one bit at a time. The central problem in the stream-cipher cryptography is the difficulty of generating a long unpredictable sequence of binary signals from short and random key. Pseudo random number generators (PRNG have been widely used to construct this key sequence. The pseudo random number generator was designed using the Artificial Neural Networks (ANN. The Artificial Neural Networks (ANN providing the required nonlinearity properties that increases the randomness statistical properties of the pseudo random generator. The learning algorithm of this neural network is backpropagation learning algorithm. The learning process was done by software program in Matlab (software implementation to get the efficient weights. Then, the learned neural network was implemented using field programmable gate array (FPGA.

  20. Human cultures as niche constructions within the solar system

    NARCIS (Netherlands)

    Van de Vliert, Evert

    This commentary seeks to refine Kashima’s (2016) timely and topical but too-general call for embedding culture within the planetary ecosystem. My starting point is that cultures are to an underestimated extent ongoing niche constructions within the merry-go-round of the Sun’s radiation, the Earth’s

  1. Representation of individual elements of a complex call sequence in primary auditory cortex

    Directory of Open Access Journals (Sweden)

    Mark Nelson Wallace

    2013-10-01

    Full Text Available Conspecific communication calls can be rhythmic or contain extended, discontinuous series of either constant or frequency modulated harmonic tones and noise bursts separated by brief periods of silence. In the guinea pig, rhythmic calls can produce isomorphic responses within the primary auditory cortex (AI where single units respond to every call element. Other calls such as the chutter comprise a series of short irregular syllables that vary in their spectral content and are more like human speech. These calls can also evoke isomorphic responses, but may only do so in fields in the auditory belt and not in AI. Here we present evidence that cells in AI treat the individual elements within a syllable as separate auditory objects and respond selectively to one or a subset of them. We used a single chutter exemplar to compare single/multi-unit responses in the low-frequency portion of AI - AI(LF and the low-frequency part of the thalamic medial geniculate body - MGB(LF in urethane anaesthetised guinea pigs. Both thalamic and cortical cells responded with brief increases in firing rate to one, or more, of the 8 main elements present in the chutter call. Almost none of the units responded to all 8 elements. While there were many different combinations of responses to between one and five of the elements, MBG(LF and AI(LF neurons exhibited the same specific types of response combinations. Nearby units in the upper layers of the cortex tended to respond to similar combinations of elements while the deep layers were less responsive. Thus the responses from a number of AI units would need to be combined in order to represent the entire chutter call. Our results don’t rule out the possibility of constructive convergence but there was no evidence that a convergence of inputs within AI led to a complete representation of all eight elements.

  2. The Dangling model in the construction of compound sentences with regard to verb tenses

    Directory of Open Access Journals (Sweden)

    Mahmoud Mehravaran

    2016-02-01

    Full Text Available Abstract A sentence is the most complete syntactic unit of a language. The construction of a sentence is the most comprehensive, controversial and fascinating syntactic issue in the language grammar. The message or intention is usually conveyed through a sentence. In fact, the communicative function of a language is carried out via a sentence. A sentence can be classified in to different categories from different perspectives: semantically, constructively or performatively either with a verb or without a verb and also with regard to the construction. With regard to the construction, a sentence is either simple or compound. A simple sentence is the one with a complete meaning which only has one verb. It must be born in mind that a sentence is a complete unit whit meaning and there can be a hesitation after that. There for units of speech that have a verb without a complete meaning and there can be no silence or hesitation after them cannot be regarded as a sentence. Since they are dependent upon another sentence to be completed. They are called phrases. Such phrases can be incorporated in compound sentences make main and subordinate clauses. Compound sentences are widely discussed whit in grammatical constructions, but their types and that how have been built their various constructions are less adequately discussed. With regard to the manner of construction of compound sentences, the widest linguistic amenities can be observed in the sentences. There is not such complexity or disagreement over simple sentences but compound sentences have been less adequately investigated and there is room for more discussion and debate. Because, in some grammars, without considering the construction criteria, all sentences that are connected to one another, whit connectives are called compound sentences. This paper has precisely investigated compound sentences and has elaborated on the construction criteria of compound sentences. The study has also pointed to

  3. How to call the Fire Brigade

    CERN Multimedia

    2003-01-01

    The telephone numbers for the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from "wired" telephones, however, from mobile phones it leads to non-CERN emergency services.

  4. Using Semantic Similarity In Automated Call Quality Evaluator For Call Centers

    Directory of Open Access Journals (Sweden)

    Ria A. Sagum

    2015-08-01

    Full Text Available Conversation between the agent and client are being evaluated manually by a quality assurance officer QA. This job is only one of the responsibilities being done by a QA and particularly eat ups a lot of time for them which lead to late evaluation results that may cause untimely response of the company to concerns raised by their clients. This research developed an application software that automates and evaluates the quality assurance in business process outsourcing companies or customer service management implementing sentence similarity. The developed system includes two modules speaker diarization which includes transcription and question and answer extraction and similarity checker which checks the similarity between the extracted answer and the answer of the call center agent to a question. The system was evaluated for Correctness of the extracted answers and accurateness of the evaluation for a particular call. Audio conversations were tested for the accuracy of the transcription module which has an accuracy of 27.96. The Precision Recall and F-measure of the extracted answer was tested as 78.03 96.26 and 86.19 respectively. The Accuracy of the system in evaluating a call is 70.

  5. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Directory of Open Access Journals (Sweden)

    Laszlo B Kish

    Full Text Available Recently, Bennett and Riedel (BR (http://arxiv.org/abs/1303.7435v1 argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional security of the KLJN method has not been successfully challenged.

  6. Calling in Work: Secular or Sacred?

    Science.gov (United States)

    Steger, Michael F.; Pickering, N. K.; Shin, J. Y.; Dik, B. J.

    2010-01-01

    Recent scholarship indicates that people who view their work as a calling are more satisfied with their work and their lives. Historically, calling has been regarded as a religious experience, although modern researchers frequently have adopted a more expansive and secular conceptualization of calling, emphasizing meaning and personal fulfillment…

  7. The use of production management techniques in the construction of large scale physics detectors

    CERN Document Server

    Bazan, A; Estrella, F; Kovács, Z; Le Flour, T; Le Goff, J M; Lieunard, S; McClatchey, R; Murray, S; Varga, L Z; Vialle, J P; Zsenei, M

    1999-01-01

    The construction process of detectors for the Large Hadron Collider (LHC) experiments is large scale, heavily constrained by resource availability and evolves with time. As a consequence, changes in detector component design need to be tracked and quickly reflected in the construction process. With similar problems in industry engineers employ so-called Product Data Management (PDM) systems to control access to documented versions of designs and managers employ so- called Workflow Management software (WfMS) to coordinate production work processes. However, PDM and WfMS software are not generally integrated in industry. The scale of LHC experiments, like CMS, demands that industrial production techniques be applied in detector construction. This paper outlines the major functions and applications of the CRISTAL system (Cooperating Repositories and an information System for Tracking Assembly Lifecycles) in use in CMS which successfully integrates PDM and WfMS techniques in managing large scale physics detector ...

  8. Hornbills can distinguish between primate alarm calls.

    Science.gov (United States)

    Rainey, Hugo J.; Zuberbühler, Klaus; Slater, Peter J. B.

    2004-01-01

    Some mammals distinguish between and respond appropriately to the alarm calls of other mammal and bird species. However, the ability of birds to distinguish between mammal alarm calls has not been investigated. Diana monkeys (Cercopithecus diana) produce different alarm calls to two predators: crowned eagles (Stephanoaetus coronatus) and leopards (Panthera pardus). Yellow-casqued hornbills (Ceratogymna elata) are vulnerable to predation by crowned eagles but are not preyed on by leopards and might therefore be expected to respond to the Diana monkey eagle alarm call but not to the leopard alarm call. We compared responses of hornbills to playback of eagle shrieks, leopard growls, Diana monkey eagle alarm calls and Diana monkey leopard alarm calls and found that they distinguished appropriately between the two predator vocalizations as well as between the two Diana monkey alarm calls. We discuss possible mechanisms leading to these responses. PMID:15209110

  9. An analitical extended book review. S. Frunză: Advertising constructs reality (2014)

    OpenAIRE

    Ștefan Vlăduțescu; Mirela Teodorescu

    2014-01-01

    As communication axis, communication philosophy interrogates the idea that in postmodern society communication constructs reality. The philosopher is called to achieve a new synthesis, between philosophy and media communication, to assume the condition of man of media communication. Media has a decisive influence in relation to the constitution of reality in post-modern consciousness. Communication is related to relationships, to construct interhuman relationships, changing the attitudes of t...

  10. Construction of Subgame-Perfect Mixed Strategy Equilibria in Repeated Games

    NARCIS (Netherlands)

    Berg, Kimmo; Schoenmakers, Gijsbertus

    2017-01-01

    This paper examines how to construct subgame-perfect mixed-strategy equilibria in discounted repeated games with perfect monitoring.We introduce a relatively simple class of strategy profiles that are easy to compute and may give rise to a large set of equilibrium payoffs. These sets are called

  11. Construction of hydroelectric project generation: Focuses of the option value

    International Nuclear Information System (INIS)

    Villegas P, Clara Ines

    2002-01-01

    Work present work aims at the development of an analysis, that using the option value approach allows finding the optimal moment (from the environmental point of view), for the construction of an electrical project generation in a zone with determined environmental characteristics. The construction of the project, constitutes an irreversible decision and with uncertainty associated. The evolution of the environmental damage of the zone can be attracting through the variable C of environmental damage. The analysis developed here allows the characterization of a rule (or a barrier of environmental damage called C, which determines when, is optimal to construct the generation project or to conserve the ecosystems of the zone of location. Over this barrier, the construction of the project becomes optimal and below her the conservation of the ecosystems of the zone is privileged

  12. Incommensurability in Cross-Disciplinary Research: A Call for Cultural Negotiation

    Directory of Open Access Journals (Sweden)

    Anne MacCleave

    2006-06-01

    Full Text Available What happens when a clinical psychologist, a grounded theorist, an ethnographer, and a phenomenologist meet to collaborate on an interdisciplinary grant proposal on childhood loneliness? Excerpts of an imaginary dialogue reveal how different disciplines can be thought of as different “cultures,” because each has its own way of doing things, deeply embedded assumptions about knowledge and the construction/representation of reality, and different specialized languages. Some of these differences might be incommensurable and call for cultural negotiation if a coherent approach is to be adopted. Cultural negotiation helps to make differences more accessible and understandable rather than creating inflexible or polarized ideological camps. This process might help methodologists think about researching across disciplines in new and more effective ways.

  13. From nestling calls to fledgling silence: adaptive timing of change in response to aerial alarm calls.

    Science.gov (United States)

    Magrath, Robert D; Platzen, Dirk; Kondo, Junko

    2006-09-22

    Young birds and mammals are extremely vulnerable to predators and so should benefit from responding to parental alarm calls warning of danger. However, young often respond differently from adults. This difference may reflect: (i) an imperfect stage in the gradual development of adult behaviour or (ii) an adaptation to different vulnerability. Altricial birds provide an excellent model to test for adaptive changes with age in response to alarm calls, because fledglings are vulnerable to a different range of predators than nestlings. For example, a flying hawk is irrelevant to a nestling in a enclosed nest, but is dangerous to that individual once it has left the nest, so we predict that young develop a response to aerial alarm calls to coincide with fledging. Supporting our prediction, recently fledged white-browed scrubwrens, Sericornis frontalis, fell silent immediately after playback of their parents' aerial alarm call, whereas nestlings continued to calling despite hearing the playback. Young scrubwrens are therefore exquisitely adapted to the changing risks faced during development.

  14. Staffing to Maximize Profit for Call Centers with Impatient and Repeat-Calling Customers

    Directory of Open Access Journals (Sweden)

    Jun Gong

    2015-01-01

    Full Text Available Motivated by call center practice, we study the optimal staffing of many-server queues with impatient and repeat-calling customers. A call center is modeled as an M/M/s+M queue, which is developed to a behavioral queuing model in which customers come and go based on their satisfaction with waiting time. We explicitly take into account customer repeat behavior, which implies that satisfied customers might return and have an impact on the arrival rate. Optimality is defined as the number of agents that maximize revenues net of staffing costs, and we account for the characteristic that revenues are a direct function of staffing. Finally, we use numerical experiments to make certain comparisons with traditional models that do not consider customer repeat behavior. Furthermore, we indicate how managers might allocate staffing optimally with various customer behavior mechanisms.

  15. Branding Icarus: The Construction of Identity and Diversity at The United States Air Force Academy

    Science.gov (United States)

    2015-06-01

    in the RAAF, Australia’s Sex Discrimina- tion Commissioner Elizabeth Broderick provided further insight into the construction of these five critical...Weber. 60 Unpublished statement by Elizabeth Broderick at Chief of Air Force New Horizon Call, RAAF... Broderick , Elizabeth. Unpublished Statement at Chief of Air Force New Horizon Call, Royal Australian Air Force Base Glenbrook, August 2013

  16. Ubiquitous mobile knowledge construction in collaborative learning environments.

    Science.gov (United States)

    Baloian, Nelson; Zurita, Gustavo

    2012-01-01

    Knowledge management is a critical activity for any organization. It has been said to be a differentiating factor and an important source of competitiveness if this knowledge is constructed and shared among its members, thus creating a learning organization. Knowledge construction is critical for any collaborative organizational learning environment. Nowadays workers must perform knowledge creation tasks while in motion, not just in static physical locations; therefore it is also required that knowledge construction activities be performed in ubiquitous scenarios, and supported by mobile and pervasive computational systems. These knowledge creation systems should help people in or outside organizations convert their tacit knowledge into explicit knowledge, thus supporting the knowledge construction process. Therefore in our understanding, we consider highly relevant that undergraduate university students learn about the knowledge construction process supported by mobile and ubiquitous computing. This has been a little explored issue in this field. This paper presents the design, implementation, and an evaluation of a system called MCKC for Mobile Collaborative Knowledge Construction, supporting collaborative face-to-face tacit knowledge construction and sharing in ubiquitous scenarios. The MCKC system can be used by undergraduate students to learn how to construct knowledge, allowing them anytime and anywhere to create, make explicit and share their knowledge with their co-learners, using visual metaphors, gestures and sketches to implement the human-computer interface of mobile devices (PDAs).

  17. Functional Interaction Network Construction and Analysis for Disease Discovery.

    Science.gov (United States)

    Wu, Guanming; Haw, Robin

    2017-01-01

    Network-based approaches project seemingly unrelated genes or proteins onto a large-scale network context, therefore providing a holistic visualization and analysis platform for genomic data generated from high-throughput experiments, reducing the dimensionality of data via using network modules and increasing the statistic analysis power. Based on the Reactome database, the most popular and comprehensive open-source biological pathway knowledgebase, we have developed a highly reliable protein functional interaction network covering around 60 % of total human genes and an app called ReactomeFIViz for Cytoscape, the most popular biological network visualization and analysis platform. In this chapter, we describe the detailed procedures on how this functional interaction network is constructed by integrating multiple external data sources, extracting functional interactions from human curated pathway databases, building a machine learning classifier called a Naïve Bayesian Classifier, predicting interactions based on the trained Naïve Bayesian Classifier, and finally constructing the functional interaction database. We also provide an example on how to use ReactomeFIViz for performing network-based data analysis for a list of genes.

  18. The Dangling model in the construction of compound sentences with regard to verb tenses

    Directory of Open Access Journals (Sweden)

    Mahmoud Mehravaran

    2016-01-01

    Full Text Available Abstract A sentence is the most complete syntactic unit of a language. The construction of a sentence is the most comprehensive, controversial and fascinating syntactic issue in the language grammar. The message or intention is usually conveyed through a sentence. In fact, the communicative function of a language is carried out via a sentence. A sentence can be classified in to different categories from different perspectives: semantically, constructively or performatively either with a verb or without a verb and also with regard to the construction. With regard to the construction, a sentence is either simple or compound. A simple sentence is the one with a complete meaning which only has one verb. It must be born in mind that a sentence is a complete unit whit meaning and there can be a hesitation after that. There for units of speech that have a verb without a complete meaning and there can be no silence or hesitation after them cannot be regarded as a sentence. Since they are dependent upon another sentence to be completed. They are called phrases. Such phrases can be incorporated in compound sentences make main and subordinate clauses. Compound sentences are widely discussed whit in grammatical constructions, but their types and that how have been built their various constructions are less adequately discussed. With regard to the manner of construction of compound sentences, the widest linguistic amenities can be observed in the sentences. There is not such complexity or disagreement over simple sentences but compound sentences have been less adequately investigated and there is room for more discussion and debate. Because, in some grammars, without considering the construction criteria, all sentences that are connected to one another, whit connectives are called compound sentences. This paper has precisely investigated compound sentences and has elaborated on the construction criteria of compound sentences. The study has also pointed to

  19. Peafowl antipredator calls encode information about signalers.

    Science.gov (United States)

    Yorzinski, Jessica L

    2014-02-01

    Animals emit vocalizations that convey information about external events. Many of these vocalizations, including those emitted in response to predators, also encode information about the individual that produced the call. The relationship between acoustic features of antipredator calls and information relating to signalers (including sex, identity, body size, and social rank) were examined in peafowl (Pavo cristatus). The "bu-girk" antipredator calls of male and female peafowl were recorded and 20 acoustic parameters were automatically extracted from each call. Both the bu and girk elements of the antipredator call were individually distinctive and calls were classified to the correct signaler with over 90% and 70% accuracy in females and males, respectively. Females produced calls with a higher fundamental frequency (F0) than males. In both females and males, body size was negatively correlated with F0. In addition, peahen rank was related to the duration, end mean frequency, and start harmonicity of the bu element. Peafowl antipredator calls contain detailed information about the signaler and can potentially be used by receivers to respond to dangerous situations.

  20. WDM Multicast Tree Construction Algorithms and Their Comparative Evaluations

    Science.gov (United States)

    Makabe, Tsutomu; Mikoshi, Taiju; Takenaka, Toyofumi

    We propose novel tree construction algorithms for multicast communication in photonic networks. Since multicast communications consume many more link resources than unicast communications, effective algorithms for route selection and wavelength assignment are required. We propose a novel tree construction algorithm, called the Weighted Steiner Tree (WST) algorithm and a variation of the WST algorithm, called the Composite Weighted Steiner Tree (CWST) algorithm. Because these algorithms are based on the Steiner Tree algorithm, link resources among source and destination pairs tend to be commonly used and link utilization ratios are improved. Because of this, these algorithms can accept many more multicast requests than other multicast tree construction algorithms based on the Dijkstra algorithm. However, under certain delay constraints, the blocking characteristics of the proposed Weighted Steiner Tree algorithm deteriorate since some light paths between source and destinations use many hops and cannot satisfy the delay constraint. In order to adapt the approach to the delay-sensitive environments, we have devised the Composite Weighted Steiner Tree algorithm comprising the Weighted Steiner Tree algorithm and the Dijkstra algorithm for use in a delay constrained environment such as an IPTV application. In this paper, we also give the results of simulation experiments which demonstrate the superiority of the proposed Composite Weighted Steiner Tree algorithm compared with the Distributed Minimum Hop Tree (DMHT) algorithm, from the viewpoint of the light-tree request blocking.

  1. Completion of cathode strip chamber (CSC) installation on the so-called YE+2 wheel of CMS on March 2005.

    CERN Multimedia

    Tejinder S. Virdee

    2005-01-01

    The pictures have been taken in the CMS construction hall in Cessy (neighbouring France), called SX5, in March 2005 and show the status of cathode strip chamber (CSC) assembly on the yoke disk YE+2. The chambers are labelled ME+3 and their installation has been completed on March 16th, 2005.

  2. BUFO PARDALIS (ANURA: BUFONIDAE): MATING CALL AND ...

    African Journals Online (AJOL)

    the calls of one of these species, Bufo pardalis. Hewitt, were not analysed by Tandy & Keith. (1972). Furthennore there is some confusion in the literature regarding the mating call of this species. For these reasons this mating call is here clarified. The mating call of B. pardaiis was first described by Ranger (in Hewitt 1935) as ...

  3. Impact of mobility on call block, call drops and optimal cell size in small cell networks

    OpenAIRE

    Ramanath , Sreenath; Voleti , Veeraruna Kavitha; Altman , Eitan

    2011-01-01

    We consider small cell networks and study the impact of user mobility. Assuming Poisson call arrivals at random positions with random velocities, we discuss the characterization of handovers at the boundaries. We derive explicit expressions for call block and call drop probabilities using tools from spatial queuing theory. We also derive expressions for the average virtual server held up time. These expressions are used to derive optimal cell sizes for various profile of velocities in small c...

  4. External GSM phone calls now made simpler

    CERN Multimedia

    2007-01-01

    On 2 July, the IT/CS Telecom Service introduced a new service making external calls from CERN GSM phones easier. A specific prefix is no longer needed for calls outside CERN. External calls from CERN GSM phones are to be simplified. It is no longer necessary to use a special prefix to call an external number from the CERN GSM network.The Telecom Section of the IT/CS Group is introducing a new system that will make life easier for GSM users. It is no longer necessary to use a special prefix (333) to call an external number from the CERN GSM network. Simply dial the number directly like any other Swiss GSM customer. CERN currently has its own private GSM network with the Swiss mobile operator, Sunrise, covering the whole of Switzerland. This network was initially intended exclusively for calls between CERN numbers (replacing the old beeper system). A special system was later introduced for external calls, allowing them to pass thr...

  5. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies.

    Science.gov (United States)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew; Gautier, Laurent; Willis, Scooter; Fields, Christopher; Katayama, Toshiaki

    2012-01-01

    Open-source software (OSS) encourages computer programmers to reuse software components written by others. In evolutionary bioinformatics, OSS comes in a broad range of programming languages, including C/C++, Perl, Python, Ruby, Java, and R. To avoid writing the same functionality multiple times for different languages, it is possible to share components by bridging computer languages and Bio* projects, such as BioPerl, Biopython, BioRuby, BioJava, and R/Bioconductor. In this chapter, we compare the two principal approaches for sharing software between different programming languages: either by remote procedure call (RPC) or by sharing a local call stack. RPC provides a language-independent protocol over a network interface; examples are RSOAP and Rserve. The local call stack provides a between-language mapping not over the network interface, but directly in computer memory; examples are R bindings, RPy, and languages sharing the Java Virtual Machine stack. This functionality provides strategies for sharing of software between Bio* projects, which can be exploited more often. Here, we present cross-language examples for sequence translation, and measure throughput of the different options. We compare calling into R through native R, RSOAP, Rserve, and RPy interfaces, with the performance of native BioPerl, Biopython, BioJava, and BioRuby implementations, and with call stack bindings to BioJava and the European Molecular Biology Open Software Suite. In general, call stack approaches outperform native Bio* implementations and these, in turn, outperform RPC-based approaches. To test and compare strategies, we provide a downloadable BioNode image with all examples, tools, and libraries included. The BioNode image can be run on VirtualBox-supported operating systems, including Windows, OSX, and Linux.

  6. Call Duration Characteristics based on Customers Location

    Directory of Open Access Journals (Sweden)

    Žvinys Karolis

    2014-05-01

    Full Text Available Nowadays a lot of different researches are performed based on call duration distributions (CDD analysis. However, the majority of studies are linked with social relationships between the people. Therefore the scarcity of information, how the call duration is associated with a user's location, is appreciable. The goal of this paper is to reveal the ties between user's voice call duration and the location of call. For this reason we analyzed more than 5 million calls from real mobile network, which were made over the base stations located in rural areas, roads, small towns, business and entertainment centers, residential districts. According to these site types CDD’s and characteristic features for call durations are given and discussed. Submitted analysis presents the users habits and behavior as a group (not an individual. The research showed that CDD’s of customers being them in different locations are not equal. It has been found that users at entertainment, business centers are tend to talk much shortly, than people being at home. Even more CDD can be distorted strongly, when machinery calls are evaluated. Hence to apply a common CDD for a whole network it is not recommended. The study also deals with specific parameters of call duration for distinguished user groups, the influence of network technology for call duration is considered.

  7. A.S.N. regulation of Flamanville 3 EPR construction

    International Nuclear Information System (INIS)

    Limousin, S.

    2009-01-01

    The EPR authorization decree for Flamanville 3 was issued by the French government (decree no. 2007-534) on the 10 April 2007. The construction activities are going on in the manufacturer workshops and at Flamanville site. The decree published in November 2007, and related to the so called TSN law (the nuclear transparency and safety nuclear law published in 2006), specifies that the commissioning licence (the agreement for first fuel load) has to be granted by an ASN decision on the basis of the assessment of the demonstration of the plant safety. In this aim, one part of ASN's work is to review, with its technical sup-port organisation (IRSN), the reactor construction in order to appreciate the safety level of the construction activities. This paper describes ASN's strategy for the regulation of Flamanville 3 EPR construction activities, endorsed by ASN commission at the end of November 2007, and the main events which have occurred on Flamanville site since the beginning of the construction. The article presents the main ASN conclusions of this regulation at this time. (author)

  8. Additive Manufacturing of Biomedical Constructs with Biomimetic Structural Organizations.

    Science.gov (United States)

    Li, Xiao; He, Jiankang; Zhang, Weijie; Jiang, Nan; Li, Dichen

    2016-11-09

    Additive manufacturing (AM), sometimes called three-dimensional (3D) printing, has attracted a lot of research interest and is presenting unprecedented opportunities in biomedical fields, because this technology enables the fabrication of biomedical constructs with great freedom and in high precision. An important strategy in AM of biomedical constructs is to mimic the structural organizations of natural biological organisms. This can be done by directly depositing cells and biomaterials, depositing biomaterial structures before seeding cells, or fabricating molds before casting biomaterials and cells. This review organizes the research advances of AM-based biomimetic biomedical constructs into three major directions: 3D constructs that mimic tubular and branched networks of vasculatures; 3D constructs that contains gradient interfaces between different tissues; and 3D constructs that have different cells positioned to create multicellular systems. Other recent advances are also highlighted, regarding the applications of AM for organs-on-chips, AM-based micro/nanostructures, and functional nanomaterials. Under this theme, multiple aspects of AM including imaging/characterization, material selection, design, and printing techniques are discussed. The outlook at the end of this review points out several possible research directions for the future.

  9. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    cryptography was thus concerned with message confidentiality and integrity. Modern cryptography cover a much wider range of subjects including the area of secure multiparty computation, which will be the main topic of this dissertation. Our first contribution is a new protocol for secure comparison, presented...... implemented the comparison protocol in Java and benchmarks show that is it highly competitive and practical. The biggest contribution of this dissertation is a general framework for secure multiparty computation. Instead of making new ad hoc implementations for each protocol, we want a single and extensible...... in Chapter 2. Comparisons play a key role in many systems such as online auctions and benchmarks — it is not unreasonable to say that when parties come together for a multiparty computation, it is because they want to make decisions that depend on private information. Decisions depend on comparisons. We have...

  10. Wireless, amphibious theory for reinforcement learning

    Science.gov (United States)

    Li, Jinci

    2013-10-01

    Cryptographers agree that heterogeneous information are an interesting new topic in the field of cryptography, and biologists concur. Given the current status of stochastic epistemologies, security experts clearly desire the construction of flip-flop gates [1, 2, 3]. Mungo, our new system for authenticated algorithms, is the solution to all of these challenges. Though such a hypothesis at first glance seems perverse, it has ample historical precedence.

  11. Care and Calls

    DEFF Research Database (Denmark)

    Paasch, Bettina Sletten

    on the enactment of care but also on patient safety. Nurses working in various hospital departments have developed different strategies for handling mobile phone calls when with a patient. Additional research into the ways nurses successfully or unsuccessfully enact care and ensure patient safety when they answer......In Danish hospitals, nurses have been equipped with a mobile work phone to improve their availability and efficiency. On the phones nurses receive internal and external phone conversations, patient calls, and alarms from electronic surveillance equipment. For safety reasons the phones cannot...... be switched off or silenced; they consequently ring during all activities and also during interactions with patients. A possible tension thus arises when nurses have to be both caring and sensitive towards the patient and simultaneously be efficient and available and answer their phone. The present paper...

