WorldWideScience

Sample records for cryptographic construct called

  1. Construction and analysis of cryptographic functions

    CERN Document Server

    Budaghyan, Lilya

    2015-01-01

    This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions. These functions have optimal resistance to linear and/or differential attacks, which are the two most powerful attacks on symmetric cryptosystems. Besides cryptographic applications, these functions are significant in many branches of mathematics and information theory including coding theory, combinatorics, commutative algebra, finite geometry, sequence design and quantum information theory. The author analyzes equ

  2. Cryptographic protocol security analysis based on bounded constructing algorithm

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    An efficient approach to analyzing cryptographic protocols is to develop automatic analysis tools based on formal methods. However, the approach has encountered the high computational complexity problem due to reasons that participants of protocols are arbitrary, their message structures are complex and their executions are concurrent. We propose an efficient automatic verifying algorithm for analyzing cryptographic protocols based on the Cryptographic Protocol Algebra (CPA) model proposed recently, in which algebraic techniques are used to simplify the description of cryptographic protocols and their executions. Redundant states generated in the analysis processes are much reduced by introducing a new algebraic technique called Universal Polynomial Equation and the algorithm can be used to verify the correctness of protocols in the infinite states space. We have implemented an efficient automatic analysis tool for cryptographic protocols, called ACT-SPA, based on this algorithm, and used the tool to check more than 20 cryptographic protocols. The analysis results show that this tool is more efficient, and an attack instance not offered previously is checked by using this tool.

  3. Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box

    Directory of Open Access Journals (Sweden)

    Shristi Deva Sinha

    2012-01-01

    Full Text Available Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long security evaluation; it is well proven in terms of its strength and efficiency. The substitution box is the back bone of the cipher and its strength lies in the simplicity of its algebraic construction. The present paper is a study of the construction of Rijndael Substitution box and the effect of varying the design components on its cryptographic properties.

  4. Algebraic Construction and Cryptographic Properties of Rijndael Substitution Box

    Directory of Open Access Journals (Sweden)

    Shristi Deva Sinha

    2012-01-01

    Full Text Available Rijndael algorithm was selected as the advanced encryption standard in 2001 after five year long security evaluation; it is well proven in terms of its strength and efficiency. The substitution box is the back bone of the cipher and its strength lies in the simplicity of its algebraic construction. The present paper is a study of the construction of Rijndael Substitution box and the effect of varying the design components on its cryptographic properties.Defence Science Journal, 2012, 62(1, pp.32-37, DOI:http://dx.doi.org/10.14429/dsj.62.1439

  5. Construction of cryptographic information protection in automated control systems for rapid reaction military forces

    Directory of Open Access Journals (Sweden)

    Sergey Petrovich Evseev

    2012-04-01

    Full Text Available New approaches to realizations of military operations are analyzed. The main factors that directly affect the construction and operation of information security subsystems in prospective automated command and control military systems are described. Possible ways of the construction of cryptographic subsystems of information protection in automated operation management systems for united military force groups are investigated.

  6. Call centres: constructing flexibility

    OpenAIRE

    Arzbächer, Sandra; Holtgrewe, Ursula; Kerst, Christian

    2002-01-01

    "The development of call centres as a flexible interface between firms and their environments has been seen as exemplary or even symptomatic of flexible capitalism (Sennett 1998). We are going to point out that they do not just stand for organisational change but also for changes of institutions towards deregulation. Employers and managers hoped for gains of flexibility, decreasing labour costs, and market gains by an expanded 24-hour-service. Surveillance and control by flexib...

  7. A Construction of Boolean Functions with Good Cryptographic Properties

    Science.gov (United States)

    2014-01-01

    using Binary Decision Diagram ( BDD ). Later research [19, 33] showed the effectiveness of BDD -based attacks on stream ciphers (albeit, they generally...require a large amount of memory). Krause notes that one of the effective ways to disrupt BDD -based attacks is for the Boolean function combiner of the...stream cipher is to have a robust BDD . There are many constructions of Boolean functions with high algebraic immu- nity [1, 7, 9, 10, 14, 15, 20, 21

  8. On the construction of cryptographically strong Boolean functions with desirable trade-off

    Institute of Scientific and Technical Information of China (English)

    REN Kui; PARK Jaemin; KIM Kwangjo

    2005-01-01

    This paper proposes a practical algorithm for systematically generating strong Boolean functions (f:GF(2)n→GF(2))with cryptographic meaning. This algorithm takes bent function as input and directly outputs the resulted Boolean function in terms of truth table sequence. This algorithm was used to develop two classes of balanced Boolean functions, one of which has very good cryptographic properties: nl(f)=22k-1-2k+2k-2 (n=2k), with the sum-of-squares avalanche characteristic off satisfying σf=24k+23k+2+23k+23k-2 and the absolute avalanche characteristic of △f satisfying △f=2k+1. This is the best result up to now compared to existing ones. Instead of bent sequences, starting from random Boolean functions was also tested in the algorithm. Experimental results showed that starting from bent sequences is highly superior to starting from random Boolean functions.

  9. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Thomsen, Søren Steffen

    2009-01-01

    Cryptographic hash functions are commonly used in many different areas of cryptography: in digital signatures and in public-key cryptography, for password protection and message authentication, in key derivation functions, in pseudo-random number generators, etc. Recently, cryptographic hash...... well-known designs, and also some design and cryptanalysis in which the author took part. The latter includes a construction method for hash functions and four designs, of which one was submitted to the SHA-3 hash function competition, initiated by the U.S. standardisation body NIST. It also includes...

  10. Symmetric cryptographic protocols for extended millionaires' problem

    Institute of Scientific and Technical Information of China (English)

    LI ShunDong; WANG DaoShun; DAI YiQi

    2009-01-01

    Yao's millionaires' problem is a fundamental problem in secure multiparty computation, and its solutions have become building blocks of many secure multiparty computation solutions. Unfortunately,most protocols for millionaires' problem are constructed based on public cryptography, and thus are inefficient. Furthermore, all protocols are designed to solve the basic millionaires' problem, that is,to privately determine which of two natural numbers is greater. If the numbers are real, existing solutions do not directly work. These features limit the extensive application of the existing protocols. This study introduces and refines the first symmetric cryptographic protocol for the basic millionaires' problem, and then extends the symmetric cryptographic protocol to privately determining which of two real numbers is greater, which are called the extended millionaires' problem, and proposes corresponding Constructed based on symmetric cryptography, these protocols are very efficient.

  11. CRYPTOGRAPHIC STEGANOGRAPHY

    Directory of Open Access Journals (Sweden)

    Vikas Yadav

    2014-08-01

    Full Text Available In the cryptographic steganography system, the message will first be converted into unreadable cipher and then this cipher will be embedded into an image file. Hence this type of system will provide more security by achieving both data encoding as well as data hiding. In this paper we propose an advanced steganocryptic system that combines the features of cryptography and steganography. In this proposed steganocryptic system we will encrypt the message into cipher1 by using Kunal Secure Astro-Encryption and we again encrypt this cipher to cipher2 by using grid cipher technique. Advantage of Kunal Secure Astro-Encryption is that it generates random useless points in between, thus fixed size messages can be generated providing more security compared to other cryptographic algorithms as the number of characters in original message cannot be found from encrypted message without the knowing the black holes. Now we will embed this cipher2 into image file by using visual steganography .In this proposed steganocryptic system we will use modified bit insertion technique to achieve visual steganography. This proposed system will be more secure than cryptography or steganography techniques[digital steganography] alone and also as compared to steganography and cryptography combined systems.

  12. Cryptographically enforced search pattern hiding

    NARCIS (Netherlands)

    Bösch, Christoph Tobias

    2015-01-01

    Searchable encryption is a cryptographic primitive that allows a client to out- source encrypted data to an untrusted storage provider, while still being able to query the data without decrypting. To allow the server to perform the search on the encrypted data, a so-called trapdoor is generated by t

  13. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...

  14. Cryptographic Key Management System

    Energy Technology Data Exchange (ETDEWEB)

    No, author

    2014-02-21

    This report summarizes the outcome of U.S. Department of Energy (DOE) contract DE-OE0000543, requesting the design of a Cryptographic Key Management System (CKMS) for the secure management of cryptographic keys for the energy sector infrastructure. Prime contractor Sypris Electronics, in collaboration with Oak Ridge National Laboratories (ORNL), Electric Power Research Institute (EPRI), Valicore Technologies, and Purdue University's Center for Education and Research in Information Assurance and Security (CERIAS) and Smart Meter Integration Laboratory (SMIL), has designed, developed and evaluated the CKMS solution. We provide an overview of the project in Section 3, review the core contributions of all contractors in Section 4, and discuss bene ts to the DOE in Section 5. In Section 6 we describe the technical construction of the CKMS solution, and review its key contributions in Section 6.9. Section 7 describes the evaluation and demonstration of the CKMS solution in different environments. We summarize the key project objectives in Section 8, list publications resulting from the project in Section 9, and conclude with a discussion on commercialization in Section 10 and future work in Section 11.

  15. Cryptographic Protocols:

    DEFF Research Database (Denmark)

    Geisler, Martin Joakim Bittel

    The art of keeping messages secret is ancient. It must have been invented only shortly after the invention of the messages themselves. Merchants and generals have always had a need to exchange critical messages while keeping them secret from the prying eyes of competitors or the enemy. Classical...... framework. We call this framework VIFF, short for Virtual Ideal Functionality Framework. VIFF implements a UC functionality for general multiparty computation on asynchronous networks. We give a formal definition of the functionality in Chapter 3. There we also describe how we implemented the functionality...

  16. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class......,  providing a currently acceptable level of security. This allows us to propose the rst practical blind signature scheme provably secure, without relying on heuristics called random oracle model (ROM). We obtain the protocol for issuing blind signatures by implementing our modi ed Fischlin's signing algorithm...

  17. Algebra model and security analysis for cryptographic protocols

    Institute of Scientific and Technical Information of China (English)

    HUAI Jinpeng; LI Xianxian

    2004-01-01

    More and more cryptographic protocols have been used to achieve various security requirements of distributed systems in the open network environment. However cryptographic protocols are very difficult to design and analyze due to the complexity of the cryptographic protocol execution, and a large number of problems are unsolved that range from the theory framework to the concrete analysis technique. In this paper, we build a new algebra called cryptographic protocol algebra (CPA) for describing the message operations with many cryptographic primitives, and proposed a new algebra model for cryptographic protocols based on the CPA. In the model, expanding processes of the participant's knowledge on the protocol runs are characterized with some algebraic notions such as subalgebra, free generator and polynomial algebra, and attack processes are modeled with a new notion similar to that of the exact sequence used in homological algebra. Then we develope a mathematical approach to the cryptographic protocol security analysis. By using algebraic techniques, we have shown that for those cryptographic protocols with some symmetric properties, the execution space generated by an arbitrary number of participants may boil down to a smaller space generated by several honest participants and attackers. Furthermore we discuss the composability problem of cryptographic protocols and give a sufficient condition under which the protocol composed of two correct cryptographic protocols is still correct, and we finally offer a counterexample to show that the statement may not be true when the condition is not met.

  18. PROPERTIES AND APPROACH OF CRYPTOGRAPHIC HASH ALGORITHMS

    Directory of Open Access Journals (Sweden)

    T.LALITHA

    2010-06-01

    Full Text Available The importance of hash functions for protecting the authenticity of information is demonstrated. Applications include integrity protection, conventional message authentication and digital signatures. An overview is given of the study of basic building blocks of cryptographic hash functions leads to the study of the cryptographic properties of Boolean functions and the information theoretic approach to authentication is described. An overview is given of the complexity theoretic definitions and constructions .New criteria are defined and functions satisfying new and existing criteria are studied.

  19. Cryptographic Cloud Storage

    Science.gov (United States)

    Kamara, Seny; Lauter, Kristin

    We consider the problem of building a secure cloud storage service on top of a public cloud infrastructure where the service provider is not completely trusted by the customer. We describe, at a high level, several architectures that combine recent and non-standard cryptographic primitives in order to achieve our goal. We survey the benefits such an architecture would provide to both customers and service providers and give an overview of recent advances in cryptography motivated specifically by cloud storage.

  20. CRYPTOGRAPHIC PROTOCOL DEPENDING ON BIOMETRIC AUTHENTICATION

    Directory of Open Access Journals (Sweden)

    SANJUKTA PAL

    2013-02-01

    Full Text Available In modern age, security is the most challenging issue for using the secure data used by computer. This cryptographic protocol on biometric authentication is nothing but the combination of cryptography and biometric authentication. Here the same idea of cryptography is working (i.e. using key, conversion of plain textinto cipher text called encryption and the reverse, means cipher text to plain text called decryption. Here the most promising method fingerprint geometry of biometric authentication is used as the key for encryption and decryption. Here this cryptographic protocol is just an algorithm for matching the key means matching of stored fingerprint images say DB Images with further given fingerprint image say Final Image. For matching purpose we used binary conversion of images. This algorithm is suitable for any type of data (means text data, multimedia data etc.

  1. Cryptographic Protocols under Quantum Attacks

    CERN Document Server

    Lunemann, Carolin

    2011-01-01

    The realm of this thesis is cryptographic protocol theory in the quantum world. We study the security of quantum and classical protocols against adversaries that are assumed to exploit quantum effects to their advantage. Security in the quantum world means that quantum computation does not jeopardize the assumption, underlying the protocol construction. But moreover, we encounter additional setbacks in the security proofs, which are mostly due to the fact that some well-known classical proof techniques are forbidden by certain properties of a quantum environment. Interestingly, we can exploit some of the very same properties to the benefit of quantum cryptography. Thus, this work lies right at the heart of the conflict between highly potential effects but likewise rather demanding conditions in the quantum world.

  2. Cryptographic Applications using FPGA Technology

    Directory of Open Access Journals (Sweden)

    Alexandru Coman

    2011-03-01

    Full Text Available Cryptographic systems have become a part of our daily life through the need of security of many common activities such as communication, payments, data transfers etc. The best support in design and implementation of cryptographic applications is offered by embedded systems such as ASICs and FPGAs. In the past few years, the increase in performance of FPGAs has made them key components in implementing cryptographic systems. One of the most important parts of the cryptographic systems is the random number generator used. Combinations of PRNG and TRNG are commonly used. A good and efficient TRNG implementation is very important and can be achieved through FPGA technology.

  3. Multiparty Quantum Cryptographic Protocol

    Institute of Scientific and Technical Information of China (English)

    M. Ramzan; M. K. Khan

    2008-01-01

    We propose a multiparty quantum cryptographic protocol. Unitary operators applied by Bob and Charlie, on their respective qubits of a tripartite entangled state encoding a classical symbol that can be decoded at Alice's end with the help of a decoding matrix. Eve's presence can be detected by the disturbance of the decoding matrix. Our protocol is secure against intercept-resend attacks. Furthermore, it is efficient and deterministic in the sense that two classical bits can be transferred per entangled pair of qubits. It is worth mentioning that in this protocol, the same symbol can be used for key distribution and Eve's detection that enhances the effciency of the protocol.

  4. Security Requirements for Cryptographic Modules

    Science.gov (United States)

    1999-01-01

    module interfaces; roles, services, and authentication; finite state machine model ; physical security; operating system security; cryptographic key...15 4.4 Finite State Machine Model .......................................................................................................... 17...These areas include cryptographic module specification; module interfaces; roles, services, and authentication; finite state machine model ; physical

  5. Cryptographic Boolean functions and applications

    CERN Document Server

    Cusick, Thomas W

    2009-01-01

    Boolean functions are the building blocks of symmetric cryptographic systems. Symmetrical cryptographic algorithms are fundamental tools in the design of all types of digital security systems (i.e. communications, financial and e-commerce).Cryptographic Boolean Functions and Applications is a concise reference that shows how Boolean functions are used in cryptography. Currently, practitioners who need to apply Boolean functions in the design of cryptographic algorithms and protocols need to patch together needed information from a variety of resources (books, journal articles and other sources). This book compiles the key essential information in one easy to use, step-by-step reference. Beginning with the basics of the necessary theory the book goes on to examine more technical topics, some of which are at the frontier of current research.-Serves as a complete resource for the successful design or implementation of cryptographic algorithms or protocols using Boolean functions -Provides engineers and scient...

  6. Cryptographic Protocols Based on Root Extracting

    DEFF Research Database (Denmark)

    Koprowski, Maciej

    In this thesis we design new cryptographic protocols, whose security is based on the hardness of root extracting or more speci cally the RSA problem. First we study the problem of root extraction in nite Abelian groups, where the group order is unknown. This is a natural generalization of the...... complexity of root extraction, even if the algorithm can choose the "public exponent'' itself. In other words, both the standard and the strong RSA assumption are provably true w.r.t. generic algorithms. The results hold for arbitrary groups, so security w.r.t. generic attacks follows for any cryptographic...... construction based on root extracting. As an example of this, we modify Cramer-Shoup signature scheme such that it becomes a genericm algorithm. We discuss then implementing it in RSA groups without the original restriction that the modulus must be a product of safe primes. It can also be implemented in class...

  7. Cryptographic Hash functions - a review

    Directory of Open Access Journals (Sweden)

    Rajeev Sobti

    2012-03-01

    Full Text Available Cryptographic Hash functions are used to achieve a number of security objectives. In this paper, we bring out the importance of hash functions, its various structures, design techniques, attacks and the progressive recent development in this field.

  8. William Friedman, Geneticist Turned Cryptographer.

    Science.gov (United States)

    Goldman, Irwin L

    2017-05-01

    William Friedman (1891-1969), trained as a plant geneticist at Cornell University, was employed at Riverbank Laboratories by the eccentric millionaire George Fabyan to work on wheat breeding. Friedman, however, soon became intrigued by and started working on a pet project of Fabyan's involving the conjecture that Francis Bacon, a polymath known for the study of ciphers, was the real author of Shakespeare's plays. Thus, beginning in ∼1916, Friedman turned his attention to the so called "Baconian cipher," and developed decryption techniques that bore similarity to approaches for solving problems in population genetics. His most significant, indeed pathbreaking, work used ideas from genetics and statistics, focusing on analysis of the frequencies of letters in language use. Although he had transitioned from being a geneticist to a cryptographer, his earlier work had resonance in his later pursuits. He soon began working directly for the United States government and produced solutions used to solve complex military ciphers, in particular to break the Japanese Purple code during World War II. Another important legacy of his work was the establishment of the Signal Intelligence Service and eventually the National Security Agency. Copyright © 2017 by the Genetics Society of America.