  12. Calling under pressure: short-finned pilot whales make social calls during deep foraging dives.

    Science.gov (United States)

    Jensen, Frants H; Perez, Jacobo Marrero; Johnson, Mark; Soto, Natacha Aguilar; Madsen, Peter T

    2011-10-22

    Toothed whales rely on sound to echolocate prey and communicate with conspecifics, but little is known about how extreme pressure affects pneumatic sound production in deep-diving species with a limited air supply. The short-finned pilot whale (Globicephala macrorhynchus) is a highly social species among the deep-diving toothed whales, in which individuals socialize at the surface but leave their social group in pursuit of prey at depths of up to 1000 m. To investigate if these animals communicate acoustically at depth and test whether hydrostatic pressure affects communication signals, acoustic DTAGs logging sound, depth and orientation were attached to 12 pilot whales. Tagged whales produced tonal calls during deep foraging dives at depths of up to 800 m. Mean call output and duration decreased with depth despite the increased distance to conspecifics at the surface. This shows that the energy content of calls is lower at depths where lungs are collapsed and where the air volume available for sound generation is limited by ambient pressure. Frequency content was unaffected, providing a possible cue for group or species identification of diving whales. Social calls may be important to maintain social ties for foraging animals, but may be impacted adversely by vessel noise.

  13. Do market participants learn from conference calls?

    NARCIS (Netherlands)

    Roelofsen, E.; Verbeeten, F.; Mertens, G.

    2014-01-01

    We examine whether market participants learn from the information that is disseminated during the Q-and-A section of conference calls. Specifically, we investigate whether stock prices react to information on intangible assets provided during conference calls, and whether conference calls

  14. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2002-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.  

  15. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2002-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  16. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  17. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note: the number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  18. Telephone calls by individuals with cancer.

    Science.gov (United States)

    Flannery, Marie; McAndrews, Leanne; Stein, Karen F

    2013-09-01

    To describe symptom type and reporting patterns found in spontaneously initiated telephone calls placed to an ambulatory cancer center practice. Retrospective, descriptive. Adult hematology oncology cancer center. 563 individuals with a wide range of oncology diagnoses who initiated 1,229 telephone calls to report symptoms. Raw data were extracted from telephone forms using a data collection sheet with 23 variables obtained for each phone call, using pre-established coding criteria. A literature-based, investigator-developed instrument was used for the coding criteria and selection of which variables to extract. Symptom reporting, telephone calls, pain, and symptoms. A total of 2,378 symptoms were reported by telephone during the four months. At least 10% of the sample reported pain (38%), fatigue (16%), nausea (16%), swelling (12%), diarrhea (12%), dyspnea (10%), and anorexia (10%). The modal response was to call only one time and to report only one symptom (55%). Pain emerged as the symptom that most often prompted an individual to pick up the telephone and call. Although variation was seen in symptom reporting, an interesting pattern emerged with an individual reporting on a solitary symptom in a single telephone call. The emergence of pain as the primary symptom reported by telephone prompted educational efforts for both in-person clinic visit management of pain and prioritizing nursing education and protocol management of pain reported by telephone. Report of symptoms by telephone can provide nurses unique insight into patient-centered needs. Although pain has been an important focus of education and research for decades, it remains a priority for individuals with cancer. A wide range in symptom reporting by telephone was evident.

  19. Outsourcing an Effective Postdischarge Call Program

    Science.gov (United States)

    Meek, Kevin L.; Williams, Paula; Unterschuetz, Caryn J.

    2018-01-01

    To improve patient satisfaction ratings and decrease readmissions, many organizations utilize internal staff to complete postdischarge calls to recently released patients. Developing, implementing, monitoring, and sustaining an effective call program can be challenging and have eluded some of the renowned medical centers in the country. Using collaboration with an outsourced vendor to bring state-of-the-art call technology and staffed with specially trained callers, health systems can achieve elevated levels of engagement and satisfaction for their patients postdischarge. PMID:29494453

  20. Calling to Nursing: Concept Analysis.

    Science.gov (United States)

    Emerson, Christie

    The aims of this article are (a) to analyze the concept of a calling as it relates nursing and (b) to develop a definition of calling to nursing with the detail and clarity needed to guide reliable and valid research. The classic steps described by Walker and Avant are used for the analysis. Literature from several disciplines is reviewed including vocational psychology, Christian career counseling, sociology, organizational management, and nursing. The analysis provides an operational definition of a calling to nursing and establishes 3 defining attributes of the concept: (a) a passionate intrinsic motivation or desire (perhaps with a religious component), (b) an aspiration to engage in nursing practice, as a means of fulfilling one's purpose in life, and (c) the desire to help others as one's purpose in life. Antecedents to the concept are personal introspection and cognitive awareness. Positive consequences to the concept are improved work meaningfulness, work engagement, career commitment, personal well-being, and satisfaction. Negative consequences of having a calling might include willingness to sacrifice well-being for work and problems with work-life balance. Following the concept analysis, philosophical assumptions, contextual factors, interdisciplinary work, research opportunities, and practice implications are discussed.

  1. Metaphor Analysis and the Construction of Gender

    Directory of Open Access Journals (Sweden)

    Rudolf Schmitt

    2009-02-01

    Full Text Available Recently there has been an increasing number of studies on the construction of gender based on metaphors (KOLLER, 2004a, 2004b, 2005; ANDERSON VASBY & HORN SHEELER, 2005; EBELING & SCHMITZ, 2006; BOCK VON WÜLFINGEN, 2007. Many of these studies seem to have overlooked one of the most thoroughly developed theories of metaphor, LAKOFF and JOHNSON's so-called cognitive theory of metaphor or limited themselves to LAKOFF and JOHNSON's first book from 1980. In this article I explore current research on metaphor and gender and sketch the central topics of the cognitive theory of metaphor and develop a revision of this theory. It is hoped that this will enhance further research in metaphor analysis concerning the construction of gender. URN: urn:nbn:de:0114-fqs0902167

  2. A program for constructing finitely presented Lie algebras and superalgebras

    International Nuclear Information System (INIS)

    Gerdt, V.P.; Kornyak, V.V.

    1997-01-01

    The purpose of this paper is to describe a C program FPLSA for investigating finitely presented Lie algebras and superalgebras. The underlying algorithm is based on constructing the complete set of relations called also standard basis or Groebner basis of ideal of free Lie (super) algebra generated by the input set of relations. The program may be used, in particular, to compute the Lie (super)algebra basis elements and its structure constants, to classify the finitely presented algebras depending on the values of parameters in the relations, and to construct the Hilbert series. These problems are illustrated by examples. (orig.)

  3. EMERGENCY CALLS

    CERN Multimedia

    Medical Service

    2001-01-01

    IN URGENT NEED OF A DOCTOR GENEVA EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME, open 24h/24h 748-49-50 Association Of Geneva Doctors Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin EMERGENCIES 719-61-11 URGENCES PEDIATRIQUES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112 FRANCE EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ANTI-POISONS CENTRE Open 24h/24h 04-72-11-69-11 All doctors ...

  4. Construction of Discrete Time Shadow Price

    International Nuclear Information System (INIS)

    Rogala, Tomasz; Stettner, Lukasz

    2015-01-01

    In the paper expected utility from consumption over finite time horizon for discrete time markets with bid and ask prices and strictly concave utility function is considered. The notion of weak shadow price, i.e. an illiquid price, depending on the portfolio, under which the model without bid and ask price is equivalent to the model with bid and ask price is introduced. Existence and the form of weak shadow price is shown. Using weak shadow price usual (called in the paper strong) shadow price is then constructed

  5. TPMG Northern California appointments and advice call center.

    Science.gov (United States)

    Conolly, Patricia; Levine, Leslie; Amaral, Debra J; Fireman, Bruce H; Driscoll, Tom

    2005-08-01

    Kaiser Permanente (KP) has been developing its use of call centers as a way to provide an expansive set of healthcare services to KP members efficiently and cost effectively. Since 1995, when The Permanente Medical Group (TPMG) began to consolidate primary care phone services into three physical call centers, the TPMG Appointments and Advice Call Center (AACC) has become the "front office" for primary care services across approximately 89% of Northern California. The AACC provides primary care phone service for approximately 3 million Kaiser Foundation Health Plan members in Northern California and responds to approximately 1 million calls per month across the three AACC sites. A database records each caller's identity as well as the day, time, and duration of each call; reason for calling; services provided to callers as a result of calls; and clinical outcomes of calls. We here summarize this information for the period 2000 through 2003.

  6. Summary Report on Unconditionally Secure Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Cachin, Christian

    This document describes the state of the art snd some of the main open problems in the area of unconditionally secure cryptographic protocols. The most essential part of a cryptographic protocol is not its being secure. Imagine a cryptographic protocol which is secure, but where we do not know...... that it is secure. Such a protocol would do little in providing security. When all comes to all, cryptographic security is done for the sake of people, and the essential part of security is for people what it has always been, namely to feel secure. To feel secure employing a given cryptographic protocol we need...... to know that is is secure. I.e. we need a proof that it is secure. Today the proof of security of essentially all practically employed cryptographic protocols relies on computational assumptions. To prove that currently employed ways to communicate securely over the Internet are secure we e.g. need...

  7. Evolution of advertisement calls in African clawed frogs

    Science.gov (United States)

    Tobias, Martha L.; Evans, Ben J.; Kelley, Darcy B.

    2014-01-01

    Summary For most frogs, advertisement calls are essential for reproductive success, conveying information on species identity, male quality, sexual state and location. While the evolutionary divergence of call characters has been examined in a number of species, the relative impacts of genetic drift or natural and sexual selection remain unclear. Insights into the evolutionary trajectory of vocal signals can be gained by examining how advertisement calls vary in a phylogenetic context. Evolution by genetic drift would be supported if more closely related species express more similar songs. Conversely, a poor correlation between evolutionary history and song expression would suggest evolution shaped by natural or sexual selection. Here, we measure seven song characters in 20 described and two undescribed species of African clawed frogs (genera Xenopus and Silurana) and four populations of X. laevis. We identify three call types — click, burst and trill — that can be distinguished by click number, call rate and intensity modulation. A fourth type is biphasic, consisting of two of the above. Call types vary in complexity from the simplest, a click, to the most complex, a biphasic call. Maximum parsimony analysis of variation in call type suggests that the ancestral type was of intermediate complexity. Each call type evolved independently more than once and call type is typically not shared by closely related species. These results indicate that call type is homoplasious and has low phylogenetic signal. We conclude that the evolution of call type is not due to genetic drift, but is under selective pressure. PMID:24723737

  8. Metaphor Analysis and the Construction of Gender

    OpenAIRE

    Rudolf Schmitt

    2009-01-01

    Recently there has been an increasing number of studies on the construction of gender based on metaphors (KOLLER, 2004a, 2004b, 2005; ANDERSON VASBY & HORN SHEELER, 2005; EBELING & SCHMITZ, 2006; BOCK VON WÜLFINGEN, 2007). Many of these studies seem to have overlooked one of the most thoroughly developed theories of metaphor, LAKOFF and JOHNSON's so-called cognitive theory of metaphor or limited themselves to LAKOFF and JOHNSON's first book from 1980. In this article I explore current researc...

  9. Entrepreneurship research and practice: a call to action for psychology.

    Science.gov (United States)

    Hisrich, Robert; Langan-Fox, Janice; Grant, Sharon

    2007-09-01

    Entrepreneurship is a major source of employment, economic growth, and innovation, promoting product and service quality, competition, and economic flexibility. It is also a mechanism by which many people enter the society's economic and social mainstream, aiding culture formation, population integration, and social mobility. This article aims to illuminate research opportunities for psychologists by exposing gaps in the entrepreneurship literature and describing how these gaps can be filled. A "call to action" is issued to psychologists to develop theory and undertake empirical research focusing on five key topic areas: the personality characteristics of entrepreneurs, the psychopathology of entrepreneurs, entrepreneurial cognition, entrepreneurship education, and international entrepreneurship. Methodological issues are discussed and recommendations provided. It is shown that psychologists can help identify the factors that influence new venture creation and success and inform the construction of public policy to facilitate entrepreneurship.

  10. The construction of a Concept called Regulation

    Directory of Open Access Journals (Sweden)

    María José Campanelli Espíndola

    2014-12-01

    Full Text Available The following analysis is directed to study “regulation” from the legal, economic and social aspects of compared law minding diverse legal systems and regimes. The methodology of investigation for this exercise begins by comparing the different thesis and main propositions on the concept of regulation in different legal orders and systems.

  11. Efficient Approximate JavaScript Call Graph Construction

    NARCIS (Netherlands)

    S. Benschop

    2014-01-01

    htmlabstractJavaScript has seen an increase in popularity in the last few years, both in the browser as well as on other platforms such as Node.js. However, the tools to help developers reason about JavaScript code remain fairly barebone in comparison with tooling for static languages such as Java.

  12. Temporal Statistical Analysis of Degree Distributions in an Undirected Landline Phone Call Network Graph Series

    Directory of Open Access Journals (Sweden)

    Orgeta Gjermëni

    2017-10-01

    Full Text Available This article aims to provide new results about the intraday degree sequence distribution considering phone call network graph evolution in time. More specifically, it tackles the following problem. Given a large amount of landline phone call data records, what is the best way to summarize the distinct number of calling partners per client per day? In order to answer this question, a series of undirected phone call network graphs is constructed based on data from a local telecommunication source in Albania. All network graphs of the series are simplified. Further, a longitudinal temporal study is made on this network graphs series related to the degree distributions. Power law and log-normal distribution fittings on the degree sequence are compared on each of the network graphs of the series. The maximum likelihood method is used to estimate the parameters of the distributions, and a Kolmogorov–Smirnov test associated with a p-value is used to define the plausible models. A direct distribution comparison is made through a Vuong test in the case that both distributions are plausible. Another goal was to describe the parameters’ distributions’ shape. A Shapiro-Wilk test is used to test the normality of the data, and measures of shape are used to define the distributions’ shape. Study findings suggested that log-normal distribution models better the intraday degree sequence data of the network graphs. It is not possible to say that the distributions of log-normal parameters are normal.

  13. Investigation of Visual Management Cases in Construction by an Analytical Framework from Manufacturing

    OpenAIRE

    Murata, K.; Nakajima, K.; Kinoshita, K.; Tezel, Algan; Koskela, Lauri; Tzortzopoulos, Patricia; Katayama, H.

    2016-01-01

    Along with the progress of globalization, speed and efficiency have become more critical for any industry than ever before. In this sense, the concept and methods of lean management, promoting these performances, have been deployed from manufacturing, its origin industry, to other industries. This paper deals with this management style in the construction industry, called lean construction. In particular, visual management (VM) as one effective tool in this scheme is focused on. A number of V...

  14. Outpatient outcomes and satisfaction in pediatric population: data from the postoperative phone call.

    Science.gov (United States)

    Brenn, B Randall; Choudhry, Dinesh K; Sacks, Karen

    2016-02-01

    Quality and patient/parent satisfaction are goals for pediatric perioperative services. As part of the implementation of our operating room electronic medical record (EMR), a postoperative phone call questionnaire was developed to assess patients discharged after outpatient surgery. The goal of this initiative was to determine the rate of common postoperative complications and understand reasons for patient/parent dissatisfaction. Institutional Review Board approval was obtained for chart review. The postoperative phone call survey was attempted by our postanesthesia care unit nursing staff on all pediatric outpatients. The call was attempted for 3 days. From 2009 to 2013, more than 37 000 phone records existed in our EMR, Epic Optime (Epic Systems, Verona, WI). These data were extracted to a business intelligence (BI) program, QlikView (Qliktech, Radnor, PA, USA). A BI dashboard was constructed to obtain phone call results for any given time frame from monthly to spanning several years. Complications were logged as 4-point severity rating scales (none, mild, moderate, severe) with descriptions for each level. The BI dashboard calculated the overall and rates by severity for the following: (i) nausea, (ii) vomiting, (iii) pain, (iv) bleeding, (v) hoarseness, and (vi) difficulty eating. Of 42 688 outpatient cases, 37 620 postoperative phone calls were completed for an overall response rate of 88%. Pain, at 11.1%, was the highest reported postoperative complication. The rate of dissatisfaction was reported to be 0.31%. Most patients reporting dissatisfaction (62%) did not report any complications. Contingency coefficient showed that there was little relationship between satisfaction and presence of complications. A postoperative phone survey is cost-effective and appreciated by patients. We found that satisfaction with our perioperative services was not related to the rates of reported complications. Although reducing complications is of utmost importance

  15. Qualitative Knowledge Construction for Engineering Systems: Extending the Design Structure Matrix Methodology in Scope and Procedure

    National Research Council Canada - National Science Library

    Bartolomei, Jason E

    2007-01-01

    ...), by providing a dynamic, end-to-end representation of an engineering system. In support of this contribution, a new research methodology is presented called Qualitative Knowledge Construction (QKC...

  16. 29 CFR 785.17 - On-call time.

    Science.gov (United States)

    2010-07-01

    ... On-call time. An employee who is required to remain on call on the employer's premises or so close... employee who is not required to remain on the employer's premises but is merely required to leave word at his home or with company officials where he may be reached is not working while on call. (Armour & Co...

  17. CALLING AQUARIUM LOVERS...

    CERN Multimedia

    2002-01-01

    CERN's anemones will soon be orphans. We are looking for someone willing to look after the aquarium in the main building, for one year. If you are interested, or if you would like more information, please call 73830. (The anemones living in the aquarium thank you in anticipation.)

  18. Informal worker phenomenon in housing construction project

    Science.gov (United States)

    Wijayaningtyas, Maranatha; Sipan, Ibrahim; Lukiyanto, Kukuh

    2017-11-01

    The informal workers phenomenon on housing construction projects in Indonesia is different from workers in other sectors who would always request as permanent employees. Substantively, the informal workers are disinclined to be bound as permanent employees which different from the general labor paradigm. Hence, the objective of this study is to find out how the labour selection process, the factors that affected their performance, and the suitable wage system to achieve the target completion of housing construction project. The qualitative method is used to uncover and understand the meaning behind the phenomena (numina) of informal workers action and their influence on housing construction project which called phenomenological approach. Five informal workers and two project managers were selected as informants based on predetermined criteria with in-depth interviews. The results showed that the informal worker were more satisfied with the wage based on unit price while working in the housing construction project for the flexibility in working hours. In addition, the developer was also relieved because they only control the quality and the achievement of the project completion time which supported by informal worker leader. Therefore, these findings are beneficial for both of developer and government as policy maker to succeed the housing program in Indonesia.

  19. Calling 911! What role does the pediatrician play?

    Science.gov (United States)

    Grossman, Devin; Kunkov, Sergey; Kaplan, Carl; Crain, Ellen F

    2013-06-01

    The objective of this study was to compare admission rates and medical interventions among children whose caregivers called their child's primary care provider (PCP) before taking an ambulance to the pediatric emergency department (PED) versus those who did not. This was a prospective cohort study of patients brought to an urban, public hospital PED via emergency medical system (EMS). Children were included if the caregiver called 911 to have them transported via EMS and was present in the PED. The main variable was whether the child's PCP was called before EMS utilization. Study outcomes were medical interventions, such as intravenous line insertion or laboratory tests, and hospital admission. χ Test and logistic regression were used to evaluate the relationship of the main variable to the study outcomes. Six hundred fourteen patients met inclusion criteria and were enrolled. Five hundred eighty-five patients (95.3%) were reported to have a PCP. Seventy-four caregivers (12.1%) called their child's PCP before calling EMS. Two hundred seventy-seven patients (45.1%) had medical interventions performed; of these, 42 (15.2%) called their PCP (P = 0.03). Forty-two patients (6.8%) were admitted; among these, 14 (33.3%) called their PCP (P < 0.01). Adjusting for triage level, patients whose caregiver called the PCP before calling EMS were 3.2 times (95% confidence interval, 1.9-5.2 times) more likely to be admitted and 1.7 times (95% confidence interval, 1.1-2.9 times) more likely to have a medical intervention compared with patients whose caregivers did not call their child's PCP. Children were more likely to be admitted or require a medical intervention if their caregiver called their PCP before calling EMS. The availability of a PCP for telephone triage may help to optimize EMS utilization.

  20. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies

    DEFF Research Database (Denmark)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew

    2012-01-01

    Open-source software (OSS) encourages computer programmers to reuse software components written by others. In evolutionary bioinformatics, OSS comes in a broad range of programming languages, including C/C++, Perl, Python, Ruby, Java, and R. To avoid writing the same functionality multiple times...... for different languages, it is possible to share components by bridging computer languages and Bio* projects, such as BioPerl, Biopython, BioRuby, BioJava, and R/Bioconductor. In this chapter, we compare the two principal approaches for sharing software between different programming languages: either by remote...... procedure call (RPC) or by sharing a local call stack. RPC provides a language-independent protocol over a network interface; examples are RSOAP and Rserve. The local call stack provides a between-language mapping not over the network interface, but directly in computer memory; examples are R bindings, RPy...

  1. Structure of steel reactor building and construction method therefor

    International Nuclear Information System (INIS)

    Yamakawa, Toshikimi.

    1997-01-01

    The building of the present invention contains a reactor pressure vessel, and has double steel plate walls endurable to elevation of inner pressure and keeping airtightness, and shielding concretes are filled between the double steel plate walls. It also has empty double steel plate walls not filled with concretes and has pipelines, vent ducts, wirings and a support structures for attaching them between the double steel plate walls. It is endurable to a great inner pressure satisfactory and keeps airtightness by the two spaced steel plates. It can be greatly reduced in the weight, and can be manufactured efficiently with high quality in a plant by so called module construction, and the dimension of the entire of the reactor building can be reduced. It is constructed in a dock, transported on the sea while having the space between the two steel plate walls as a ballast tanks, placed in the site, and shielding concretes are filled between the double steel plate walls. The term for the construction can be reduced, and the cost for the construction can be saved. (N.H.)

  2. Indico CONFERENCE: Define the Call for Abstracts

    CERN Multimedia

    CERN. Geneva; Ferreira, Pedro

    2017-01-01

    In this tutorial, you will learn how to define and open a call for abstracts. When defining a call for abstracts, you will be able to define settings related to the type of questions asked during a review of an abstract, select the users who will review the abstracts, decide when to open the call for abstracts, and more.

  3. Call for Research

    International Development Research Centre (IDRC) Digital Library (Canada)

    Marie-Isabelle Beyer

    2014-10-03

    Oct 3, 2014 ... 5.Submission process. 6.Eligibility criteria. 7.Selection Process. 8. Format and requirements. 9.Evaluation criteria. 10.Country clearance requirements. 11. .... It is envisaged that through this call a single consortium will undertake 6-8 projects within a total budget of up to ... principle qualify for IDRC's support.

  4. EPR project construction cost control

    International Nuclear Information System (INIS)

    Duflo, D.; Pouget-Abadie, X.; Dufour, A.; Kauffmann, G.

    2001-01-01

    The EPR project is now managed by EDF in cooperation with the German Utilities. The main engineering activities for this period are related to the preparation of construction project management, deepening of some safety issues, definition of the project technical reference. The EPR project concerns the so-called reference unit, that is an isolated first-off unit, with unit electrical power of about 1500 MW. The construction costs evaluated are those of the nuclear island, the conventional island, site facilities, installation work and the administrative buildings. The EPR project construction cost evaluation method applies to all the equipment installed and commissioned. It requires the availability of a preliminary project detailed enough to identify the bill of quantities. To these quantities are then assigned updated unit prices that are based either on cost bases for similar and recent facilities or taken from request for quotation for similar equipment or result from gains due to contractual conditions benefiting from simplifications in the functional and technical specifications. The input and output data are managed in a model that respects the breakdown on which the evaluation method is based. The structural organization of this method reflects a functional breakdown on the one hand (nuclear island, conventional island, common site elements) and on the other hand a breakdown according to equipment or activity (civil engineering, mechanics, electricity, instrumentation and control). This paper discusses the principle and the method of construction cost evaluation carried out, the cost data base and input and output parameters as well as results and oncoming cost analysis tasks. (author)

  5. Pile-ou-face et mise-en-gage de bit quantique : bornes optimales, constructions pratiques et sécurité calculatoire

    OpenAIRE

    Chailloux , André

    2011-01-01

    Quantum computing allows us to revisit the study of quantum cryptographic primitives with information theoretic security. In 1984, Bennett and Brassard presented a protocol of quantum key distribution. In this protocol, Alice and Bob cooperate in order to share a common secret key k, which has to be unknown for a third party that has access to the communication channel. They showed how to perform this task quantumly with an information theoretic security; which is impossible classically.In my...

  6. The function of migratory bird calls

    DEFF Research Database (Denmark)

    Reichl, Thomas; Andersen, Bent Bach; Larsen, Ole Næsbye

    The function of migratory bird calls: do they influence orientation and navigation?   Thomas Reichl1, Bent Bach Andersen2, Ole Naesbye Larsen2, Henrik Mouritsen1   1Institute of Biology, University of Oldenburg, Oldenburg, D-26111 Oldenburg, Germany 2Institute of Biology, University of Southern...... migration and to stimulate migratory restlessness in conspecifics. We wished to test if conspecific flight calls influence the flight direction of a nocturnal migrant, the European Robin (Erithacus rubecula), i.e. if flight calls help migrants keeping course. Wild caught birds showing migratory restlessness...... the experimental bird could be activated successively to simulate a migrating Robin cruising E-W, W-E, S-N or N-S at a chosen height (mostly about 40 m), at 10 m/s and emitting Robin flight calls of 80 dB(A) at 1 m. The simulated flight of a "ding" sound served as a control. During an experiment the bird was first...

  7. An empirical analysis of the corporate call decision

    International Nuclear Information System (INIS)

    Carlson, M.D.

    1998-01-01

    An economic study of the the behaviour of financial managers of utility companies was presented. The study examined whether or not an option pricing based model of the call decision does a better job of explaining callable preferred share prices and call decisions compared to other models. In this study, the Rust (1987) empirical technique was extended to include the use of information from preferred share prices in addition to the call decisions. Reasonable estimates were obtained from data of shares of the Pacific Gas and Electric Company (PGE) for the transaction costs associated with a call. It was concluded that the managers of the PGE clearly take into account the value of the option to delay the call when making their call decisions

  8. Bitcoin a favourable instrument for diversification? : A quantitative study on the relations between Bitcoin and global stock markets

    OpenAIRE

    Krause, Dominik; Pham, Nga

    2017-01-01

    Bitcoin is a peer to peer (p2p) payment cash system and an unregulated digital currency that is primarily designed and developed in 2008 without tender legal status. Bitcoin is so-called cryptocurrency because it uses the cryptographic function in order to secure the creation and transfer of money. During recent years, Bitcoin has been emerging as the well-known electronic currency and gaining popularity worldwide as well as caught the media attention in the area of volume trading. Therefore,...

  9. Construction of covariance matrix for absolute fission yield data measurement

    International Nuclear Information System (INIS)

    Liu Tingjin; Sun Zhengjun

    1999-01-01

    The purpose is to provide a tool for experimenters and evaluators to conveniently construct the covariance based on the information of the experiment. The method used is so called as parameter analysis one. The basic method and formula are given in the first section, a practical program is introduced in the second section, and finally, some examples are given in the third section

  10. Perceived Calling and Work Engagement Among Nurses.

    Science.gov (United States)

    Ziedelis, Arunas

    2018-03-01

    The purpose of this study was to explore the relationship of perceived calling and work engagement in nursing over and above major work environment factors. In all, 351 nurses from various health care institutions completed the survey. Data were collected about the most demanding aspects of nursing, major job resources, the degree to which nursing is perceived as a meaningful calling, work engagement, and main demographic information. Hierarchical linear regression was applied to assess the relation between perceived calling and work engagement, while controlling for demographic and work environment factors, and perceived calling was significantly related to two out of three components of nurses' work engagement. The highest association was found with dedication component, and vigor component was related insignificantly. Results have shown that perceived calling might motivate nurses to engage in their work even in burdensome environment, although possible implications for the occupational well-being of nurses themselves remains unclear.