  9. Superposition Attacks on Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Funder, Jakob Løvstad; Nielsen, Jesper Buus

    2011-01-01

    Attacks on classical cryptographic protocols are usually modeled by allowing an adversary to ask queries from an oracle. Security is then defined by requiring that as long as the queries satisfy some constraint, there is some problem the adversary cannot solve, such as compute a certain piece...... of information. In this paper, we introduce a fundamentally new model of quantum attacks on classical cryptographic protocols, where the adversary is allowed to ask several classical queries in quantum superposition. This is a strictly stronger attack than the standard one, and we consider the security...

  10. Pythagorean Triples and Cryptographic Coding

    CERN Document Server

    Kak, Subhash

    2010-01-01

    This paper summarizes basic properties of PPTs and shows that each PPT belongs to one of six different classes. Mapping an ordered sequence of PPTs into a corresponding sequence of these six classes makes it possible to use them in cryptography. We pose problems whose solution would facilitate such cryptographic application.

  11. Probability Distributions over Cryptographic Protocols

    Science.gov (United States)

    2009-06-01

    exception. Cryptyc integrates use of pattern- matching in the spi calculus framework , which in turn allows the specification of nested cryptographic...programs too: the metaheuristic search for security protocols,” Information and Software Technology, vol. 43, pp. 891– 904, December 2001. 131 [9] X

  12. Symmetric cryptographic protocols

    CERN Document Server

    Ramkumar, Mahalingam

    2014-01-01

    This book focuses on protocols and constructions that make good use of symmetric pseudo random functions (PRF) like block ciphers and hash functions - the building blocks for symmetric cryptography. Readers will benefit from detailed discussion of several strategies for utilizing symmetric PRFs. Coverage includes various key distribution strategies for unicast, broadcast and multicast security, and strategies for constructing efficient digests of dynamic databases using binary hash trees.   •        Provides detailed coverage of symmetric key protocols •        Describes various applications of symmetric building blocks •        Includes strategies for constructing compact and efficient digests of dynamic databases

  13. A new class of codes for Boolean masking of cryptographic computations

    CERN Document Server

    Carlet, Claude; Kim, Jon-Lark; Solé, Patrick

    2011-01-01

    We introduce a new class of rate one half binary codes: complementary information set codes. A binary linear code of length 2n and dimension n is called a complementary information set code (CIS code for short) if it has two disjoint information sets. This class of codes contains self-dual codes as a subclass. It is connected to graph correlation immune Boolean functions of use in the security of hardware implementations of cryptographic primitives. Such codes permit to improve the cost of masking cryptographic algorithms against side channel attacks. In this paper we investigate this new class of codes: we give optimal or best known CIS codes of length < 132. We derive general constructions based on cyclic codes and on double circulant codes. We derive a Varshamov-Gilbert bound for long CIS codes, and show that they can all be classified in small lengths \\leq 12 by the building up construction. Some nonlinear S-boxes are constructed by using Z4-codes, based on the notion of dual distance of an unrestricte...

  14. Rationality in the Cryptographic Model

    DEFF Research Database (Denmark)

    Hubacek, Pavel

    This thesis presents results in the field of rational cryptography. In the first part we study the use of cryptographic protocols to avoid mediation and binding commitment when implementing game theoretic equilibrium concepts. First, we concentrate on the limits of cryptographic cheap talk....... The second part presents a study of the problem of verifiable delegation of computation in the rational setting. We define rational arguments, an extension of the recent concept of rational proofs into the computational setting, and give a single round delegation scheme for the class NC1, of search problems...... computable by log-space uniform circuits of logarithmic depth, with a sub-linear time verifier. While our approach provides a weaker (yet arguably meaningful) guarantee of soundness, it compares favorably with each of the known delegation schemes in at least one aspect. Our protocols are simple, rely...

  15. A secured Cryptographic Hashing Algorithm

    CERN Document Server

    Mohanty, Rakesh; Bishi, Sukant kumar

    2010-01-01

    Cryptographic hash functions for calculating the message digest of a message has been in practical use as an effective measure to maintain message integrity since a few decades. This message digest is unique, irreversible and avoids all types of collisions for any given input string. The message digest calculated from this algorithm is propagated in the communication medium along with the original message from the sender side and on the receiver side integrity of the message can be verified by recalculating the message digest of the received message and comparing the two digest values. In this paper we have designed and developed a new algorithm for calculating the message digest of any message and implemented t using a high level programming language. An experimental analysis and comparison with the existing MD5 hashing algorithm, which is predominantly being used as a cryptographic hashing tool, shows this algorithm to provide more randomness and greater strength from intrusion attacks. In this algorithm th...

  16. Raptor Codes and Cryptographic Issues

    CERN Document Server

    Malinen, Mikko

    2008-01-01

    In this paper two cryptographic methods are introduced. In the first method the presence of a certain size subgroup of persons can be checked for an action to take place. For this we use fragments of Raptor codes delivered to the group members. In the other method a selection of a subset of objects can be made secret. Also, it can be proven afterwards, what the original selection was.

  17. Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

    CERN Document Server

    Ganesh, Vijay; Rinard, Martin

    2012-01-01

    We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices to harden paths in programs. By "harden" we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent" we mean that adversaries cannot use semi-automatic program analysis techniques to reason about the hardened program paths and thus cannot discover as-yet-unknown errors along those paths, except perhaps through black-box dictionary attacks or random testing (which we can never prevent). Other than these unpreventable attack methods, we can make program analysis aimed at error-finding "provably hard" for a resource-bounded attacker, in the same sense that cryptographic schemes are hard to break. Unlike security-through-obscurity, in Cryptographic Path Hardening we use provably-secure crypto devices to hide errors and our mathemati...

  18. Constructing a Pseudorandom Generator Requires an Almost Linear Number of Calls

    CERN Document Server

    Holenstein, Thomas

    2012-01-01

    We show that a black-box construction of a pseudorandom generator from a one-way function needs to make Omega(n/log(n)) calls to the underlying one-way function. The bound even holds if the one-way function is guaranteed to be regular. In this case it matches the best known construction due to Goldreich, Krawczyk, and Luby (SIAM J. Comp. 22, 1993), which uses O(n/log(n)) calls.

  19. Summary Report on Rational Cryptographic Protocols

    DEFF Research Database (Denmark)

    Alwen, Joël; Cachin, Christian; Pereira, Olivier

    This report gives an overview of some of the models and techniques in rational cryptography, an emerging research area which in particular uses the methodologies and techniques of game theory to analyze cryptographic protocols and which uses cryptographic protocol theory to implement game theoretic...

  20. Cryptographer

    Science.gov (United States)

    Sullivan, Megan

    2005-01-01

    For the general public, the field of cryptography has recently become famous as the method used to uncover secrets in Dan Brown's fictional bestseller, The Da Vinci Code. But the science of cryptography has been popular for centuries--secret hieroglyphics discovered in Egypt suggest that code-making dates back almost 4,000 years. In today's…

  1. The Laws of Physics and Cryptographic Security

    CERN Document Server

    Rudolph, T

    2002-01-01

    This paper consists of musings that originate mainly from conversations with other physicists, as together we've tried to learn some cryptography, but also from conversations with a couple of classical cryptographers. The main thrust of the paper is an attempt to explore the ramifications for cryptographic security of incorporating physics into our thinking at every level. I begin by discussing two fundamental cryptographic principles, namely that security must not rely on secrecy of the protocol and that our local environment must be secure, from a physical perspective. I go on to explain why by definition a particular cryptographic task, oblivious transfer, is inconsistent with a belief in the validity of quantum mechanics. More precisely, oblivious transfer defines states and operations that do not exist in any (complex) Hilbert space. I go on to argue the fallaciousness of a "black box" approach to quantum cryptography, in which classical cryptographers just trust physicists to provide them with secure qu...

  2. On another two cryptographic identities in universal Osborn loops

    Directory of Open Access Journals (Sweden)

    T. G. Jaiyéolá

    2010-03-01

    Full Text Available In this study, by establishing an identity for universal Osborn loops, two other identities (of degrees 4 and 6 are deduced from it and they are recognized and recommended for cryptography in a similar spirit in which the cross inverse property (of degree 2 has been used by Keedwell following the fact that it was observed that universal Osborn loops that do not have the 3-power associative property or weaker forms of; inverse property, power associativity and diassociativity to mention a few, will have cycles (even long ones. These identities are found to be cryptographic in nature for universal Osborn loops and thereby called cryptographic identities. They were also found applicable to security patterns, arrangements and networks which the CIP may not be applicable to.

  3. AN INTERACTIVE VISUALIZATION TOOL FOR ANIMATING BEHAVIOR OF CRYPTOGRAPHIC PROTOCOLS

    Directory of Open Access Journals (Sweden)

    Mabroka Maeref

    2015-03-01

    Full Text Available Cryptography and Network Security is a difficult subject to understand, mainly because of the complexity of security protocols and the mathematical rigour required to understand encryption algorithms. Realizing the need for an interactive visualization tool to facilitate the understanding of cryptographic concepts and protocols, several tools had been developed. However, these tools cannot be easily adapted to animate different protocols. The aim of this paper is to propose an interactive visualization tool, called the Cryptographic Protocol Animator (CPAnim. The tool enables a student to specify a protocol and gain knowledge about the impact of its behavior. The protocol is specified by using a scenario-based approach and it is demonstrated as a number of scenes displaying a complete scenario. The effectiveness of this tool was tested using an empirical evaluation method. The results show that this tool was effective in meeting its learning objectives.

  4. Efficient construction of approximate call graphs for JavaScript IDE services

    DEFF Research Database (Denmark)

    Feldthaus, Asger; Schäfer, Max; Sridharan, Manu

    2013-01-01

    The rapid rise of JavaScript as one of the most popular programming languages of the present day has led to a demand for sophisticated IDE support similar to what is available for Java or C#. However, advanced tooling is hampered by the dynamic nature of the language, which makes any form of static...... analysis very difficult. We single out efficient call graph construction as a key problem to be solved in order to improve development tools for JavaScript. To address this problem, we present a scalable field-based flow analysis for constructing call graphs. Our evaluation on large real-world programs...

  5. A Rational Approach to Cryptographic Protocols

    CERN Document Server

    Caballero-Gil, P; Bruno-Castañeda, C; 10.1016/j.mcm.2006.12.013

    2010-01-01

    This work initiates an analysis of several cryptographic protocols from a rational point of view using a game-theoretical approach, which allows us to represent not only the protocols but also possible misbehaviours of parties. Concretely, several concepts of two-person games and of two-party cryptographic protocols are here combined in order to model the latters as the formers. One of the main advantages of analysing a cryptographic protocol in the game-theory setting is the possibility of describing improved and stronger cryptographic solutions because possible adversarial behaviours may be taken into account directly. With those tools, protocols can be studied in a malicious model in order to find equilibrium conditions that make possible to protect honest parties against all possible strategies of adversaries.

  6. Quantum walks public key cryptographic system

    OpenAIRE

    Vlachou, C; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2016-01-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public key is given by a quantum state generated by performing a quantum walk. We show that th...

  7. New Cryptosystem Using Multiple Cryptographic Assumptions

    Directory of Open Access Journals (Sweden)

    E. S. Ismail

    2011-01-01

    Full Text Available Problem statement: A cryptosystem is a way for a sender and a receiver to communicate digitally by which the sender can send receiver any confidential or private message by first encrypting it using the receiver’s public key. Upon receiving the encrypted message, the receiver can confirm the originality of the message’s contents using his own secret key. Up to now, most of the existing cryptosystems were developed based on a single cryptographic assumption like factoring, discrete logarithms, quadratic residue or elliptic curve discrete logarithm. Although these schemes remain secure today, one day in a near future they may be broken if one finds a polynomial algorithm that can efficiently solve the underlying cryptographic assumption. Approach: By this motivation, we designed a new cryptosystem based on two cryptographic assumptions; quadratic residue and discrete logarithms. We integrated these two assumptions in our encrypting and decrypting equations so that the former depends on one public key whereas the latter depends on one corresponding secret key and two secret numbers. Each of public and secret keys in our scheme determines the assumptions we use. Results: The newly developed cryptosystem is shown secure against the three common considering algebraic attacks using a heuristic security technique. The efficiency performance of our scheme requires 2Texp+2Tmul +Thash time complexity for encryption and Texp+2Tmul+Tsrt time complexity for decryption and this magnitude of complexity is considered minimal for multiple cryptographic assumptions-like cryptosystems. Conclusion: The new cryptosystem based on multiple cryptographic assumptions offers a greater security level than that schemes based on a single cryptographic assumption. The adversary has to solve the two assumptions simultaneously to recover the original message from the received corresponding encrypted message but this is very unlikely to happen.

  8. Quantum walk public-key cryptographic system

    Science.gov (United States)

    Vlachou, C.; Rodrigues, J.; Mateus, P.; Paunković, N.; Souto, A.

    2015-12-01

    Quantum Cryptography is a rapidly developing field of research that benefits from the properties of Quantum Mechanics in performing cryptographic tasks. Quantum walks are a powerful model for quantum computation and very promising for quantum information processing. In this paper, we present a quantum public-key cryptographic system based on quantum walks. In particular, in the proposed protocol the public-key is given by a quantum state generated by performing a quantum walk. We show that the protocol is secure and analyze the complexity of public key generation and encryption/decryption procedures.

  9. Chaotic cryptographic scheme and its randomness evaluation

    Science.gov (United States)

    Stoyanov, B. P.

    2012-10-01

    We propose a new cryptographic scheme based on the Lorenz chaos attractor and 32 bit bent Boolean function. We evaluated the keystream generated by the scheme with batteries of the NIST statistical tests. We also applied a number of statistical analysis techniques, such as calculating histograms, correlations between two adjacent pixels, information entropy, and differential resistance, all refer to images encrypted by the proposed system. The results of the analysis show that the new cryptographic scheme ensures a secure way for sending digital data with potential applications in real-time image encryption.

  10. Cryptographic primitives based on cellular transformations

    Directory of Open Access Journals (Sweden)

    B.V. Izotov

    2003-11-01

    Full Text Available Design of cryptographic primitives based on the concept of cellular automata (CA is likely to be a promising trend in cryptography. In this paper, the improved method performing data transformations by using invertible cyclic CAs (CCA is considered. Besides, the cellular operations (CO as a novel CAs application in the block ciphers are introduced. Proposed CCAs and COs, integrated under the name of cellular transformations (CT, suit well to be used in cryptographic algorithms oriented to fast software and cheap hardware implementation.

  11. Impact of Three Illumina Library Construction Methods on GC Bias and HLA Genotype Calling

    Science.gov (United States)

    Lan, James H; Yin, Yuxin; Reed, Elaine F; Moua, Kevin; Thomas, Kimberly; Zhang, Qiuheng

    2016-01-01

    Next-generation sequencing (NGS) is increasingly recognized for its ability to overcome allele ambiguity and deliver high-resolution typing in the human leukocyte antigen (HLA) system. Using this technology, non-uniform read distribution can impede the reliability of variant detection, which renders high-confidence genotype calling particularly difficult to achieve in the polymorphic HLA complex. Recently, library construction has been implicated as the dominant factor in instigating coverage bias. To study the impact of this phenomenon on HLA genotyping, we performed long-range PCR on 12 samples to amplify HLA-A, -B, -C, -DRB1, and -DQB1, and compared the relative contribution of three Illumina library construction methods (TruSeq Nano, Nextera, Nextera XT) in generating downstream bias. Here, we show high GC% to be a good predictor of low sequencing depth. Compared to standard TruSeq Nano, GC bias was more prominent in transposase-based protocols, particularly Nextera XT, likely through a combination of transposase insertion bias being coupled with a high number of PCR enrichment cycles. Importantly, our findings demonstrate non-uniform read depth can have a direct and negative impact on the robustness of HLA genotyping, which has clinical implications for users when choosing a library construction strategy that aims to balance cost and throughput with data quality. PMID:25543015

  12. A Verifiable Language for Cryptographic Protocols

    DEFF Research Database (Denmark)

    Nielsen, Christoffer Rosenkilde

    We develop a formal language for specifying cryptographic protocols in a structured and clear manner, which allows verification of many interesting properties; in particular confidentiality and integrity. The study sheds new light on the problem of creating intuitive and human readable languages...

  13. Constructing notions of healthcare productivity: the call for a new professionalism?

    Science.gov (United States)

    Moffatt, Fiona; Martin, Paul; Timmons, Stephen

    2014-06-01

    Improving performance is an imperative for most healthcare systems in industrialised countries. This article considers one such system, the UK's National Health Service (NHS). Recent NHS reforms and strategies have advocated improved healthcare productivity as a fundamental objective of policy and professional work. This article explores the construction of productivity in contemporary NHS discourse, analysing it via the Foucauldian concept of governmentality. In this manner it is possible to investigate claims that the commodification of health work constitutes a threat to autonomy, and counter that with an alternative view from a perspective of neoliberal self-governance. Contemporary policy documents pertaining to NHS productivity were analysed using discourse analysis to examine the way in which productivity was framed and how responsibility for inefficient resource use, and possible solutions, were constructed. Data reveals the notion of productivity as problematic, with professionals as key protagonists. A common narrative identifies traditional NHS command/control principles as having failed to engage professionals or having been actively obstructed by them. In contrast, new productivity narratives are framed as direct appeals to professionalism. These new narratives do not support deprofessionalisation, but rather reconstruct responsibilities, what might be called 'new professionalism', in which productivity is identified as an individualised professional duty.

  14. Appliance of Neuron Networks in Cryptographic Systems

    Directory of Open Access Journals (Sweden)

    Mohammed Al-Maitah

    2014-01-01

    Full Text Available This study is dedicated to the examination of a problem of postquantum encryption algorithms which are connected with a potential crisis in modern cryptography that is caused by appearance of quantum computers. General problem formulation is given as well as an example of danger from the quantum algorithms against classical cryptosystems. Existing postquantum systems are analyzed and the complication of their realization and cryptosecurity are estimated. Among the others algorithms on the basis of neural networks are chosen as a starting point. The study demonstrates neuro cryptographic protocol based on a three-level neural network of the direct propagation. There was evaluated it’s cryptosecurity and analyzed three types of this algorithm attack to show the reality of the hypothesis that neuro cryptography is currently one of the most promising post quantum cryptographic systems.

  15. Algorithms for improved performance in cryptographic protocols.

    Energy Technology Data Exchange (ETDEWEB)

    Schroeppel, Richard Crabtree; Beaver, Cheryl Lynn

    2003-11-01

    Public key cryptographic algorithms provide data authentication and non-repudiation for electronic transmissions. The mathematical nature of the algorithms, however, means they require a significant amount of computation, and encrypted messages and digital signatures possess high bandwidth. Accordingly, there are many environments (e.g. wireless, ad-hoc, remote sensing networks) where public-key requirements are prohibitive and cannot be used. The use of elliptic curves in public-key computations has provided a means by which computations and bandwidth can be somewhat reduced. We report here on the research conducted in an LDRD aimed to find even more efficient algorithms and to make public-key cryptography available to a wider range of computing environments. We improved upon several algorithms, including one for which a patent has been applied. Further we discovered some new problems and relations on which future cryptographic algorithms may be based.

  16. Cryptographic hash functions. Trends and challenges

    Directory of Open Access Journals (Sweden)

    Rodica Tirtea

    2009-10-01

    Full Text Available Hash functions are important in cryptography due to their use in data integrity and message authentication. Different cryptographicimplementations rely on the performance and strength of hash functions to answer the need for integrity and authentication. This paper gives an overview of cryptographic hash functions used or evaluated today. Hash functions selected in NESSIE and CRYPTREC projects are shortly presented. SHA-3 selection initiative is alsointroduced.

  17. New Eavesdropper Detection Method in Quantum Cryptograph

    Directory of Open Access Journals (Sweden)

    Cătălin Anghel

    2011-12-01

    Full Text Available ecurity of quantum cryptographic algorithms is one of the main research directions in quantum cryptography. Security growth of the quantum key distribution systems can be realized by detecting the eavesdropper quickly, precisely and without letting any secret information in the hands of the enemy. This paper proposes a new method, named QBTT, to detect the enemy who try to tap the communication channel. The QBTT method can be implemented in every type of quantum key distribution scheme.

  18. PACE: Proactively Secure Accumulo with Cryptographic Enforcement

    Science.gov (United States)

    2017-05-27

    modify data using digital signatures . The contributions of our work include: • Cryptographic enforcement of access control. The PACE library allows...the impact of encryption and signatures on operation throughput. I. INTRODUCTION Over the last several years, many companies have moved their...second). This evaluation demonstrates that while encryp- tion and signatures have an impact on throughput, the impact is small enough to be

  19. A Construction System for CALL Materials from TV News with Captions

    Science.gov (United States)

    Kobayashi, Satoshi; Tanaka, Takashi; Mori, Kazumasa; Nakagawa, Seiichi

    Many language learning materials have been published. In language learning, although repetition training is obviously necessary, it is difficult to maintain the learner's interest/motivation using existing learning materials, because those materials are limited in their scope and contents. In addition, we doubt whether the speech sounds used in most materials are natural in various situations. Nowadays, some TV news programs (CNN, ABC, PBS, NHK, etc.) have closed/open captions corresponding to the announcer's speech. We have developed a system that makes Computer Assisted Language Learning (CALL) materials for both English learning by Japanese and Japanese learning by foreign students from such captioned newscasts. This system computes the synchronization between captions and speech by using HMMs and a forced alignment algorithm. Materials made by the system have following functions: full/partial text caption display, repetition listening, consulting an electronic dictionary, display of the user's/announcer's sound waveform and pitch contour, and automatic construction of a dictation test. Materials have following advantages: materials present polite and natural speech, various and timely topics. Furthermore, the materials have the following possibility: automatic creation of listening/understanding tests, and storage/retrieval of the many materials. In this paper, firstly, we present the organization of the system. Then, we describe results of questionnaires on trial use of the materials. As the result, we got enough accuracy on the synchronization between captions and speech. Speaking totally, we encouraged to research this system.

  20. CRYPTOGRAPHIC PROTOCOLS SPECIFICATION AND VERIFICATION TOOLS - A SURVEY

    Directory of Open Access Journals (Sweden)

    Amol H Shinde

    2017-06-01

    Full Text Available Cryptographic protocols cannot guarantee the secure operations by merely using state-of-the-art cryptographic mechanisms. Validation of such protocols is done by using formal methods. Various specialized tools have been developed for this purpose and are being used to validate real life cryptographic protocols. These tools give feedback to the designers of protocols in terms of loops and attacks in protocols to improve security. In this paper, we discuss the brief history of formal methods and tools that are useful for the formal verification of the cryptographic protocols.

  1. Individual Learner Differences in CALL: The Field Independence/Dependence (FID) Construct

    Science.gov (United States)

    Chapelle, Carol A.; Heift, Trude

    2009-01-01

    In Spring semester 2006, we conducted a study with 50 learners of German to investigate the use of a new measure (Cardenas-Claros, 2005) for research on the field independent/dependent (FID) cognitive style and CALL use. After the measure was administered, students worked on a CALL program for German that logs interaction. This paper reports the…

  2. An Efficient Cryptographic Hash Algorithm (BSA)

    CERN Document Server

    Mukherjee, Subhabrata; Laha, Anirban

    2012-01-01

    Recent cryptanalytic attacks have exposed the vulnerabilities of some widely used cryptographic hash functions like MD5 and SHA-1. Attacks in the line of differential attacks have been used to expose the weaknesses of several other hash functions like RIPEMD, HAVAL. In this paper we propose a new efficient hash algorithm that provides a near random hash output and overcomes some of the earlier weaknesses. Extensive simulations and comparisons with some existing hash functions have been done to prove the effectiveness of the BSA, which is an acronym for the name of the 3 authors.

  3. Cryptographic Combinatorial Clock-Proxy Auctions

    Science.gov (United States)

    Parkes, David C.; Rabin, Michael O.; Thorpe, Christopher

    We present a cryptographic protocol for conducting efficient, provably correct and secrecy-preserving combinatorial clock-proxy auctions. The “clock phase” functions as a trusted auction despite price discovery: bidders submit encrypted bids, and prove for themselves that they meet activity rules, and can compute total demand and thus verify price increases without revealing any information about individual demands. In the sealed-bid “proxy phase”, all bids are revealed the auctioneer via time-lapse cryptography and a branch-and-bound algorithm is used to solve the winner-determination problem. Homomorphic encryption is used to prove the correctness of the solution, and establishes the correctness of the solution to any interested party. Still an NP-hard optimization problem, the use of homomorphic encryption imposes additional computational time on winner-determination that is linear in the size of the branch-and-bound search tree, and thus roughly linear in the original (search-based) computational time. The result is a solution that avoids, in the usual case, the exponential complexity of previous cryptographically-secure combinatorial auctions.

  4. Cryptographic Key Management and Critical Risk Assessment

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL

    2014-05-01

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) CyberSecurity for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing CyberSecurity for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  5. Physical cryptographic verification of nuclear warheads

    Science.gov (United States)

    Kemp, R. Scott; Danagoulian, Areg; Macdonald, Ruaridh R.; Vavrek, Jayson R.

    2016-08-01

    How does one prove a claim about a highly sensitive object such as a nuclear weapon without revealing information about the object? This paradox has challenged nuclear arms control for more than five decades. We present a mechanism in the form of an interactive proof system that can validate the structure and composition of an object, such as a nuclear warhead, to arbitrary precision without revealing either its structure or composition. We introduce a tomographic method that simultaneously resolves both the geometric and isotopic makeup of an object. We also introduce a method of protecting information using a provably secure cryptographic hash that does not rely on electronics or software. These techniques, when combined with a suitable protocol, constitute an interactive proof system that could reject hoax items and clear authentic warheads with excellent sensitivity in reasonably short measurement times.

  6. Quantum Communication Attacks on Classical Cryptographic Protocols

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre

    , one can show that the protocol remains secure even under such an attack. However, there are also cases where the honest players are quantum as well, even if the protocol uses classical communication. For instance, this is the case when classical multiparty computation is used as a “subroutine......” in quantum multiparty computation. Furthermore, in the future, players in a protocol may employ quantum computing simply to improve efficiency of their local computation, even if the communication is supposed to be classical. In such cases, it no longer seems clear that a quantum adversary must be limited......In the literature on cryptographic protocols, it has been studied several times what happens if a classical protocol is attacked by a quantum adversary. Usually, this is taken to mean that the adversary runs a quantum algorithm, but communicates classically with the honest players. In several cases...

  7. Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2012-03-01

    Full Text Available Millions of citizens around the world have already acquired their new electronic passport. The e-passport is equipped with contactless chip which stores personal data of the passport holder, information about the passport and the issuing institution, as well as with a multiple biometrics enabling cryptographic functionality. Countries are required to build a Public Key Infrastructure, biometric and Radio Frequency Identification to support various cryptographic, as this is considered the basic tools to prove the authenticity and integrity of the Machine Readable Travel Documents. The large-scale worldwide PKI is construction, by means of bilateral trust relationships between Countries. Investigate the good practices, which are essential for the establishment of a global identification scheme based on e-passports. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

  8. Research of the Kernel Operator Library Based on Cryptographic Algorithm

    Institute of Scientific and Technical Information of China (English)

    王以刚; 钱力; 黄素梅

    2001-01-01

    The variety of encryption mechanism and algorithms which were conventionally used have some limitations.The kernel operator library based on Cryptographic algorithm is put forward. Owing to the impenetrability of algorithm, the data transfer system with the cryptographic algorithm library has many remarkable advantages in algorithm rebuilding and optimization,easily adding and deleting algorithm, and improving the security power over the traditional algorithm. The user can choose any one in all algorithms with the method against any attack because the cryptographic algorithm library is extensible.

  9. Cryptographic Trust Management Requirements Specification: Version 1.1

    Energy Technology Data Exchange (ETDEWEB)

    Edgar, Thomas W.

    2009-09-30

    The Cryptographic Trust Management (CTM) Project is being developed for Department of Energy, OE-10 by the Pacific Northwest National Laboratory (PNNL). It is a component project of the NSTB Control Systems Security R&D Program.

  10. Cryptographic Technique Used Lower and Upper Triangular Decomposition Method

    Directory of Open Access Journals (Sweden)

    B. KumaraswamyAchary,

    2016-02-01

    Full Text Available In this paper, the main cryptographic technique we will use affine cipher used for encryption and also decryption by using one of the linear algebra technique lower and upper triangular technique

  11. Ant-Crypto, a Cryptographer for Data Encryption Standard

    Directory of Open Access Journals (Sweden)

    Salabat Khan

    2013-01-01

    Full Text Available Swarm Intelligence and Evolutionary Techniques are attracting the cryptanalysts in the field of cryptography. This paper presents a novel swarm based attack called Ant-Crypto (Ant-Cryptographer for the cryptanalysis of Data Encryption Standard (DES. Ant-Crypto is based on Binary Ant Colony Optimization (BACO i.e. a binary search space based directed graph is modeled for efficiently searching the optimum result (an original encryption key, in our case. The reason that why evolutionary techniques are becoming attractive is because of the inapplicability of traditional techniques and brute force attacks against feistel ciphers due to their inherent structure based on high nonlinearity and low autocorrelation. Ant-Crypto uses a known-plaintext attack to recover the secret key of DES which is required to break/ decipher the secret messages. Ant-Crypto iteratively searches for the secret key while generating several candidate optimum keys that are guessed across different runs on the basis of routes completed by ants. These optimum keys are then used to find each individual bit of the 56 bit secret key used during encryption by DES. Ant-Crypto is compared with some other state of the art evolutionary based attacks i.e. Genetic Algorithm and Comprehensive Binary Particle Swarm Optimization. The experimental results show that Ant-Crypto is an effective evolutionary attack against DES and can deduce large number of valuable bits as compared to other evolutionary algorithms; both in terms of time and space complexity.

  12. Deciding security properties for cryptographic protocols. Application to key cycles

    CERN Document Server

    Comon-Lundh, Hubert; Zalinescu, Eugen

    2007-01-01

    There has been a growing interest in applying formal methods for validating cryptographic protocols and many results have been obtained. In this paper, we re-investigate and extend the NP-complete decision procedure for a bounded number of sessions of Rusinowitch and Turuani. In this setting, constraint systems are now a standard for modeling security protocols. We provide a generic approach to decide general security properties by showing that any constraint system can be transformed in (possibly several) much simpler constraint systems that are called \\emph{solved forms}. As a consequence, we prove that deciding the existence of key cycles is NP-complete for a bounded number of sessions. Indeed, many recent results are concerned with interpreting proofs of security done in symbolic models in the more detailed models of computational cryptography. In the case of symmetric encryption, these results stringently demand that no key cycle (e.g. $\\{k\\}_k$) can be produced during the execution of protocols. We show...

  13. Constructing an Evidence-Base for Future CALL Design with "Engineering Power": The Need for More Basic Research and Instrumental Replication

    Science.gov (United States)

    Handley, Zöe

    2014-01-01

    This paper argues that the goal of Computer-Assisted Language Learning (CALL) research should be to construct a reliable evidence-base with "engineering power" and generality upon which the design of future CALL software and activities can be based. In order to establish such an evidence base for future CALL design, it suggests that CALL…

  14. Physically unclonable cryptographic primitives using self-assembled carbon nanotubes

    Science.gov (United States)

    Hu, Zhaoying; Comeras, Jose Miguel M. Lobez; Park, Hongsik; Tang, Jianshi; Afzali, Ali; Tulevski, George S.; Hannon, James B.; Liehr, Michael; Han, Shu-Jen

    2016-06-01

    Information security underpins many aspects of modern society. However, silicon chips are vulnerable to hazards such as counterfeiting, tampering and information leakage through side-channel attacks (for example, by measuring power consumption, timing or electromagnetic radiation). Single-walled carbon nanotubes are a potential replacement for silicon as the channel material of transistors due to their superb electrical properties and intrinsic ultrathin body, but problems such as limited semiconducting purity and non-ideal assembly still need to be addressed before they can deliver high-performance electronics. Here, we show that by using these inherent imperfections, an unclonable electronic random structure can be constructed at low cost from carbon nanotubes. The nanotubes are self-assembled into patterned HfO2 trenches using ion-exchange chemistry, and the width of the trench is optimized to maximize the randomness of the nanotube placement. With this approach, two-dimensional (2D) random bit arrays are created that can offer ternary-bit architecture by determining the connection yield and switching type of the nanotube devices. As a result, our cryptographic keys provide a significantly higher level of security than conventional binary-bit architecture with the same key size.

  15. Anonymous One-Time Broadcast Using Non-interactive Dining Cryptographer Nets with Applications to Voting

    Science.gov (United States)

    van de Graaf, Jeroen

    All voting protocols proposed so far, with the exception of a few, have the property that the privacy of the ballot is only computational. In this paper we outline a new and conceptually simple approach allowing us to construct a protocol in which the privacy of the ballot is unconditional. Our basic idea is to modify the protocol of Fujioka, Okamoto and Ohta[1], which uses blind signatures so that the voter can obtain a valid ballot. However, instead of using a MIX net, we use a new broadcast protocol for anonymously publishing the vote, a Non-Interactive variation of the Dining Cryptographer Net.

  16. A New Approach in Cryptographic Systems Using Fractal Image Coding

    Directory of Open Access Journals (Sweden)

    Nadia M.G. Al-Saidi

    2009-01-01

    Full Text Available Problem statement: With the rapid development in the communications and information transmissions there is a growing demand for new approaches that increase the security of cryptographic systems. Approach: Therefore some emerging theories, such as fractals, can be adopted to provide a contribution toward this goal. In this study we proposed a new cryptographic system utilizing fractal theories; this approach exploited the main feature of fractals generated by IFS techniques. Results: Double enciphering and double deciphering methods performed to enhance the security of the system. The encrypted date represented the attractor generated by the IFS transformation, collage theorem was used to find the IFSM for decrypting data. Conclusion/Recommendations: The proposed method gave the possibility to hide maximum amount of data in an image that represent the attractor of the IFS without degrading its quality and to make the hidden data robust enough to withstand known cryptographic attacks and image processing techniques which did not change the appearance of image.

  17. Limits on the Power of Cryptographic Cheap Talk

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Nielsen, Jesper Buus; Rosen, Alon

    2013-01-01

    We revisit the question of whether cryptographic protocols can replace correlated equilibria mediators in two-player strategic games. This problem was first addressed by Dodis, Halevi and Rabin (CRYPTO 2000), who suggested replacing the mediator with a secure protocol and proved that their solution...... is stable in the Nash equilibrium (NE) sense, provided that the players are computationally bounded. We show that there exist two-player games for which no cryptographic protocol can implement the mediator in a sequentially rational way; that is, without introducing empty threats. This explains why all...... and sufficient cryptographic assumptions for implementing a mediator that allows to achieve a given utility profile of a correlated equilibrium. The picture that emerges is somewhat different than the one arising in semi-honest secure two-party computation. Specifically, while in the latter case every...

  18. Wireless Secured Data Transmission using Cryptographic Techniques through FPGA

    Directory of Open Access Journals (Sweden)

    I.Rama Satya Nageswara Rao

    2016-02-01

    Full Text Available The need to protect the data disturbances and unauthorized access in communication has led to development of several cryptographic algorithms. Current issue in modern world as popularity of internet, e-commerce and communication technologies has emerging and they became the medium to security threats. Due to advancement in cryptographic techniques the DNA technique is a new crypto algorithm to encrypt and decrypt data. It consists of two stage encryption based on DNA sequence enhances the data security compared to conventional methods. In encryption process the former stage will encrypt the data (plain text with a random key generated by random DNA sequence generator. Latter and final stage the encrypted data is re-encrypted with DNA translation to generate cipher. The cryptographic techniques (symmetric algorithm is designed and simulated using Xilinx ISE and targeted on Spartan-3E FPGA interfaced with ZigBee for wireless communication.