  11. Sustainable construction in rural Guatemala.

    Science.gov (United States)

    Temple, Ericka K; Rose, Elizabeth

    2011-11-01

    Waste management is a significant problem in Guatemala, as elsewhere in the developing world. The inappropriate disposal of solid waste produces pollution and places the environment and human health at risk. Environmental risk factors, including inadequate disposal of solid waste, are implicated in 25-30% of disease worldwide with children bearing a disproportionate burden of those diseases. Therefore, economic development which reduces inappropriate disposal of waste and affords economic opportunities may help reduce the global burden of disease on children. In the indigenous highlands of central Guatemala, a community supported non-profit organisation called Long Way Home (http://www.longwayhomeinc.org) is employing alternative construction techniques to build a vocational school complex. The construction of the school from waste materials demonstrates the use and principles of re-purposing materials, helps clean the environment and affords further educational and vocational opportunities. This article will outline the health problems inherent in an indigenous area of a developing country and will offer an alternative solution to reverse environmental risk factors associated with solid waste pollution and also actively improve child health.

  12. On-call work and health: a review

    Directory of Open Access Journals (Sweden)

    Botterill Jackie S

    2004-12-01

    Full Text Available Abstract Many professions in the fields of engineering, aviation and medicine employ this form of scheduling. However, on-call work has received significantly less research attention than other work patterns such as shift work and overtime hours. This paper reviews the current body of peer-reviewed, published research conducted on the health effects of on-call work The health effects studies done in the area of on-call work are limited to mental health, job stress, sleep disturbances and personal safety. The reviewed research suggests that on-call work scheduling can pose a risk to health, although there are critical gaps in the literature.

  13. Systems configured to distribute a telephone call, communication systems, communication methods and methods of routing a telephone call to a service representative

    Science.gov (United States)

    Harris, Scott H.; Johnson, Joel A.; Neiswanger, Jeffery R.; Twitchell, Kevin E.

    2004-03-09

    The present invention includes systems configured to distribute a telephone call, communication systems, communication methods and methods of routing a telephone call to a customer service representative. In one embodiment of the invention, a system configured to distribute a telephone call within a network includes a distributor adapted to connect with a telephone system, the distributor being configured to connect a telephone call using the telephone system and output the telephone call and associated data of the telephone call; and a plurality of customer service representative terminals connected with the distributor and a selected customer service representative terminal being configured to receive the telephone call and the associated data, the distributor and the selected customer service representative terminal being configured to synchronize, application of the telephone call and associated data from the distributor to the selected customer service representative terminal.

  14. Portmanteau constructions, phrase structure and linearization

    Directory of Open Access Journals (Sweden)

    Brian Hok-Shing Chan

    2015-12-01

    Full Text Available In bilingual code-switching which involves language-pairs with contrasting head-complement orders (i.e. head-initial vs head-final, a head may be lexicalized from both languages with its complement sandwiched in the middle. These so-called portmanteau sentences (Nishimura, 1985, 1986; Sankoff, Poplack, and Vanniarajan, 1990, etc. have been attested for decades, but they had never received a systematic, formal analysis in terms of current syntactic theory before a few recent attempts (Hicks, 2010, 2012. Notwithstanding this lack of attention, these structures are in fact highly relevant to theories of linearization and phrase structure. More specifically, they challenge binary-branching (Kayne, 1994, 2004, 2005 as well as the Antisymmetry hypothesis (ibid.. Not explained by current grammatical models of code-switching, including the Equivalence Constraint (Poplack, 1980, the Matrix Language Frame Model (Myers-Scotton, 1993, 2002, etc., and the Bilingual Speech Model (Muysken, 2000, 2013, the portmanteau construction indeed looks uncommon or abnormal, defying any systematic account. However, the recurrence of these structures in various datasets and constraints on them do call for an explanation. This paper suggests an account which lies with syntax and also with the psycholinguistics of bilingualism. Assuming that linearization is a process at the Sensori-Motor (SM interface (Chomsky, 2005; 2013, this paper sees that word order is not fixed in a syntactic tree but it is set in the production process, and much information of word order rests in the processor, for instance, outputting a head before its complement (i.e. head-initial word order or the reverse (i.e. head-final word order. As for the portmanteau construction, it is the output of bilingual speakers co-activating two sets of head-complement orders which summon the phonetic forms of the same word in both languages. Under this proposal, the underlying structure of a portmanteau

  15. Portmanteau Constructions, Phrase Structure, and Linearization.

    Science.gov (United States)

    Chan, Brian Hok-Shing

    2015-01-01

    In bilingual code-switching which involves language-pairs with contrasting head-complement orders (i.e., head-initial vs. head-final), a head may be lexicalized from both languages with its complement sandwiched in the middle. These so-called "portmanteau" sentences (Nishimura, 1985, 1986; Sankoff et al., 1990, etc.) have been attested for decades, but they had never received a systematic, formal analysis in terms of current syntactic theory before a few recent attempts (Hicks, 2010, 2012). Notwithstanding this lack of attention, these structures are in fact highly relevant to theories of linearization and phrase structure. More specifically, they challenge binary-branching (Kayne, 1994, 2004, 2005) as well as the Antisymmetry hypothesis (ibid.). Not explained by current grammatical models of code-switching, including the Equivalence Constraint (Poplack, 1980), the Matrix Language Frame Model (Myers-Scotton, 1993, 2002, etc.), and the Bilingual Speech Model (Muysken, 2000, 2013), the portmanteau construction indeed looks uncommon or abnormal, defying any systematic account. However, the recurrence of these structures in various datasets and constraints on them do call for an explanation. This paper suggests an account which lies with syntax and also with the psycholinguistics of bilingualism. Assuming that linearization is a process at the Sensori-Motor (SM) interface (Chomsky, 2005, 2013), this paper sees that word order is not fixed in a syntactic tree but it is set in the production process, and much information of word order rests in the processor, for instance, outputting a head before its complement (i.e., head-initial word order) or the reverse (i.e., head-final word order). As for the portmanteau construction, it is the output of bilingual speakers co-activating two sets of head-complement orders which summon the phonetic forms of the same word in both languages. Under this proposal, the underlying structure of a portmanteau construction is as simple as an

  16. No Call for Action? Why There Is No Union (Yet in Philippine Call Centers

    Directory of Open Access Journals (Sweden)

    Niklas Reese

    2013-01-01

    Full Text Available This contribution presents findings from a qualitative study which focused on young urban professionals in the Philippines who work(ed in international call centers – workplaces usually characterized by job insecurity and other forms of precarity, factory-like working conditions, and disembeddedness. Nevertheless, trade unions in these centers have not come into existence. Why collective action is not chosen by call center agents as an option to tackle the above mentioned problems – this is what the research project this article is based on tried to understand. After outlining some workrelated problems identified by Filipino call center agents, the article will focus on the strategies the agents employ to counter these problems (mainly accommodation and everyday resistance. By highlighting five objective and five subjective reasons (or reasons by circumstances and reasons by framing, we conclude that it is not repressive regulation policies, but rather the formative power and the internalization of discourses of rule within individual life strategies that are preventing the establishment of unions and other collective action structures.

  17. Technical and Regulatory Guidance Document for Constructed Treatment Wetlands

    Science.gov (United States)

    2003-12-01

    horizon in which organic material is being added. This horizon often has the characteristics of cultivation and other disturbances. Under the A horizon is...intermediate between III and II (commonly called “green rust”) induces the reduction of Se. In the case of Se accumulation, ecotoxicological effects should be...consulted before a constructed wetland system design can be approved, specifically because many restrict the use and cultivation of plant species that

  18. Construction and test of sMDT chambers for the ATLAS muon spectrometer

    Energy Technology Data Exchange (ETDEWEB)

    Takasugi, Eric; Schmidt-Sommerfeld, Korbinian; Kortner, Oliver; Kroha, Hubert [Max-Planck-Institut fuer Physik, Muenchen (Germany)

    2016-07-01

    In the ATLAS muon spectrometer, Monitored Drift Tube chambers (MDTs) are used for precise tracking measurements. In order to increase the geometric acceptance and rate capability, new chambers have been designed and are under construction to be installed in ATLAS during the winter shutdown of 2016/17 of the LHC. The new chambers have a drift tube diameter of 15 mm (compared to 30 mm of the other MDTs) and are therefore called sMDT chambers. This presentation reports on the progress of chamber construction and on the results of quality assurance tests.

  19. Reducing juvenile delinquency with automated cell phone calls.

    Science.gov (United States)

    Burraston, Bert O; Bahr, Stephen J; Cherrington, David J

    2014-05-01

    Using a sample of 70 juvenile probationers (39 treatment and 31 controls), we evaluated the effectiveness of a rehabilitation program that combined cognitive-behavioral training and automated phone calls. The cognitive-behavioral training contained six 90-min sessions, one per week, and the phone calls occurred twice per day for the year following treatment. Recidivism was measured by whether they were rearrested and the total number of rearrests during the 1st year. To test the impact of the phone calls, those who received phone calls were divided into high and low groups depending on whether they answered more or less than half of their phone calls. Those who completed the class and answered at least half of their phone calls were less likely to have been arrested and had fewer total arrests.

  20. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  1. A survey of noninteractive zero knowledge proof system and its applications.

    Science.gov (United States)

    Wu, Huixin; Wang, Feng

    2014-01-01

    Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.

  2. A Survey of Noninteractive Zero Knowledge Proof System and Its Applications

    Directory of Open Access Journals (Sweden)

    Huixin Wu

    2014-01-01

    Full Text Available Zero knowledge proof system which has received extensive attention since it was proposed is an important branch of cryptography and computational complexity theory. Thereinto, noninteractive zero knowledge proof system contains only one message sent by the prover to the verifier. It is widely used in the construction of various types of cryptographic protocols and cryptographic algorithms because of its good privacy, authentication, and lower interactive complexity. This paper reviews and analyzes the basic principles of noninteractive zero knowledge proof system, and summarizes the research progress achieved by noninteractive zero knowledge proof system on the following aspects: the definition and related models of noninteractive zero knowledge proof system, noninteractive zero knowledge proof system of NP problems, noninteractive statistical and perfect zero knowledge, the connection between noninteractive zero knowledge proof system, interactive zero knowledge proof system, and zap, and the specific applications of noninteractive zero knowledge proof system. This paper also points out the future research directions.

  3. Call for volunteers

    CERN Document Server

    2008-01-01

    CERN is calling for volunteers from all members of the Laboratory for organizing the two exceptional Open days.CERN is calling for volunteers from all members of the Laboratory’s personnel to help with the organisation of these two exceptional Open Days, for the visits of CERN personnel and their families on the Saturday and above all for the major public Open Day on the Sunday. As for the 50th anniversary in 2004, the success of the Open Days will depend on a large number of volunteers. All those working for CERN as well as retired members of the personnel can contribute to making this event a success. Many guides will be needed at the LHC points, for the activities at the surface and to man the reception and information points. The aim of these major Open Days is to give the local populations the opportunity to discover the fruits of almost 20 years of work carried out at CERN. We are hoping for some 2000 volunteers for the two Open Days, on the Saturday from 9 a.m. to ...

  4. Vitis phylogenomics: hybridization intensities from a SNP array outperform genotype calls.

    Directory of Open Access Journals (Sweden)

    Allison J Miller

    Full Text Available Understanding relationships among species is a fundamental goal of evolutionary biology. Single nucleotide polymorphisms (SNPs identified through next generation sequencing and related technologies enable phylogeny reconstruction by providing unprecedented numbers of characters for analysis. One approach to SNP-based phylogeny reconstruction is to identify SNPs in a subset of individuals, and then to compile SNPs on an array that can be used to genotype additional samples at hundreds or thousands of sites simultaneously. Although powerful and efficient, this method is subject to ascertainment bias because applying variation discovered in a representative subset to a larger sample favors identification of SNPs with high minor allele frequencies and introduces bias against rare alleles. Here, we demonstrate that the use of hybridization intensity data, rather than genotype calls, reduces the effects of ascertainment bias. Whereas traditional SNP calls assess known variants based on diversity housed in the discovery panel, hybridization intensity data survey variation in the broader sample pool, regardless of whether those variants are present in the initial SNP discovery process. We apply SNP genotype and hybridization intensity data derived from the Vitis9kSNP array developed for grape to show the effects of ascertainment bias and to reconstruct evolutionary relationships among Vitis species. We demonstrate that phylogenies constructed using hybridization intensities suffer less from the distorting effects of ascertainment bias, and are thus more accurate than phylogenies based on genotype calls. Moreover, we reconstruct the phylogeny of the genus Vitis using hybridization data, show that North American subgenus Vitis species are monophyletic, and resolve several previously poorly known relationships among North American species. This study builds on earlier work that applied the Vitis9kSNP array to evolutionary questions within Vitis vinifera

  5. "We Dominate the Basement!": How Asian American Girls Construct a Borderland Community

    Science.gov (United States)

    Tokunaga, Tomoko

    2016-01-01

    This article, based on two years of ethnographic fieldwork, explores the ways in which eight Asian American immigrant high school girls construct a borderland community, which they call the "Basement Group," after the place where they gather at school. While the girls struggle with displacement in the borderlands, including isolation in…

  6. Perpetual Cancellable American Call Option

    OpenAIRE

    Emmerling, Thomas J.

    2010-01-01

    This paper examines the valuation of a generalized American-style option known as a Game-style call option in an infinite time horizon setting. The specifications of this contract allow the writer to terminate the call option at any point in time for a fixed penalty amount paid directly to the holder. Valuation of a perpetual Game-style put option was addressed by Kyprianou (2004) in a Black-Scholes setting on a non-dividend paying asset. Here, we undertake a similar analysis for the perpetua...

  7. Generalized internal long wave equations: construction, hamiltonian structure and conservation laws

    International Nuclear Information System (INIS)

    Lebedev, D.R.

    1982-01-01

    Some aspects of the theory of the internal long-wave equations (ILW) are considered. A general class of the ILW type equations is constructed by means of the Zakharov-Shabat ''dressing'' method. Hamiltonian structure and infinite numbers of conservation laws are introduced. The considered equations are shown to be Hamiltonian in the so-called second Hamiltonian structu

  8. Leveraging management information in improving call centre productivity

    Directory of Open Access Journals (Sweden)

    Manthisana Mosese

    2016-04-01

    Objectives: This research explored the use of management information and its impact on two fundamental functions namely, improving productivity without compromising the quality of service, in the call centre of a well-known South African fashion retailer, Edcon. Following the implementation of the call centre technology project the research set out to determine how Edcon can transform their call centre to improve productivity and customer service through effective utilisation of their management information. Method: Internal documents and reports were analysed to provide the basis of evaluation between the measures of productivity prior to and post the implementation of a technology project at Edcon’s call centre. Semi-structured in-depth and group interviews were conducted to establish the importance and use of management information in improving productivity and customer service. Results: The results indicated that the availability of management information has indeed contributed to improved efficiency at the Edcon call centre. Although literature claims that there is a correlation between a call centre technology upgrade and improvement in performance, evident in the return on investment being realised within a year or two of implementation, it fell beyond the scope of this study to investigate the return on investment for Edcon’s call centre. Conclusion: Although Edcon has begun realising benefits in improved productivity in their call centre from their available management information, information will continue to play a crucial role in supporting management with informed decisions that will improve the call centre operations. [pdf to follow

  9. ITER, On the way to call for the license

    International Nuclear Information System (INIS)

    Alejaidre, C.; Girard, J.P.

    2007-01-01

    Full text of publication follows: All the seven ITER Parties have now ratified the lTER Agreement, which was signed in Paris in November last year. On October 24, 2007 the ITER Agreement enters officially into force. The licensing procedure to start construction shall be launched within the coming months in order to start construction at the beginning of 2009. The Host Party, Europe and the Host State, France have already participated together with the ITER Organization (IO) to a public debate to present the project to the neighboring populations (January to May 2006) and other administrative procedures to prepare the site and the roads for heavy loads. According to host state law on licensing of nuclear facilities, IO will send a set of administrative documents including a safety assessment (called Preliminary Safety Report) and public hearing files including impact studies and risk analysis. The review and public hearing are expected mid-08 to be consistent with the start of nuclear building construction on site. The latest update of the design took into account of inputs from: -An internal design review managed through eight specialist groups including safety and licensing, - Host State regulations (technical and QA), which should be fulfilled as quoted in the ITER agreement, - Site adaptation including land configuration, environmental conditions and external hazards. The ITER designers, in close contact with the Participant Teams, are proceeding with the adaptation of the generic design to comply with these new inputs. The codes and standards for all equipment are also under revision in order to fit with the expected requirements, taking into account the procurement sharing agreement and the French regulations. In the earlier stage of ITER design fusion took benefit from fission knowledge, in the present stage fusion is taking the lead as can be demonstrated by the update of the European mechanical code RCC-MR, now ready and updated to the vacuum vessel design

  10. Smart Grid Technology and Consumer Call Center Readiness

    OpenAIRE

    Schamber, Kelsey L.

    2010-01-01

    The following reasearch project deals with utility call center readiness to address customer concerns and questions about the Smart Grid and smart meter technology. Since consumer engagement is important for the benefits of the Smart Grid to be realized, the readiness and ability of utilities to answer consumer questions is an important issue. Assessing the readiness of utility call centers to address pertinant customer concerns was accomplished by calling utility call centers with Smart Grid...

  11. Mobile telephones: a comparison of radiated power between 3G VoIP calls and 3G VoCS calls.

    Science.gov (United States)

    Jovanovic, Dragan; Bragard, Guillaume; Picard, Dominique; Chauvin, Sébastien

    2015-01-01

    The purpose of this study is to assess the mean RF power radiated by mobile telephones during voice calls in 3G VoIP (Voice over Internet Protocol) using an application well known to mobile Internet users, and to compare it with the mean power radiated during voice calls in 3G VoCS (Voice over Circuit Switch) on a traditional network. Knowing that the specific absorption rate (SAR) is proportional to the mean radiated power, the user's exposure could be clearly identified at the same time. Three 3G (High Speed Packet Access) smartphones from three different manufacturers, all dual-band for GSM (900 MHz, 1800 MHz) and dual-band for UMTS (900 MHz, 1950 MHz), were used between 28 July and 04 August 2011 in Paris (France) to make 220 two-minute calls on a mobile telephone network with national coverage. The places where the calls were made were selected in such a way as to describe the whole range of usage situations of the mobile telephone. The measuring equipment, called "SYRPOM", recorded the radiation power levels and the frequency bands used during the calls with a sampling rate of 20,000 per second. In the framework of this study, the mean normalised power radiated by a telephone in 3G VoIP calls was evaluated at 0.75% maximum power of the smartphone, compared with 0.22% in 3G VoCS calls. The very low average power levels associated with use of 3G devices with VoIP or VoCS support the view that RF exposure resulting from their use is far from exceeding the basic restrictions of current exposure limits in terms of SAR.

  12. Development of Innovative Construction Technologies for ABWRs

    International Nuclear Information System (INIS)

    Yamashita, T.; Fukuda, T.; Masuda, N.

    2002-01-01

    This paper describes an effort by Tokyo Electric Power Company (TEPCO) to shorten the construction time in a drastic manner for the Advanced Boiling Water Reactors (ABWR), thereby aiming at reducing construction costs. First an outline of the actual construction records for the five BWR Units and the two ABWR Units at the Kashiwazaki-Kariwa site is introduced along with the construction methods employed for these units. There is a continued trend in the reduction of construction time from Unit 1 to 7 owing to a number of improvements made to these units, and in particular it is noteworthy that the drastic reduction was accomplished due to the change in reactor type from BWR to ABWR. Explained next is an on-going effort for the next ABWR and the following next generation of ABWRs to further shorten construction time. In this effort an emphasis is laid on the development of innovative construction methods by the adoption of steel plate/concrete composite structures (SC Structure), and the application of those structures even to containment vessel (so-called SCCV). This work is being conducted as part of TEPCO's research and development for the next generation ABWRs (ABWR II). Presently it is expected that the construction time from bedrock inspection to fuel loading could be shortened in a stepwise fashion to 38 and 31.5 months for the next ABWR and finally to 23 months for the next generation ABWR II, thus enabling a greatly reduced power generating cost and enhanced safety during construction. In addition to the above effort, a preliminary study has been performed concerning the application of base isolation systems to ABWR plants. From this study which is aimed at standardization, lowered cost and mitigation of engineering work, it was found that base isolation system effectively reduces seismic response and is instrumental in achieving the above-mentioned objectives. Therefore it can be said that the use of this system gives more freedom in selecting sites

  13. What Should Guide Reality Construction?

    DEFF Research Database (Denmark)

    Ravn, Ib

    1991-01-01

    The constructivist movement in the social sciences (Berger & Luckmann, Gergen) argues that social institutions are the constructions of a community of human agents. This implies that people possess the power to radically change those institutions. This raises what may be called the values problem...... ethical positions (relativism and absolutism) as distorted or degenerate cases of an ideal case, characterized by unity-in-diversity. This model is offered as a framework for a discussion of the values problem in constructivism, particularly in social research....... in the scientific community, whereas in the general community it is at least acknowledged as an issue. The values problem in constructivism has been addressed by a number of writers in second-order cybernetics, who offer reflections on ethics and values that are quite tentative and call for further elaboration....... The remainder of the chapter is an attempt to provide a broader context for a constructivist discussion of values and ethics. To do this I discuss the concept of the "implicate order," an ontological framework proposed by the theoretical physicist David Bohm (1980b). As will be shown, this ontology implies...

  14. Towards Interactive Construction of Topical Hierarchy: A Recursive Tensor Decomposition Approach.

    Science.gov (United States)

    Wang, Chi; Liu, Xueqing; Song, Yanglei; Han, Jiawei

    2015-08-01

    Automatic construction of user-desired topical hierarchies over large volumes of text data is a highly desirable but challenging task. This study proposes to give users freedom to construct topical hierarchies via interactive operations such as expanding a branch and merging several branches. Existing hierarchical topic modeling techniques are inadequate for this purpose because (1) they cannot consistently preserve the topics when the hierarchy structure is modified; and (2) the slow inference prevents swift response to user requests. In this study, we propose a novel method, called STROD, that allows efficient and consistent modification of topic hierarchies, based on a recursive generative model and a scalable tensor decomposition inference algorithm with theoretical performance guarantee. Empirical evaluation shows that STROD reduces the runtime of construction by several orders of magnitude, while generating consistent and quality hierarchies.

  15. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  16. Integrating heterogeneous healthcare call centers.

    Science.gov (United States)

    Peschel, K M; Reed, W C; Salter, K

    1998-01-01

    In a relatively short period, OHS has absorbed multiple call centers supporting different LOBs from various acquisitions, functioning with diverse standards, processes, and technologies. However, customer and employee satisfaction is predicated on OHS's ability to thoroughly integrate these heterogeneous call centers. The integration was initiated and has successfully progressed through a balanced program of focused leadership and a defined strategy which includes site consolidation, sound performance management philosophies, and enabling technology. Benefits have already been achieved with even more substantive ones to occur as the integration continues to evolve.

  17. The Culture of Construction Organisations: the Epitome of Institutionalised Corruption

    Directory of Open Access Journals (Sweden)

    Andrew Oyen Arewa

    2015-08-01

    Full Text Available The culture of an organisation is a vital element of business competency that must align with its strategic goals, and enhance peoples’ perceptions, feelings and behaviour in adapting to the world around them. Organisational culture may also bring about negative practices such as dishonesty and unethical behaviours. Recently the culture of some construction organisations has been called into question. For example, major construction projects around the globe have become involved in allegations of fraud and corruption. The cost is currently estimated at US$860 billion globally; with forecasts that it may rise to US$1.5 trillion by 2025. Hitherto the role of the culture of construction organisations in fraud and corruption activities has been largely hidden. The study aim is to establish whether the culture of construction organisations promotes corrupt practices in the UK construction and infrastructure sector. The study employed mixed research methods with interviews supported by a questionnaire and an examination of five case studies in different countries. Findings show that the culture of construction organisations together with the nature of the industry promotes fraud and corruption. The study subsequently highlights key cultural factors that support fraud and corruption in a way that is almost institutionalised.

  18. The renewal of hydroelectric concessions in competitive call

    International Nuclear Information System (INIS)

    2013-01-01

    This document discusses various issues associated with the planned competitive call on the French hydraulic power plants. The principles of this competitive call for hydroelectric concessions are first addressed: administrative regime of concessions, competitive call process, criteria of selection of the concession holder, case of 'concession of valleys', potential competitors. It outlines and discusses the difficulties of this competitive call: France is the single country to implement this procedure; it concerns a national asset; it questions the guarantee of a future use of equipment at best for the energy benefits of French consumers; the competitive call is a nice idea indeed but extremely complex. A note discusses the profitability aspects of Plants for Transfer of Energy by Pumping

  19. Differentiating intolerance of uncertainty from three related but distinct constructs.

    Science.gov (United States)

    Rosen, Natalie O; Ivanova, Elena; Knäuper, Bärbel

    2014-01-01

    Individual differences in uncertainty have been associated with heightened anxiety, stress and approach-oriented coping. Intolerance of uncertainty (IU) is a trait characteristic that arises from negative beliefs about uncertainty and its consequences. Researchers have established the central role of IU in the development of problematic worry and maladaptive coping, highlighting the importance of this construct to anxiety disorders. However, there is a need to improve our understanding of the phenomenology of IU. The goal of this paper was to present hypotheses regarding the similarities and differences between IU and three related constructs--intolerance of ambiguity, uncertainty orientation, and need for cognitive closure--and to call for future empirical studies to substantiate these hypotheses. To assist with achieving this goal, we conducted a systematic review of the literature, which also served to identify current gaps in knowledge. This paper differentiates these constructs by outlining each definition and general approaches to assessment, reviewing the existing empirical relations, and proposing theoretical similarities and distinctions. Findings may assist researchers in selecting the appropriate construct to address their research questions. Future research directions for the application of these constructs, particularly within the field of clinical and health psychology, are discussed.

  20. The institutionalization of benchmarking in the Danish construction industry

    DEFF Research Database (Denmark)

    Rasmussen, Grane Mikael Gregaard; Gottlieb, Stefan Christoffer

    , the chapter accounts for the data collection methods used to conduct the empirical data collection and the appertaining choices that are made, based on the account for analyzing institutionalization processes. The analysis unfolds over seven chapters, starting with an exposition of the political foundation...... and disseminated to the construction industry. The fourth chapter demonstrates how benchmarking was concretized into a benchmarking system and articulated to address several political focus areas for the construction industry. BEC accordingly became a political arena where many local perspectives and strategic...... emerged as actors expressed diverse political interests in the institutionalization of benchmarking. The political struggles accounted for in chapter five constituted a powerful political pressure and called for transformations of the institutionalization in order for benchmarking to attain institutional...

  1. Mathematical Abstraction: Constructing Concept of Parallel Coordinates

    Science.gov (United States)

    Nurhasanah, F.; Kusumah, Y. S.; Sabandar, J.; Suryadi, D.

    2017-09-01

    Mathematical abstraction is an important process in teaching and learning mathematics so pre-service mathematics teachers need to understand and experience this process. One of the theoretical-methodological frameworks for studying this process is Abstraction in Context (AiC). Based on this framework, abstraction process comprises of observable epistemic actions, Recognition, Building-With, Construction, and Consolidation called as RBC + C model. This study investigates and analyzes how pre-service mathematics teachers constructed and consolidated concept of Parallel Coordinates in a group discussion. It uses AiC framework for analyzing mathematical abstraction of a group of pre-service teachers consisted of four students in learning Parallel Coordinates concepts. The data were collected through video recording, students’ worksheet, test, and field notes. The result shows that the students’ prior knowledge related to concept of the Cartesian coordinate has significant role in the process of constructing Parallel Coordinates concept as a new knowledge. The consolidation process is influenced by the social interaction between group members. The abstraction process taken place in this group were dominated by empirical abstraction that emphasizes on the aspect of identifying characteristic of manipulated or imagined object during the process of recognizing and building-with.