  19. Affine Equivalence and Constructions of Cryptographically Strong Boolean Functions

    Science.gov (United States)

    2013-09-01

    3 (mod n) aiaj, . . . , n⊕ i, j=1 i+j≡n (mod n) aiaj, n⊕ i=1 i+j≡1 (mod n) aiaj  =  C(a1, adn /2e+1, a2, adn /2e+2, . . . , adn /2e) if...a3, . . . , ak, a2k+1, ak+1) = C(a1, adn /2e+1, a2, adn /2e+2, . . . , adn /2e). 46 If n = 2k for k = 0, 1, 2, ..., n⊕ i=1 i+j≡2 (mod n) aiaj = a1a1...3.4.5, C(a1, . . . , an) 2 = C(a1, adn /2e+1, a2, adn /2e+2, . . . , adn /2e) = C((a1, . . . , an)Pτ ) = C(aτ(1), . . . , aτ(n)). 64 Therefore, (a1

  20. On the Sociolinguistic Significance of Obscure Dialect Structures: The NP[i]"call" NP[i] Ving" Construction in African American Vernacular English.

    Science.gov (United States)

    Wolfram, Walt

    A construction occurring in African American Vernacular English (AAVE) is examined: NPi "call" NPi V"-ing", as in "the woman call herself working." First, a number of reasons that such a form might be overlooked or dismissed as an AAVE dialect form are outlined. Then the sociolinguistic method is applied to the…

  1. Feasibility and Completeness of Cryptographic Tasks in the Quantum World

    NARCIS (Netherlands)

    Fehr, S.; Katz, J.; Song, F.; Zhou, H.S.; Zikas, V.; Sahai, A.

    2013-01-01

    It is known that cryptographic feasibility results can change by moving from the classical to the quantum world. With this in mind, we study the feasibility of realizing functionalities in the framework of universal composability, with respect to both computational and information-theoretic security

  2. Cryptographic protocol verification using tractable classes of horn clauses

    DEFF Research Database (Denmark)

    Seidl, Helmut; Neeraj Verma, Kumar

    2007-01-01

    We consider secrecy problems for cryptographic protocols modeled using Horn clauses and present general classes of Horn clauses which can be efficiently decided. Besides simplifying the methods for the class of flat and onevariable clauses introduced for modeling of protocols with single blind...

  3. SPONGENT: The Design Space of Lightweight Cryptographic Hashing

    DEFF Research Database (Denmark)

    Bogdanov, Andrey; Knezevic, Miroslav; Leander, Gregor

    2013-01-01

    The design of secure yet efficiently implementable cryptographic algorithms is a fundamental problem of cryptography. Lately, lightweight cryptography--optimizing the algorithms to fit the most constrained environments--has received a great deal of attention, the recent research being mainly...

  4. On fairness in simulatability-based cryptographic systems

    NARCIS (Netherlands)

    Backes, M.; Hofheinz, D.; Müller-Quade, J.; Unruh, D.

    2005-01-01

    Simulatability constitutes the cryptographic notion of a secure refinement and has asserted its position as one of the fundamental concepts of modern cryptography. Although simulatability carefully captures that a distributed protocol does not behave any worse than an ideal specification, it however

  5. Hybrid Cryptographic Processor for Secure Communication Using FPGA

    OpenAIRE

    Savitha Raj.S; Merlin Sharmila.A; Poorinima Beneta.P

    2013-01-01

    Cryptographic hash functions are mainly used for the purpose of authentication and for integrity of messages. In this paper, we investigate high-speed, efficient hardware algorithm which is a combination of both RSA and BLAKE for providing privacy and security in data networks including encryption/decryption. Hash function- BLAKE is a new standard candidate algorithm; it is one of the finalists in the SHA-3 competition by NIST. RSA is the asymmetric public key cryptography system. Since this ...

  6. Apparatus, system and method for providing cryptographic key information with physically unclonable function circuitry

    Energy Technology Data Exchange (ETDEWEB)

    Areno, Matthew

    2015-12-08

    Techniques and mechanisms for providing a value from physically unclonable function (PUF) circuitry for a cryptographic operation of a security module. In an embodiment, a cryptographic engine receives a value from PUF circuitry and based on the value, outputs a result of a cryptographic operation to a bus of the security module. The bus couples the cryptographic engine to control logic or interface logic of the security module. In another embodiment, the value is provided to the cryptographic engine from the PUF circuitry via a signal line which is distinct from the bus, where any exchange of the value by either of the cryptographic engine and the PUF circuitry is for communication of the first value independent of the bus.

  7. Constructing a psychological coping profile in the call centre environment: Wellness-related dispositions in relation to resiliency-related behavioural capacities

    Directory of Open Access Journals (Sweden)

    Nisha Harry

    2015-02-01

    Full Text Available Orientation: The context of this research is the coping and wellness of call centre agents in a characteristically high-stress work environment. Research purpose: The purpose of the study was to construct a psychological coping profile by investigating the overall relationship between individuals’ wellness-related dispositional attributes and their resiliency-related behavioural capacities. Motivation of the study: It is important that coping in the call centre environment be understood in light of the complexity of the challenges that call centre agents experience in terms of their wellbeing. Research design, approach and method: A quantitative cross-sectional survey approach was followed, using a non-probability purposive sample (N = 409 comprising predominantly early career, permanently employed black females in call centres in Africa. Main findings: A canonical correlation analysis indicated a significant overall relationship between the wellness-related constructs (sense of coherence, emotional intelligence and burnout and the resiliency-related constructs (career adaptability and hardiness. Structural equation modelling indicated that managing own emotions and cynicism contributed significantly to explaining the participants’ resiliency-related behavioural capacities (hardicommitment and hardi-control. Practical/managerial implications: Enhancing call centre agents’ emotional intelligence and lowering cynicism will increase resiliency-related capacities, such as sense of control and commitment, and will significantly increase the resiliency and capacity of call centre agents to cope with pressure, which can lead to positive work attitudes. Contribution/value-add: The findings may provide valuable pointers for the design of wellness intervention practices and could potentially add to the body of knowledge concerned with employee wellness in call centres.

  8. The SAT solving method as applied to cryptographic analysis of asymmetric ciphers

    CERN Document Server

    Faizullin, R T; Dylkeyt, V I

    2009-01-01

    The one of the most interesting problem of discrete mathematics is the SAT (satisfiability) problem. Good way in SAT solver developing is to transform the SAT problem to the problem of continuous search of global minimums of the functional associated with the CNF. This article proves the special construction of the functional and offers to solve the system of non-linear algebraic equation that determines functional stationary points via modified method of consecutive approximation. The article describes parallel versions of the method. Also gives the schema of using the method to important problems of cryptographic analysis of asymmetric ciphers, including determining concrete bits of multipliers (in binary form) in large factorization problems and concrete bits of exponent of discrete logarithm problem.

  9. IMPLEMENTATION OF NEURAL - CRYPTOGRAPHIC SYSTEM USING FPGA

    Directory of Open Access Journals (Sweden)

    KARAM M. Z. OTHMAN

    2011-08-01

    Full Text Available Modern cryptography techniques are virtually unbreakable. As the Internet and other forms of electronic communication become more prevalent, electronic security is becoming increasingly important. Cryptography is used to protect e-mail messages, credit card information, and corporate data. The design of the cryptography system is a conventional cryptography that uses one key for encryption and decryption process. The chosen cryptography algorithm is stream cipher algorithm that encrypt one bit at a time. The central problem in the stream-cipher cryptography is the difficulty of generating a long unpredictable sequence of binary signals from short and random key. Pseudo random number generators (PRNG have been widely used to construct this key sequence. The pseudo random number generator was designed using the Artificial Neural Networks (ANN. The Artificial Neural Networks (ANN providing the required nonlinearity properties that increases the randomness statistical properties of the pseudo random generator. The learning algorithm of this neural network is backpropagation learning algorithm. The learning process was done by software program in Matlab (software implementation to get the efficient weights. Then, the learned neural network was implemented using field programmable gate array (FPGA.

  10. 基于众包模式的导航库系统构建的探讨%Construction of CALLS Subject Gateway Framework Based on Crowdsourcing

    Institute of Scientific and Technical Information of China (English)

    孙捷; 宋福根; 陈惠兰

    2012-01-01

    This article learned from the concept of crowdsourcing, proposed new ways and new framework about constructing CALLS subject gateway, in order to make the development of CALLS subject gateway in a good circle.%借鉴众包理念,探讨重点学科导航库建设的新思路,构建众包模式下导航库的参建流程及系统框架,以期实现导航库建设的良性发展。

  11. Asymmetric Unification: A New Unification Paradigm for Cryptographic Protocol Analysis

    OpenAIRE

    2013-01-01

    The final publication is available at Springer via http://dx.doi.org/10.1007/978-3-642-38574-2_16 We present a new paradigm for unification arising out of a technique commonly used in cryptographic protocol analysis tools that employ unification modulo equational theories. This paradigm relies on: (i) a decomposition of an equational theory into (R,E) where R is confluent, terminating, and coherent modulo E, and (ii) on reducing unification problems to a set of problems s=?ts=?t under the ...

  12. Cryptographically Blinded Games: Leveraging Players' Limitations for Equilibria and Profit

    DEFF Research Database (Denmark)

    Hubacek, Pavel; Park, Sunoo

    2014-01-01

    In this work we apply methods from cryptography to enable mutually distrusting players to implement broad classes of mediated equilibria of strategic games without trusted mediation. Our implementation uses a pre-play 'cheap talk' phase, consisting of non- binding communication between players pr...... prior to play in the original game. In the cheap talk phase, the players run a secure multi-party computation protocol to sample from an equilibrium of a "cryptographically blinded" version of the game, in which actions are encrypted...

  13. Research of Cryptographic Algorithms Applied in Electronic Commerce

    Directory of Open Access Journals (Sweden)

    Cheng Zengping

    2014-02-01

    Full Text Available With the developments of network communication, electronic commerce plays a more and more role in the trade business and industry structure. The requirement for the electronic commerce turns to be higher. In this study, we study current status about the cryptographic algorithms exploited in electronic commerce. We discuss the advantages and disadvantages about the symmetric and asymmetric algorithms and improve them. Then we give a new scheme that combines the improved symmetric algorithm and asymmetric algorithm. We give sound reasons to explain why our scheme is more secure. Finally, we carry the experiments to show the security of our scheme.

  14. A brief history of cryptology and cryptographic algorithms

    CERN Document Server

    Dooley, John F

    2013-01-01

    The science of cryptology is made up of two halves. Cryptography is the study of how to create secure systems for communications. Cryptanalysis is the study of how to break those systems. The conflict between these two halves of cryptology is the story of secret writing. For over 2,000 years, the desire to communicate securely and secretly has resulted in the creation of numerous and increasingly complicated systems to protect one's messages. Yet for every system there is a cryptanalyst creating a new technique to break that system. With the advent of computers the cryptographer seems to final

  15. The construction of work–life balance: The experience of Black employees in a call-centre environment

    Directory of Open Access Journals (Sweden)

    Sonia C.B. Potgieter

    2010-03-01

    Full Text Available Orientation: Work–life balance, as a crucial aspect of employee and organisational wellness, remains an interesting field of research, especially due to the changing demographic employee profile.Research purpose: The objective of the study was to explore Black employees’ construction of work–life balance in a customer care environment.Motivation for the study: The conceptual debate regarding the construct of work–life balance in general as well as limited qualitative research with regard to Black employees’ experience of work–life balance in a South African context motivated the study.Research design, approach and method: This qualitative study was designed from an interpretivist perspective. Ten employees, selected through purposeful sampling, participated in the study. Data was gathered through in-depth interviews and grounded theory was applied during data analysis.Main findings: The grounded theory analysis of the data yielded six themes central to participants’ construction of work–life balance. The findings suggest that work–life balance is conceptualised as a continuous, subjective and holistic valuation of satisfaction derived from multiple roles in relation to the importance to the individual at a given point in time.Practical/managerial implications: Findings provide valuable managerial information to guide suitable strategies enhancing the work–life balance experience and by implication employees’ general wellbeing, job satisfaction and commitment.Contributions/value-add: This study contributes to the evolving body of knowledge with regard to work–life balance and provides a unique context-specific perspective to the conceptual understanding of the construct.

  16. Secure management of biomedical data with cryptographic hardware.

    Science.gov (United States)

    Canim, Mustafa; Kantarcioglu, Murat; Malin, Bradley

    2012-01-01

    The biomedical community is increasingly migrating toward research endeavors that are dependent on large quantities of genomic and clinical data. At the same time, various regulations require that such data be shared beyond the initial collecting organization (e.g., an academic medical center). It is of critical importance to ensure that when such data are shared, as well as managed, it is done so in a manner that upholds the privacy of the corresponding individuals and the overall security of the system. In general, organizations have attempted to achieve these goals through deidentification methods that remove explicitly, and potentially, identifying features (e.g., names, dates, and geocodes). However, a growing number of studies demonstrate that deidentified data can be reidentified to named individuals using simple automated methods. As an alternative, it was shown that biomedical data could be shared, managed, and analyzed through practical cryptographic protocols without revealing the contents of any particular record. Yet, such protocols required the inclusion of multiple third parties, which may not always be feasible in the context of trust or bandwidth constraints. Thus, in this paper, we introduce a framework that removes the need for multiple third parties by collocating services to store and to process sensitive biomedical data through the integration of cryptographic hardware. Within this framework, we define a secure protocol to process genomic data and perform a series of experiments to demonstrate that such an approach can be run in an efficient manner for typical biomedical investigations.

  17. Some Attacks On Quantum-based Cryptographic Protocols

    CERN Document Server

    Lo, H K; Lo, Hoi-Kwong; Ko, Tsz-Mei

    2003-01-01

    Quantum-based cryptographic protocols are often said to enjoy security guaranteed by the fundamental laws of physics. However, subtle attacks that are outside the original design of the protocols may allow eavesdroppers to break those protocols. As an example, we will give a peeking attack against a quantum key distribution scheme based on quantum memory. Moreover, if technological assumptions are made in the design of a quantum-based cryptographic protocol, then the actual security of the protocol may fall short of expectations. This is because it is often hard to quantify those technological assumptions in a precise manner. Here, we give an attack against a recently proposed ``secure communication using coherent state scheme''. Our attack requires only beamsplitters and the replacement of a lossy channel by a lossless one. It is successful provided that the original loss in the channel is so big that Eve can obtain 2^k copies of what Bob receives, where k is the length of the seed key pre-shared by Alice an...

  18. Secured Cryptographic Key Generation From Multimodal Biometrics Feature Level Fusion Of Fingerprint And Iris

    CERN Document Server

    Jagadeesan, A

    2010-01-01

    Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the users biometric features into the generated key, so as to make the key unguessable to an attacker lacking significant knowledge of the users biometrics. We go one step further trying to incorporate multiple biometric modalities into cryptographic key generation so as to provide better security. In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. The proposed approach is composed of three modules namely, 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. Initially, the features, minutiae points and texture properties are extracted from...

  19. Secured Cryptographic Key Generation From Multimodal Biometrics: Feature Level Fusion of Fingerprint and Iris

    CERN Document Server

    Jagadeesan, A

    2010-01-01

    Human users have a tough time remembering long cryptographic keys. Hence, researchers, for so long, have been examining ways to utilize biometric features of the user instead of a memorable password or passphrase, in an effort to generate strong and repeatable cryptographic keys. Our objective is to incorporate the volatility of the user's biometric features into the generated key, so as to make the key unguessable to an attacker lacking significant knowledge of the user's biometrics. We go one step further trying to incorporate multiple biometric modalities into cryptographic key generation so as to provide better security. In this article, we propose an efficient approach based on multimodal biometrics (Iris and fingerprint) for generation of secure cryptographic key. The proposed approach is composed of three modules namely, 1) Feature extraction, 2) Multimodal biometric template generation and 3) Cryptographic key generation. Initially, the features, minutiae points and texture properties are extracted fr...

  20. Land Consolidation Calls for Landscape Ecological Construction%土地整治呼唤景观生态建设

    Institute of Scientific and Technical Information of China (English)

    王军

    2011-01-01

    研究目的:探讨土地整治景观生态建设基础,提出不同尺度的土地整治景观生态建设途径与方法,以引导土地整治的景观生态建设。研究方法:文献资料法,归纳分析法,比较分析法。研究结果:土地整治景观生态建设在大尺度上从规划层面构建生态板块和生态网络体系,确定土地整治的重点区域、重大工程布局;在中尺度上通过景观格局与生态过程分析,加强景观多样性保护,构建土地整治项目的空间格局;在小尺度上注重提高土地综合生产力的同时,重视斑块、廊道的景观生态化设计,提升景观生态功能性;同时积极拓展公众参与的途径、方式,注意汲取当地乡土知识%The purposes of the paper are to explore the basis of landscape ecological construction, provide the ways and the methods of the land landscape ecological construction in different scales, and to guide the landscape ecological construction during land consolidation. Methods employed are documentation, inductive analysis and comparative analysis. The results indicate that the landscape ecological construction of land consolidation has four connotations. First, it builds the ecological region and ecological network system from the planning level in a large scale, which defines the key area of land consolidation and major engineering layout; Second, it enhances the protection of landscape diversity and builds the spatial distribution pattern of land consolidation project through the analysis of landscape patterns and ecological processes in middle scale; Third, besides the improvement of the integrated land productivity, it emphasizes the landscape ecological design for land patch and corridor, and the improvement of landscape ecological function in small scale; Fourth, it actively expands the way and route of public participation, pays attention to derive the local knowledge, skills, and experiences. It is concluded

  1. A Review of Cryptographic Algorithms in Network Security

    Directory of Open Access Journals (Sweden)

    B.Nithya

    2016-02-01

    Full Text Available In the excellent growth of internet environment, there is a challenge to send data in secure. Security means sending information without any modification or hacking done by unauthorized users. The network security has the component of cryptography technique which acts like guard to the information. The general concept of cryptography is encryption and decryption. There are many cryptographic algorithms are used to send the information as cipher text which cannot be understand by the intruders. So experts have taken the existing algorithms to provide security over the network and they want to apply the benefits of those algorithms in the suitable places. First step of getting the help from algorithm is to be studied and compared their parameters. This paper presents a review that comparative study of algorithms taken by many authors.

  2. A Compendium Over Cloud Computing Cryptographic Algorithms and Security Issues

    Directory of Open Access Journals (Sweden)

    Neha Mishra

    2015-01-01

    Full Text Available Cloud computing is an emerging and revolutionary approach towards the computing and becoming more risk prone than ever before. It is an evolutionary approach of using resources and services on demand and as per need of consumers. Cloud computing providing a platform rose on the Internet for usage of IT services and flexible infrastructure to the consumers and business. Deployment and management of services or resources are maintained by the third party. Whereas there are innumerable advantages to approaching the cloud computing, it also contains various issues such as confidentiality, Integrity, Authenticity and Privacy. One of the prominent barrier to adopt the cloud computing is security. This paper comprises the elaborated study on various security issues allied to cloud computing are presented by consolidating literature reviews on cryptographic algorithms used for data security.

  3. Formalizing the Relationship Between Commitment and Basic Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    S. Sree Vivek

    2016-11-01

    Full Text Available Signcryption is a cryptographic primitive which offers the functionality of both digital signature and encryption with lower combined computational cost. On the other hand, commitment scheme allows an entity to commit to a value, where the entity reveals the committed value later during a decommit phase. In this paper, we explore the connection between commitment schemes, public key encryption, digital signatures and signcryption. We establish formal relationship between commitment and the other primitives. Our main result is that we show signcryption can be used as a commitment scheme with appropriate security notions. We show that if the underlying signcryption scheme is IND-CCA2 secure, then the hiding property of the commitment scheme is satisfied. Similarly, we show that if the underlying signcryption scheme is unforgeable, then the relaxed biding property of the commitment scheme is satisfied. Moreover, we prove that if the underlying signcryption scheme is NM-CCA2, then the commitment scheme is non-malleable.

  4. Implimentation of Cryptographic Algorithm for GSM and UMTS Systems.

    Directory of Open Access Journals (Sweden)

    Alpesh R. Sankaliya

    2011-12-01

    Full Text Available Due to extremely high demand of mobile phones among people, over the years there has been a great demand for the support of various applications and security services. Cryptographic algorithms used by Mobile Subscribers to protect the privacy of their cellular voice and data communication. Ciphering provides the mean to regain control over privacy and authentication. A5/x are the encryption algorithms used in order to ensure privacy of conversations on mobile phones. A5/3 encryption algorithm used for 3G and GEA3 encryption algorithm used for GPRS. f8 is confidentiality algorithms developed by 3GPP used in UMTS System. The following paper is based on simulation of A5/3 and f8 algorithms.

  5. Analysis and Implementation of Cryptographic Hash Functions in Programmable Logic Devices

    Directory of Open Access Journals (Sweden)

    Tautvydas Brukštus

    2016-06-01

    Full Text Available In this day’s world, more and more focused on data pro-tection. For data protection using cryptographic science. It is also important for the safe storage of passwords for this uses a cryp-tographic hash function. In this article has been selected the SHA-256 cryptographic hash function to implement and explore, based on fact that it is now a popular and safe. SHA-256 cryp-tographic function did not find any theoretical gaps or conflict situations. Also SHA-256 cryptographic hash function used cryptographic currencies. Currently cryptographic currency is popular and their value is high. For the measurements have been chosen programmable logic integrated circuits as they less effi-ciency then ASIC. We chose Altera Corporation produced prog-rammable logic integrated circuits. Counting speed will be inves-tigated by three programmable logic integrated circuit. We will use programmable logic integrated circuits belong to the same family, but different generations. Each programmable logic integ-rated circuit made using different dimension technology. Choo-sing these programmable logic integrated circuits: EP3C16, EP4CE115 and 5CSEMA5F31. To compare calculations perfor-mances parameters are provided in the tables and graphs. Re-search show the calculation speed and stability of different prog-rammable logic circuits.

  6. CRYPTOGRAPHIC MEANS OF INFORMATION PROTECTION AND PSYCHOLOGICAL COMFORT OF THE USERS OF COMPUTER INFORMATIONAL SYSTEMS

    Directory of Open Access Journals (Sweden)

    Yurii A. Kotsiuk

    2010-09-01

    Full Text Available The article checks up the existence of functional relation between the level of psychological comfort of the users of computer informational systems and their awareness/skills to use cryptographic means of information protection.

  7. Novel Authentication of Monitoring Data Through the use of Secret and Public Cryptographic Keys

    Energy Technology Data Exchange (ETDEWEB)

    Benz, Jacob M.; Tolk, Keith; Tanner, Jennifer E.

    2014-07-21

    The Office of Nuclear Verification (ONV) is supporting the development of a piece of equipment to provide data authentication and protection for a suite of monitoring sensors as part of a larger effort to create an arms control technology toolkit. This device, currently called the Red Box, leverages the strengths of both secret and public cryptographic keys to authenticate, digitally sign, and pass along monitoring data to allow for host review, and redaction if necessary, without the loss of confidence in the authenticity of the data by the monitoring party. The design of the Red Box will allow for the addition and removal of monitoring equipment and can also verify that the data was collected by authentic monitoring equipment prior to signing the data and sending it to the host and for review. The host will then forward the data to the monitor for review and inspection. This paper will highlight the progress to date of the Red Box development, and will explain the novel method of leveraging both symmetric and asymmetric (secret and public key) cryptography to authenticate data within a warhead monitoring regime.

  8. Constructing and Application of Intelligent Call Center of Civil Air Defence%人防智能化呼叫中心的构建及应用

    Institute of Scientific and Technical Information of China (English)

    赵华; 王海阔

    2012-01-01

    In this paper,analysis the necessity and feasibility of the intelligence call center used in civil air defence,and thorough discuss the working principle and the function used in civil air defence actions.Based on the research construct an intelligence call center system which adapt to civil air defence characters and focused on the soft-switch technology,then forecast the foreground in the evacuate and conceal actions in wartime and the emergency rescue actions in peacetime.%本文分析了呼叫中心在人防中应用的必要性和可行性,对其工作原理和在人防行动中的作用进行了深入探讨,在此基础上构建了基于软交换技术并适合人防特点的智能化呼叫中心系统,并对其在战时疏散掩蔽行动和平时的应急救援行动中应用前景进行了预测。

  9. A secure and efficient cryptographic hash function based on NewFORK-256

    Directory of Open Access Journals (Sweden)

    Harshvardhan Tiwari

    2012-11-01

    Full Text Available Cryptographic hash functions serve as a fundamental building block of information security and are used in numerous security applications and protocols such as digital signature schemes, construction of MAC and random number generation, for ensuring data integrity and data origin authentication. Researchers have noticed serious security flaws and vulnerabilities in most widely used MD and SHA family hash functions. As a result hash functions from FORK family with longer digest value were considered as good alternatives for MD5 and SHA-1, but recent attacks against these hash functions have highlighted their weaknesses. In this paper we propose a dedicated hash function MNF-256 based on the design principle of NewFORK-256. It takes 512 bit message blocks and generates 256 bit hash value. A random sequence is added as an additional input to the compression function of MNF-256. Three branch parallel structure and secure compression function make MNF-256 an efficient, fast and secure hash function. Various simulation results indicate that MNF-256 is immune to common cryptanalytic attacks and faster than NewFORK-256.

  10. Cryptographically supported NFC tags in medication for better inpatient safety.

    Science.gov (United States)

    Özcanhan, Mehmet Hilal; Dalkılıç, Gökhan; Utku, Semih

    2014-08-01

    Reliable sources report that errors in drug administration are increasing the number of harmed or killed inpatients, during healthcare. This development is in contradiction to patient safety norms. A correctly designed hospital-wide ubiquitous system, using advanced inpatient identification and matching techniques, should provide correct medicine and dosage at the right time. Researchers are still making grouping proof protocol proposals based on the EPC Global Class 1 Generation 2 ver. 1.2 standard tags, for drug administration. Analyses show that such protocols make medication unsecure and hence fail to guarantee inpatient safety. Thus, the original goal of patient safety still remains. In this paper, a very recent proposal (EKATE) upgraded by a cryptographic function is shown to fall short of expectations. Then, an alternative proposal IMS-NFC which uses a more suitable and newer technology; namely Near Field Communication (NFC), is described. The proposed protocol has the additional support of stronger security primitives and it is compliant to ISO communication and security standards. Unlike previous works, the proposal is a complete ubiquitous system that guarantees full patient safety; and it is based on off-the-shelf, new technology products available in every corner of the world. To prove the claims the performance, cost, security and scope of IMS-NFC are compared with previous proposals. Evaluation shows that the proposed system has stronger security, increased patient safety and equal efficiency, at little extra cost.

  11. Preventing Real-Time Packet Classification Using Cryptographic Primitives

    Directory of Open Access Journals (Sweden)

    N.Vasumathi

    2014-03-01

    Full Text Available Jamming attacks are especially harmful when ensuring the dependability of wireless communication. Typically, jamming has been addressed under an external threat model. Adversaries with internal knowledge of protocol specifications and network secrets can launch low-effort jamming attacks that are difficult to detect and counter. The problem of selective jamming attacks in wireless networks is addressed in this work. In these attacks, the adversary is active only for a short period of time, specifically targeting messages of high importance. The advantages of selective jamming in terms of network performance degradation and adversary effort is illustrated by presenting two case studies; one is selective attack on TCP and another is on routing. The selective jamming attacks can be launched by performing real-time packet classification at the physical layer. To avoid these attacks, four schemes are developed such as All Or Nothing Transformation-Hiding Scheme (AONT-HS - pseudo message is added with message before transformation and encryption, Strong Hiding Commitment Scheme(SHCS - off-the-shelf symmetric encryption is done, Puzzle Based Hiding Scheme(PBHS- time lock and hash puzzle and Nonce based Authenticated Encryption Scheme(N-AES-Nonce is used for encryption, that prevent real-time packet classification by combining cryptographic primitives with physical-layer attributes.

  12. A Novel Visual Cryptographic Method for Color Images

    Directory of Open Access Journals (Sweden)

    Amarjot Singh

    2013-05-01

    Full Text Available Visual cryptography is considered to be a vital technique for hiding visual data from intruders. Because of its importance, it finds applications in various sectors such as E-voting system, financial documents and copyright protections etc. A number of methods have been proposed in past for encrypting color images such as color decomposition, contrast manipulation, polynomial method, using the difference in color intensity values in a color image etc. The major flaws with most of the earlier proposed methods is the complexity encountered during the implementation of the methods on a wide scale basis, the problem of random pixilation and insertion of noise in encrypted images. This paper presents a simple and highly resistant algorithm for visual cryptography to be performed on color images. The main advantage of the proposed cryptographic algorithm is the robustness and low computational cost with structure simplicity. The proposed algorithm outperformed the conventional methods when tested over sample images proven using key analysis, SSIM and histogram analysis tests. In addition, the proposed method overshadows the standard method in terms of the signal to noise ratio obtained for the encrypted image, which is much better than the SNR value obtained using the standard method. The paper also makes a worst case analysis for the SNR values for both the methods.

  13. Abstraction for Epistemic Model Checking of Dining Cryptographers-based Protocols

    CERN Document Server

    Al-Bataineh, Omar I

    2010-01-01

    The paper describes an abstraction for protocols that are based on multiple rounds of Chaum's Dining Cryptographers protocol. It is proved that the abstraction preserves a rich class of specifications in the logic of knowledge, including specifications describing what an agent knows about other agents' knowledge. This result can be used to optimize model checking of Dining Cryptographers-based protocols, and applied within a methodology for knowledge-based program implementation and verification. Some case studies of such an application are given, for a protocol that uses the Dining Cryptographers protocol as a primitive in an anonymous broadcast system. Performance results are given for model checking knowledge-based specifications in the concrete and abstract models of this protocol, and some new conclusions about the protocol are derived.

  14. SIMPL Systems, or: Can We Design Cryptographic Hardware without Secret Key Information?

    Science.gov (United States)

    Rührmair, Ulrich

    This paper discusses a new cryptographic primitive termed SIMPL system. Roughly speaking, a SIMPL system is a special type of Physical Unclonable Function (PUF) which possesses a binary description that allows its (slow) public simulation and prediction. Besides this public key like functionality, SIMPL systems have another advantage: No secret information is, or needs to be, contained in SIMPL systems in order to enable cryptographic protocols - neither in the form of a standard binary key, nor as secret information hidden in random, analog features, as it is the case for PUFs. The cryptographic security of SIMPLs instead rests on (i) a physical assumption on their unclonability, and (ii) a computational assumption regarding the complexity of simulating their output. This novel property makes SIMPL systems potentially immune against many known hardware and software attacks, including malware, side channel, invasive, or modeling attacks.

  15. A Partially Non-Cryptographic Security Routing Protocol in Mobile Ad Hoc Networks

    Institute of Scientific and Technical Information of China (English)

    CHEN Jing; CUI Guohua

    2006-01-01

    In this paper, we propose a partially non-cryptographic security routing protocol(PNCSR ) that protects both routing and data forwarding operations through the same reactive approach. PNCSR only apply public-key cryptographic system in managing token, but it doesn't utilize any cryptographic primitives on the routing messages. In PNCSR, each node is fair. Local neighboring nodes collaboratively monitor each other and sustain each other. It also uses a novel credit strategy which additively increases the token lifetime each time a node renews its token. We also analyze the storage, computation, and communication overhead of PNCSR, and provide a simple yet meaningful overhead comparison. Finally, the simulation results show the effectiveness of PNCSR in various situations.

  16. Performance Impacts of Lower-Layer Cryptographic Methods in Mobile Wireless Ad Hoc Networks

    Energy Technology Data Exchange (ETDEWEB)

    VAN LEEUWEN, BRIAN P.; TORGERSON, MARK D.

    2002-10-01

    In high consequence systems, all layers of the protocol stack need security features. If network and data-link layer control messages are not secured, a network may be open to adversarial manipulation. The open nature of the wireless channel makes mobile wireless mobile ad hoc networks (MANETs) especially vulnerable to control plane manipulation. The objective of this research is to investigate MANET performance issues when cryptographic processing delays are applied at the data-link layer. The results of analysis are combined with modeling and simulation experiments to show that network performance in MANETs is highly sensitive to the cryptographic overhead.

  17. K-Medoids-Based Random Biometric Pattern for Cryptographic Key Generation

    Science.gov (United States)

    Garcia-Baleon, H. A.; Alarcon-Aquino, V.; Starostenko, O.

    In this paper we report an approach for cryptographic key generation based on keystroke dynamics and the k-medoids algorithm. The stages that comprise the approach are training-enrollment and user verification. The proposed approach is able to verify the identity of individuals off-line avoiding the use of a centralized database. The performance of the proposed approach is assessed using 20 samples of keystroke dynamics from 20 different users. Simulation results show a false acceptance rate (FAR) of 5.26% and a false rejection rate (FRR) of 10%. The cryptographic key released by the proposed approach may be used in several encryption algorithms.

  18. Analysis of cryptographic mechanisms used in ransomware CryptXXX v3

    Directory of Open Access Journals (Sweden)

    Michał Glet

    2016-12-01

    Full Text Available The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3. At the end were given some useful advices how to improve CryptXXX.[b]Keyword:[/b] ransomware, software engineering, reverse engineering, RC4, RSA, malicious software

  19. Type-Based Automated Verification of Authenticity in Asymmetric Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten; Kobayashi, Naoki; Sun, Yunde

    2011-01-01

    Gordon and Jeffrey developed a type system for verification of asymmetric and symmetric cryptographic protocols. We propose a modified version of Gordon and Jeffrey's type system and develop a type inference algorithm for it, so that protocols can be verified automatically as they are, without any...

  20. Analysis of cryptographic mechanisms used in ransomware CryptXXX v3

    OpenAIRE

    Michał Glet

    2016-01-01

    The main purpose of this paper was to analysis how malicious software is using cryptographic mechanisms. Reverse engineering were applied in order to discover mechanisms used in ransomware CryptXXX v3. At the end were given some useful advices how to improve CryptXXX.[b]Keyword:[/b] ransomware, software engineering, reverse engineering, RC4, RSA, malicious software

  1. Quality of Service Enhancement of Wireless Sensor Network Using Symmetric Key Cryptographic Schemes

    Directory of Open Access Journals (Sweden)

    Er. Gurjot Singh

    2014-07-01

    Full Text Available A Wireless Sensor Network is a combination of spatially distributed independent nodes deployed in dense environment, communicating wirelessly over limited bandwidth and frequency. Security and Qos is the major concern in wireless sensor network due to its wireless communication nature and constraints like low computation capability, less memory, bounded energy resources, susceptibility to physical capture or damages and the use of insecure wireless communication channels. These constraints make security along with the QoS, a challenge in wireless sensor network. The cryptographic schemes increases the level of security and make it secure against critical attacks but also has a significant impact on the QoS of wireless sensor network. In this paper, the different cryptographic schemes based on asymmetric key and symmetric key cryptography are evaluated. The symmetric key cryptography schemes require less time for processing, less power and also require less storage space as compared to asymmetric key cryptographic schemes, results in less impact on the QoS of wireless sensor network. In this paper, the QoS of wireless sensor network along with cryptographic schemes will be evaluated on the basis of metrics like throughput, jitter, end-to-end delay, total packet received and energy consumption.

  2. EMERGENCY CALLS

    CERN Multimedia

    2001-01-01

    IN URGENT NEED OF A DOCTOR GENEVA EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME, open 24h/24h 748-49-50 Association Of Geneva Doctors Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin EMERGENCIES 719-61-11 URGENCES PEDIATRIQUES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112 FRANCE EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ANTI-POISONS CENTRE Open 24h/24h 04-72-11-69-11 All doctors ...

  3. Algorithm for finding partitionings of hard variants of boolean satisfiability problem with application to inversion of some cryptographic functions.