  2. Interiors Construction Manual integrated planning, finishing and fitting out, technical servcies

    CERN Document Server

    Hausladen, Gerhard

    2010-01-01

    Soccer stadiums, airports, theaters, museums it falls to very few architects to tackle spectacular building tasks like these. The everyday work of most architects is more often focused on ""manageable"" projects like the renovation, remodeling, or rebuilding of single- and multi-family houses, schools, and offices. Whatever the nature of the building task, interior construction is always a significant design and qualitative challenge that calls for highly detailed technical expertise. After all, it affects the realm that will be brought to life and utilized by the user when the task is finished, and whose aesthetic and functional serviceability will be put to the test each and every day. The Interior Construction Manual supports planners in their daily work as a practical planning aid and reference work with the relevant standards, guidelines, reference details, and constructional solutions, all illustrated by built example projects. It brings together the crucial facts on all aspects of interior construction...

  3. Linking Calling Orientations to Organizational Attachment via Organizational Instrumentality

    Science.gov (United States)

    Cardador, M. Teresa; Dane, Erik; Pratt, Michael G.

    2011-01-01

    Despite an emerging interest in callings, researchers know little about whether calling orientations matter in the workplace. We explore the under-examined relationship between a calling orientation and employees' attachment to their organizations. Although some theory suggests that callings may be negatively related to organizational attachment,…

  4. User-friendly Establishment of Trust in Distributed Home Automation Networks

    DEFF Research Database (Denmark)

    Solberg Hjorth, Theis; Torbensen, Rune; Madsen, Per Printz

    2014-01-01

    Current wireless technologies use a variety of methods to locally exchange and verify credentials between devices to establish trusted relationships. Scenarios in home automation networks also require this capability over the Internet, but the necessary involvement of non-expert users to setup...... these relationships can lead to misconfiguration or breaches of security. We outline a security system for Home Automation called Trusted Domain that can establish and maintain cryptographically secure relationships between devices connected via IP-based networks and the Internet. Trust establishment is presented...

  5. Fault Analysis in Cryptography

    CERN Document Server

    Joye, Marc

    2012-01-01

    In the 1970s researchers noticed that radioactive particles produced by elements naturally present in packaging material could cause bits to flip in sensitive areas of electronic chips. Research into the effect of cosmic rays on semiconductors, an area of particular interest in the aerospace industry, led to methods of hardening electronic devices designed for harsh environments. Ultimately various mechanisms for fault creation and propagation were discovered, and in particular it was noted that many cryptographic algorithms succumb to so-called fault attacks. Preventing fault attacks without

  6. The Classification of Complementary Information Set Codes of Lengths 14 and 16

    OpenAIRE

    Freibert, Finley

    2012-01-01

    In the paper "A new class of codes for Boolean masking of cryptographic computations," Carlet, Gaborit, Kim, and Sol\\'{e} defined a new class of rate one-half binary codes called \\emph{complementary information set} (or CIS) codes. The authors then classified all CIS codes of length less than or equal to 12. CIS codes have relations to classical Coding Theory as they are a generalization of self-dual codes. As stated in the paper, CIS codes also have important practical applications as they m...

  7. Underlying Constructs in the Development and Institutionalization of the Child Drama Field.

    Science.gov (United States)

    Woodson, Stephani Etheridge

    1998-01-01

    Examines the invisible incorporation of constructions from the Victorian and Progressive eras regarding children, women, and theatre art, into the field of child drama. Discusses child drama as a moral calling; women and the gendered status of child drama; child drama as an amateur field; child drama as education in democracy; and the construction…

  8. The Influence of Judgment Calls on Meta-Analytic Findings.

    Science.gov (United States)

    Tarrahi, Farid; Eisend, Martin

    2016-01-01

    Previous research has suggested that judgment calls (i.e., methodological choices made in the process of conducting a meta-analysis) have a strong influence on meta-analytic findings and question their robustness. However, prior research applies case study comparison or reanalysis of a few meta-analyses with a focus on a few selected judgment calls. These studies neglect the fact that different judgment calls are related to each other and simultaneously influence the outcomes of a meta-analysis, and that meta-analytic findings can vary due to non-judgment call differences between meta-analyses (e.g., variations of effects over time). The current study analyzes the influence of 13 judgment calls in 176 meta-analyses in marketing research by applying a multivariate, multilevel meta-meta-analysis. The analysis considers simultaneous influences from different judgment calls on meta-analytic effect sizes and controls for alternative explanations based on non-judgment call differences between meta-analyses. The findings suggest that judgment calls have only a minor influence on meta-analytic findings, whereas non-judgment call differences between meta-analyses are more likely to explain differences in meta-analytic findings. The findings support the robustness of meta-analytic results and conclusions.

  9. Optimal scheduling in call centers with a callback option

    OpenAIRE

    Legros , Benjamin; Jouini , Oualid; Koole , Ger

    2016-01-01

    International audience; We consider a call center model with a callback option, which allows to transform an inbound call into an outbound one. A delayed call, with a long anticipated waiting time, receives the option to be called back. We assume a probabilistic customer reaction to the callback offer (option). The objective of the system manager is to characterize the optimal call scheduling that minimizes the expected waiting and abandonment costs. For the single-server case, we prove that ...

  10. Flight calls and orientation

    DEFF Research Database (Denmark)

    Larsen, Ole Næsbye; Andersen, Bent Bach; Kropp, Wibke

    2008-01-01

    flight calls was simulated by sequential computer controlled activation of five loudspeakers placed in a linear array perpendicular to the bird's migration course. The bird responded to this stimulation by changing its migratory course in the direction of that of the ‘flying conspecifics' but after about......  In a pilot experiment a European Robin, Erithacus rubecula, expressing migratory restlessness with a stable orientation, was video filmed in the dark with an infrared camera and its directional migratory activity was recorded. The flight overhead of migrating conspecifics uttering nocturnal...... 30 minutes it drifted back to its original migration course. The results suggest that songbirds migrating alone at night can use the flight calls from conspecifics as additional cues for orientation and that they may compare this information with other cues to decide what course to keep....

  11. LABELLING DIFFERENT SKIN COLOR AS CULTURAL DETERMINISM REPRESENTED IN MAYA ANGELOU‘S POEM THE CALLING OF NAMES

    Directory of Open Access Journals (Sweden)

    Mohamad Ikhwan Rosyidi

    2017-12-01

    Full Text Available The aim of this study is to describe representation of labelling different color skin as a construction of American towards color skin people in America reflected on one of Maya Angelou‘s poems The Calling of Names (1994. This study will use structural-semiotic approach, especially applying Riffaterre‘s semiotics of poetry (1984. This semiotic theory will operate on heuristic and hermeneutic readings for uncovering description of representation of how color skin people is perceived and, of course, labelled as different people by white people. This labelling performance for color skin people results, first, the acts of calling particular name of people which raises racism on different skin colour, second, racism, prejudice, discrimination which leads to bias and disparity creating inequity and inequality towards Black or Coloured people in American society and long continuum of labelling different skin colour as a result of cultural determninism in American Society.

  12. Lunar phases and crisis center telephone calls.

    Science.gov (United States)

    Wilson, J E; Tobacyk, J J

    1990-02-01

    The lunar hypothesis, that is, the notion that lunar phases can directly affect human behavior, was tested by time-series analysis of 4,575 crisis center telephone calls (all calls recorded for a 6-month interval). As expected, the lunar hypothesis was not supported. The 28-day lunar cycle accounted for less than 1% of the variance of the frequency of crisis center calls. Also, as hypothesized from an attribution theory framework, crisis center workers reported significantly greater belief in lunar effects than a non-crisis-center-worker comparison group.

  13. Correlates of Gay-Related Name-Calling in Schools

    Science.gov (United States)

    Slaatten, Hilde; Hetland, Jørn; Anderssen, Norman

    2015-01-01

    The aim of this study was to examine whether attitudes about gay-related name-calling, social norms concerning gay-related name-calling among co-students, teacher intervention, and school-related support would predict whether secondary school pupils had called another pupil a gay-related name during the last month. A total of 921 ninth-grade…

  14. 47 CFR 90.241 - Radio call box operations.

    Science.gov (United States)

    2010-10-01

    ... remains on for a period in excess of three minutes. The automatic cutoff system must be designed so the... Public Safety Pool for highway call box systems subject to the following requirements: (1) Call box... effective radiated power (ERP). (3) The height of a call box antenna may not exceed 6.1 meters (20 feet...

  15. Coaching "Callings" throughout the Adult Life Cycle.

    Science.gov (United States)

    Hudson, Frederic M.

    2001-01-01

    The process of "callings" continues throughout life. Coaching can connect the present to the future in a meaningful way. Callings represent a value shift requiring revision of the nature and scope of one's central purpose in life and meaningful activities. (JOW)

  16. Construction of Intelligent Virtual Worlds Using a Grammatical Framework

    OpenAIRE

    López García, Gabriel; Gallego Sánchez, Antonio Javier; Molina-Carmona, Rafael; Compañ, Patricia

    2014-01-01

    The potential of integrating multiagent systems and virtual environments has not been exploited to its whole extent. This paper proposes a model based on grammars, called Minerva, to construct complex virtual environments that integrate the features of agents. A virtual world is described as a set of dynamic and static elements. The static part is represented by a sequence of primitives and transformations and the dynamic elements by a series of agents. Agent activation and communication is a...

  17. Performance indicators for call centers with impatience

    NARCIS (Netherlands)

    Jouini, O.; Koole, G.M.; Roubos, A.

    2013-01-01

    An important feature of call center modeling is the presence of impatient customers. This article considers single-skill call centers including customer abandonments. A number of different service-level definitions are structured, including all those used in practice, and the explicit computation of

  18. Calling, is there anything special about it?

    African Journals Online (AJOL)

    2016-07-15

    Jul 15, 2016 ... when a pastor is installed or a new candidate is ordained, 'The one who calls you is faithful .... extension to secular work of the dignity of a calling' (Fowler ... For Luther, therefore, the private life of devotion exercised in the.

  19. Ultrasound call detection in capybara

    Directory of Open Access Journals (Sweden)

    Selene S.C. Nogueira

    2012-07-01

    Full Text Available The vocal repertoire of some animal species has been considered a non-invasive tool to predict distress reactivity. In rats ultrasound emissions were reported as distress indicator. Capybaras[ vocal repertoire was reported recently and seems to have ultrasound calls, but this has not yet been confirmed. Thus, in order to check if a poor state of welfare was linked to ultrasound calls in the capybara vocal repertoire, the aim of this study was to track the presence of ultrasound emissions in 11 animals under three conditions: 1 unrestrained; 2 intermediately restrained, and 3 highly restrained. The ultrasound track identified frequencies in the range of 31.8±3.5 kHz in adults and 33.2±8.5 kHz in juveniles. These ultrasound frequencies occurred only when animals were highly restrained, physically restrained or injured during handling. We concluded that these calls with ultrasound components are related to pain and restraint because they did not occur when animals were free of restraint. Thus we suggest that this vocalization may be used as an additional tool to assess capybaras[ welfare.

  20. Relabeling the Medications We Call Antidepressants

    Directory of Open Access Journals (Sweden)

    David Antonuccio

    2012-01-01

    Full Text Available This paper raises the question about whether the data on the medications we call antidepressants justify the label of antidepressant. The authors argue that a true antidepressant should be clearly superior to placebo, should offer a risk/benefit balance that exceeds that of alternative treatments, should not increase suicidality, should not increase anxiety and agitation, should not interfere with sexual functioning, and should not increase depression chronicity. Unfortunately, these medications appear to fall short on all of these dimensions. Many of the “side effects” of these medications have larger effect sizes than the antidepressant effect size. To call these medications antidepressants may make sense from a marketing standpoint but may be misleading from a scientific perspective. Consumers deserve a label that more accurately reflects the data on the largest effects and helps them understand the range of effects from these medications. In other words, it may make just as much sense to call these medications antiaphrodisiacs as antidepressants because the negative effects on libido and sexual functioning are so common. It can be argued that a misleading label may interfere with our commitment to informed consent. Therefore, it may be time to stop calling these medications antidepressants.

  1. Proposal for constructing the energetic particle injector

    International Nuclear Information System (INIS)

    Ueda, M.; Ferreira, A.C.A.; Aso, Y.

    1987-07-01

    The construction of an electrostatic accelerator to produce an intense ion beam is proposed. The high voltage pulse to be used in the acceleration of the ions (500 kV, 1 μs) will be provided by a Marx generator. Using this pulses, a high total current proton beam (>200 KA) will be extracted from a magnetically insulated diode with an anode plasma produced by an inductive breakdown of hydrogen gas. The beam will be injected into a magnetic confinement device, a tokamak to be called ETA (Experimento Toroidal Avancado), to study heating, refueling and noninductive current generation in toroidal plasmas. (author) [pt

  2. The Barbados Emergency Ambulance Service: High Frequency of Nontransported Calls

    Directory of Open Access Journals (Sweden)

    Sherwin E. Phillips

    2012-01-01

    Full Text Available Objectives. There are no published studies on the Barbados Emergency Ambulance Service and no assessment of the calls that end in nontransported individuals. We describe reasons for the nontransport of potential clients. Methods. We used the Emergency Medical Dispatch (Medical Priority Dispatch System instrument, augmented with five local call types, to collect information on types of calls. The calls were categorised under 7 headings. Correlations between call types and response time were calculated. Results. Most calls were from the category medical (54%. Nineteen (19% percent of calls were in the non-transported category. Calls from call type Cancelled accounted for most of these and this was related to response time, while Refused service was inversely related (. Conclusions. The Barbados Ambulance Service is mostly used by people with a known illness and for trauma cases. One-fifth of calls fall into a category where the ambulance is not used often due to cancellation which is related to response time. Other factors such as the use of alternative transport are also important. Further study to identify factors that contribute to the non-transported category of calls is necessary if improvements in service quality are to be made.

  3. A construction process model for implementing constructability in construction

    NARCIS (Netherlands)

    Langkemper, J.; Al-Jibouri, S.; Reymen, I.M.M.J.; Maas, G.J.; Gassel, van F.

    2003-01-01

    In construction, failure of design professionals to consider how a builder will implement the design can result in scheduling problems, cost escalation, delays and disputes during the construction process. The integration of construction knowledge and experience during planning and design is termed

  4. Make a 21st century phone call

    CERN Multimedia

    Katarina Anthony

    2014-01-01

    Want to avoid roaming charges? Click to call anyone at CERN? How about merging your CERN landline with your existing smartphone? That's all easily done with Lync, CERN's new opt-in service that can take your calls to the next level.   The Lync application on Windows (left) and iPhone (right). Lync unites CERN's traditional telephone service with the digital sphere. "Lync gives you the gift of mobility, by letting you access your CERN landline on the go," explains Pawel Grzywaczewski, service manager of the Lync system. "Once you've registered your CERN telephone with the service, you can run the Lync application and make calls from a range of supported devices. No matter where you are in the world - be it simply out to lunch or off at an international conference - you can make a CERN call as though you were in the office. All you need is an Internet connection!" Following a recent upgrade, CERN's Lync service now has...

  5. Multipartite secret key distillation and bound entanglement

    International Nuclear Information System (INIS)

    Augusiak, Remigiusz; Horodecki, Pawel

    2009-01-01

    Recently it has been shown that quantum cryptography beyond pure entanglement distillation is possible and a paradigm for the associated protocols has been established. Here we systematically generalize the whole paradigm to the multipartite scenario. We provide constructions of new classes of multipartite bound entangled states, i.e., those with underlying twisted Greenberger-Horne-Zeilinger (GHZ) structure and nonzero distillable cryptographic key. We quantitatively estimate the key from below with the help of the privacy squeezing technique.

  6. Visual cryptography for image processing and security theory, methods, and applications

    CERN Document Server

    Liu, Feng

    2014-01-01

    This unique book describes the fundamental concepts, theories and practice of visual cryptography. The design, construction, analysis, and application of visual cryptography schemes (VCSs) are discussed in detail. Original, cutting-edge research is presented on probabilistic, size invariant, threshold, concolorous, and cheating immune VCS. Features: provides a thorough introduction to the field; examines various common problems in visual cryptography, including the alignment, flipping, cheating, distortion, and thin line problems; reviews a range of VCSs, including XOR-based visual cryptograph

  7. Sleep Quality of Call Handlers Employed in International Call Centers in National Capital Region of Delhi, India

    Directory of Open Access Journals (Sweden)

    JD Raja

    2016-10-01

    suspicion of insomnia or suspected insomnia; the rest had no sleep problem. Smoking, poor social support, heavy workload, lack of relaxation facility at office, and prolonged travel time to office were independent predictors of sleep quality (p<0.05. Conclusion: Call handlers have to compromise upon their sleep owing to the contemporary work settings in call centers. Safeguarding their health becomes an occupational health challenge to public health specialists.

  8. Constructal theory through thermodynamics of irreversible processes framework

    International Nuclear Information System (INIS)

    Tescari, S.; Mazet, N.; Neveu, P.

    2011-01-01

    Highlights: → Point to area flow problem is solved through Thermodynamics of irreversible processes. → A new optimisation criterion is defined: the exergy or entropy impedance. → Optimisation is performed following two different routes, constructal or global. → Global optimisation is more efficient than constructal optimisation. → Global optimisation enhances the domain of construct benefits. - Abstract: Point to volume flow problem is revisited on a thermodynamics of irreversible processes (TIP) basis. The first step consists in evaluating the local entropy production of the system, and deducing from this expression the phenomenological laws. Then, the total entropy production can be simply evaluated. It is demonstrated that total entropy production can be written in a remarkable form: the product of the so-called entropy impedance with the square of the heat flux. As the heat flux is given, optimisation consists in minimising the entropy impedance. It is also shown that minimising entropy impedance minimises the maximum temperature difference. Applied to the elemental volume, this optimisation process leads to a shape factor close to the one already published. For the first construction, the equivalent system is defined as stated by Prigogine: when subjected to the same constraints, two systems are thermodynamically equivalent if their entropy production is equal. Two optimisation routes are then investigated: a global optimisation where all scales are taken into account and the constructal optimisation where the system is optimised scale by scale. In this second case, results are close to Ghodossi's work. When global optimisation is performed, it is demonstrated that conductive paths have to be spread uniformly in the active material (i.e. the number of elemental volumes must go to infinite). Comparing the two routes, global optimisation leads to better performance than constructal optimisation. Moreover, global optimisation enlarges the domain of

  9. Consumer Experiences Calling Toll-Free Corporate Hotlines.

    Science.gov (United States)

    Martin, Charles L.; Smart, Denise T.

    1994-01-01

    Finds that dimensions that contribute to caller satisfaction (of toll-free corporate hotlines) included operator characteristics such as knowledge, courtesy, and interest; specific behaviors such as apologizing for a problem, thanking the consumer for calling, and encouraging them to call again; and reducing time placed on "hold." (SR)

  10. Call center performance with direct response advertising

    NARCIS (Netherlands)

    M. Kiygi Calli (Meltem); M. Weverbergh (Marcel); Ph.H.B.F. Franses (Philip Hans)

    2017-01-01

    textabstractThis study investigates the manpower planning and the performance of a national call center dealing with car repairs and on the road interventions. We model the impact of advertising on the capacity required. The starting point is a forecasting model for the incoming calls, where we take

  11. Auditing of suppliers as the requirement of quality management systems in construction

    Science.gov (United States)

    Harasymiuk, Jolanta; Barski, Janusz

    2017-07-01

    The choice of a supplier of construction materials can be important factor of increase or reduction of building works costs. Construction materials present from 40 for 70% of investment task depending on kind of works being provided for realization. There is necessity of estimate of suppliers from the point of view of effectiveness of construction undertaking and necessity from the point of view of conformity of taken operation by executives of construction job and objects within the confines of systems of managements quality being initiated in their organizations. The estimate of suppliers of construction materials and subexecutives of special works is formal requirement in quality management systems, which meets the requirements of the ISO 9001 standard. The aim of this paper is to show possibilities of making use of anaudit for estimate of credibility and reliability of the supplier of construction materials. The article describes kinds of audits, that were carried in quality management systems, with particular taking into consideration audits called as second-site. One characterizes the estimate criterions of qualitative ability and method of choice of the supplier of construction materials. The paper shows also propositions of exemplary questions, that would be estimated in audit process, the way of conducting of this estimate and conditionality of estimate.

  12. From within the Abyss of the Mind : Psychological Horror in H. P. Lovecraft’s “The Call of Cthulhu”

    OpenAIRE

    Joakim, Bengtsson

    2003-01-01

    ABSTRACT An attempt to put the horror writer H. P. Lovecraft on the map of psychoanalytical criticism, this analysis examines Lovecraft’s use of setting, characters, and narrative mode and structure in “The Call of Cthulhu” (1926) to show how his construction of horror has its ground in psychology, or, more specifically, in ideas of identity and violated boundaries of the self. In addition, brief reflections on Modernist art, its connections with psychoanalysis, and its analogies to Lovecraft...

  13. Call for tender - Areva-Alstom: watershed in wind energy - Technological duel on the open sea

    International Nuclear Information System (INIS)

    Dupin, L.

    2012-01-01

    The author comments the answers to a call for tender made by the French government and concerning five offshore wind farm sites (Le Treport, Fecamp, Courseulles sur Mer, Saint-Brieuc and Saint-Nazaire). As they are present within the three consortiums, Areva and Alstom should provide the wind turbines. This would result in the construction by Alstom of two blade and mast factories and two turbine and pad factories. For both companies, this market of 500 to 600 turbines is an opportunity. Many jobs are at stake. They push themselves forward for their experience or their innovation capacity. But their wind turbines will be based on foreign (Spanish or German) technology

  14. Hardware device binding and mutual authentication

    Science.gov (United States)

    Hamlet, Jason R; Pierson, Lyndon G

    2014-03-04

    Detection and deterrence of device tampering and subversion by substitution may be achieved by including a cryptographic unit within a computing device for binding multiple hardware devices and mutually authenticating the devices. The cryptographic unit includes a physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generates a binding PUF value. The cryptographic unit uses the binding PUF value during an enrollment phase and subsequent authentication phases. During a subsequent authentication phase, the cryptographic unit uses the binding PUF values of the multiple hardware devices to generate a challenge to send to the other device, and to verify a challenge received from the other device to mutually authenticate the hardware devices.

  15. Advertisement call of Scinax camposseabrai (Bokermann, 1968) (Anura: Hylidae), with comments on the call of three species of the Scinax ruber clade.

    Science.gov (United States)

    Novaes, Gabriel; Zina, Juliana

    2016-02-25

    Scinax camposseabrai was allocated into the Scinax ruber clade by Caramaschi & Cardoso (2006) by overall similarities as snout not pointed, breeding in open areas, and an advertisement calls with multipulsed notes. This assumption about the call was based solely on an onomatopoeia provided by Bokermann (1968). Herein we provide a formal description of the advertisement call of S. camposseabrai and compare it with described calls of other S. ruber clade species. Additionally, we provide descriptions of the advertisement calls of three sympatric species of the S. ruber clade: S. eurydice (Bokermann), S. pachycrus (Miranda-Ribeiro) and S. cf. x-signatus.

  16. Hacking the art of exploitation

    CERN Document Server

    Erickson, Jon

    2003-01-01

    A comprehensive introduction to the techniques of exploitation and creative problem-solving methods commonly referred to as "hacking," Hacking: The Art of Exploitation is for both technical and non-technical people who are interested in computer security. It shows how hackers exploit programs and write exploits, instead of just how to run other people's exploits. Unlike many so-called hacking books, this book explains the technical aspects of hacking, including stack based overflows, heap based overflows, string exploits, return-into-libc, shellcode, and cryptographic attacks on 802.11b.

  17. A Synoptic of Software Implementation for Shift Registers Based on 16th Degree Primitive Polynomials

    Directory of Open Access Journals (Sweden)

    Mirella Amelia Mioc

    2016-08-01

    Full Text Available Almost all of the major applications in the specific Fields of Communication used a well-known device called Linear Feedback Shift Register. Usually LFSR functions in a Galois Field GF(2n, meaning that all the operations are done with arithmetic modulo n degree Irreducible  and especially  Primitive Polynomials. Storing data in Galois Fields allows effective and manageable manipulation, mainly in computer cryptographic applications. The analysis of functioning for Primitive Polynomials of 16th degree shows that almost all the obtained results are in the same time distribution.

  18. Environmental constraints and call evolution in torrent-dwelling frogs.

    Science.gov (United States)

    Goutte, Sandra; Dubois, Alain; Howard, Samuel D; Marquez, Rafael; Rowley, Jodi J L; Dehling, J Maximilian; Grandcolas, Philippe; Rongchuan, Xiong; Legendre, Frédéric

    2016-04-01

    Although acoustic signals are important for communication in many taxa, signal propagation is affected by environmental properties. Strong environmental constraints should drive call evolution, favoring signals with greater transmission distance and content integrity in a given calling habitat. Yet, few empirical studies have verified this prediction, possibly due to a shortcoming in habitat characterization, which is often too broad. Here we assess the potential impact of environmental constraints on the evolution of advertisement call in four groups of torrent-dwelling frogs in the family Ranidae. We reconstruct the evolution of calling site preferences, both broadly categorized and at a finer scale, onto a phylogenetic tree for 148 species with five markers (∼3600 bp). We test models of evolution for six call traits for 79 species with regard to the reconstructed history of calling site preferences and estimate their ancestral states. We find that in spite of existing morphological constraints, vocalizations of torrent-dwelling species are most probably constrained by the acoustic specificities of torrent habitats and particularly their high level of ambient noise. We also show that a fine-scale characterization of calling sites allows a better perception of the impact of environmental constraints on call evolution. © 2016 The Author(s). Evolution © 2016 The Society for the Study of Evolution.

  19. Attitude of Farmers towards Kisan Call Centres

    Directory of Open Access Journals (Sweden)

    Shely Mary Koshy

    2017-09-01

    Full Text Available The present study was conducted to measure the attitude of farmers in Kerala, India towards Kisan Call Centre (KCC. Kisan Call Centre provides free agricultural advisory services to every citizen involved in agriculture through a toll free number. One hundred and fifty farmers who have utilized the Kisan Call Centre service were selected from the database of KCC. The results showed that the respondents had moderately favourable attitude towards KCC followed by highly favourable attitude. The variables digital divide, temporal awareness on KCC, satisfaction towards KCC and utilization of KCC were found to have a positive correlation with the attitude of respondents towards KCC.

  20. Partitioning a call graph

    NARCIS (Netherlands)

    Bisseling, R.H.; Byrka, J.; Cerav-Erbas, S.; Gvozdenovic, N.; Lorenz, M.; Pendavingh, R.A.; Reeves, C.; Röger, M.; Verhoeven, A.; Berg, van den J.B.; Bhulai, S.; Hulshof, J.; Koole, G.; Quant, C.; Williams, J.F.

    2006-01-01

    Splitting a large software system into smaller and more manageable units has become an important problem for many organizations. The basic structure of a software system is given by a directed graph with vertices representing the programs of the system and arcs representing calls from one program to

  1. Too close to call

    DEFF Research Database (Denmark)

    Kurrild-Klitgaard, Peter

    2012-01-01

    a number of other frequent explanations and is found to be quite robust. When augmented with approval ratings for incumbent presidents, the explanatory power increases to 83 pct. and only incorrectly calls one of the last 15 US presidential elections. Applied to the 2012 election as a forecasting model...

  2. A call for surveys

    DEFF Research Database (Denmark)

    Bernstein, Philip A.; Jensen, Christian S.; Tan, Kian-Lee

    2012-01-01

    The database field is experiencing an increasing need for survey papers. We call on more researchers to set aside time for this important writing activity. The database field is growing in population, scope of topics covered, and the number of papers published. Each year, thousands of new papers ...

  3. Call centers with a postponed callback offer

    NARCIS (Netherlands)

    B. Legros (Benjamin); S. Ding (Sihan); R.D. van der Mei (Rob); O. Jouini (Oualid)

    2017-01-01

    textabstractWe study a call center model with a postponed callback option. A customer at the head of the queue whose elapsed waiting time achieves a given threshold receives a voice message mentioning the option to be called back later. This callback option differs from the traditional ones found in

  4. Achieving the Limits of the Noisy-Storage Model Using Entanglement Sampling

    DEFF Research Database (Denmark)

    Dupont-Dupuis, Fréderic; Fawzi, Omar; Wehner, Stephanie

    2013-01-01

    . Cryptology, 2000) with constructions of logarithmic-depth formulae which compute threshold functions using only constant fan-in threshold gates. Using this approach, we simplify and improve on previous results in cryptography and distributed computing. In particular: - We provide conceptually simple...... on the following complexity-theoretic contributions, which may be of independent interest: - We show that for every j,k ∈ ℕ such that m Delta equal to k-1/j-1 is an integer, there is an explicit (poly(n)-time) construction of a logarithmic-depth formula which computes a good approximation of an (n...... approximation than for the general threshold case, and also an exact explicit construction based on standard complexity-theoretic or cryptographic assumptions. © 2013 International Association for Cryptologic Research....

  5. The Role of Analyst Conference Calls in Capital Markets

    NARCIS (Netherlands)

    E.M. Roelofsen (Erik)

    2010-01-01

    textabstractMany firms conduct a conference call with analysts shortly after the quarterly earnings announcement. In these calls, management discusses the completed quarter, and analysts can ask questions. Due to SEC requirements, conference calls in the United States are virtually always live

  6. Canonical quantization of so-called non-Lagrangian systems

    Energy Technology Data Exchange (ETDEWEB)

    Gitman, D.M. [Universidade de Sao Paulo, Instituto de Fisica, Caixa Postal 66318-CEP, Sao Paulo, S.P. (Brazil); Kupriyanov, V.G. [Universidade de Sao Paulo, Instituto de Fisica, Caixa Postal 66318-CEP, Sao Paulo, S.P. (Brazil); Tomsk State University, Physics Department, Tomsk (Russian Federation)

    2007-04-15

    We present an approach to the canonical quantization of systems with equations of motion that are historically called non-Lagrangian equations. Our viewpoint of this problem is the following: despite the fact that a set of differential equations cannot be directly identified with a set of Euler-Lagrange equations, one can reformulate such a set in an equivalent first-order form that can always be treated as the Euler-Lagrange equations of a certain action. We construct such an action explicitly. It turns out that in the general case the hamiltonization and canonical quantization of such an action are non-trivial problems, since the theory involves time-dependent constraints. We adopt the general approach of hamiltonization and canonical quantization for such theories as described in D.M. Gitman, I.V. Tyutin, Quantization of Fields with Constraints (Springer, Berlin, 1990). to the case under consideration. There exists an ambiguity (that cannot be reduced to the addition of a total time derivative) in associating a Lagrange function with a given set of equations. We present a complete description of this ambiguity. The proposed scheme is applied to the quantization of a general quadratic theory. In addition, we consider the quantization of a damped oscillator and of a radiating point-like charge. (orig.)

  7. Canonical quantization of so-called non-Lagrangian systems

    International Nuclear Information System (INIS)

    Gitman, D.M.; Kupriyanov, V.G.

    2007-01-01

    We present an approach to the canonical quantization of systems with equations of motion that are historically called non-Lagrangian equations. Our viewpoint of this problem is the following: despite the fact that a set of differential equations cannot be directly identified with a set of Euler-Lagrange equations, one can reformulate such a set in an equivalent first-order form that can always be treated as the Euler-Lagrange equations of a certain action. We construct such an action explicitly. It turns out that in the general case the hamiltonization and canonical quantization of such an action are non-trivial problems, since the theory involves time-dependent constraints. We adopt the general approach of hamiltonization and canonical quantization for such theories as described in D.M. Gitman, I.V. Tyutin, Quantization of Fields with Constraints (Springer, Berlin, 1990). to the case under consideration. There exists an ambiguity (that cannot be reduced to the addition of a total time derivative) in associating a Lagrange function with a given set of equations. We present a complete description of this ambiguity. The proposed scheme is applied to the quantization of a general quadratic theory. In addition, we consider the quantization of a damped oscillator and of a radiating point-like charge. (orig.)

  8. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary

    OpenAIRE

    Sendrier , Nicolas; Tillich , Jean-Pierre

    2016-01-01

    International audience; Cryptography is one of the key tools for providing security in our quickly evolving technological society. An adversary with the ability to use a quantum computer would defeat most of the cryptographic solutions that are deployed today to secure our communications. We do not know when quantum computing will become available, but nevertheless, the cryptographic research community must get ready for it now. Code-based cryptography is among the few cryptographic technique...

  9. Individual and contextual variation in Thomas langur male loud calls

    NARCIS (Netherlands)

    Wich, S.A.; Koski, S.; Vries, Han de; Schaik, Carel P. van

    2003-01-01

    Individual and contextual differences in male loud calls of wild Thomas langurs (Presbytis thomasi) were studied in northern Sumatra, Indonesia. Loud calls were given in the following contexts: morning calls, vocal responses to other groups, between-group encounter calls and alarmcalls. Loud

  10. Help Options in CALL: A Systematic Review

    Science.gov (United States)

    Cardenas-Claros, Monica S.; Gruba, Paul A.

    2009-01-01

    This paper is a systematic review of research investigating help options in the different language skills in computer-assisted language learning (CALL). In this review, emerging themes along with is-sues affecting help option research are identified and discussed. We argue that help options in CALL are application resources that do not only seem…

  11. The Call to Teach and Teacher Hopefulness

    Science.gov (United States)

    Bullough, Robert V., Jr.; Hall-Kenyon, Kendra M.

    2011-01-01

    The purpose of this paper is to explore teacher motivation and well-being. Our analysis focuses on two central concepts, the notion of a "calling to teach" and of teacher "hopefulness." Data from 205 preservice and inservice teachers were collected to determine teachers' sense of calling and level of hope. Results indicate that overwhelmingly,…

  12. Examining calling as a double-edged sword for employability

    NARCIS (Netherlands)

    Lysova, Evgenia I.; Jansen, Paul G.W.; Khapova, Svetlana N.; Plomp, Judith; Tims, Maria

    2018-01-01

    Using a two-study design (total N = 1232), this paper examines the relationship between calling and employability. We suggest that, on the one hand, calling can positively relate to employability due to individuals’ engagement in proactive professional development (PPD). On the other hand, calling

  13. Identification of sympatric bat species by the echolocation calls

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    One hundred and thirty-eight echolocation calls of 63 free-flying individuals of five bat species (Rhinolophus ferrumequinum,Myotis formosus,Myotis ikonnikovi,Myotis daubentoni and Murina leucogaster)were recorded (by ultrasonic bat detector (D980)) in Zhi'an village of Jilin Province,China.According to the frequency-time spectra,these calls were categorized into two types:FM/CF (constant frequency) / FM (R.ferrumequinum) and FM (frequency modulated)(M.formosus,M.ikonnikovi,M.daubentoni and M.leucogaster).Sonograms of the calls of R.ferrumequinum could easily be distinguished from those of the other four species.For the calls of the remaining four species,six echolocation call parameters,including starting frequency,ending frequency,peak frequency duration,longest inter-pulse interval and shortest inter-pulse interval,were examined by stepwise discriminant analysis.The results show that 84.1% of calls were correctly classified,which indicates that these parameters of echolocation calls play an important role in identifying bat species.These parameters can be used to test the accuracy of general predictions based on bats' morphology in the same forest and can provide essential information for assessing patterns of bat habitat use.

  14. Heart rate variability changes in physicians working on night call.

    Science.gov (United States)

    Malmberg, Birgitta; Persson, Roger; Flisberg, Per; Ørbaek, Palle

    2011-03-01

    Adverse effects by night-call duty have become an important occupational health issue. The aim of this study was to investigate whether the heart rate variability (HRV) differed during recovery from day work and night-call duty between distinct physician specialities. We studied the impact of a 16-h night-call duty on autonomic balance, measured by HRV, among two physician groups differing with respect to having to deal with life-threatening conditions while on call. Nineteen anaesthesiologists (ANEST) and 16 paediatricians and ear, nose and throat surgeons (PENT) were monitored by ambulatory digital Holter electrocardiogram (ECG). Heart rate variability was analysed between 21:00 and 22:00 after an ordinary workday, on night call and in the evening post-call. Absolute and normalized high-frequency power (HF, HFnu) were the main outcome variables, expressing parasympathetic influence on the heart. ANEST had lower HF power than PENT while on night call and post-daytime work (p work compared with post-night-call duty (p balance and did not differ between specialities. However, the less dynamic HRV after daytime work and during night-call duty in the ANEST group may indicate a higher physiological stress level. These results may contribute to the improvement of night-call schedules within the health care sector.

  15. Teaching of History: argumentation and the construction of meaning

    Directory of Open Access Journals (Sweden)

    Patricia Bastos de Azevedo

    2011-06-01

    Full Text Available The aim of this article is to discuss the construction of meaning through argumentation in the teaching of History. The field research was carried out in a municipal school in Niterói – RJ. The research included 30 hours of recordings of History classes of a group of the 4th cycle of Elementary Education (also called 8th year of Elementary Education. The data analysis articulated the theoretical elements related to curriculum, language and culture. It can be pointed out a possibility of theoretical approximation of these three fields of knowledge relating them to the concrete space of the History class. The challenge is to create a dialogue among the theories from the curriculum, language and culture fields, aiming to understand the construction of meaning in the teaching of History by means of argumentation.

  16. Constructing linkage maps in the genomics era with MapDisto 2.0.

    Science.gov (United States)

    Heffelfinger, Christopher; Fragoso, Christopher A; Lorieux, Mathias

    2017-07-15

    Genotyping by sequencing (GBS) generates datasets that are challenging to handle by current genetic mapping software with graphical interface. Geneticists need new user-friendly computer programs that can analyze GBS data on desktop computers. This requires improvements in computation efficiency, both in terms of speed and use of random-access memory (RAM). MapDisto v.2.0 is a user-friendly computer program for construction of genetic linkage maps. It includes several new major features: (i) handling of very large genotyping datasets like the ones generated by GBS; (ii) direct importation and conversion of Variant Call Format (VCF) files; (iii) detection of linkage, i.e. construction of linkage groups in case of segregation distortion; (iv) data imputation on VCF files using a new approach, called LB-Impute. Features i to iv operate through inclusion of new Java modules that are used transparently by MapDisto; (v) QTL detection via a new R/qtl graphical interface. The program is available free of charge at mapdisto.free.fr. mapdisto@gmail.com. Supplementary data are available at Bioinformatics online. © The Author (2017). Published by Oxford University Press. All rights reserved. For Permissions, please email: journals.permissions@oup.com

  17. Calling under pressure: Short-finned pilot whales make social calls during deep foraging dives

    DEFF Research Database (Denmark)

    Jensen, Frants Havmand; Marrero Perez, Jacobo; Johnson, Mark

    2011-01-01

    Toothed whales rely on sound to echolocate prey and communicate with conspecifics, but little is known about how extreme pressure affects pneumatic sound production in deep-diving species with a limited air supply. The short-finned pilot whale (Globicephala macrorhynchus) is a highly social species...... among the deep-diving toothed whales, in which individuals socialize at the surface but leave their social group in pursuit of prey at depths of up to 1000 m. To investigate if these animals communicate acoustically at depth and test whether hydrostatic pressure affects communication signals, acoustic...... DTAGs logging sound, depth and orientation were attached to 12 pilot whales. Tagged whales produced tonal calls during deep foraging dives at depths of up to 800 m. Mean call output and duration decreased with depth despite the increased distance to conspecifics at the surface. This shows...

  18. The persistent sampling bias in developmental psychology: A call to action.

    Science.gov (United States)

    Nielsen, Mark; Haun, Daniel; Kärtner, Joscha; Legare, Cristine H

    2017-10-01

    Psychology must confront the bias in its broad literature toward the study of participants developing in environments unrepresentative of the vast majority of the world's population. Here, we focus on the implications of addressing this challenge, highlight the need to address overreliance on a narrow participant pool, and emphasize the value and necessity of conducting research with diverse populations. We show that high-impact-factor developmental journals are heavily skewed toward publishing articles with data from WEIRD (Western, educated, industrialized, rich, and democratic) populations. Most critically, despite calls for change and supposed widespread awareness of this problem, there is a habitual dependence on convenience sampling and little evidence that the discipline is making any meaningful movement toward drawing from diverse samples. Failure to confront the possibility that culturally specific findings are being misattributed as universal traits has broad implications for the construction of scientifically defensible theories and for the reliable public dissemination of study findings. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Frogs Call at a Higher Pitch in Traffic Noise

    Directory of Open Access Journals (Sweden)

    Kirsten M. Parris

    2009-06-01

    Full Text Available Male frogs call to attract females for mating and to defend territories from rival males. Female frogs of some species prefer lower-pitched calls, which indicate larger, more experienced males. Acoustic interference occurs when background noise reduces the active distance or the distance over which an acoustic signal can be detected. Birds are known to call at a higher pitch or frequency in urban noise, decreasing acoustic interference from low-frequency noise. Using Bayesian linear regression, we investigated the effect of traffic noise on the pitch of advertisement calls in two species of frogs, the southern brown tree frog (Litoria ewingii and the common eastern froglet (Crinia signifera. We found evidence that L. ewingii calls at a higher pitch in traffic noise, with an average increase in dominant frequency of 4.1 Hz/dB of traffic noise, and a total effect size of 123 Hz. This frequency shift is smaller than that observed in birds, but is still large enough to be detected by conspecific frogs and confer a significant benefit to the caller. Mathematical modelling predicted a 24% increase in the active distance of a L. ewingii call in traffic noise with a frequency shift of this size. Crinia signifera may also call at a higher pitch in traffic noise, but more data are required to be confident of this effect. Because frog calls are innate rather than learned, the frequency shift demonstrated by L. ewingii may represent an evolutionary adaptation to noisy conditions. The phenomenon of frogs calling at a higher pitch in traffic noise could therefore constitute an intriguing trade-off between audibility and attractiveness to potential mates.

  20. Certificate-Based Encryption with Keyword Search: Enabling Secure Authorization in Electronic Health Record

    Directory of Open Access Journals (Sweden)

    Clémentine Gritti

    2016-11-01

    Full Text Available In an e-Health scenario, we study how the practitioners are authorized when they are requesting access to medical documents containing sensitive information. Consider the following scenario. A clinician wants to access and retrieve a patient’s Electronic Health Record (EHR, and this means that the clinician must acquire sufficient access right to access this document. As the EHR is within a collection of many other patients, the clinician would need to specify some requirements (such as a keyword which match the patient’s record, as well as having a valid access right. The complication begins when we do not want the server to learn anything from this query (as the server might be outsourced to other place. To encompass this situation, we define a new cryptographic primitive called Certificate-Based Encryption with Keyword Search (CBEKS, which will be suitable in this scenario. We also specify the corresponding security models, namely computational consistency, indistinguishability against chosen keyword and ciphertext attacks, indistinguishability against keyword-guessing attacks and collusion resistance. We provide a CBEKS construction that is proven secure in the standard model with respect to the aforementioned security models.

  1. New degradation call admission control for increasing WCDMA system capacity

    Institute of Scientific and Technical Information of China (English)

    Liu Ningqing; Lu Zhi; Gu Xuemai

    2006-01-01

    Propose a new degradation call admission control(DCAC)scheme, which can be used in wideband code division multiple access communication system. So-called degradation is that non-real time call has the characteristic of variable bit rate, so decreasing its bit rate can reduce the load of the system, consequently the system can admit new call which should be blocked when the system is close to full load, therefore new call's access probability increases. This paper brings forward design project and does system simulation, simulation proves that DCAC can effectively decrease calls' blocking probability and increase the total number of the on-line users.

  2. Hardware device to physical structure binding and authentication

    Science.gov (United States)

    Hamlet, Jason R.; Stein, David J.; Bauer, Todd M.

    2013-08-20

    Detection and deterrence of device tampering and subversion may be achieved by including a cryptographic fingerprint unit within a hardware device for authenticating a binding of the hardware device and a physical structure. The cryptographic fingerprint unit includes an internal physically unclonable function ("PUF") circuit disposed in or on the hardware device, which generate an internal PUF value. Binding logic is coupled to receive the internal PUF value, as well as an external PUF value associated with the physical structure, and generates a binding PUF value, which represents the binding of the hardware device and the physical structure. The cryptographic fingerprint unit also includes a cryptographic unit that uses the binding PUF value to allow a challenger to authenticate the binding.

  3. Nanostructured materials, production and application in construction

    Directory of Open Access Journals (Sweden)

    KUDRYAVTSEV Pavel Gennadievich

    2014-12-01

    Full Text Available The paper considers characteristics of water-soluble high module silicate systems: based on polysilicates of alkali element called liquid glasses and the chains of their transformations from the lowest oligomers into the highest ones with further formation colloid solutions – silica sol. The authors describe the potentialities of the use of such systems as binders or modifying additives to produce different nanostructured silicate polymer concretes. There are examples of prospective application of liquid glass and water solutions of high module silicates in industrial areas and construction. Quantum-chemical calculations of the structure and properties of tetraphenylarsonium are given and heterogeneity of its functional groups is shown.

  4. The Role of Calling in Military Engagement

    Science.gov (United States)

    2017-06-01

    depression , hopelessness, emotional and behavior problems , and have lower levels of neuroticism (Oladipo et al., 2013; Suldo & Huebner, 2004; Gilman...retention? Data from surveys of Naval Postgraduate School students reveal many work-related correlations with calling and calling’s positive effects. My...retention? Data from surveys of Naval Postgraduate School students reveal many work-related correlations with calling and calling’s positive effects

  5. Constructing Optimal Coarse-Grained Sites of Huge Biomolecules by Fluctuation Maximization.

    Science.gov (United States)

    Li, Min; Zhang, John Zenghui; Xia, Fei

    2016-04-12

    Coarse-grained (CG) models are valuable tools for the study of functions of large biomolecules on large length and time scales. The definition of CG representations for huge biomolecules is always a formidable challenge. In this work, we propose a new method called fluctuation maximization coarse-graining (FM-CG) to construct the CG sites of biomolecules. The defined residual in FM-CG converges to a maximal value as the number of CG sites increases, allowing an optimal CG model to be rigorously defined on the basis of the maximum. More importantly, we developed a robust algorithm called stepwise local iterative optimization (SLIO) to accelerate the process of coarse-graining large biomolecules. By means of the efficient SLIO algorithm, the computational cost of coarse-graining large biomolecules is reduced to within the time scale of seconds, which is far lower than that of conventional simulated annealing. The coarse-graining of two huge systems, chaperonin GroEL and lengsin, indicates that our new methods can coarse-grain huge biomolecular systems with up to 10,000 residues within the time scale of minutes. The further parametrization of CG sites derived from FM-CG allows us to construct the corresponding CG models for studies of the functions of huge biomolecular systems.

  6. Adult meerkats modify close call rate in the presence of pups

    Institute of Scientific and Technical Information of China (English)

    Megan T.WYMAN; Pearl R.RIVERS; Coline MULLER; Pauline TONI; Marta B.MANSER

    2017-01-01

    In animals,signaling behavior is often context-dependent,with variation in the probability of emitting certain signals dependent on fitness advantages.Senders may adjust signaling rate depending on receiver identity,presence of audiences,or noise masking the signal,all of which can affect the benefits and costs of signal production.In the cooperative breeding meerkat Suricata suricatta,group members emit soft contact calls,termed as "close calls",while foraging in order to maintain group cohesion.Here,we investigated how the close calling rate during foraging was affected by the presence of pups,that produce continuous,noisy begging calls as they follow older group members.Adults decreased their overall close call rate substantially when pups were foraging with the group in comparison to periods when no pups were present.We suggest this decrease was likely due to a masking effect of the loud begging calls,which makes the close call function of maintaining group cohesion partly redundant as the centrally located begging calls can be used instead to maintain cohesion.There was some support that adults use close calls strategically to attract specific pups based on fitness advantages,that is,as the philopatric sex,females should call more than males and more to female pups than male pups.Dominant females called more than dominant males when a pup was in close proximity,while subordinates showed no sex-based differences.The sex of the nearest pup did not affect the calling rate of adults.The study shows that meerkats modify their close call production depending on benefits gained from calling and provides an example of the flexible use of one calling system in the presence of another,here contact calls versus begging calls,within the same species.

  7. Adult meerkats modify close call rate in the presence of pups.

    Science.gov (United States)

    Wyman, Megan T; Rivers, Pearl R; Muller, Coline; Toni, Pauline; Manser, Marta B

    2017-06-01

    In animals, signaling behavior is often context-dependent, with variation in the probability of emitting certain signals dependent on fitness advantages. Senders may adjust signaling rate depending on receiver identity, presence of audiences, or noise masking the signal, all of which can affect the benefits and costs of signal production. In the cooperative breeding meerkat Suricata suricatta , group members emit soft contact calls, termed as "close calls", while foraging in order to maintain group cohesion. Here, we investigated how the close calling rate during foraging was affected by the presence of pups, that produce continuous, noisy begging calls as they follow older group members. Adults decreased their overall close call rate substantially when pups were foraging with the group in comparison to periods when no pups were present. We suggest this decrease was likely due to a masking effect of the loud begging calls, which makes the close call function of maintaining group cohesion partly redundant as the centrally located begging calls can be used instead to maintain cohesion. There was some support that adults use close calls strategically to attract specific pups based on fitness advantages, that is, as the philopatric sex, females should call more than males and more to female pups than male pups. Dominant females called more than dominant males when a pup was in close proximity, while subordinates showed no sex-based differences. The sex of the nearest pup did not affect the calling rate of adults. The study shows that meerkats modify their close call production depending on benefits gained from calling and provides an example of the flexible use of one calling system in the presence of another, here contact calls versus begging calls, within the same species.

  8. Acoustic model optimisation for a call routing system

    CSIR Research Space (South Africa)

    Kleynhans, N

    2012-11-01

    Full Text Available Secretary system and provides background on some application-specific ASR issues. Section III details the ASR development effort as well as corpus selection and design. Our experiments are described Fig. 1. High level AutoSecretary call flow. in Section IV... and results and a discussion are presented in Section V. Lastly, the conclusion and possible future work appear in Section VI. II. BACKGROUND A. AutoSecretary IVR System Figure 1 shows the high level call flow of the AutoSecretary call routing system...

  9. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  10. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    Directory of Open Access Journals (Sweden)

    Murilo Coutinho

    2018-04-01

    Full Text Available Researches in Artificial Intelligence (AI have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC. Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  11. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    Science.gov (United States)

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  12. Actively Secure Two-Party Evaluation of Any Quantum Operation

    DEFF Research Database (Denmark)

    Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis

    2012-01-01

    We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map , given as a quantum circuit, upon their joint quantum input state . Our protocol leaks no more to any active adversary than an ideal ...... functionality for provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]....

  13. Quantum protocols for transference of proof of zero-knowledge systems

    OpenAIRE

    Nascimento, Jose Claudio do; Ramos, Rubens Viana

    2007-01-01

    Zero-knowledge proof system is an important protocol that can be used as a basic block for construction of other more complex cryptographic protocols. An intrinsic characteristic of a zero-knowledge systems is the assumption that is impossible for the verifier to show to a third part that he has interacted with the prover. However, it has been shown that using quantum correlations the impossibility of transferring proofs can be successfully attacked. In this work we show two new protocols for...

  14. Calle y Saberes en Movimiento

    Directory of Open Access Journals (Sweden)

    Laura Daniela Aguirre Aguilar

    2010-01-01

    Full Text Available En México el rezago, el ausentismo, la deserción escolar, el trabajo a temprana edad y el inicio de una vida en la calle, en repetidas ocasiones son consecuencia de un núcleo familiar desarticulado o de una débil relación intrafamiliar, así como de una condición socioeconómica en desventaja. Ante esta problemática, la Secretaría de Educación Pública, instancia gubernamental encargada de garantizar una educación de calidad para la población, trabaja coordinadamente con organizaciones de la sociedad civil e instancias públicas, para la reintegración a los espacios educativos de los niños, niñas y jóvenes en situación de calle.

  15. Inhibitors of calling behavior of Plodia interpunctella.

    Science.gov (United States)

    Hirashima, Akinori; Shigeta, Yoko; Eiraku, Tomohiko; Kuwano, Eiichi

    2003-01-01

    Some octopamine agonists were found to suppress the calling behavior of the stored product Indian meal moth, Plodia interpunctella. Compounds were screened using a calling behavior bioassay using female P. interpunctella. Four active derivatives, with inhibitory activity at the nanomolar range, were identified in order of decreasing activity: 2-(1-phenylethylamino)-2-oxazoline > 2-(2-ethyl,6-methylanilino)oxazolidine > 2-(2-methyl benzylamino)-2-thiazoline > 2-(2,6-diethylanilino)thiazolidine. Three-dimensional pharmacophore hypotheses were built from a set of 15 compounds. Among the ten common-featured models generated by the program Catalyst/HipHop, a hypothesis including a hydrogen-bond acceptor lipid, a hydrophobic aromatic and two hydrophobic aliphatic features was considered to be essential for inhibitory activity in the calling behavior. Active compounds mapped well onto all the hydrogen-bond acceptor lipid, hydrophobic aromatic and hydrophobic aliphatic features of the hypothesis. On the other hand, less active compounds were shown not to achieve the energetically favorable conformation that is found in the active molecules in order to fit the 3D common-feature pharmacophore models. The present studies demonstrate that inhibition of calling behavior is via an octopamine receptor.

  16. Inhibitors of calling behavior of Plodia interpunctella

    Directory of Open Access Journals (Sweden)

    Akinori Hirashima

    2003-01-01

    Full Text Available Some octopamine agonists were found to suppress the calling behavior of the stored product Indian meal moth, Plodia interpunctella. Compounds were screened using a calling behavior bioassay using female P. interpunctella. Four active derivatives, with inhibitory activity at the nanomolar range, were identified in order of decreasing activity: 2-(1-phenylethylamino-2-oxazoline > 2-(2-ethyl,6-methylanilinooxazolidine > 2-(2-methyl benzylamino-2-thiazoline > 2-(2,6-diethylanilinothiazolidine. Three-dimensional pharmacophore hypotheses were built from a set of 15 compounds. Among the ten common-featured models generated by the program Catalyst/HipHop, a hypothesis including a hydrogen-bond acceptor lipid, a hydrophobic aromatic and two hydrophobic aliphatic features was considered to be essential for inhibitory activity in the calling behavior. Active compounds mapped well onto all the hydrogen-bond acceptor lipid, hydrophobic aromatic and hydrophobic aliphatic features of the hypothesis. On the other hand, less active compounds were shown not to achieve the energetically favorable conformation that is found in the active molecules in order to fit the 3D common-feature pharmacophore models. The present studies demonstrate that inhibition of calling behavior is via an octopamine receptor.

  17. Islamic Constructs of Nursi’s Perspective and Their Impacts on Psychology

    Directory of Open Access Journals (Sweden)

    MUSTAFA TEKKE

    2017-06-01

    Full Text Available This study proposed new constructs to the field of Islamic psychology. It is particularly noteworthy to articulate the views of Said Nursi in the context of Islamic psychology. Based on fundamental aims of Qur’an, it clearly shows that Tawhid (Belief in God, Nubuwwa (Awareness of Prophetic Teaching, Hashr (Belief in Resurrection, and Ibadah (Worship as for main constructs of Qur'an greatly influential on a person's belief and thought.The proposed four constructs were thoroughly scrutinized to determine the possible meanings with human belief and thought. In line with chosen method, this paper applies the views of Nursi as a device for synthesizing arguments. Islamic psychology clearly indicates the Tawhid and  Nubuwwa, called shahadah, are fundamental of Islamic belief and thought and included with awareness of hereafter and doing worship. The other constructs of Hashr and Ibadah are also essential for an Islamic psychology model for understanding human personality. They were conceptually evaluated within the context of psychology, as indicatives of the concept of Islamic personality. These four constructs can be interpreted as inner experience depicting human’s emotions, desires, wishes, and intentions. Thus, they are strongly suggested to employ in newly developing Islamic personality scales.

  18. House Calls in Private Practice.

    Science.gov (United States)

    Whittington, Ronaele

    1985-01-01

    Relates the experiences of a social worker in private practice who offered house calls as an ongoing setting for counseling and psychotherapy to individuals and families. Describes advantages and disadvantages, liability, and target populations. (JAC)

  19. Scalable Brain Network Construction on White Matter Fibers.

    Science.gov (United States)

    Chung, Moo K; Adluru, Nagesh; Dalton, Kim M; Alexander, Andrew L; Davidson, Richard J

    2011-02-12

    DTI offers a unique opportunity to characterize the structural connectivity of the human brain non-invasively by tracing white matter fiber tracts. Whole brain tractography studies routinely generate up to half million tracts per brain, which serves as edges in an extremely large 3D graph with up to half million edges. Currently there is no agreed-upon method for constructing the brain structural network graphs out of large number of white matter tracts. In this paper, we present a scalable iterative framework called the ε-neighbor method for building a network graph and apply it to testing abnormal connectivity in autism.