    Science.gov (United States)

    Semenov, Alexander; Zaikin, Oleg

    2016-01-01

    In this paper we propose an approach for constructing partitionings of hard variants of the Boolean satisfiability problem (SAT). Such partitionings can be used for solving corresponding SAT instances in parallel. For the same SAT instance one can construct different partitionings, each of them is a set of simplified versions of the original SAT instance. The effectiveness of an arbitrary partitioning is determined by the total time of solving of all SAT instances from it. We suggest the approach, based on the Monte Carlo method, for estimating time of processing of an arbitrary partitioning. With each partitioning we associate a point in the special finite search space. The estimation of effectiveness of the particular partitioning is the value of predictive function in the corresponding point of this space. The problem of search for an effective partitioning can be formulated as a problem of optimization of the predictive function. We use metaheuristic algorithms (simulated annealing and tabu search) to move from point to point in the search space. In our computational experiments we found partitionings for SAT instances encoding problems of inversion of some cryptographic functions. Several of these SAT instances with realistic predicted solving time were successfully solved on a computing cluster and in the volunteer computing project SAT@home. The solving time agrees well with estimations obtained by the proposed method.

  4. Construction of plateaued functions satisfying multiple criteria

    Institute of Scientific and Technical Information of China (English)

    Zhang Weiguo

    2005-01-01

    A class of plateaued functions has been got by using the Maiorana-McFarland construction. A variety of desirable criteria for functions with cryptographic application could be satisfied: balancedness, high nonlinearity, correlation immunity of reasonably high order, strict avalanche criterion, non-existence of non-zero linear structures, good global avalanche characteristics, etc.

  5. Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current

    Science.gov (United States)

    Hayashi, Yu-Ichi; Homma, Naofumi; Mizuki, Takaaki; Sugawara, Takeshi; Kayano, Yoshiki; Aoki, Takafumi; Minegishi, Shigeki; Satoh, Akashi; Sone, Hideaki; Inoue, Hiroshi

    This paper presents a possibility of Electromagnetic (EM) analysis against cryptographic modules outside their security boundaries. The mechanism behind the information leakage is explained from the view point of Electromagnetic Compatibility: electric fluctuation released from cryptographic modules can conduct to peripheral circuits based on ground bounce, resulting in radiation. We demonstrate the consequence of the mechanism through experiments where the ISO/IEC standard block cipher AES (Advanced Encryption Standard) is implemented on an FPGA board and EM radiations from power and communication cables are measured. Correlation Electromagnetic Analysis (CEMA) is conducted in order to evaluate the information leakage. The experimental results show that secret keys are revealed even though there are various disturbing factors such as voltage regulators and AC/DC converters between the target module and the measurement points. We also discuss information-suppression techniques as electrical-level countermeasures against such CEMAs.

  6. Cryptographic applications of analytic number theory complexity lower bounds and pseudorandomness

    CERN Document Server

    2003-01-01

    The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation. Key topics and features: - various lower bounds on the complexity of some number theoretic and cryptographic problems, associated with classical schemes such as RSA, Diffie-Hellman, DSA as well as with relatively new schemes like XTR and NTRU - a series of very recent results about certain important characteristics (period, distribution, linear complexity) of several commonly used pseudorandom number generators, such as the RSA generator, Blum-Blum-Shub generator, Naor-Reingold generator, inversive generator, and others - one of the principal tools is bounds of exponential sums, which are combined with other number theoretic methods such as lattice reduction and sieving - a number of open problems of different level of difficulty and proposals for further research - an extensive and up-to-date bibliography Cryptographers and number theorists will find th...

  7. SD-REE: A Cryptographic Method to Exclude Repetition from a Message

    CERN Document Server

    Dey, Somdip

    2012-01-01

    In this paper, the author presents a new cryptographic technique, SD-REE, to exclude the repetitive terms in a message, when it is to be encrypted, so that it becomes almost impossible for a person to retrieve or predict the original message from the encrypted message. In modern world, cryptography hackers try to break a code or cryptographic algorithm [1,2] or retrieve the key, used for encryption, by inserting repetitive bytes / characters in the message and encrypt the message or by analyzing repetitions in the encrypted message, to find out the encryption algorithm or retrieve the key used for the encryption. But in SD-REE method the repetitive bytes / characters are removed and there is no trace of any repetition in the message, which was encrypted.

  8. The generation of shared cryptographic keys through channel impulse response estimation at 60 GHz.

    Energy Technology Data Exchange (ETDEWEB)

    Young, Derek P.; Forman, Michael A.; Dowdle, Donald Ryan

    2010-09-01

    Methods to generate private keys based on wireless channel characteristics have been proposed as an alternative to standard key-management schemes. In this work, we discuss past work in the field and offer a generalized scheme for the generation of private keys using uncorrelated channels in multiple domains. Proposed cognitive enhancements measure channel characteristics, to dynamically change transmission and reception parameters as well as estimate private key randomness and expiration times. Finally, results are presented on the implementation of a system for the generation of private keys for cryptographic communications using channel impulse-response estimation at 60 GHz. The testbed is composed of commercial millimeter-wave VubIQ transceivers, laboratory equipment, and software implemented in MATLAB. Novel cognitive enhancements are demonstrated, using channel estimation to dynamically change system parameters and estimate cryptographic key strength. We show for a complex channel that secret key generation can be accomplished on the order of 100 kb/s.

  9. Techniques for Performance Improvement of Integer Multiplication in Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Robert Brumnik

    2014-01-01

    Full Text Available The problem of arithmetic operations performance in number fields is actively researched by many scientists, as evidenced by significant publications in this field. In this work, we offer some techniques to increase performance of software implementation of finite field multiplication algorithm, for both 32-bit and 64-bit platforms. The developed technique, called “delayed carry mechanism,” allows to preventing necessity to consider a significant bit carry at each iteration of the sum accumulation loop. This mechanism enables reducing the total number of additions and applies the modern parallelization technologies effectively.

  10. A Real-Time Performance Analysis Model for Cryptographic Protocols

    Directory of Open Access Journals (Sweden)

    Amos Olagunju

    2012-12-01

    Full Text Available Several encryption algorithms exist today for securing data in storage and transmission over network systems. The choice of encryption algorithms must weigh performance requirements against the call for protection of sensitive data. This research investigated the processing times of alternative encryption algorithms under specific conditions. The paper presents the architecture of a model multiplatform tool for the evaluation of candidate encryption algorithms based on different data and key sizes. The model software was used to appraise the real-time performance of DES, AES, 3DES, MD5, SHA1, and SHA2 encryption algorithms.

  11. Revoke and Let Live: A Secure Key Revocation API for Cryptographic Devices

    OpenAIRE

    Cortier, Véronique; Steel,Graham; Wiedling, Cyrille

    2012-01-01

    While extensive research addresses the problem of establishing session keys through cryptographic protocols, relatively little work has appeared addressing the problem of revocation and update of long term keys. We present an API for symmetric key management on embedded devices that supports revocation and prove security properties design in the symbolic model of cryptography. Our API supports two modes of revocation: a passive mode where keys have an expiration time, and an active mode where...

  12. Using Animation in Active Learning Tool to Detect Possible Attacks in Cryptographic Protocols

    Science.gov (United States)

    Ali Mayouf, Mabroka; Shukur, Zarina

    Interactive Visualization tools for active learning of generic cryptographic protocols are very few. Although these tools provide the possibility to engage the learner by asking him to describe a cryptographic protocol using a simple visual metaphor to represent the abstraction of the concepts being visualized, the problem is that some cryptographic operations are not visualized or animated and hidden from the learner's perspective such as encryption/decryption actions. Other operations are not supported by these tools such as timestamp and freshness. So, it's difficult to cover all possible attack that the intruder might employ with such operations are missing. The purpose of this research is to provide an interactive visualization tool for teaching undergraduate students security protocols concepts especially key distribution, multiple operations such as encryption/decryption and signed/unsigned operations, and possible protocol attacks. By designing a high quality graphical user interface and simple visual metaphor, learners will be able to specify the protocols and consider the possible attack at each step of protocol demonstration.

  13. Efficiency of two constructs called "fear of disease" and "perceived severity of disease" on the prevention of gastric cancer: Application of protection motivation theory.

    Science.gov (United States)

    Baghiani-Moghadam, Mohamad Hosein; Seyedi-Andi, Seyed Jalil; Shokri-Shirvani, Javad; Khafri, Sorayya; Ghadimi, Reza; Parsian, Hadi

    2015-01-01

    Among all cancers, malignancies of gastrointestinal tract are the most common cancer among Iranian population. Dietary behavior is thought to be the most important risk factor in gastric cancer. Fear and perceived severity are two important constructs of the protection motivation theory (PMT). Despite the evidence of the impact of these two constructs in modifying dietary habits against gastric cancer, their efficiency is not well established. Therefore, the present study was designed to determine the efficiency of the mentioned constructs. This cross-sectional study was performed on 360 participants (180 males and 180 females) aged over 30 years old who presented to health centers in Babol, Iran in 2014. They were selected by a cluster sampling method in a population covered by health centers in Babol. Data collection was done using a questionnaire with acceptable reliability and validity, designed by a researcher based on two constructs of protection motivation theory. The data were analyzed by SPSS Version 20 using descriptive and analytical statistics such as ANOVA, linear and logistic regression analysis. The participants who entered in the study achieved 38.6 and 69.7% of the scores of fear and perceived severity, respectively. There was a significant difference between perceived severity with level of education (pmotivation theory with predicting 38% of the variance of nutritional high risk behaviors had an effective role against gastric cancer and may help in the design and implementation of educational programs for the prevention of gastric cancer.

  14. Development of a New Cryptographic Construct Using Palmprint-Based Fuzzy Vault

    Directory of Open Access Journals (Sweden)

    Amioy Kumar

    2009-01-01

    Full Text Available The combination of cryptology and biometrics has emerged as promising component of information security. Despite the current popularity of palmprint biometric, there has not been any attempt to investigate its usage for the fuzzy vault. This paper therefore investigates the possible usage of palmprint in fuzzy vault to develop a user friendly and reliable crypto system. We suggest the use of both symmetric and asymmetric approach for the encryption. The ciphertext of any document is generated by symmetric cryptosystem; the symmetric key is then encrypted by asymmetric approach. Further, Reed and Solomon codes are used on the generated asymmetric key to provide some error tolerance while decryption. The experimental results from the proposed approach on the palmprint images suggest its possible usage in an automated palmprint-based key generation system.

  15. Chaos-based hash function (CBHF) for cryptographic applications

    Energy Technology Data Exchange (ETDEWEB)

    Amin, Mohamed [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: mamin04@yahoo.com; Faragallah, Osama S. [Dept. of Computer Science and Engineering, Faculty of Electronic Engineering, Menoufia University, Menouf 32952 (Egypt)], E-mail: osam_sal@yahoo.com; Abd El-Latif, Ahmed A. [Dept. of Mathematics and Computer Science, Faculty of Science, Menoufia University, Shebin El-Koom 32511 (Egypt)], E-mail: ahmed_rahiem@yahoo.com

    2009-10-30

    As the core of cryptography, hash is the basic technique for information security. Many of the hash functions generate the message digest through a randomizing process of the original message. Subsequently, a chaos system also generates a random behavior, but at the same time a chaos system is completely deterministic. In this paper, an algorithm for one-way hash function construction based on chaos theory is introduced. Theoretical analysis and computer simulation indicate that the algorithm can satisfy all performance requirements of hash function in an efficient and flexible manner and secure against birthday attacks or meet-in-the-middle attacks, which is good choice for data integrity or authentication.

  16. Construction and Enumerating of Resilient—Functions

    Institute of Scientific and Technical Information of China (English)

    WENQiaoyan; YANGYixian

    2003-01-01

    This paper discussed construction and enumeration of resilient functions,which have widely applications in the fault-tolerant distributed computing,quantum-cryptographic key distribution,and random sequence generation for stream ciphers.It turned out that resilient functions are special case of unbiased multi-value correlation-immune functions.Resilient functions are constructed by recursive construction of orthogonal matrices and the exact number of them is found for some special cases.

  17. Constructions of new plateaued functions from known ones

    Institute of Scientific and Technical Information of China (English)

    Zhang Weiguo; Ding Yong; Zhang Ning; Xiao Guozhen

    2008-01-01

    A number of methods for constructing new plateaued functions from known ones are presented. By properly combining the known plateaued functions it is possible to get highly nonlinear resilient plateaued functions. The order, resiliency and propagation characteristics of the constructed plateaued functions are discussed. We show the new functions could possess the desirable cryptographic property.

  18. Security issues of quantum cryptographic systems with imperfect detectors

    Science.gov (United States)

    Burenkov, Viacheslav

    The laws of quantum physics can be used to secure communications between two distant parties in a scheme called quantum key distribution (QKD), even against a technologically unlimited eavesdropper. While the theoretical security of QKD has been proved rigorously, current implementations of QKD are generally insecure. In particular, mathematical models of devices, such as detectors, do not accurately describe their real-life behaviour. Such seemingly insignificant discrepancies can compromise the security of the entire scheme, especially as novel detector technologies are being developed with little regard for potential vulnerabilities. In this thesis, we study how detector imperfections can impact the security of QKD and how to overcome such technological limitations. We first analyze the security of a high-speed QKD system with finite detector dead time tau. We show that the previously reported sifting approaches are not guaranteed to be secure in this regime. More specifically, Eve can induce a basis-dependent detection efficiency at the receiver's end. Modified key sifting schemes that are basis-independent, and thus secure in the presence of dead time and an active eavesdropper, are discussed and compared. It is shown that the maximum key generation rate is 1/(2tau) for passive basis selection, and 1/tau for active basis selection. The security analysis is also extended to the decoy state BB84 protocol. We then study a relatively new type of single-photon detector called the superconducting nanowire single-photon detector (SNSPD), and discover some unexpected behaviour. We report an afterpulsing effect present when the SNSPD is operated in the high bias current regime. In our standard set-up, the afterpulsing is most likely to occur at around 180 ns following a detection event, for both real counts and dark counts. We characterize the afterpulsing behaviour and speculate that it is not due to the SNSPD itself but rather the associated read-out circuit. We also

  19. Construction

    Science.gov (United States)

    2002-01-01

    Harbor Deepening Project, Jacksonville, FL Palm Valley Bridge Project, Jacksonville, FL Rotary Club of San Juan, San Juan, PR Tren Urbano Subway...David. What is nanotechnology? What are its implications for construction?, Foresight/CRISP Workshop on Nanotechnology, Royal Society of Arts

  20. Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Shahram Jahani

    2014-01-01

    Full Text Available Public-key cryptosystems are broadly employed to provide security for digital information. Improving the efficiency of public-key cryptosystem through speeding up calculation and using fewer resources are among the main goals of cryptography research. In this paper, we introduce new symbols extracted from binary representation of integers called Big-ones. We present a modified version of the classical multiplication and squaring algorithms based on the Big-ones to improve the efficiency of big integer multiplication and squaring in number theory based cryptosystems. Compared to the adopted classical and Karatsuba multiplication algorithms for squaring, the proposed squaring algorithm is 2 to 3.7 and 7.9 to 2.5 times faster for squaring 32-bit and 8-Kbit numbers, respectively. The proposed multiplication algorithm is also 2.3 to 3.9 and 7 to 2.4 times faster for multiplying 32-bit and 8-Kbit numbers, respectively. The number theory based cryptosystems, which are operating in the range of 1-Kbit to 4-Kbit integers, are directly benefited from the proposed method since multiplication and squaring are the main operations in most of these systems.

  1. A Threshold Pseudorandom Function Construction and Its Applications

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus

    2002-01-01

    We give the first construction of a practical threshold pseudo- random function.The protocol for evaluating the function is efficient enough that it can be used to replace random oracles in some protocols relying on such oracles. In particular, we show how to transform the efficient...... cryptographically secure Byzantine agreement protocol by Cachin, Kursawe and Shoup for the random oracle model into a cryptographically secure protocol for the complexity theoretic model without loosing efficiency or resilience,thereby constructing an efficient and optimally resilient Byzantine agreement protocol...

  2. Aufforderung zum Kampf. Geschlechterkonstruktionen und Antisemitismus zum Tanzen bringen! A Call to Arms. Bringing Gender Constructions and Anti-Semitism to Dance!

    Directory of Open Access Journals (Sweden)

    Iris Homann

    2006-07-01

    Full Text Available Der Band Antisemitismus und Geschlecht der Gruppe A.G.Gender-Killer versammelt Untersuchungen über die Bedeutung der Kategorie Geschlecht in antisemitischen Diskursen seit dem 19. Jahrhundert. Ihnen gemeinsam ist die These einer konstitutiven Verknüpfung von Antisemitismus und Geschlechterkonstruktionen. Von der Notwendigkeit eines antifaschistischen gesellschaftlichen Engagements ausgehend, versuchen die Beiträger/-innen einen Brückenschlag zwischen Universität und Politik, Theorie und Praxis. Ihre Ergebnisse belegen die Abrufbarkeit und damit auch die Wirkungsmacht antisemitischer Sexualphantasien und Geschlechterbilder bis heute.The volume Anti-Semitism and Gender (Antisemitismus und Geschlecht published by the group A.G. Gender-Killer collects studies about the meaning of the category of gender in anti-Semitic discourses since the nineteenth century. They share the thesis that sees a constitutive connection between anti-Semitism and gender constructs. The studies attempt to bridge university and politics, theory and practice by beginning with the necessity of an anti-fascist engagement in society. Their results prove that anti-Semitic sexual fantasies and gender images are both immediately recallable and potent today.

  3. Efficient cryptographic substitution box design using travelling salesman problem and chaos

    Directory of Open Access Journals (Sweden)

    Musheer Ahmad

    2016-09-01

    Full Text Available Symmetric encryption has been a standout amongst the most reliable option by which security is accomplished. In modern block symmetric cyphers, the substitution-boxes have been playing a critical role of nonlinear components that drives the actual security of cyphers. In this paper, the travelling salesman problem and piece-wise linear chaotic map are explored to synthesize an efficient configuration of 8 × 8 substitution-box. The proposed anticipated design has the consistency which is justified by the standard performance indexes. The statistical results manifest that the prospective substitution-box is cryptographically more impressive as compared to some recent investigations.

  4. MEANING OF THE BITCOIN CRYPTOGRAPHIC CURRENCY AS A MEDIUM OF EXCHANGE

    Directory of Open Access Journals (Sweden)

    Łukasz Dopierała

    2014-06-01

    Full Text Available This article presents one of the new elements of virtual reality, which is the Bitcoin cryptocurrency. This thesis focuses on the condition and perspectives on development of the trading function of this instrument. The authors discuss the legal aspects of functioning of the Bitcoin, conduct a SWOT analysis of this cryptocurrency as a medium of exchange, and examin the scale of use of Bitcoin in transaction purposes. As of March 1, 2014 the trading system gradually develops and the strengths of this cryptographic currency outweigh its weaknesses, but the future of Bitcoin as a medium of exchange is difficult to determine.

  5. The FPGA realization of the general cellular automata based cryptographic hash functions: Performance and effectiveness

    Directory of Open Access Journals (Sweden)

    P. G. Klyucharev

    2014-01-01

    Full Text Available In the paper the author considers hardware implementation of the GRACE-H family general cellular automata based cryptographic hash functions. VHDL is used as a language and Altera FPGA as a platform for hardware implementation. Performance and effectiveness of the FPGA implementations of GRACE-H hash functions were compared with Keccak (SHA-3, SHA-256, BLAKE, Groestl, JH, Skein hash functions. According to the performed tests, performance of the hardware implementation of GRACE-H family hash functions significantly (up to 12 times exceeded performance of the hardware implementation of previously known hash functions, and effectiveness of that hardware implementation was also better (up to 4 times.

  6. Call Forecasting for Inbound Call Center

    Directory of Open Access Journals (Sweden)

    Peter Vinje

    2009-01-01

    Full Text Available In a scenario of inbound call center customer service, the ability to forecast calls is a key element and advantage. By forecasting the correct number of calls a company can predict staffing needs, meet service level requirements, improve customer satisfaction, and benefit from many other optimizations. This project will show how elementary statistics can be used to predict calls for a specific company, forecast the rate at which calls are increasing/decreasing, and determine if the calls may stop at some point.

  7. Pseudorandom functions revisited: The cascade construction and its concrete security

    Energy Technology Data Exchange (ETDEWEB)

    Bellare, M. [Univ. of California at San Diego, La Jolla, CA (United States); Canetti, R.; Krawczyk, H. [IBM T.J. Watson Research Center, Yorktown Heights, NY (United States)

    1996-12-31

    Pseudorandom function families are a powerful cryptographic primitive, yielding, in particular, simple solutions for the main problems in private key cryptography. Their existence based on general assumptions (namely, the existence of one-way functions) has been established. In this work we investigate new ways of designing pseudorandom function families. The goal is to find constructions that are both efficient and secure, and thus eventually to bring the benefits of pseudorandom functions to practice. The basic building blocks in our design are certain limited versions of pseudorandom function families, called finite-length input pseudorandom function families, for which very efficient realizations exist in practical cryptography. Thus rather than starting from one-way functions, we propose constructions of {open_quote}full-fledged{close_quotes} pseudorandom function families from these limited ones. In particular we propose the cascade construction, and provide a concrete security analysis which relates the strength of the cascade to that of the underlying finite pseudorandom function family in a precise and quantitative way.

  8. The construction of a Concept called Regulation

    Directory of Open Access Journals (Sweden)

    María José Campanelli Espíndola

    2014-12-01

    Full Text Available The following analysis is directed to study “regulation” from the legal, economic and social aspects of compared law minding diverse legal systems and regimes. The methodology of investigation for this exercise begins by comparing the different thesis and main propositions on the concept of regulation in different legal orders and systems.

  9. Research on method to improve the high-speed railway users’ calling perception by constructing GSM special network%建设GSM专网解决高铁用户话音感知的探讨

    Institute of Scientific and Technical Information of China (English)

    杨璇; 周海峰

    2014-01-01

    在传统宏基站覆盖模型下,高铁列车内用户话音呼叫的连续性和可靠性无法满足,根据专网特性规划建设高铁GSM专网,采用分布式基站合并小区方式组网方式,并通过单站和全网性能优化大幅度高铁用户通过可靠性和连续性,提高客户话音感知。同时,将高铁站点维护列入VIP维护级别,确保专网站点正常运行。%Under the traditional model of macro base station, continuity and reliability of the high-speed railway users calls can not be met. According to the high-speed railway network features, we desire and construct special GSM network, using combined cell technology with distributed base station .After the project is complete, we begin the single station and the whole network optimization to improve the high-speed railway users’ calling perception. Meanwhile, the high-speed rail maintenance site has been set up to the VIP level, to ensure the normal operation of specialized web sites.

  10. MiMC: Efficient encryption and cryptographic hashing with minimal multiplicative complexity

    DEFF Research Database (Denmark)

    Albrecht, Martin; Grassi, Lorenzo; Rechberger, Christian;

    2016-01-01

    We explore cryptographic primitives with low multiplicative complexity. This is motivated by recent progress in practical applications of secure multi-party computation (MPC), fully homomorphic encryption (FHE), and zero-knowledge proofs (ZK) where primitives from symmetric cryptography are needed...... and where linear computations are, compared to non-linear operations, essentially “free”. Starting with the cipher design strategy “LowMC” from Eurocrypt 2015, a number of bitoriented proposals have been put forward, focusing on applications where the multiplicative depth of the circuit describing...... a new attack vector that outperforms others in relevant settings. Due to its very low number of multiplications, the design lends itself well to a large class of applications, especially when the depth does not matter but the total number of multiplications in the circuit dominates all aspects...

  11. Secure Cryptographic Key Management System (CKMS) Considerations for Smart Grid Devices

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, Robert K [ORNL; Sheldon, Frederick T [ORNL; Aldridge, Hal [ORNL; Duren, Mike [Sypris Electronics, LLC; Ricci, Tracy [Sypris Electronics, LLC; Bertino, Elisa [ORNL; Kulatunga, Athula [Purdue University; Navaratne, Uditha Sudheera [Purdue University

    2011-01-01

    In this paper, we examine some unique challenges associated with key management in the Smart Grid and concomitant research initiatives: 1) effectively model security requirements and their implementations, and 2) manage keys and key distribution for very large scale deployments such as Smart Meters over a long period of performance. This will set the stage to: 3) develop innovative, low cost methods to protect keying material, and 4) provide high assurance authentication services. We will present our perspective on key management and will discuss some key issues within the life cycle of a cryptographic key designed to achieve the following: 1) control systems designed, installed, operated, and maintained to survive an intentional cyber assault with no loss of critical function, and 2) widespread implementation of methods for secure communication between remote access devices and control centers that are scalable and cost-effective to deploy.

  12. Efficient Implementation of Electronic Passport Scheme Using Cryptographic Security Along With Multiple Biometrics

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-02-01

    Full Text Available Electronic passports have known a wide and fast deployment all around the world since the International Civil Aviation Organization the world has adopted standards whereby passports can store biometric identifiers. The use of biometrics for identification has the potential to make the lives easier, and the world people live in a safer place. The purpose of biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The paper analyses the face, fingerprint, palm print and iris biometric e-passport design. The paper also provides a cryptographic security analysis of the e-passport using face fingerprint, palm print and iris biometric that are intended to provide improved security in protecting biometric information of the e-passport bearer.

  13. Embedded Platform for Automatic Testing and Optimizing of FPGA Based Cryptographic True Random Number Generators

    Directory of Open Access Journals (Sweden)

    M. Varchola

    2009-12-01

    Full Text Available This paper deals with an evaluation platform for cryptographic True Random Number Generators (TRNGs based on the hardware implementation of statistical tests for FPGAs. It was developed in order to provide an automatic tool that helps to speed up the TRNG design process and can provide new insights on the TRNG behavior as it will be shown on a particular example in the paper. It enables to test sufficient statistical properties of various TRNG designs under various working conditions on the fly. Moreover, the tests are suitable to be embedded into cryptographic hardware products in order to recognize TRNG output of weak quality and thus increase its robustness and reliability. Tests are fully compatible with the FIPS 140 standard and are implemented by the VHDL language as an IP-Core for vendor independent FPGAs. A recent Flash based Actel Fusion FPGA was chosen for preliminary experiments. The Actel version of the tests possesses an interface to the Actel’s CoreMP7 softcore processor that is fully compatible with the industry standard ARM7TDMI. Moreover, identical tests suite was implemented to the Xilinx Virtex 2 and 5 in order to compare the performance of the proposed solution with the performance of already published one based on the same FPGAs. It was achieved 25% and 65% greater clock frequency respectively while consuming almost equal resources of the Xilinx FPGAs. On the top of it, the proposed FIPS 140 architecture is capable of processing one random bit per one clock cycle which results in 311.5 Mbps throughput for Virtex 5 FPGA.

  14. Linux用户空间加/解密API的设计与实现%DESIGN AND IMPLEMENTATION OF LINUX USER-SPACE CRYPTOGRAPHIC API

    Institute of Scientific and Technical Information of China (English)

    李石磊; 闫宏印

    2013-01-01

    Development of the unified Crypto API interface for user-space applications is one of future design goals for Linux kernel developers. In this paper, by taking IPsec VPN gateway agent system as the application model, and using Linux system call interception and loadable kernel module technique, we study the development process and designing method of the system call-based user-space cryptographic API. Meanwhile, by comparison with the Netlink-based API, it is found that this API interface is more flexibility in design and can be customised as well. Taking the application model as the background, this API interface is tested its performance of practical use. Result shows that the use of this system call-based API can improve overall system operation performance and the system stability.%开发标准的用户空间Crypto API接口是Linux内核开发者未来开发目标之一.以IPsec VPN网关代理系统为应用模型,使用动态模块加载机制和系统调用劫持技术,对基于系统调用的用户空间加/解密API的开发流程和设计方法进行研究.通过与基于Netlink用户空间加/解密API进行对比,展示了该API接口的设计灵活性和可定制性.并以应用模型为背景,对该API接口的实际使用性能进行测试.结果表明,使用该API接口,可以提高系统的整体运行效率,也可以提高系统的稳定性.

  15. Dynamic DNS update security, based on cryptographically generated addresses and ID-based cryptography, in an IPv6 autoconfiguration context

    OpenAIRE

    Combes, Jean-Michel; Arfaoui, Ghada; LAURENT, Maryline

    2012-01-01

    International audience; This paper proposes a new security method for protecting signalling for Domain Name System (DNS) architecture. That is, it makes secure DNS update messages for binding a Fully Qualified Domain Name (FQDN) of an IPv6 node and the IPv6 address of the node owning this FQDN. This method is based on the use of Cryptographically Generated Addresses (CGA) and IDBased Cryptography (IBC). Combination of these two techniques allows DNS server to check the ownership of the IPv6 a...

  16. A call center primer.

    Science.gov (United States)

    Durr, W

    1998-01-01

    Call centers are strategically and tactically important to many industries, including the healthcare industry. Call centers play a key role in acquiring and retaining customers. The ability to deliver high-quality and timely customer service without much expense is the basis for the proliferation and expansion of call centers. Call centers are unique blends of people and technology, where performance indicates combining appropriate technology tools with sound management practices built on key operational data. While the technology is fascinating, the people working in call centers and the skill of the management team ultimately make a difference to their companies.

  17. Design and Analysis of Optimization Algorithms to Minimize Cryptographic Processing in BGP Security Protocols.

    Science.gov (United States)

    Sriram, Vinay K; Montgomery, Doug

    2017-07-01

    The Internet is subject to attacks due to vulnerabilities in its routing protocols. One proposed approach to attain greater security is to cryptographically protect network reachability announcements exchanged between Border Gateway Protocol (BGP) routers. This study proposes and evaluates the performance and efficiency of various optimization algorithms for validation of digitally signed BGP updates. In particular, this investigation focuses on the BGPSEC (BGP with SECurity extensions) protocol, currently under consideration for standardization in the Internet Engineering Task Force. We analyze three basic BGPSEC update processing algorithms: Unoptimized, Cache Common Segments (CCS) optimization, and Best Path Only (BPO) optimization. We further propose and study cache management schemes to be used in conjunction with the CCS and BPO algorithms. The performance metrics used in the analyses are: (1) routing table convergence time after BGPSEC peering reset or router reboot events and (2) peak-second signature verification workload. Both analytical modeling and detailed trace-driven simulation were performed. Results show that the BPO algorithm is 330% to 628% faster than the unoptimized algorithm for routing table convergence in a typical Internet core-facing provider edge router.

  18. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures

    Directory of Open Access Journals (Sweden)

    Elyes Ben Hamida

    2015-07-01

    Full Text Available Due to the growing number of vehicles on the roads worldwide, road traffic accidents are currently recognized as a major public safety problem. In this context, connected vehicles are considered as the key enabling technology to improve road safety and to foster the emergence of next generation cooperative intelligent transport systems (ITS. Through the use of wireless communication technologies, the deployment of ITS will enable vehicles to autonomously communicate with other nearby vehicles and roadside infrastructures and will open the door for a wide range of novel road safety and driver assistive applications. However, connecting wireless-enabled vehicles to external entities can make ITS applications vulnerable to various security threats, thus impacting the safety of drivers. This article reviews the current research challenges and opportunities related to the development of secure and safe ITS applications. It first explores the architecture and main characteristics of ITS systems and surveys the key enabling standards and projects. Then, various ITS security threats are analyzed and classified, along with their corresponding cryptographic countermeasures. Finally, a detailed ITS safety application case study is analyzed and evaluated in light of the European ETSI TC ITS standard. An experimental test-bed is presented, and several elliptic curve digital signature algorithms (ECDSA are benchmarked for signing and verifying ITS safety messages. To conclude, lessons learned, open research challenges and opportunities are discussed.

  19. A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems

    Science.gov (United States)

    Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik

    The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.

  20. Evaluation of call options

    Institute of Scientific and Technical Information of China (English)

    陈道平

    2002-01-01

    The European and American call options,for which the prices of their underlying asset follow compound Poisson process,are evaluated by a probability method.Formulas that can be used to evaluate the options are obtained,which include not only the elements of an option:the price of the call option,the exercise price and the expiration date,but also the riskless interest rate,nevertheless exclude the volatility of the underlying asset.In practice,the evaluated results obtained by these formulas can proved references of making strategic decision for an investor who buys the call option and a company who sells the call option.

  1. Callings and Organizational Behavior

    Science.gov (United States)

    Elangovan, A. R.; Pinder, Craig C.; McLean, Murdith

    2010-01-01

    Current literature on careers, social identity and meaning in work tends to understate the multiplicity, historical significance, and nuances of the concept of calling(s). In this article, we trace the evolution of the concept from its religious roots into secular realms and develop a typology of interpretations using occupation and religious…

  2. Dimensioning large call centers

    NARCIS (Netherlands)

    S.C. Borst (Sem); A. Mandelbaum; M.I. Reiman

    2000-01-01

    textabstractWe develop a framework for asymptotic optimization of a queueing system. The motivation is the staffing problem of call centers with 100's of agents (or more). Such a call center is modeled as an M/M/N queue, where the number of agents~$N$ is large. Within our framework, we determine the

  3. Callings and Organizational Behavior

    Science.gov (United States)

    Elangovan, A. R.; Pinder, Craig C.; McLean, Murdith

    2010-01-01

    Current literature on careers, social identity and meaning in work tends to understate the multiplicity, historical significance, and nuances of the concept of calling(s). In this article, we trace the evolution of the concept from its religious roots into secular realms and develop a typology of interpretations using occupation and religious…

  4. Making telephone calls

    Institute of Scientific and Technical Information of China (English)

    任民

    2007-01-01

    @@ 1.常见用语 a.请找某人接电话 Hello!May/Could/Can I speak to…,please? b.问对方是不是某人 Is that…(speaking)? c.问对方是谁 1)Who's speaking(calling)? 2)Who's that(speaking/calling)?

  5. Communication cliques in mobile phone calling networks

    CERN Document Server

    Li, Ming-Xia; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2015-01-01

    People in modern societies form different social networks through numerous means of communication. These communication networks reflect different aspects of human's societal structure. The billing records of calls among mobile phone users enable us to construct a directed calling network (DCN) and its Bonferroni network (SVDCN) in which the preferential communications are statistically validated. Here we perform a comparative investigation of the cliques of the original DCN and its SVDCN constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that the statistical properties of the cliques of the two calling networks are qualitatively similar and the clique members in the DCN and the SVDCN exhibit idiosyncratic behaviors quantitatively. Members in large cliques are found to be spatially close to each other. Based on the clique degree profile of each mobile phone user, the most active users in the two calling networks can be classified in to seve...

  6. A Telephone Call

    Institute of Scientific and Technical Information of China (English)

    王晓兰

    2004-01-01

    At about two o'clock on a cold winter morning, a doctor drove seven miles in answer to a telephone call. On his coming the man who had called him in said, “Doctor, I don't have a sore throat, I don't cough.I have no pain either in the side or in the back, I'm not running a temperature, but still I feel that death is near.”

  7. Protocol based on compressed sensing for high-speed authentication and cryptographic key distribution over a multiparty optical network

    CERN Document Server

    Yu, Wen-Kai; Yao, Xu-Ri; Liu, Xue-Feng; Wu, Ling-An; Zhai, Guang-Jie

    2013-01-01

    We present a protocol for the amplification and distribution of a one-time-pad cryptographic key over a point-to-multipoint optical network based on computational ghost imaging (GI) and compressed sensing (CS). It is shown experimentally that CS imaging can perform faster authentication and increase the key generation rate by an order of magnitude compared with the scheme using computational GI alone. The protocol is applicable for any number of legitimate user, thus, the scheme could be used in real intercity networks where high speed and high security are crucial.

  8. 电子选举中的安全协议%Cryptographic Protocols for Electronic Voting

    Institute of Scientific and Technical Information of China (English)

    孟江涛; 冯登国; 胡振宇

    2002-01-01

    Electronic Voting has begun to move into the mainstream, with small online votes taking place on the Internet. Electronic Voting investigates how to conduct large-scale electronic Voting securely including various modes of voting. In this paper we will discuss the characteristics of a good Electronic Voting system and explore cryptographic Protocols that can be used to build actual implementations with these characteristics. We mainly study the Electronic Voting protocols as opposed to the Electronic Voting systems. We propose some new taxonomy of the security protocols proposed for Electronic Voting procedures and examine their advantages and shortcomings. The goal of the paper is to impose some order into the multitude of Electronic Voting mechanisms that would lead to a better understanding of challenges in the Electronic Voting field. In the end, we give some advices on Electronic Voting system design.%随着因特网上出现的一些小范围的电子选举,电子选举开始引起人们的关注.而电子选举中的关键技术之一是电子选举协议的设计,特别是在多种投票方式下大规模电子选举协议的安全性问题.讨论了优秀的电子投票系统应该具备的特点,及如何通过密码协议来实现这些特点;对电子选举协议提出了新的分类方法,并考察了其优缺点;并对已有的许多电子选举协议进行了分类整理,有助于人们更好地理解这一领域内所面临的挑战和问题;同时对电子选举系统的设计也给出了一些建议.