  20. Non-linguistic analysis of call center conversations

    CERN Document Server

    Kopparapu, Sunil Kumar

    2014-01-01

    The book focuses on the part of the audio conversation not related to language such as speaking rate (in terms of number of syllables per unit time) and emotion centric features. This text examines using non-linguistics features to infer information from phone calls to call centers. The author analyzes 'how' the conversation happens and not 'what' the conversation is about by audio signal processing and analysis.

  1. Construction of symmetric Hadamard matrices of order 4v for v = 47, 73, 113

    Directory of Open Access Journals (Sweden)

    Balonin N. A.

    2018-01-01

    Full Text Available We continue our systematic search for symmetric Hadamard matrices based on the so called propus construction. In a previous paper this search covered the orders 4v with odd v ≤ 41. In this paper we cover the cases v = 43, 45, 47, 49, 51. The odd integers v < 120 for which no symmetric Hadamard matrices of order 4v are known are the following: 47, 59, 65, 67, 73, 81, 89, 93, 101, 103, 107, 109, 113, 119. By using the propus construction, we found several symmetric Hadamard matrices of order 4v for v = 47, 73, 113.

  2. [Work-family conflict in call center].

    Science.gov (United States)

    Ghislieri, Chiara; Ricotta, Simona; Colombo, Lara

    2012-01-01

    The working environment of call centers, which have seen a significant growth in recent years, has been the subject of several studies aiming at understanding its specific dynamics, with particular attention to the possible causes of stress and discomfort. Despite the fact that the work-family conflict is considered a source of stress responsible for undermining workers' well-being, and as such has been explored in many work environments, there is still very little research specific to call centers. This study had the following aims: to explore work-family conflict perceived by call-center operators taking account of any differences related to respondents'professional and personal characteristics; to understand which demands and resources can have an impact on work-family conflict in this context. The study was carried out on a sample of 898 call center operators in a telecommunications company through the administration of a self-reporting questionnaire. Data analysis included: t-test, one-way analysis of variance, linear correlations and multiple regressions. A higher perception of work-family conflict among workers having a full-time contract was observed compared to those having part-time contracts. Multiple regression analysis identified as sources of influence on work-family conflict: emotional dissonance, uneasiness due customer dissatisfaction, workload, avoidance coping and working hours. Work-family conflict in the context studied is not particularly critical: it is in part influenced by professional and personal characteristics of respondents and primarily caused by work demands. Managerial implications are discussed, especially referred to training activities.

  3. Structural characterization and monitoring of heritage constructions: contributions of IC-LESE-FEUP

    International Nuclear Information System (INIS)

    Arêde, Antonio; Varum, Humberto; Vila-Pouca, Nelson; Guedes, João; Romão, Xavier; Paupério, Esmeralda; Cosa, Anibal

    2016-01-01

    The need for interventions in heritage constructions often calls for deciding whether the structure can be kept in the existing conditions or should it be retrofitted by introducing more or less significant modifications. Still, sustainable interventions in heritage constructions can only be achieved if there is adequate knowledge about their state of conservation. To obtain such knowledge, reliable structural survey and diagnosis procedures need to be employed. In this context, structural monitoring can be particularly helpful in cases where the information obtained from the structural survey or from other stages of the analysis is insufficient to establish a final diagnosis. Over the last 15 years, the Construction Institute (IC) and the Laboratory for Earthquake and Structural Engineering (LESE) of the Faculty of Engineering of the University of Porto (FEUP) were involved in the survey and monitoring activities o f numerous heritage structures for private institutions as well as for governmental stake-holders managing cultural heritage in Portugal. This work describes the structural survey/diagnosis and the monitoring systems supporting the decision about the need for interventions for three heritage constructions .

  4. Investigating CALL in the Classroom: Situational Variables to Consider

    Directory of Open Access Journals (Sweden)

    Darlene Liutkus

    2012-01-01

    Full Text Available A new paradigm in second language pedagogy has Computer Assisted Language Learning (CALL playing a significant role. Much of the literature to-date claims that CALL can have a positive impact on students’ second language acquisition (SLA. Mixed method of research produces data to investigate if CALL positively affects student language proficiency, motivation and autonomy. Classroom observation of participants in their natural environment is a qualitative technique used but has situational variables that could skew results if not structured. A questionnaire is a quantitative tool that can offer insight regarding participants’ perception of performance but can contradict what the researcher has observed. This paper will take an in-depth look at variables such as: instructor’s pedagogical application; blending CALL into the curriculum; types of CALL implemented; feedback received and their implications for design of the data collection tools

  5. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2007-01-01

    Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analys...

  6. PENGARUH PERMAINAN CALL CARDS TERHADAP HASIL BELAJAR DAN AKTIVITAS PEMBELAJARAN BIOLOGI

    Directory of Open Access Journals (Sweden)

    A. Machin

    2012-10-01

    Full Text Available Tujuan penelitian untuk mengetahui pengaruh permainan call cards terhadap hasil belajar dan aktivitas pembelajaran. Aktivitas pembelajaran yang diukur meliputi aktivitas individual siswa dan kinerja guru. Penelitian ini merupakan penelitian eksperimental. Hasil penelitian menunjukkan bahwa media permainan call cards berkontribusi sebesar 46% terhadap hasil belajar siswa. Hasil belajar siswa yang diberi media permainan call cards lebih baik daripada hasil belajar siswa yang tidak diberi mediapermainan call cards. Dengan demikian, media permainan call cards dapat menjadi alternatif dalam pencapaian hasil belajar biologi yang lebih baik.   Research purposes to determine the effect of call cards game against learning outcomes and learning activities. Learning activities that were measured included the activity of individual student and teacher performance. This research was experimental. The results showed that the media play call cards account for 46% of the student learning outcomes. Learning outcomes of students who were given media cards call the game better than the learning outcomes of students who were not given mediapermainan call cards. Thus, the media play call cards can be an alternative in achieving the learning outcomes of biology better.

  7. Penentuan Nilai Opsi Call Eropa Dengan Pembayaran Dividen

    Directory of Open Access Journals (Sweden)

    Diana Purwandari

    2016-08-01

    Full Text Available Fluktuasi harga saham menyebabkan perdagangan saham memiliki resiko. Opsi merupakan alternatif untuk mengurangi resiko dalam perdagangan saham. Opsi Eropa adalah suatu kontrak keuangan yang memberikan hak, bukan kewajiban, kepada holder, untuk membeli atau menjual aset pokok dari writer pada saat jatuh tempo dengan harga yang sudah ditentukan. Model penilaian harga opsi yang banyak diterima dalam bidang finansial adalah model Black-Scholes. Tujuan dari penelitian ini adalah mengetahui pengaruh pembagian dividen terhadap harga saham dan menentukan nilai opsi call Eropa dengan pembayaran dividen pada waktu yang telah ditentukan. Nilai opsi call Eropa dengan pembayaran dividen pada waktu yang telah ditentukan diperoleh menggunakan integrasi numerik dengan metode Simpson sebesar 12,6388.Kata kunci: opsi call Eropa, model Black-Scholes, dividen, metode Simpson.ABSTRACT Fluctuations in stock prices lead stock trading risk. An alternative options to reduce the risk in stock trading. European option is a financial contract that gives the right, but not the obligation, to the holder, to buy or sell the underlying asset of the writer at the maturity date at a price specified. Option price valuation models are widely accepted in the field of finance is the Black-Scholes model. The purpose of this study is to determine the effect of dividend distribution to the stock price and determine the value of the European call option with dividend payments at a predetermined time. Value of the European call option with dividend payments at a predetermined time obtained using numerical integration with Simpson method of 12,6388.Key words: European call options, Black-Scholes model, dividend, Simpson method.

  8. Leveraging Call Center Logs for Customer Behavior Prediction

    Science.gov (United States)

    Parvathy, Anju G.; Vasudevan, Bintu G.; Kumar, Abhishek; Balakrishnan, Rajesh

    Most major businesses use business process outsourcing for performing a process or a part of a process including financial services like mortgage processing, loan origination, finance and accounting and transaction processing. Call centers are used for the purpose of receiving and transmitting a large volume of requests through outbound and inbound calls to customers on behalf of a business. In this paper we deal specifically with the call centers notes from banks. Banks as financial institutions provide loans to non-financial businesses and individuals. Their call centers act as the nuclei of their client service operations and log the transactions between the customer and the bank. This crucial conversation or information can be exploited for predicting a customer’s behavior which will in turn help these businesses to decide on the next action to be taken. Thus the banks save considerable time and effort in tracking delinquent customers to ensure minimum subsequent defaulters. Majority of the time the call center notes are very concise and brief and often the notes are misspelled and use many domain specific acronyms. In this paper we introduce a novel domain specific spelling correction algorithm which corrects the misspelled words in the call center logs to meaningful ones. We also discuss a procedure that builds the behavioral history sequences for the customers by categorizing the logs into one of the predefined behavioral states. We then describe a pattern based predictive algorithm that uses temporal behavioral patterns mined from these sequences to predict the customer’s next behavioral state.

  9. On-call emergency workload of a general surgical team.

    Science.gov (United States)

    Jawaid, Masood; Raza, Syed Muhammad; Alam, Shams Nadeem; Manzar, S

    2009-01-01

    To examine the on-call emergency workload of a general surgical team at a tertiary care teaching hospital to guide planning and provision of better surgical services. During six months period from August to January 2007; all emergency calls attended by general surgical team of Surgical Unit II in Accident and Emergency department (A and E) and in other units of Civil, Hospital Karachi, Pakistan were prospectively recorded. Data recorded includes timing of call, diagnosis, operation performed and outcome apart from demography. Total 456 patients (326 males and 130 females) were attended by on-call general surgery team during 30 emergency days. Most of the calls, 191 (41.9%) were received from 8 am to 5 pm. 224 (49.1%) calls were of abdominal pain, with acute appendicitis being the most common specific pathology in 41 (9.0%) patients. Total 73 (16.0%) calls were received for trauma. Total 131 (28.7%) patients were admitted in the surgical unit for urgent operation or observation while 212 (46.5%) patients were discharged from A and E. 92 (20.1%) patients were referred to other units with medical referral accounts for 45 (9.8%) patients. Total 104 (22.8%) emergency surgeries were done and the most common procedure performed was appendicectomy in 34 (32.7%) patients. Major workload of on-call surgical emergency team is dealing with the acute conditions of abdomen. However, significant proportion of patients are suffering from other conditions including trauma that require a holistic approach to care and a wide range of skills and experience. These results have important implications in future healthcare planning and for the better training of general surgical residents.

  10. MEDICAL SERVICE - URGENT CALLS

    CERN Multimedia

    Service Médical

    2000-01-01

    IN URGENT NEED OF A DOCTOR GENEVA: EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME: Open 24h/24h 748-49-50 AMG- Association Of Geneva Doctors: Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin 719-61-11 EMERGENCIES 719-61-11 CHILDREN'S EMERGENCIES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112   FRANCE: EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ...

  11. Analysis of jitter due to call-level fluctuations

    NARCIS (Netherlands)

    M.R.H. Mandjes (Michel)

    2005-01-01

    textabstractIn communication networks used by constant bit rate applications, call-level dynamics (i.e., entering and leaving calls) lead to fluctuations in the load, and therefore also fluctuations in the delay (jitter). By intentionally delaying the packets at the destination, one can transform

  12. Management for Construction Materials and Control of Construction Waste in Construction Industry: A Review

    OpenAIRE

    A. A. Gulghane; Prof P. V. Khandve

    2015-01-01

    In recent treads a wide range of building materials is available for the construction of civil engineering structures. The total cost of materials may be up to 60% or more of the total cost incurred in construction project dependent upon the type of project. Effective construction materials management is a key to success for a construction project. Construction waste is another serious problem in construction industry. A large and various types of construction waste with different...

  13. Construction Project Leadership from the Perspective of Islam

    Directory of Open Access Journals (Sweden)

    MUHAMAD ROSDI SENAM

    2014-12-01

    Full Text Available Construction industry is continuously being accused with common issues such as low performance, corruptions, spillages, bad practices in addition to common project failures despite advances in project management tools and techniques. This further adds to the existing and increasing complex and multi-facets business environment in construction projects that has resulted in the increasing pressure and challenges faced by project leaders and project managers today. Researchers in project management literature calls for more project leadership research as leadership now is increasingly recognised as project success factor. Ethical dilemma and leadership crisis facing the project managers and business organisations reveals the shortcomings and inadequacies of the conventional non-Islamic leadership that is believed to be or that has not fully considered the religious, spiritual, moral and ethical dimensions. Examples of these theories of leadership are authentic leadership, servant leadership and ethical leadership. Therefore, recent trend from literature has implicitly suggested a new form of leadership for construction project manager which is spiritual, moral, values and ethical form of leadership. The uniqueness of Islam is that it does not separate religion and other aspects of human life activities. Construction and project activities are part of the whole economic and social transactions of a nation and thus it is part of Islam. Project management in particular leadership awaits divine intervention that is tied to God consciousness and accords with values and principles prescribed in the Quran and Sunnah. This research is intended to overcome the spiritual and religious shortcomings of the present leadership models by proposing an Islamic perspective of leadership for construction project manager.

  14. Content Analysis of the Construction of Self and Others in Women with Bulimia Nervosa.

    Science.gov (United States)

    Dada, Gloria; Izu, Sheila; Montebruno, Claudia; Grau, Antoni; Feixas, Guillem

    2017-01-01

    The purpose of this study was to explore the content of personal constructs in people diagnosed with bulimia nervosa (BN). We expected to find differences in the predominant content of the construct systems between women with and without BN. We analyzed the constructs elicited using the repertory grid technique from 120 women aged between 18 to 45 years, divided into two groups: a clinical group of women diagnosed with bulimia ( n = 62) and a control group of university students ( n = 58). The constructs were categorized using the Classification System for Personal Constructs (CSPC), composed of six themes which are broken down into 45 categories. For this study, a new area called "Physical" was included, and it consists of three categories. The results indicated that women diagnosed with bulimia used significantly more constructs related to the body, while the control group used more constructs from the personal area. In addition, the congruent constructs from the clinical sample were predominantly moral, or related to values and interests, while discrepant constructs were personal and physical. The findings provide evidence for the clinical use of the CSPC as an instrument for exploring the content of personal meaning systems. Understanding the patient's personal constructions about herself and others is useful for treatment. Moreover, it is important for clinicians to explore the content of constructs related to symptomatic areas, which could be hindering change, and focus on them to facilitate improvement.

  15. Evaluation of Static JavaScript Call Graph Algorithms

    NARCIS (Netherlands)

    J.-J. Dijkstra (Jorryt-Jan)

    2014-01-01

    htmlabstractThis thesis consists of a replication study in which two algorithms to compute JavaScript call graphs have been implemented and evaluated. Existing IDE support for JavaScript is hampered due to the dynamic nature of the language. Previous studies partially solve call graph computation

  16. 47 CFR 25.284 - Emergency Call Center Service.

    Science.gov (United States)

    2010-10-01

    ... mobile satellite service to end-user customers (part 25, subparts A-D) must provide Emergency Call Center... Center personnel must determine the emergency caller's phone number and location and then transfer or otherwise redirect the call to an appropriate public safety answering point. Providers of mobile satellite...

  17. Ultrastructure and composition of Call-Exner bodies in bovine follicles.

    Science.gov (United States)

    van Wezel, I L; Irving-Rodgers, H F; Sado, Y; Ninomiya, Y; Rodgers, R J

    1999-05-01

    Call-Exner bodies are present in ovarian follicles of a range of species including human and rabbit, and in a range of human ovarian tumors. We have also found structures resembling Call-Exner bodies in bovine preantral and small antral follicles. Hematoxylin and eosin staining of single sections of bovine ovaries has shown that 30% of preantral follicles with more than one layer of granulosa cells and 45% of small (less than 650 microns) antral follicles have at least one Call-Exner body composed of a spherical eosinophilic region surrounded by a rosette of granulosa cells. Alcian blue stains the spherical eosinophilic region of the Call-Exner bodies. Electron microscopy has demonstrated that some Call-Exner bodies contain large aggregates of convoluted basal lamina, whereas others also contain regions of unassembled basal-lamina-like material. Individual chains of the basal lamina components type IV collagen (alpha 1 to alpha 5) and laminin (alpha 1, beta 2 and delta 1) have been immunolocalized to Call-Exner bodies in sections of fresh-frozen ovaries. Bovine Call-Exner bodies are presumably analogous to Call-Exner bodies in other species but are predominantly found in preantral and small antral follicles, rather than large antral follicles. With follicular development, the basal laminae of Call-Exner bodies change in their apparent ratio of type IV collagen to laminin, similar to changes observed in the follicular basal lamina, suggesting that these structures have a common cellular origin.

  18. On-call work: To sleep or not to sleep? It depends.

    Science.gov (United States)

    Ferguson, Sally A; Paterson, Jessica L; Hall, Sarah J; Jay, Sarah M; Aisbett, Brad

    On-call working time arrangements are increasingly common, involve work only in the event of an unpredictable incident and exist primarily outside of standard hours. Like other non-standard working time arrangements, on-call work disrupts sleep and can therefore have negative effects on health, safety and performance. Unlike other non-standard working time arrangements, on-call work often allows sleep opportunities between calls. Any sleep obtained during on-call periods will be beneficial for waking performance. However, there is evidence that sleep while on call may be of substantially reduced restorative value because of the expectation of receiving the call and apprehension about missing the call. In turn, waking from sleep to respond to a call may be associated with temporary increases in performance impairment. This is dependent on characteristics of both the preceding sleep, the tasks required upon waking and the availability and utility of any countermeasures to support the transition from sleep to wake. In this paper, we critically evaluate the evidence both for and against sleeping during on-call periods and conclude that some sleep, even if it is of reduced quality and broken by repeated calls, is a good strategy. We also note, however, that organisations utilising on-call working time arrangements need to systematically manage the likelihood that on-call sleep can be associated with temporary performance impairments upon waking. Given that the majority of work in this area has been laboratory-based, there is a significant need for field-based investigations of the magnitude of sleep inertia, in addition to the utility of sleep inertia countermeasures. Field studies should include working with subject matter experts to identify the real-world impacts of changes in performance associated with sleeping, or not sleeping, whilst on call.

  19. TADtool: visual parameter identification for TAD-calling algorithms.

    Science.gov (United States)

    Kruse, Kai; Hug, Clemens B; Hernández-Rodríguez, Benjamín; Vaquerizas, Juan M

    2016-10-15

    Eukaryotic genomes are hierarchically organized into topologically associating domains (TADs). The computational identification of these domains and their associated properties critically depends on the choice of suitable parameters of TAD-calling algorithms. To reduce the element of trial-and-error in parameter selection, we have developed TADtool: an interactive plot to find robust TAD-calling parameters with immediate visual feedback. TADtool allows the direct export of TADs called with a chosen set of parameters for two of the most common TAD calling algorithms: directionality and insulation index. It can be used as an intuitive, standalone application or as a Python package for maximum flexibility. TADtool is available as a Python package from GitHub (https://github.com/vaquerizaslab/tadtool) or can be installed directly via PyPI, the Python package index (tadtool). kai.kruse@mpi-muenster.mpg.de, jmv@mpi-muenster.mpg.deSupplementary information: Supplementary data are available at Bioinformatics online. © The Author 2016. Published by Oxford University Press.

  20. Calling behavior of mass-reared and wild Anastrepha serpentina (Diptera: Tephritidae).

    Science.gov (United States)

    Castrejón-Gómez, Victor R; Lascares, Shaila; Malo, Edi A; Toledo, Jorge; Rojas, Julio C

    2007-08-01

    The calling behavior of mass-reared and wild males of Anastrepha serpentina (Wiedemann) (Diptera: Tephritidae) was studied both in the laboratory and in field cage tests. In the laboratory, density (1, 5, and 10 males per container), age, and hour of day significantly affected calling behavior. Mass-reared males called independently of density, whereas wild males only called at densities of 5 and 10 individuals. Males of both strains started calling when they were 5-7 d old. The daily pattern of male calling was similar in both strains, starting at 0730 hours, and reaching a peak at 1330-1630 hours. Field cage tests showed that mass-reared males started calling when they were 5d old; the period of peak calling was when males were 8-9 d old. In contrast, wild males began calling when they were 10 d old, reaching peaks when males were 13, 15, and 18 d old. Wild males tended to form leks to call during each day of the experiment, whereas mass-reared males only formed leks during 2 d, both strains displaying very low levels. During field cage tests, males, independently of strain, displayed two calling peaks, one peak in the morning and one peak in the afternoon, whereas males observed in the laboratory only showed a single calling peak. The results are discussed in view of the effects of mass rearing A. serpentina males in relation to potential use of the sterile insect technique.

  1. SYSTEMIC INNOVATION IN CONSTRUCTION: THE

    DEFF Research Database (Denmark)

    Jensen, Jens Stissing; Koch, Christian

    2007-01-01

    -based. This approach evaluates the outcome of the program against the main intentions formulated in the tender material. Drawing on systemic innovation theory an alternative evaluative approach is suggested which focuses on the build-up of organizational and institutional resources to support the development...... of an emerging ICT trajectory. While the result-based evaluation points to some weaknesses in the quality of the best-practice and cross-organizational elements of the case-material, the systemic approach point to some important sideeffects of the program, such as the stabilization and enrolment of the industry......This paper offers an evaluation of a best practice program called ‘Best in Construction’ (BiC) which aimed to identify and document cases of successful ICT use in the Danish construction industry. The program is evaluated using two different approaches. The first approach is result...

  2. Addressee Errors in ATC Communications: The Call Sign Problem

    Science.gov (United States)

    Monan, W. P.

    1983-01-01

    Communication errors involving aircraft call signs were portrayed in reports of 462 hazardous incidents voluntarily submitted to the ASRS during an approximate four-year period. These errors resulted in confusion, disorder, and uncoordinated traffic conditions and produced the following types of operational anomalies: altitude deviations, wrong-way headings, aborted takeoffs, go arounds, runway incursions, missed crossing altitude restrictions, descents toward high terrain, and traffic conflicts in flight and on the ground. Analysis of the report set resulted in identification of five categories of errors involving call signs: (1) faulty radio usage techniques, (2) call sign loss or smearing due to frequency congestion, (3) confusion resulting from similar sounding call signs, (4) airmen misses of call signs leading to failures to acknowledge or readback, and (5) controller failures regarding confirmation of acknowledgements or readbacks. These error categories are described in detail and several associated hazard mitigating measures that might be aken are considered.

  3. On-call emergency workload of a general surgical team

    Directory of Open Access Journals (Sweden)

    Jawaid Masood

    2009-01-01

    Full Text Available Background: To examine the on-call emergency workload of a general surgical team at a tertiary care teaching hospital to guide planning and provision of better surgical services. Patients and Methods: During six months period from August to January 2007; all emergency calls attended by general surgical team of Surgical Unit II in Accident and Emergency department (A and E and in other units of Civil, Hospital Karachi, Pakistan were prospectively recorded. Data recorded includes timing of call, diagnosis, operation performed and outcome apart from demography. Results: Total 456 patients (326 males and 130 females were attended by on-call general surgery team during 30 emergency days. Most of the calls, 191 (41.9% were received from 8 am to 5 pm. 224 (49.1% calls were of abdominal pain, with acute appendicitis being the most common specific pathology in 41 (9.0% patients. Total 73 (16.0% calls were received for trauma. Total 131 (28.7% patients were admitted in the surgical unit for urgent operation or observation while 212 (46.5% patients were discharged from A and E. 92 (20.1% patients were referred to other units with medical referral accounts for 45 (9.8% patients. Total 104 (22.8% emergency surgeries were done and the most common procedure performed was appendicectomy in 34 (32.7% patients. Conclusion: Major workload of on-call surgical emergency team is dealing with the acute conditions of abdomen. However, significant proportion of patients are suffering from other conditions including trauma that require a holistic approach to care and a wide range of skills and experience. These results have important implications in future healthcare planning and for the better training of general surgical residents.

  4. Efficiency of two constructs called "fear of disease" and "perceived severity of disease" on the prevention of gastric cancer: Application of protection motivation theory.

    Science.gov (United States)

    Baghiani-Moghadam, Mohamad Hosein; Seyedi-Andi, Seyed Jalil; Shokri-Shirvani, Javad; Khafri, Sorayya; Ghadimi, Reza; Parsian, Hadi

    2015-01-01

    Among all cancers, malignancies of gastrointestinal tract are the most common cancer among Iranian population. Dietary behavior is thought to be the most important risk factor in gastric cancer. Fear and perceived severity are two important constructs of the protection motivation theory (PMT). Despite the evidence of the impact of these two constructs in modifying dietary habits against gastric cancer, their efficiency is not well established. Therefore, the present study was designed to determine the efficiency of the mentioned constructs. This cross-sectional study was performed on 360 participants (180 males and 180 females) aged over 30 years old who presented to health centers in Babol, Iran in 2014. They were selected by a cluster sampling method in a population covered by health centers in Babol. Data collection was done using a questionnaire with acceptable reliability and validity, designed by a researcher based on two constructs of protection motivation theory. The data were analyzed by SPSS Version 20 using descriptive and analytical statistics such as ANOVA, linear and logistic regression analysis. The participants who entered in the study achieved 38.6 and 69.7% of the scores of fear and perceived severity, respectively. There was a significant difference between perceived severity with level of education (pprotection motivation theory with predicting 38% of the variance of nutritional high risk behaviors had an effective role against gastric cancer and may help in the design and implementation of educational programs for the prevention of gastric cancer.

  5. The McMillan and Newton polygons of a feedback system and the construction of root loci

    Science.gov (United States)

    Byrnes, C. I.; Stevens, P. K.

    1982-01-01

    The local behaviour of root loci around zeros and poles is investigated. This is done by relating the Newton diagrams which arise in the local analysis to the McMillan structure of the open-loop system, by means of what we shall call the McMillan polygon. This geometric construct serves to clarify the precise relationship between the McMillan structure, the principal structure, and the branching patterns of the root loci. In addition, several rules are obtained which are useful in the construction of the root loci of multivariable control systems.

  6. Electoronic Performance Monitoring in Call Centers: An Ethical Decision Model

    OpenAIRE

    Perkins, David

    2013-01-01

    Ever since it emerged on a widespread basis in the 1990s, electronic performance monitoring of employees has received significant scrutiny in the literature. Call centers have been the focus of many of these studies. This particular study addresses the issue of electronic performance monitoring in call centers from an ethical perspective. The following ethical dilemma is offered: "Is it ethical for a call center manager to evaluate the performance of a call center employee using electronic pe...

  7. Calls to Teen Line: Representative Concerns of Adolescents.

    Science.gov (United States)

    Boehm, Kathryn E.; Schondel, Connie K.; Ivoska, William J.; Marlowe, Alison L.; Manke-Mitchell, Laurie

    1998-01-01

    Study examines whether the concerns of teenagers calling a peer listening service are representative of the concerns of teenagers in the area served. Results indicate that students' biggest concerns involve family problems, peer relationships, self-esteem, and school problems. Concludes that calls to the teen line are representative. (Author/GCP)

  8. Call Admission Scheme for Multidimensional Traffic Assuming Finite Handoff User

    Directory of Open Access Journals (Sweden)

    Md. Baitul Al Sadi

    2017-01-01

    Full Text Available Usually, the number of users within a cell in a mobile cellular network is considered infinite; hence, M/M/n/k model is appropriate for new originated traffic, but the number of ongoing calls around a cell is always finite. Hence, the traffic model of handoff call will be M/M/n/k/N. In this paper, a K-dimensional traffic model of a mobile cellular network is proposed using the combination of limited and unlimited users case. A new call admission scheme (CAS is proposed based on both thinning scheme and fading condition. The fading condition of the wireless channel access to a handoff call is prioritized compared to newly originated calls.

  9. [A relational database to store Poison Centers calls].

    Science.gov (United States)

    Barelli, Alessandro; Biondi, Immacolata; Tafani, Chiara; Pellegrini, Aristide; Soave, Maurizio; Gaspari, Rita; Annetta, Maria Giuseppina

    2006-01-01

    Italian Poison Centers answer to approximately 100,000 calls per year. Potentially, this activity is a huge source of data for toxicovigilance and for syndromic surveillance. During the last decade, surveillance systems for early detection of outbreaks have drawn the attention of public health institutions due to the threat of terrorism and high-profile disease outbreaks. Poisoning surveillance needs the ongoing, systematic collection, analysis, interpretation, and dissemination of harmonised data about poisonings from all Poison Centers for use in public health action to reduce morbidity and mortality and to improve health. The entity-relationship model for a Poison Center relational database is extremely complex and not studied in detail. For this reason, not harmonised data collection happens among Italian Poison Centers. Entities are recognizable concepts, either concrete or abstract, such as patients and poisons, or events which have relevance to the database, such as calls. Connectivity and cardinality of relationships are complex as well. A one-to-many relationship exist between calls and patients: for one instance of entity calls, there are zero, one, or many instances of entity patients. At the same time, a one-to-many relationship exist between patients and poisons: for one instance of entity patients, there are zero, one, or many instances of entity poisons. This paper shows a relational model for a poison center database which allows the harmonised data collection of poison centers calls.

  10. Depletion and recovery behavior of the Gladys McCall geopressured geothermal reservoir

    International Nuclear Information System (INIS)

    Riney, T.D.

    1991-01-01

    Many sedimentary basins throughout the world contain sealed fault blocks in which the pore fluids are at higher pressures and temperatures than normal as a consequence of their depositional environment. The U.S. Department of Energy has drilled, completed, and tested four deep research wells in selected geopressured geothermal prospects in the Texas-Louisiana Gulf Coast region to evaluate the recoverability of the thermal, hydraulic, and chemical (methane) energy in this potential energy resource. The wells are expensive and the specific energy of the fluids is relatively small, but the total recoverable energy from a single well can be extremely large. Long-term testing of the Gladys McCall No. 1 research well, located in Cameron Parish, Louisiana, U.S.A., has defined an impressively large geopressured geothermal reservoir. In this paper an integrated analysis of the test data is presented, and a numerical model is constructed that matches the available data for the 6.5-year test history of the well

  11. Permutation parity machines for neural synchronization

    International Nuclear Information System (INIS)

    Reyes, O M; Kopitzke, I; Zimmermann, K-H

    2009-01-01

    Synchronization of neural networks has been studied in recent years as an alternative to cryptographic applications such as the realization of symmetric key exchange protocols. This paper presents a first view of the so-called permutation parity machine, an artificial neural network proposed as a binary variant of the tree parity machine. The dynamics of the synchronization process by mutual learning between permutation parity machines is analytically studied and the results are compared with those of tree parity machines. It will turn out that for neural synchronization, permutation parity machines form a viable alternative to tree parity machines

  12.  Thermal Insulation System Made of Wood and Paper for Use in Residential Construction

    Science.gov (United States)

    Zoltán Pásztory; Tibor Horváth; Samuel V. Glass; Samuel L. Zelinka

    2015-01-01

    This article introduces an insulation system that takes advantage of the low thermal conductivity of still air and is made of wood and paper. The insulation, called the Mirrorpanel, is constructed as a panel of closely spaced layers of coated paper and held together in a frame of wood or fiberboard. Panels have been fabricated and tested at the laboratory scale, whole...

  13. Turchin's Relation for Call-by-Name Computations: A Formal Approach

    OpenAIRE

    Antonina Nepeivoda

    2016-01-01

    Supercompilation is a program transformation technique that was first described by V. F. Turchin in the 1970s. In supercompilation, Turchin's relation as a similarity relation on call-stack configurations is used both for call-by-value and call-by-name semantics to terminate unfolding of the program being transformed. In this paper, we give a formal grammar model of call-by-name stack behaviour. We classify the model in terms of the Chomsky hierarchy and then formally prove that Turchin's rel...

  14. Effect of bystander CPR initiation prior to the emergency call on ROSC and 30day survival-An evaluation of 548 emergency calls.

    Science.gov (United States)

    Viereck, Søren; Palsgaard Møller, Thea; Kjær Ersbøll, Annette; Folke, Fredrik; Lippert, Freddy

    2017-02-01

    This study aimed at evaluating if time for initiation of bystander cardiopulmonary resuscitation (CPR) - prior to the emergency call (CPR prior ) versus during the emergency call following dispatcher-assisted CPR (CPR during ) - was associated with return of spontaneous circulation (ROSC) and 30-day survival. The secondary aim was to identify predictors of CPR prior . This observational study evaluated out-of-hospital cardiac arrests (OHCA) occurring in the Capital Region of Denmark from 01.01.2013 to 31.12.2013. OHCAs were linked to emergency medical dispatch centre records and corresponding emergency calls were evaluated. Multivariable logistic regression analyses were applied to evaluate the association between time for initiation of bystander CPR, ROSC, and 30-day survival. Univariable logistic regression analyses were applied to identify predictors of CPR prior . The study included 548 emergency calls for OHCA patients receiving bystander CPR, 34.9% (n=191) in the CPR prior group and 65.1% (n=357) in the CPR during group. Multivariable analyses showed no difference in ROSC (OR=0.88, 95% CI: 0.56-1.38) or 30-day survival (OR=1.14, 95% CI: 0.68-1.92) between CPR prior and CPR during . Predictors positively associated with CPR prior included witnessed OHCA and healthcare professional bystanders. Predictors negatively associated with CPR prior included residential location, solitary bystanders, and bystanders related to the patient. The majority of bystander CPR (65%) was initiated during the emergency call, following dispatcher-assisted CPR instructions. Whether bystander CPR was initiated prior to emergency call versus during the emergency call following dispatcher-assisted CPR was not associated with ROSC or 30-day survival. Dispatcher-assisted CPR was especially beneficial for the initiation of bystander CPR in residential areas. Copyright © 2016 The Authors. Published by Elsevier Ireland Ltd.. All rights reserved.

  15. Bats aloft: Variation in echolocation call structure at high altitudes

    Science.gov (United States)

    Bats alter their echolocation calls in response to changes in ecological and behavioral conditions, but little is known about how they adjust their call structure in response to changes in altitude. This study examines altitudinal variation in the echolocation calls of Brazilian free-tailed bats, T...

  16. A new stratification of mourning dove call-count routes

    Science.gov (United States)

    Blankenship, L.H.; Humphrey, A.B.; MacDonald, D.

    1971-01-01

    The mourning dove (Zenaidura macroura) call-count survey is a nationwide audio-census of breeding mourning doves. Recent analyses of the call-count routes have utilized a stratification based upon physiographic regions of the United States. An analysis of 5 years of call-count data, based upon stratification using potential natural vegetation, has demonstrated that this uew stratification results in strata with greater homogeneity than the physiographic strata, provides lower error variance, and hence generates greatet precision in the analysis without an increase in call-count routes. Error variance was reduced approximately 30 percent for the contiguous United States. This indicates that future analysis based upon the new stratification will result in an increased ability to detect significant year-to-year changes.

  17. Sustainability in CALL Learning Environments: A Systemic Functional Grammar Approach

    Directory of Open Access Journals (Sweden)

    Peter McDonald

    2014-09-01

    Full Text Available This research aims to define a sustainable resource in Computer-Assisted Language Learning (CALL. In order for a CALL resource to be sustainable it must work within existing educational curricula. This feature is a necessary prerequisite of sustainability because, despite the potential for educational change that digitalization has offered since the nineteen nineties, curricula in traditional educational institutions have not fundamentally changed, even as we move from a pre-digital society towards a digital society. Curricula have failed to incorporate CALL resources because no agreed-upon pedagogical language enables teachers to discuss CALL classroom practices. Systemic Functional Grammar (SFG can help to provide this language and bridge the gap between the needs of the curriculum and the potentiality of CALL-based resources. This paper will outline how SFG principles can be used to create a pedagogical language for CALL and it will give practical examples of how this language can be used to create sustainable resources in classroom contexts.

  18. REDUCTION OF COST AND TIME CONSUMPTION IN WELL-CONSTRUCTION

    Directory of Open Access Journals (Sweden)

    Mladen Zelenika

    1998-12-01

    Full Text Available A Contractor usually utilizes the available drilling equipment when constructing just one single well. Drilling cost and time consumption in constructing the well MB-1, using the percussion method, and the well MB-2, using the conventional rotary drilling method, call for a separate analysis in order to justify the investment cost for the acquisition of additional equipment for a single well only. The wells, located in a karst vrtača close to an estavelle near Tomislavgrad, with a diameter of 500 mm and approximately 80 m deep, have been accomplished with a low rate of penetration using the conventional Cable tool and resp. Rotary Drilling Method. In this paper results of analyses for the given circumstances are shown: both the efficiency and cost of the mentioned drilling methods performed by the crews of »Geotehnika d.d.« Zagreb, as well as the justifiability of investments in new equipment are evaluated.

  19. Photoacoustic-Based Multimodal Nanoprobes: from Constructing to Biological Applications.

    Science.gov (United States)

    Gao, Duyang; Yuan, Zhen

    2017-01-01

    Multimodal nanoprobes have attracted intensive attentions since they can integrate various imaging modalities to obtain complementary merits of single modality. Meanwhile, recent interest in laser-induced photoacoustic imaging is rapidly growing due to its unique advantages in visualizing tissue structure and function with high spatial resolution and satisfactory imaging depth. In this review, we summarize multimodal nanoprobes involving photoacoustic imaging. In particular, we focus on the method to construct multimodal nanoprobes. We have divided the synthetic methods into two types. First, we call it "one for all" concept, which involves intrinsic properties of the element in a single particle. Second, "all in one" concept, which means integrating different functional blocks in one particle. Then, we simply introduce the applications of the multifunctional nanoprobes for in vivo imaging and imaging-guided tumor therapy. At last, we discuss the advantages and disadvantages of the present methods to construct the multimodal nanoprobes and share our viewpoints in this area.

  20. Non-freely generated W-algebras and construction of N=2 super W-algebras

    International Nuclear Information System (INIS)

    Blumenhagen, R.

    1994-07-01

    Firstly, we investigate the origin of the bosonic W-algebras W(2, 3, 4, 5), W(2, 4, 6) and W(2, 4, 6) found earlier by direct construction. We present a coset construction for all three examples leading to a new type of finitely, non-freely generated quantum W-algebras, which we call unifying W-algebras. Secondly, we develop a manifest covariant formalism to construct N = 2 super W-algebras explicitly on a computer. Applying this algorithm enables us to construct the first four examples of N = 2 super W-algebras with two generators and the N = 2 super W 4 algebra involving three generators. The representation theory of the former ones shows that all examples could be divided into four classes, the largest one containing the N = 2 special type of spectral flow algebras. Besides the W-algebra of the CP(3) Kazama-Suzuki coset model, the latter example with three generators discloses a second solution which could also be explained as a unifying W-algebra for the CP(n) models. (orig.)

  1. Calle San Martín

    Directory of Open Access Journals (Sweden)

    Gonzalo Cerda Brintrup

    1988-06-01

    Full Text Available En la década del 30 era un barrizal transitado por carretas, caballos y peatones, flanqueada por unas veredas algo más altas que la calle, limitadas por gruesos tablones que la Municipalidad reparaba de año en año.

  2. The construction of work–life balance: The experience of Black employees in a call-centre environment

    OpenAIRE

    Sonia C.B. Potgieter; Antoni Barnard

    2010-01-01

    Orientation: Work–life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile.Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment.Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to B...

  3. Referential calls coordinate multi-species mobbing in a forest bird community.

    Science.gov (United States)

    Suzuki, Toshitaka N

    2016-01-01

    Japanese great tits ( Parus minor ) use a sophisticated system of anti-predator communication when defending their offspring: they produce different mobbing calls for different nest predators (snake versus non-snake predators) and thereby convey this information to conspecifics (i.e. functionally referential call system). The present playback experiments revealed that these calls also serve to coordinate multi-species mobbing at nests; snake-specific mobbing calls attracted heterospecific individuals close to the sound source and elicited snake-searching behaviour, whereas non-snake mobbing calls attracted these birds at a distance. This study demonstrates for the first time that referential mobbing calls trigger different formations of multi-species mobbing parties.

  4. Gotta Go, Mom’s Calling: Dolphin (Tursiops truncatus Mothers Use Individually Distinctive Acoustic Signals To Call Their Calves

    Directory of Open Access Journals (Sweden)

    Stan A. Kuczaj II

    2015-02-01

    Full Text Available Dolphin calves often wander away from their mothers, which can compromise their safety and survival. Mothers can retrieve their calves by actively pursuing them or by signaling their wandering calves to return. However, little is known about the retrieval techniques employed by mothers in specific calf recall contexts. We experimentally investigated maternal calf retrieval methods by assessing behavioral and acoustic strategies employed by three Atlantic bottlenose dolphin mothers to elicit their calf’s return in a controlled, non-threatening setting. Three mothers were asked to retrieve their calves on cue in this setting, and could do so however they chose. Mothers were much more likely to use energetically less costly acoustic signals than physical retrievals. Each mother produced individually distinctive calls that incorporated the mother’s signature whistle but often also involved additional whistles and clicks. The dolphin mothers’ use of individually distinctive calls to request a calf’s return is consistent with the notion that other dolphins can distinguish such calls and provides additional support for the notion that dolphin communication is flexible rather than fixed.

  5. Advertisement call and tadpole morphology of the clutch-guarding ...

    African Journals Online (AJOL)

    Advertisement call and tadpole morphology of the clutch-guarding frog Mantidactylus argenteus from eastern ... We provide the first descriptions of the tadpole and advertisement call of Mantidactylus argenteus. ... AJOL African Journals Online.

  6. Algorithmic cryptanalysis

    CERN Document Server

    Joux, Antoine

    2009-01-01

    Illustrating the power of algorithms, Algorithmic Cryptanalysis describes algorithmic methods with cryptographically relevant examples. Focusing on both private- and public-key cryptographic algorithms, it presents each algorithm either as a textual description, in pseudo-code, or in a C code program.Divided into three parts, the book begins with a short introduction to cryptography and a background chapter on elementary number theory and algebra. It then moves on to algorithms, with each chapter in this section dedicated to a single topic and often illustrated with simple cryptographic applic

  7. A novel heuristic method for obtaining S-boxes

    International Nuclear Information System (INIS)

    Chen Guo

    2008-01-01

    An efficient algorithm named chaotic multi-swapping and simulated annealing (CMSSA) for obtaining cryptographically strong 8 x 8 S-boxes is presented. The method is based on chaotic maps and simulated annealing. In addition, cryptographic properties such as bijectivity, strict avalanche criterion, nonlinearity, output bits independence criterion and equiprobable input/output XOR distribution are analyzed in detail for the S-box produced. The results of numerical analysis show that the box has nearly fulfilled the criteria for a cryptographically strong S-box and can effectively resist several attacks

  8. Circadian long call distribution in wild orangutans Distribution circadienne des cris longs (long calls chez l’orang-outan en milieu naturel

    Directory of Open Access Journals (Sweden)

    Thomas Geissmann

    2009-10-01

    Full Text Available We present first data on circadian long call distribution of wild orangutans in Northwest Borneo. Data were collected during two months in Batang Ai National Park. A total of 151 male long calls were heard, exhibiting a bimodal distribution pattern with peaks at 05:00-06:00 hours and 18:00-19:00 hours. An earlier study found pronounced differences between the calling rates of Bornean orangutans, which showed an almost unimodal call distribution with its peak at mid-morning, and those of Sumatran orangutans, which showed a bimodal call distribution with a distinct calling peak at predawn and a more moderate peak near dusk (MacKinnon 1974. Our findings from Batang Ai resemble more closely the pattern reported for Sumatra than those reported for other Bornean localities and, therefore, contradict earlier reports suggesting a Sumatra-Borneo dichotomy in orangutan call distribution. In addition, orangutans in Batang Ai were heard to regularly emit long calls throughout the night. This behaviour is unusual for a diurnal species.Nous présentons les premières données sur la distribution circadienne des cris longs (long calls chez les mâles orangs-outans vivant en milieu naturel au nord-ouest de Bornéo. Les données ont été récoltées lors d’une étude de terrain de deux mois au Parc National de Batang Ai. Les 151 cris longs entendus montraient une distribution bimodale, caractérisée par des pics à 05:00-06:00 et 18:00-19:00 heures. Une étude précédente avait révélé des différences profondes entre les taux de cris longs des orangs-outans de Bornéo et de Sumatra. Alors que la distribution des cris longs à Bornéo était presque unimodale et montrait un pic en milieu d’avant-midi, la distribution à Sumatra était bimodale et montrait un pic distinct avant l’aube et un second pic plus modéré au crépuscule (MacKinnon 1974. Nos résultats à Batang Ai ressemblent davantage au schéma rapporté précédemment à Sumatra qu

  9. ICT and the location of call centres: regional and local patterns

    NARCIS (Netherlands)

    Bruinsma, Frank; Rietveld, Piet; Beekman, Michiel

    2004-01-01

    One of the sectors that gained most of the boost in ICT developments is the call centres sector. The focus in this paper is on spatial diffusion patterns of call centres in the Netherlands. The number of call centres has increased rapidly in the last decade and it seems that impacts of call

  10. On-call work and physicians' well-being: testing the potential mediators.

    Science.gov (United States)

    Heponiemi, T; Puttonen, S; Elovainio, M

    2014-07-01

    On-call duties have been rated to be among the most stressful aspects of physicians' work. On-call work has been associated, for example, with medical errors, injuries and lower well-being. Thus, because it is not possible to remove on-call duties, measures to decrease the negative ramifications of on-call work are needed. To examine whether working on-call would predict psychological distress, job satisfaction and work ability in a 4-year follow-up and whether sleeping problems or work interference with family (WIF) would act as mechanisms in these associations. Questionnaires in 2006 and 2010 among physicians in Finland. The mediation analyses were conducted using methods suggested by Preacher and Hayes to examine direct and indirect effects with multiple mediators. There were 1541 respondents (60% women) of whom 52% had on-call duties. Sleeping problems and WIF acted as mechanisms in the association of existence of on-call duties with high distress, low job satisfaction and low work ability. On-call work was associated with higher levels of sleeping problems and WIF, and the number of active on-call hours was associated with higher levels of WIF, but not with sleeping problems. According to our results, one way to attenuate on-call work's negative ramifications is to make it easier for on-call physicians to connect work and family lives and develop work arrangements to promote better sleep and protected sleep time. © The Author 2014. Published by Oxford University Press on behalf of the Society of Occupational Medicine. All rights reserved. For Permissions, please email: journals.permissions@oup.com.

  11. Psychologization, constituent power and autonomy: Rethinking subjectivity construction in post-modernity

    Directory of Open Access Journals (Sweden)

    Jorquera Fariñas, Víctor

    2007-11-01

    Full Text Available According to influential theories of identity in post-modernity, as community bonds loosen, individuals have increasing discretion in the construction of their own identity. In this article we argue for seeing modernization as the progressive psychologization of subjectivity. That reveals the mechanisms of what we can call, following Foucault, "constituent power": a power that turns the psychological subject's conflicts away from external objects and towards an inner world. It is that inner conflict that promotes the modern preoccupation with identity.

  12. High call volume at poison control centers: identification and implications for communication.

    Science.gov (United States)

    Caravati, E M; Latimer, S; Reblin, M; Bennett, H K W; Cummins, M R; Crouch, B I; Ellington, L

    2012-09-01

    High volume surges in health care are uncommon and unpredictable events. Their impact on health system performance and capacity is difficult to study. To identify time periods that exhibited very busy conditions at a poison control center and to determine whether cases and communication during high volume call periods are different from cases during low volume periods. Call data from a US poison control center over twelve consecutive months was collected via a call logger and an electronic case database (Toxicall®).Variables evaluated for high call volume conditions were: (1) call duration; (2) number of cases; and (3) number of calls per staff member per 30 minute period. Statistical analyses identified peak periods as busier than 99% of all other 30 minute time periods and low volume periods as slower than 70% of all other 30 minute periods. Case and communication characteristics of high volume and low volume calls were compared using logistic regression. A total of 65,364 incoming calls occurred over 12 months. One hundred high call volume and 4885 low call volume 30 minute periods were identified. High volume periods were more common between 1500 and 2300 hours and during the winter months. Coded verbal communication data were evaluated for 42 high volume and 296 low volume calls. The mean (standard deviation) call length of these calls during high volume and low volume periods was 3 minutes 27 seconds (1 minute 46 seconds) and 3 minutes 57 seconds (2 minutes 11 seconds), respectively. Regression analyses revealed a trend for fewer overall verbal statements and fewer staff questions during peak periods, but no other significant differences for staff-caller communication behaviors were found. Peak activity for poison center call volume can be identified by statistical modeling. Calls during high volume periods were similar to low volume calls. Communication was more concise yet staff was able to maintain a good rapport with callers during busy call periods

  13. An Evaluation Framework for CALL

    Science.gov (United States)

    McMurry, Benjamin L.; Williams, David Dwayne; Rich, Peter J.; Hartshorn, K. James

    2016-01-01

    Searching prestigious Computer-assisted Language Learning (CALL) journals for references to key publications and authors in the field of evaluation yields a short list. The "American Journal of Evaluation"--the flagship journal of the American Evaluation Association--is only cited once in both the "CALICO Journal and Language…

  14. 29 CFR 18.614 - Calling and interrogation of witnesses by judge.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 1 2010-07-01 2010-07-01 true Calling and interrogation of witnesses by judge. 18.614... interrogation of witnesses by judge. (a) Calling by the judge. The judge may, on the judge's own motion or at... thus called. (b) Interrogation by the judge. The judge may interrogate witnesses, whether called by the...

  15. Turchin's Relation for Call-by-Name Computations: A Formal Approach

    Directory of Open Access Journals (Sweden)

    Antonina Nepeivoda

    2016-07-01

    Full Text Available Supercompilation is a program transformation technique that was first described by V. F. Turchin in the 1970s. In supercompilation, Turchin's relation as a similarity relation on call-stack configurations is used both for call-by-value and call-by-name semantics to terminate unfolding of the program being transformed. In this paper, we give a formal grammar model of call-by-name stack behaviour. We classify the model in terms of the Chomsky hierarchy and then formally prove that Turchin's relation can terminate all computations generated by the model.

  16. Elementary number theory

    CERN Document Server

    Kraft, James S

    2014-01-01

    Introduction. Divisibility. Linear Diophantine Equations. Unique Factorization. Applications of Unique Factorization. Congruences. Fermat, Euler, Wilson. Cryptographic Applications. Order and Primitive Roots. More Cryptographic Applications. Quadratic Reciprocity. Primality and Factorization. Sums of Squares. Arithmetic Functions. Continued Fractions. Recent Developments. Appendices. Index.

  17. [Bioacoustic of the advertisement call of Ceratophrys cranwelli (Anura: Ceratophryidae)].

    Science.gov (United States)

    Valetti, Julián Alonso; Salas, Nancy Edith; Martino, Adolfo Ludovico

    2013-03-01

    The advertisement call plays an important role in the life history of anuran amphibians, mainly during the breeding season. Call features represent an important character to discriminate species, and sound emissions are very effective to assure or reinforce genetic incompatibility, especially in the case of sibling species. Since frogs are ectotherms, acoustic properties of their calls will vary with temperature. In this study, we described the advertisement call of C. cranwelli, quantifying the temperature effect on its components. The acoustic emissions were recorded during 2007 using a DAT record Sony TCD-100 with stereo microphone ECM-MS907 Sony and tape TDK DAT-RGX 60. As males emit their calls floating in temporary ponds, water temperatures were registered after recording the advertisement calls with a digital thermometer TES 1300+/-0.1 degreeC. Altogether, 54 calls from 18 males were analyzed. The temporal variables of each advertisement call were measured using oscillograms and sonograms and the analyses of dominant frequency were performed using a spectrogram. Multiple correlation analysis was used to identify the temperature-dependent acoustic variables and the temperature effect on these variables was quantified using linear regression models. The advertisement call of C. cranwelli consists of a single pulse group. Call duration, Pulse duration and Pulse interval decreased with the temperature, whereas the Pulse rate increased with temperature. The temperature-dependent variables were standardized at 25 degreeC according to the linear regression model obtained. The acoustic variables that were correlated with the temperature are the variables which emissions depend on laryngeal muscles and the temperature constraints the contractile properties of muscles. Our results indicated that temperature explains an important fraction of the variability in some acoustic variables (79% in the Pulse rate), and demonstrated the importance of considering the effect of

  18. Primitive entertainment prank calls in the work of counseling psychologist on Children helpline

    Directory of Open Access Journals (Sweden)

    I.A. Geronimus

    2014-08-01

    Full Text Available We explore the challenges faced by counseling psychologist when working at the Children's Helpline in cases of prank calls. The category of prank calls include such calls, when the caller asks the psychologist to discuss the imaginary situation, or do not formulate a query at all. On the basis of empirical data, we revealed the main varieties of such calls: call jokes, fantasy calls, intrusive calls, insulting calls, prank calls, calls of a sexual nature, dating calls. We explore the possible motivations of children and adolescents, entertaining by phone calls: experimentation with new social roles, expression of negative emotions, cognitive motivation, etc. We show the principles and strategies of counselors of Children's helpline working with this type of calls: they are based on cultural-historical psychology ideas and V. Satir communicative styles model.

  19. Calling and Career Preparation: Investigating Developmental Patterns and Temporal Precedence

    Science.gov (United States)

    Hirschi, Andreas; Herrmann, Anne

    2013-01-01

    The presence of a calling and career development are assumed to be closely related. However, the nature of and reason for this relationship have not been thoroughly investigated. We hypothesized the existence of reciprocal effects between calling and three dimensions of career preparation and assessed the change of the presence of a calling,…

  20. To the problem of ensuring stability of activities of construction companies engaged in high-rise building construction

    Science.gov (United States)

    Ivanov, Nikolay; Safe Aldeen, Ahmed

    2018-03-01

    Recently, more and more attention in scientific literature has been drawn to improving the sustainability of organization. The growth in the volume of high-rise construction in Russia makes the task of assessing and ensuring the sustainability of organizations and enterprises leading this type of construction very relevant. The article considers the approach to assessing the sustainability of the organization's activities in the context of functioning of quality management system (QMS). It puts forward the hypothesis that assessment of sustainability of an organization that has a real and efficient functioning quality management system can be based on the results of assessing the effectiveness of the QMS. The article describes in sufficient detail the sequence of actions to form a list of criteria for assessing the effectiveness of the QMS and sustainability of the organization, and to evaluate both characteristics on the basis of these criteria. For a clear interpretation of the results obtained, the authors use so-called petal diagrams. It suggests an original approach to their creation and analysis. Based on the results of the study, the authors conclude that in order to assess the sustainability of enterprises and organizations analysis of the dynamics of changes in the basic sustainability factors is mandatory.

  1. Staffing a call center with uncertain non-stationary arrival rate and flexibility

    NARCIS (Netherlands)

    Liao, S.; van Delft, C.; Jouini, O.; Koole, G.M.

    2012-01-01

    We consider a multi-period staffing problem in a single-shift call center. The call center handles inbound calls, as well as some alternative back-office jobs. The call arrival process is assumed to follow a doubly non-stationary stochastic process with a random mean arrival rate. The inbound calls

  2. Test Method Facet and the Construct Validity of Listening Comprehension Tests

    Directory of Open Access Journals (Sweden)

    Roya Khoii

    2010-05-01

    Full Text Available The assessment of listening abilities is one of the least understood, least developed and, yet, one of the most important areas of language testing and assessment. It is particularly important because of its potential wash-back effects on classroom practices. Given the fact that listening tests play a great role in assessing the language proficiency of students, they are expected to enjoy a high level of construct validity. The present study was dedicated to investigating the construct validity of three different test formats, namely, multiple-choice, gap filling on summary (also called listening summary cloze, and fill-in-the-blank, used to evaluate the listening comprehension of EFL learners. In order to achieve the purpose of the study, three passages with relatively similar readability levels were used for the construction of 9 listening tests, that is, each appeared in three formats. Following a counter-balanced design, the tests were administered to 91homogeneous EFL learners divided into three groups. The statistical analysis of the results revealed that the multiple-choice test enjoyed the highest level of construct validity. Moreover, a repeated measure one-way ANOVA demonstrated that the fill-in-the-blank task was the most difficult with the MC test as the easiest for the participants.

  3. 29 CFR 778.221 - “Call-back” pay.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false âCall-backâ pay. 778.221 Section 778.221 Labor Regulations...Regular Rateâ Payments Not for Hours Worked § 778.221 “Call-back” pay. (a) General. In the interest of... payments consist of a specified number of hours' pay at the applicable straight time or overtime rates...

  4. The Effects of the CALL Model on College English Reading Teaching

    Directory of Open Access Journals (Sweden)

    Dan Zhang

    2017-12-01

    Full Text Available Computer Assisted Language Learning (CALL is an important concept in English teaching method reform. College students’ English reading ability is an important indicator in the evaluation on the college students’ English proficiency. Therefore, this paper applies the CALL model in English reading teaching. Firstly, it introduces the application and development prospect of the CALL model, and analyzes its advantages and disadvantages; secondly, it analyzes the present situation of college English teaching and its influencing factors and then designs an application example to integrate the CALL model with different aspect of English reading. Finally, it analyzes the teaching results of college English reading under the CALL model. Therefore, in both theory and practice, this paper proves the effectiveness and innovativeness of the CALL model.

  5. Call 1 FAQ (ENG)

    International Development Research Centre (IDRC) Digital Library (Canada)

    Francine Sinzinkayo

    and testing, e.g. construction protein or nucleic acid scaffolds and other state of the art approaches that ... methods and a significant gain in time to proof of concept. ... demonstrates an accelerated vaccine R&D pathway to proof of concept.

  6. Call for concept notes: Research on Myanmar's decentralization and ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... are launching this research call under a new initiative called Knowledge for ... Over the decades of military rule, information sharing, research, and freedom of ... Research outputs would take the form of working papers for peer-review and ...

  7. Construction management

    CERN Document Server

    Pellicer, Eugenio; Teixeira, José C; Moura, Helder P; Catalá, Joaquín

    2014-01-01

    The management of construction projects is a wide ranging and challenging discipline in an increasingly international industry, facing continual challenges and demands for improvements in safety, in quality and cost control, and in the avoidance of contractual disputes. Construction Management grew out of a Leonardo da Vinci project to develop a series of Common Learning Outcomes for European Managers in Construction. Financed by the European Union, the project aimed to develop a library of basic materials for developing construction management skills for use in a pan-European context. Focused exclusively on the management of the construction phase of a building project from the contractor's point of view, Construction Management covers the complete range of topics of which mastery is required by the construction management professional for the effective delivery of new construction projects. With the continued internationalisation of the construction industry, Construction Management will be required rea...

  8. Method for evaluation of risk due to seismic related design and construction errors based on past reactor experience

    International Nuclear Information System (INIS)

    Gonzalez Cuesta, M.; Okrent, D.

    1985-01-01

    This paper proposes a methodology for quantification of risk due to seismic related design and construction errors in nuclear power plants, based on information available on errors discovered in the past. For the purposes of this paper, an error is defined as any event that causes the seismic safety margins of a nuclear power plant to be smaller than implied by current regulatory requirements and industry common practice. Also, the actual reduction in the safety margins caused by the error will be called a deficiency. The method is based on a theoretical model of errors, called a deficiency logic diagram. First, an ultimate cause is present. This ultimate cause is consumated as a specific instance, called originating error. As originating errors may occur in actions to be applied a number of times, a deficiency generation system may be involved. Quality assurance activities will hopefully identify most of these deficiencies, requesting their disposition. However, the quality assurance program is not perfect and some operating plant deficiencies may persist, causing different levels of impact to the plant logic. The paper provides a way of extrapolating information about errors discovered in plants under construction in order to assess the risk due to errors that have not been discovered

  9. Don't Call It School

    Science.gov (United States)

    Robb, Daniel

    2006-01-01

    "Homeschooling," "deschooling," and "unschooling" are commonly used terms in the alternative-education world, but each lacks specificity. In this article, the author describes what he discovered during several visits to North Star. Known officially as North Star: Self-Directed Learning for Teens, it is not as structured as a so-called "free"…

  10. Opportunities in white-box cryptography

    NARCIS (Netherlands)

    Michiels, W.

    White-box cryptography is the discipline of implementing a cryptographic algorithm in software such that an adversary will have difficulty extracting the cryptographic key. This approach assumes that the adversary has full access to and full control over the implementation's execution. White-box

  11. Conduits to care: call lights and patients’ perceptions of communication

    Science.gov (United States)

    Montie, Mary; Shuman, Clayton; Galinato, Jose; Patak, Lance; Anderson, Christine A; Titler, Marita G

    2017-01-01

    Background Call light systems remain the primary means of hospitalized patients to initiate communication with their health care providers. Although there is vast amounts of literature discussing patient communication with their health care providers, few studies have explored patients’ perceptions concerning call light use and communication. The specific aim of this study was to solicit patients’ perceptions regarding their call light use and communication with nursing staff. Methods Patients invited to this study met the following inclusion criteria: proficient in English, been hospitalized for at least 24 hours, aged ≥21 years, and able to communicate verbally (eg, not intubated). Thirty participants provided written informed consent, were enrolled in the study, and completed interviews. Results Using qualitative descriptive methods, five major themes emerged from patients’ perceptions (namely; establishing connectivity, participant safety concerns, no separation: health care and the call light device, issues with the current call light, and participants’ perceptions of “nurse work”). Multiple minor themes supported these major themes. Data analysis utilized the constant comparative methods of Glaser and Strauss. Discussion Findings from this study extend the knowledge of patients’ understanding of not only why inconsistencies occur between the call light and their nurses, but also why the call light is more than merely a device to initiate communication; rather, it is a direct conduit to their health care and its delivery. PMID:29075125

  12. Conduits to care: call lights and patients' perceptions of communication.

    Science.gov (United States)

    Montie, Mary; Shuman, Clayton; Galinato, Jose; Patak, Lance; Anderson, Christine A; Titler, Marita G

    2017-01-01

    Call light systems remain the primary means of hospitalized patients to initiate communication with their health care providers. Although there is vast amounts of literature discussing patient communication with their health care providers, few studies have explored patients' perceptions concerning call light use and communication. The specific aim of this study was to solicit patients' perceptions regarding their call light use and communication with nursing staff. Patients invited to this study met the following inclusion criteria: proficient in English, been hospitalized for at least 24 hours, aged ≥21 years, and able to communicate verbally (eg, not intubated). Thirty participants provided written informed consent, were enrolled in the study, and completed interviews. Using qualitative descriptive methods, five major themes emerged from patients' perceptions (namely; establishing connectivity, participant safety concerns, no separation: health care and the call light device, issues with the current call light, and participants' perceptions of "nurse work"). Multiple minor themes supported these major themes. Data analysis utilized the constant comparative methods of Glaser and Strauss. Findings from this study extend the knowledge of patients' understanding of not only why inconsistencies occur between the call light and their nurses, but also why the call light is more than merely a device to initiate communication; rather, it is a direct conduit to their health care and its delivery.

  13. The association between advertising and calls to a tobacco quitline

    Science.gov (United States)

    Mosbaek, Craig H; Austin, Donald F; Stark, Michael J; Lambert, Lori C

    2007-01-01

    Objective This study assessed the cost effectiveness of different types of television and radio advertisements and the time of day in which advertisements were placed in generating calls to the Oregon tobacco quitline. Design Cost effectiveness was measured by cost per call, calculated as the cost of advertising divided by the number of quitline calls generated by that advertising. Advertising was bought in one‐week or two‐week blocks and included 27 daytime television buys, 22 evening television buys and 31 radio buys. Results Cost effectiveness varied widely by medium, time of day and advertisement used. Daytime television was seven times more cost effective than evening television and also more cost effective than radio. The most effective advertisements at generating quitline calls were real life testimonials by people who lost family members to tobacco and advertisements that deal practically with how to quit. Conclusions Placement of television advertisements during the day versus the evening can increase an advertisement's effectiveness in generating calls to a quitline. Some advertising messages were more effective than others in generating calls to a quitline. Quitline providers can apply findings from previous research when planning media campaigns. In addition, call volume should be monitored in order to assess the cost effectiveness of different strategies to promote use of the quitline. PMID:18048626

  14. Variable-length code construction for incoherent optical CDMA systems

    Science.gov (United States)

    Lin, Jen-Yung; Jhou, Jhih-Syue; Wen, Jyh-Horng

    2007-04-01

    The purpose of this study is to investigate the multirate transmission in fiber-optic code-division multiple-access (CDMA) networks. In this article, we propose a variable-length code construction for any existing optical orthogonal code to implement a multirate optical CDMA system (called as the multirate code system). For comparison, a multirate system where the lower-rate user sends each symbol twice is implemented and is called as the repeat code system. The repetition as an error-detection code in an ARQ scheme in the repeat code system is also investigated. Moreover, a parallel approach for the optical CDMA systems, which is proposed by Marić et al., is also compared with other systems proposed in this study. Theoretical analysis shows that the bit error probability of the proposed multirate code system is smaller than other systems, especially when the number of lower-rate users is large. Moreover, if there is at least one lower-rate user in the system, the multirate code system accommodates more users than other systems when the error probability of system is set below 10 -9.

  15. Nutritional effects on male calling behaviour in the variable field cricket.

    Science.gov (United States)

    Wagner; Hoback

    1999-01-01

    In the variable field cricket, Gryllus lineaticeps, females prefer higher chirp rates and longer chirp durations in male calling song. Higher chirp rates are energetically more expensive to produce, but the energetic cost of calling does not vary with chirp duration. We tested the hypothesis that nutrition affects male chirp rate and chirp duration. Full-sibling brothers of similar age were placed on high- and low-nutrition feeding regimes. There was no effect of feeding regime on male weight; neither group showed a significant change in weight, and the two groups did not differ from each other in weight change. However, males on the high-nutrition feeding regime both called more frequently and called at higher chirp rates when they did call. The two groups did not differ in chirp duration, the duration of pulses within chirps or chirp dominant frequency. These results suggest that females select mates based on one nutrition-dependent call character (chirp rate) and one nutrition-independent call character (chirp duration). In addition, because males in the two groups did not show significant differences in weight change, and because males on the high-nutrition feeding regime engaged in energetically more expensive calling, these results suggest that males invest any excess energy above their basic maintenance requirements in the production of call types that increase their attractiveness to females. The absence of a relationship between body condition and calling song structure for males in the field may be a consequence of this pattern of energy allocation. Copyright 1999 The Association for the Study of Animal Behaviour.

  16. The Techniques for Arbitrary Secure Quering to Encrypted Cloud Database Using Fully Homomorphic Encryption

    Directory of Open Access Journals (Sweden)

    Filipp B. Burtyka

    2017-06-01

    Full Text Available The processing of queries to an encrypted database without its decryption has been actively investigated recently by both cryptographers and database researchers. Such a work is allowed by various types of so-called Processable encryption (PE, as well as special architectures of database management systems (DBMS which use these types of encryption. The most known types of PEs are order-preserving encryption, homomorphic encryption, functional encryption, searchable encryption, and property-preserving encryption. Based on these types of encryption, various DBMSs are built, the most famous of which are CryptDB, Mo- nomi, Arx and DBMS by researchers from Novosibirsk. These DBMSs are built on the basis of various types of PEs, for example order-preserving encryption, homomorphic encryption and traditional block encryption. However, this approach can cause privacy problems. The best approach from the security viewpoint is to build a cryptographic database using only homomorphic encryption. An obstacle to this is insufficient efficiency of the existing homomorphic encryption schemes and incomplete solution of a set of issues related to ensuring the confidentiality of decisions making in an untrusted environment. In this paper, we propose the techniques for solving these problems, in particular for organization of execution arbitrary secure query to the encrypted relational database using fully homomorphic encryption. Also we propose a model of query condition that splits query into atomic predicates and linking condition. One of roposed technique is aimed at ensuring the security of linking condition of queries, others keep security of atomic predicates. The parameters of the proposed techniques make it possible to implement them using the already existing homomorphic encryption schemes. The proposed techniques can be a basis for building secure cryptographic cloud databases.

  17. An Island Called Cuba

    Directory of Open Access Journals (Sweden)

    Jean Stubbs

    2011-06-01

    Full Text Available Review of: An Island Called Home: Returning to Jewish Cuba. Ruth Behar, photographs by Humberto Mayol. New Brunswick NJ: Rutgers University Press, 2007. xiii + 297 pp. (Cloth US$ 29.95 Fidel Castro: My Life: A Spoken Autobiography. Fidel Castro & Ignacio Ramonet. New York: Scribner/Simon & Schuster, 2008. vii + 724 pp. (Paper US$ 22.00, e-book US$ 14.99 Cuba: What Everyone Needs to Know. Julia E. Sweig. New York: Oxford University Press, 2009. xiv + 279 pp. (Paper US$ 16.95 [First paragraph] These three ostensibly very different books tell a compelling story of each author’s approach, as much as the subject matter itself. Fidel Castro: My Life: A Spoken Autobiography is based on a series of long interviews granted by the then-president of Cuba, Fidel Castro, to Spanish-Franco journalist Ignacio Ramonet. Cuba: What Everyone Needs to Know, by U.S. political analyst Julia Sweig, is one of a set country series, and, like Ramonet’s, presented in question/answer format. An Island Called Home: Returning to Jewish Cuba, with a narrative by Cuban-American anthropologist Ruth Behar and photographs by Cuban photographer Humberto Mayol, is a retrospective/introspective account of the Jewish presence in Cuba. While from Ramonet and Sweig we learn much about the revolutionary project, Behar and Mayol convey the lived experience of the small Jewish community against that backdrop.

  18. “Computer Assisted Language Learning” (CALL

    Directory of Open Access Journals (Sweden)

    Nazlı Gündüz

    2005-10-01

    Full Text Available This article will provide an overview of computers; an overview of the history of CALL, itspros and cons, the internet, World Wide Web, Multimedia, and research related to the uses of computers in the language classroom. Also, it also aims to provide some background for the beginnerson using the Internet in language classes today. It discusses some of the common types of Internetactivities that are being used today, what the minimum requirements are for using the Internet forlanguage learning, and some easy activities you can adapt for your classes. Some special terminology related to computers will also be used in this paper. For example, computer assisted language learning(CALL refers to the sets of instructions which need to be loaded into the computer for it to be able to work in the language classroom. It should be borne in mind that CALL does not refer to the use of acomputer by a teacher to type out a worksheet or a class list or preparing his/her own teaching alone.Hardware refers to any computer equipment used, including the computer itself, the keyboard, screen (or the monitor, the disc-drive, and the printer. Software (computer programs refers to the sets of instructions which need to be loaded into the computer for it to be able to work.

  19. ASR performance analysis of an experimental call routing system

    CSIR Research Space (South Africa)

    Modipa, T

    2009-11-01

    Full Text Available Call routing is an important application of Automatic Speech Recognition (ASR) technology. In this paper the authors discuss the main issues affecting the performance of a call routing system and describe the ASR component of the "Auto...

  20. Non-specific alarm calls trigger mobbing behavior in Hainan gibbons (Nomascus hainanus).

    Science.gov (United States)

    Deng, Huaiqing; Gao, Kai; Zhou, Jiang

    2016-09-30

    Alarm calls are important defensive behaviors. Here, we report the acoustic spectrum characteristics of alarm calls produced by Hainan gibbons (Nomascus hainanus) inhabiting Bawangling National Nature Reserve in Hainan, China. Analysis of call data collected from 2002-2014 shows that alarm calls are emitted by all family group members, except infants. Alarm behavior included simple short alarming calls (7-10 min) followed by longer variable-frequency mobbing calls lasting 5-12 min. The duration of individual alarming and mobbing calls was 0.078 ± 0.014 s and 0.154 ± 0.041 s at frequency ranges of 520-1000 Hz and 690-3920 Hz, respectively. Alarming call duration was positively associated with group size. The alarm calls can trigger mobbing behavior in Hainan gibbons; this is a defense way of social animals, and first report among the primates' species. The system of vocal alarm behavior described in this critically endangered species is simple and effective.

  1. Minimizing Barriers in Learning for On-Call Radiology Residents-End-to-End Web-Based Resident Feedback System.

    Science.gov (United States)

    Choi, Hailey H; Clark, Jennifer; Jay, Ann K; Filice, Ross W

    2018-02-01

    Feedback is an essential part of medical training, where trainees are provided with information regarding their performance and further directions for improvement. In diagnostic radiology, feedback entails a detailed review of the differences between the residents' preliminary interpretation and the attendings' final interpretation of imaging studies. While the on-call experience of independently interpreting complex cases is important to resident education, the more traditional synchronous "read-out" or joint review is impossible due to multiple constraints. Without an efficient method to compare reports, grade discrepancies, convey salient teaching points, and view images, valuable lessons in image interpretation and report construction are lost. We developed a streamlined web-based system, including report comparison and image viewing, to minimize barriers in asynchronous communication between attending radiologists and on-call residents. Our system provides real-time, end-to-end delivery of case-specific and user-specific feedback in a streamlined, easy-to-view format. We assessed quality improvement subjectively through surveys and objectively through participation metrics. Our web-based feedback system improved user satisfaction for both attending and resident radiologists, and increased attending participation, particularly with regards to cases where substantive discrepancies were identified.

  2. Experimental realization of a highly secure chaos communication under strong channel noise

    International Nuclear Information System (INIS)

    Ye Weiping; Dai Qionglin; Wang Shihong; Lu Huaping; Kuang Jinyu; Zhao Zhenfeng; Zhu Xiangqing; Tang Guoning; Huang Ronghuai; Hu Gang

    2004-01-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work

  3. Experimental realization of a highly secure chaos communication under strong channel noise

    Science.gov (United States)

    Ye, Weiping; Dai, Qionglin; Wang, Shihong; Lu, Huaping; Kuang, Jinyu; Zhao, Zhenfeng; Zhu, Xiangqing; Tang, Guoning; Huang, Ronghuai; Hu, Gang

    2004-09-01

    A one-way coupled spatiotemporally chaotic map lattice is used to construct cryptosystem. With the combinatorial applications of both chaotic computations and conventional algebraic operations, our system has optimal cryptographic properties much better than the separative applications of known chaotic and conventional methods. We have realized experiments to practice duplex voice secure communications in realistic Wired Public Switched Telephone Network by applying our chaotic system and the system of Advanced Encryption Standard (AES), respectively, for cryptography. Our system can work stably against strong channel noise when AES fails to work.

  4. Semi-Homomorphic Encryption and Multiparty Computation

    DEFF Research Database (Denmark)

    Bendlin, Rikke; Damgård, Ivan Bjerre; Orlandi, Claudio

    2011-01-01

    allow us to construct an efficient multiparty computation protocol for arithmetic circuits, UC-secure against a dishonest majority. The protocol consists of a preprocessing phase and an online phase. Neither the inputs nor the function to be computed have to be known during preprocessing. Moreover......, the online phase is extremely efficient as it requires no cryptographic operations: the parties only need to exchange additive shares and verify information theoretic MACs. Our contribution is therefore twofold: from a theoretical point of view, we can base multiparty computation on a variety of different...

  5. Essentially Optimal Universally Composable Oblivious Transfer

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Nielsen, Jesper Buus; Orlandi, Claudio

    2009-01-01

    . Communication complexity: it communicates O(1) group elements to transfer one out of two group elements. The Big-O notation hides 32, meaning that the communication is probably not optimal, but is essentially optimal in that the overhead is at least constant. Our construction is based on pairings, and we assume......Oblivious transfer is one of the most important cryptographic primitives, both for theoretical and practical reasons and several protocols were proposed during the years. We provide the first oblivious transfer protocol which is simultaneously optimal on the following list of parameters: Security...

  6. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  7. Universally composable oblivious transfer based on a variant of lPN

    DEFF Research Database (Denmark)

    David, Bernardo Machado; Dowsley, Rafael; Nascimento, Anderson C A

    2014-01-01

    Oblivious transfer (OT) is a fundamental two-party cryptographic primitive that implies secure multiparty computation. In this paper, we introduce the first OT based on the Learning Parity with Noise (LPN) problem. More specifically, we use the LPN variant that was introduced by Alekhnovich (FOCS...... 2003). We prove that our protocol is secure against active static adversaries in the Universal Composability framework in the common reference string model. Our constructions are based solely on a LPN style assumption and thus represents a clear next step from current code-based OT protocols, which...

  8. Analysis and evaluation of status reports for quality assurance practice in nuclear power plant construction

    International Nuclear Information System (INIS)

    1984-01-01

    The study elaborates the structure and definitions of a general description of quality assurance systems with respect to planning and construction of nuclear power plants and indicates standards concerning the production and adaption of structural components. It is suggested to introduce in the licensing procedure the so-called comprehensive constructional report by an expert. For contractors, tasks and responsibilities of the major companies with regard to quality assurance are expressly stipulated. The study also suggests the inclusion of ARGEN, the elaboration of production and test sequence plans and the introduction of a control and evaluation system for the feedback of experience among companies involved and ARGEN. (DG) [de

  9. In- and Out-of-the-Money Convertible Bond Calls

    DEFF Research Database (Denmark)

    Bechman, Ken; Lunde, Asger; Zebedee, Allan

    2014-01-01

    Convertible bond calls typically cause significant reactions in equity prices. The empirical research largely finds negative and positive announcement effects for the in-the-money and the out-of-the-money calls respectively. However, this research has difficulty distinguishing between the two mai...

  10. Calls to Florida Poison Control Centers about mercury: Trends over 2003-2013.

    Science.gov (United States)

    Gribble, Matthew O; Deshpande, Aniruddha; Stephan, Wendy B; Hunter, Candis M; Weisman, Richard S

    2017-11-01

    The aim of this analysis was to contrast trends in exposure-report calls and informational queries (a measure of public interest) about mercury to the Florida Poison Control Centers over 2003-2013. Poison-control specialists coded calls to Florida Poison Control Centers by substance of concern, caller demographics, and whether the call pertained to an exposure event or was an informational query. For the present study, call records regarding mercury were de-identified and provided along with daily total number of calls for statistical analysis. We fit Poisson models using generalized estimating equations to summarize changes across years in counts of daily calls to Florida Poison Control Centers, adjusting for month. In a second stage of analysis, we further adjusted for the total number of calls each day. We also conducted analyses stratified by age of the exposed. There was an overall decrease over 2003-2013 in the number of total calls about mercury [Ratio per year: 0.89, 95% CI: (0.88, 0.90)], and calls about mercury exposure [Ratio per year: 0.84, 95% CI: (0.83, 0.85)], but the number of informational queries about mercury increased over this time [Ratio per year: 1.15 (95% CI: 1.12, 1.18)]. After adjusting for the number of calls of that type each day (e.g., call volume), the associations remained similar: a ratio of 0.88 (95% CI: 0.87, 0.89) per year for total calls, 0.85 (0.83, 0.86) for exposure-related calls, and 1.17 (1.14, 1.21) for informational queries. Although, the number of exposure-related calls decreased, informational queries increased over 2003-2013. This might suggest an increased public interest in mercury health risks despite a decrease in reported exposures over this time period. Copyright © 2017 Elsevier Inc. All rights reserved.

  11. The relationship marketing in the process of customer loyalty. Case large construction of Manizales

    Directory of Open Access Journals (Sweden)

    María Cristina Torres Camacho

    2015-06-01

    Full Text Available This paper is based on the model Lindgreen (2001, upholding the relationship marketing should be approached in three dimensions: objectives, definition of constructs and tools, which enable better customer management within organizations. The objective was to determine the characteristics of relationship marketing as a key factor in the process of Customer Loyalty in the big construction of Manizales Colombia. From a joint perspective, methodology relies on instruments and qualitative and quantitative analysis of court. The results tend to confirm that developers recognize the importance of Relational Marketing but not raised as a policy or have not defined in its strategic plan; additionally, expressed lack of strategies for customer retention, however, these remain loyal because the construction work on meeting your needs, based on trust, commitment and communication. To conclude, the faithful customers perceive that construction does not periodically evaluate their satisfaction with the purchased product, also claim that they show little interest in understanding the perception, make personal meetings, making constant communication through phone calls and meet their tastes and preferences.

  12. The oil market. Call on OPEC determines the oil price

    International Nuclear Information System (INIS)

    Kingma, D.; Mulder, M.

    2001-01-01

    Several scenarios are applied to determine the oil price for the medium-long term, based on the so-called 'call on OPEC'. The 'call on OPEC' is part of the demand for oil which has to supplied by OPEC. It is expected that the nominal oil price will be circa $24 per barrel in 2004, based on a global growth of 4%. 2 refs

  13. Supporting Reform-Oriented Secondary Science Teaching through the Use of a Framework to Analyze Construction of Scientific Explanations

    Science.gov (United States)

    Richmond, Gail; Parker, Joyce M.; Kaldaras, Leonora

    2016-01-01

    The Next-Generation Science Standards (NGSS) call for a different approach to learning science. They promote three-dimensional (3D) learning that blends disciplinary core ideas, crosscutting concepts and scientific practices. In this study, we examined explanations constructed by secondary science teacher candidates (TCs) as a scientific practice…

  14. Validating Culture and Gender-Specific Constructs: A Mixed-Method Approach to Advance Assessment Procedures in Cross-Cultural Settings

    Science.gov (United States)

    Hitchcock, John H.; Sarkar, Sreeroopa; Nastasi, Bonnie; Burkholder, Gary; Varjas, Kristen; Jayasena, Asoka

    2006-01-01

    Despite on-going calls for developing cultural competency among mental health practitioners, few assessment instruments consider cultural variation in psychological constructs. To meet the challenge of developing measures for minority and international students, it is necessary to account for the influence culture may have on the latent constructs…

  15. A Sound Abstraction of the Parsing Problem

    DEFF Research Database (Denmark)

    Mödersheim, Sebastian Alexander; Katsoris, Georgios

    2014-01-01

    In formal verification, cryptographic messages are often represented by algebraic terms. This abstracts not only from the intricate details of the real cryptography, but also from the details of the non-cryptographic aspects: the actual formatting and structuring of messages. We introduce a new a...

  16. Affine pairings on ARM

    NARCIS (Netherlands)

    Acar, T.; Lauter, K.; Naehrig, M.; Shumow, D.

    2011-01-01

    Pairings on elliptic curves are being used in an increasing number of cryptographic applications on many different devices and platforms, but few performance numbers for cryptographic pairings have been reported on embedded and mobile devices. In this paper we give performance numbers for affine and

  17. High-speed cryptography and cryptanalysis

    NARCIS (Netherlands)

    Schwabe, P.

    2011-01-01

    Modern digital communication relies heavily on cryptographic protection to ensure data integrity and privacy. In order to deploy state-of-the art cryptographic primitives and protocols in real-world scenarios, one needs to highly optimize software for both speed and security. This requires careful

  18. Construction history and construction management

    International Nuclear Information System (INIS)

    Agh, S.

    1999-01-01

    The process of pre-design and design preparation of the Mochovce NPP as well as the construction history of the plant is highlighted, including the financing aspect and problems arising from changes in the technological and other conditions of start-up of the reactor units. The results of international audits performed to improve the level of nuclear safety and implementation of the measures suggested are also described. The milestones of the whole construction process and start-up process, the control and quality system, and the methods of control and management of the complex construction project are outlined. (author)

  19. Short communications: Calls of three species of arthroleptid frogs ...

    African Journals Online (AJOL)

    The calls of three anuran species in the family Arthroleptidae in the sub-family Astylosterminae from Equatorial Guinea are described including information on calling behaviour. For each species, we present a characteristic audiospectrogram and oscillogram. We also provide numerical information about the spectral and ...

  20. The hash function BLAKE

    CERN Document Server

    Aumasson, Jean-Philippe; Phan, Raphael; Henzen, Luca

    2014-01-01

    This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.   In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security de