  9. Enhanced nurse call systems.

    Science.gov (United States)

    2001-04-01

    This Evaluation focuses on high-end computerized nurse call systems--what we call enhanced systems. These are highly flexible systems that incorporate microprocessor and communications technologies to expand the capabilities of the nurse call function. Enhanced systems, which vary in configuration from one installation to the next, typically consist of a basic system that provides standard nurse call functionality and a combination of additional enhancements that provide the added functionality the facility desires. In this study, we examine the features that distinguish enhanced nurse call systems from nonenhanced systems, focusing on their application and benefit to healthcare facilities. We evaluated seven systems to determine how well they help (1) improve patient care, as well as increase satisfaction with the care provided, and (2) improve caregiver efficiency, as well as increase satisfaction with the work environment. We found that all systems meet these objectives, but not all systems perform equally well for all implementations. Our ratings will help facilities identify those systems that offer the most effective features for their intended use. The study also includes a Technology Management Guide to help readers (1) determine whether they'll benefit from the capabilities offered by enhanced systems and (2) target a system for purchase and equip the system for optimum performance and cost-effective operation.

  10. Assessing call centers’ success:

    Directory of Open Access Journals (Sweden)

    Hesham A. Baraka

    2013-07-01

    This paper introduces a model to evaluate the performance of call centers based on the Delone and McLean Information Systems success model. A number of indicators are identified to track the call center’s performance. Mapping of the proposed indicators to the six dimensions of the D&M model is presented. A Weighted Call Center Performance Index is proposed to assess the call center performance; the index is used to analyze the effect of the identified indicators. Policy-Weighted approach was used to assume the weights with an analysis of different weights for each dimension. The analysis of the different weights cases gave priority to the User satisfaction and net Benefits dimension as the two outcomes from the system. For the input dimensions, higher priority was given to the system quality and the service quality dimension. Call centers decision makers can use the tool to tune the different weights in order to reach the objectives set by the organization. Multiple linear regression analysis was used in order to provide a linear formula for the User Satisfaction dimension and the Net Benefits dimension in order to be able to forecast the values for these two dimensions as function of the other dimensions

  11. Call Center Capacity Planning

    DEFF Research Database (Denmark)

    Nielsen, Thomas Bang

    in modern call centers allows for a high level of customization, but also induces complicated operational processes. The size of the industry together with the complex and labor intensive nature of large call centers motivates the research carried out to understand the underlying processes. The customizable...... groups are further analyzed. The design of the overflow policies is optimized using Markov Decision Processes and a gain with regard to service levels is obtained. Also, the fixed threshold policy is investigated and found to be appropriate when one class is given high priority and when it is desired...

  12. CALLING AQUARIUM LOVERS...

    CERN Multimedia

    2002-01-01

    CERN's anemones will soon be orphans. We are looking for someone willing to look after the aquarium in the main building, for one year. If you are interested, or if you would like more information, please call 73830. (The anemones living in the aquarium thank you in anticipation.)

  13. A call for surveys

    DEFF Research Database (Denmark)

    Bernstein, Philip A.; Jensen, Christian S.; Tan, Kian-Lee

    2012-01-01

    The database field is experiencing an increasing need for survey papers. We call on more researchers to set aside time for this important writing activity. The database field is growing in population, scope of topics covered, and the number of papers published. Each year, thousands of new papers...

  14. A call for surveys

    DEFF Research Database (Denmark)

    Bernstein, Philip A.; Jensen, Christian S.; Tan, Kian-Lee

    2012-01-01

    The database field is experiencing an increasing need for survey papers. We call on more researchers to set aside time for this important writing activity. The database field is growing in population, scope of topics covered, and the number of papers published. Each year, thousands of new papers ...

  15. CONSTRUCCIÓN DE UNA RED INSTITUCIONAL DE APOYO PARA LA POBLACIÓN HABITANTE DE LA CALLE: TEJIENDO REDES Construction of an institutional network for homeless support: weaving networks

    OpenAIRE

    Zulma Giraldo Rátiva; Consuelo Loaiza Rojas; Claudia Téllez Reina; Olga Luz Peñas Felizzola

    2007-01-01

    Antecedentes. La problemática de la habitancia en calle es un factor que se incrementa diariamente como efecto de situaciones de tipo socioeconómico, político e ideológico. Los antecedentes investigativos demuestran que el abordaje desde la terapia ocupacional y otras disciplinas en cuanto a la habitancia en calle, redes sociales e inclusión social a la luz de los derechos humanos no ha sido ampliamente desarrollados por lo que se hace necesario profundizar esta temática. Objetivos. Abordar l...

  16. Flight calls and orientation

    DEFF Research Database (Denmark)

    Larsen, Ole Næsbye; Andersen, Bent Bach; Kropp, Wibke

    2008-01-01

    flight calls was simulated by sequential computer controlled activation of five loudspeakers placed in a linear array perpendicular to the bird's migration course. The bird responded to this stimulation by changing its migratory course in the direction of that of the ‘flying conspecifics' but after about......  In a pilot experiment a European Robin, Erithacus rubecula, expressing migratory restlessness with a stable orientation, was video filmed in the dark with an infrared camera and its directional migratory activity was recorded. The flight overhead of migrating conspecifics uttering nocturnal...... 30 minutes it drifted back to its original migration course. The results suggest that songbirds migrating alone at night can use the flight calls from conspecifics as additional cues for orientation and that they may compare this information with other cues to decide what course to keep....

  17. Calling Dunbar's Numbers

    CERN Document Server

    MacCarron, Pádraig; Dunbar, Robin

    2016-01-01

    The social brain hypothesis predicts that humans have an average of about 150 relationships at any given time. Within this 150, there are layers of friends of an ego, where the number of friends in a layer increases as the emotional closeness decreases. Here we analyse a mobile phone dataset, firstly, to ascertain whether layers of friends can be identified based on call frequency. We then apply different clustering algorithms to break the call frequency of egos into clusters and compare the number of alters in each cluster with the layer size predicted by the social brain hypothesis. In this dataset we find strong evidence for the existence of a layered structure. The clustering yields results that match well with previous studies for the innermost and outermost layers, but for layers in between we observe large variability.

  18. Flight calls and orientation

    DEFF Research Database (Denmark)

    Larsen, Ole Næsbye; Andersen, Bent Bach; Kropp, Wibke

    2008-01-01

      In a pilot experiment a European Robin, Erithacus rubecula, expressing migratory restlessness with a stable orientation, was video filmed in the dark with an infrared camera and its directional migratory activity was recorded. The flight overhead of migrating conspecifics uttering nocturnal...... flight calls was simulated by sequential computer controlled activation of five loudspeakers placed in a linear array perpendicular to the bird's migration course. The bird responded to this stimulation by changing its migratory course in the direction of that of the ‘flying conspecifics' but after about...... 30 minutes it drifted back to its original migration course. The results suggest that songbirds migrating alone at night can use the flight calls from conspecifics as additional cues for orientation and that they may compare this information with other cues to decide what course to keep....

  19. Centralized Cryptographic Key Management and Critical Risk Assessment - CRADA Final Report For CRADA Number NFE-11-03562

    Energy Technology Data Exchange (ETDEWEB)

    Abercrombie, R. K. [ORNL; Peters, Scott [Sypris Electronics, LLC

    2014-05-28

    The Department of Energy Office of Electricity Delivery and Energy Reliability (DOE-OE) Cyber Security for Energy Delivery Systems (CSEDS) industry led program (DE-FOA-0000359) entitled "Innovation for Increasing Cyber Security for Energy Delivery Systems (12CSEDS)," awarded a contract to Sypris Electronics LLC to develop a Cryptographic Key Management System for the smart grid (Scalable Key Management Solutions for Critical Infrastructure Protection). Oak Ridge National Laboratory (ORNL) and Sypris Electronics, LLC as a result of that award entered into a CRADA (NFE-11-03562) between ORNL and Sypris Electronics, LLC. ORNL provided its Cyber Security Econometrics System (CSES) as a tool to be modified and used as a metric to address risks and vulnerabilities in the management of cryptographic keys within the Advanced Metering Infrastructure (AMI) domain of the electric sector. ORNL concentrated our analysis on the AMI domain of which the National Electric Sector Cyber security Organization Resource (NESCOR) Working Group 1 (WG1) has documented 29 failure scenarios. The computational infrastructure of this metric involves system stakeholders, security requirements, system components and security threats. To compute this metric, we estimated the stakes that each stakeholder associates with each security requirement, as well as stochastic matrices that represent the probability of a threat to cause a component failure and the probability of a component failure to cause a security requirement violation. We applied this model to estimate the security of the AMI, by leveraging the recently established National Institute of Standards and Technology Interagency Report (NISTIR) 7628 guidelines for smart grid security and the International Electrotechnical Commission (IEC) 63351, Part 9 to identify the life cycle for cryptographic key management, resulting in a vector that assigned to each stakeholder an estimate of their average loss in terms of dollars per day of system

  20. How Dolphins Call

    Institute of Scientific and Technical Information of China (English)

    马加芬

    2007-01-01

    <正>与人类一样,海豚能通过声音相互称呼"名字"。A high-pitched"wee-o-wee-o-wee-o-wee"whistle might not soundlike much to you,but it6s exactly how a dolphin might introduce itself.Because sight is limited in the ocean,dolphins create individual"name"calls to communicate their whereabouts to friends and families.But it6snot as simple as just recognizing a voice,

  1. Heed the Calls

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    @@ THE bombing of Libya by some of the world's major powers, including France, the United States and Britain brought a new dimension to the protests that have washed over North Africa and the Middle East in the past months.Following the UN Security Council passing the imposition of a no-fly zone over Libyan air-space, a move supported by Nigeria, South Africa and Gabon, air and sea strikes pounded Muammar Gadhafi's strongholds.The AU called for an immediate stop to hostilities on both sides.

  2. Heed the Calls

    Institute of Scientific and Technical Information of China (English)

    2011-01-01

    THE bombing of Libya by some of the world’s major powers,including France, the United States and Britain brought a new dimension to the protests that have washed over North Africa and the Middle East in the past months.Following the UN Security Council passing the imposition of a no-fly zone over Libyan air-space,a move supported by Nigeria,South Africa and Gabon,air and sea strikes pounded Muammar Gadhafi’s strongholds.The AU called for an immediate stop to hostilities

  3. Emergency Call Reform

    Institute of Scientific and Technical Information of China (English)

    2006-01-01

    China merges several hotline call services in an effort to streamline the urban emergency system Chances are that if you find yourself in a crisis situation in China, dialing the correct emergency number could be a problem. Not because there isn't one, but quite the opposite. China has four main emergency response numbers-110 summons police help in a life-threatening situation, 119 brings out firefighters, 122 gets police activated to sort out traffic accidents and 120 ensures medical help. Along with th...

  4. 设计密码协议的若干原则与方法%SEVERAL PRINCIPLES AND METHODS FOR DESIGNING CRYPTOGRAPHIC PROTOCOLS

    Institute of Scientific and Technical Information of China (English)

    赵华伟; 刘月

    2011-01-01

    传统的密码协议设计主要考虑理想环境下运行的安全性.为了设计实用安全的密码协议,首先对理想环境下密码协议中存在的主要攻击进行研究和总结,提出四条协议设计原则,以避免常见的设计缺陷;然后通过对消息完整性的研究,提出一种协议转换算法,可将理想环境下安全的密码协议转换为现实环境下安全的密码协议,并证明算法的安全性.该转换算法的提出,有助于设计在现实环境下运行安全的密码协议.%Traditional cryptographic protocol design focuses mainly on the security issue in a perfect environment. In order to design practical and secure cryptographic protocols, at first the primary attacks upon cryptographic protocols in a perfect environment is studied and summarized, so that four principles for protocol design is proposed in order to avoid common design defects; next, through studying message integrity, a protocol transformation algorithm is proposed which can turn secure cryptographic protocols in a perfect environment into ones in a real environment; the security of the algorithm is validated. The proposal of the transformation algorithm is helpful to design a secure cryptographic protocol to operate in a real environment.

  5. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)

    CERN Document Server

    Rehman, Sadaqat Ur; Ahmad, Basharat; Yahya, Khawaja Muhammad; Ullah, Anees; Rehman, Obaid Ur

    2012-01-01

    Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography. Furthermore, it compares different encryption techniques such as stream cipher (RC4), block cipher (RC2, RC5, RC6 etc) and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc). The result of our work provides efficient techniques for communicating device, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC.

  6. Comparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC in Wireless Sensor Networks (WSN

    Directory of Open Access Journals (Sweden)

    Sadaqat Ur Rehman

    2012-01-01

    Full Text Available Wireless Sensor Networks (WSN are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC and need to choose a technique which is feasible for sensor networks. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymmetric key cryptography, furthermore it compares different encryption techniques such as stream cipher (RC4, block cipher (RC2, RC5, RC6 etc and hashing techniques (MD2, MD4, MD5, SHA, SHA1 etc. The result of our work provides efficient techniques for communicator, by selecting different comparison matrices i.e. energy consumption, processing time, memory and expenses that satisfies both the security and restricted resources in WSN environment to create MAC

  7. An Island Called Cuba

    Directory of Open Access Journals (Sweden)

    Jean Stubbs

    2011-06-01

    Full Text Available Review of: An Island Called Home: Returning to Jewish Cuba. Ruth Behar, photographs by Humberto Mayol. New Brunswick NJ: Rutgers University Press, 2007. xiii + 297 pp. (Cloth US$ 29.95 Fidel Castro: My Life: A Spoken Autobiography. Fidel Castro & Ignacio Ramonet. New York: Scribner/Simon & Schuster, 2008. vii + 724 pp. (Paper US$ 22.00, e-book US$ 14.99 Cuba: What Everyone Needs to Know. Julia E. Sweig. New York: Oxford University Press, 2009. xiv + 279 pp. (Paper US$ 16.95 [First paragraph] These three ostensibly very different books tell a compelling story of each author’s approach, as much as the subject matter itself. Fidel Castro: My Life: A Spoken Autobiography is based on a series of long interviews granted by the then-president of Cuba, Fidel Castro, to Spanish-Franco journalist Ignacio Ramonet. Cuba: What Everyone Needs to Know, by U.S. political analyst Julia Sweig, is one of a set country series, and, like Ramonet’s, presented in question/answer format. An Island Called Home: Returning to Jewish Cuba, with a narrative by Cuban-American anthropologist Ruth Behar and photographs by Cuban photographer Humberto Mayol, is a retrospective/introspective account of the Jewish presence in Cuba. While from Ramonet and Sweig we learn much about the revolutionary project, Behar and Mayol convey the lived experience of the small Jewish community against that backdrop.

  8. Too close to call

    DEFF Research Database (Denmark)

    Kurrild-Klitgaard, Peter

    2012-01-01

    The note briefly outlines a new model for the explanation of US presidential elections, founded on (a) recent economic growth and (b) a measure of what may be called “’the cost of ruling”. The former is based in changes in real disposable income for the period following a mid-term election, while...... the latter combines factors of incumbency and terms-in-office. The model is applied to data from the US presidential elections 1932-2008 and has considerable explanatory power for the variation in the incumbent party’s candidate’s share of the two-party vote (R2=0.74). The model is controlled against...... a number of other frequent explanations and is found to be quite robust. When augmented with approval ratings for incumbent presidents, the explanatory power increases to 83 pct. and only incorrectly calls one of the last 15 US presidential elections. Applied to the 2012 election as a forecasting model...

  9. MEDICAL SERVICE - URGENT CALLS

    CERN Multimedia

    Service Médical

    2000-01-01

    IN URGENT NEED OF A DOCTOR GENEVA: EMERGENCY SERVICES GENEVA AND VAUD 144 FIRE BRIGADE 118 POLICE 117 CERN FIREMEN 767-44-44 ANTI-POISONS CENTRE Open 24h/24h 01-251-51-51 Patient not fit to be moved, call family doctor, or: GP AT HOME: Open 24h/24h 748-49-50 AMG- Association Of Geneva Doctors: Emergency Doctors at home 07h-23h 322 20 20 Patient fit to be moved: HOPITAL CANTONAL CENTRAL 24 Micheli-du-Crest 372-33-11 ou 382-33-11 EMERGENCIES 382-33-11 ou 372-33-11 CHILDREN'S HOSPITAL 6 rue Willy-Donzé 372-33-11 MATERNITY 32 bvd.de la Cluse 382-68-16 ou 382-33-11 OPHTHALMOLOGY 22 Alcide Jentzer 382-33-11 ou 372-33-11 MEDICAL CENTRE CORNAVIN 1-3 rue du Jura 345 45 50 HOPITAL DE LA TOUR Meyrin 719-61-11 EMERGENCIES 719-61-11 CHILDREN'S EMERGENCIES 719-61-00 LA TOUR MEDICAL CENTRE 719-74-00 European Emergency Call 112   FRANCE: EMERGENCY SERVICES 15 FIRE BRIGADE 18 POLICE 17 CERN FIREMEN AT HOME 00-41-22-767-44-44 ...

  10. Call for volunteers

    CERN Multimedia

    2008-01-01

    CERN is calling for volunteers from all members of the Laboratory for organizing the two exceptional Open days.CERN is calling for volunteers from all members of the Laboratory’s personnel to help with the organisation of these two exceptional Open Days, for the visits of CERN personnel and their families on the Saturday and above all for the major public Open Day on the Sunday. As for the 50th anniversary in 2004, the success of the Open Days will depend on a large number of volunteers. All those working for CERN as well as retired members of the personnel can contribute to making this event a success. Many guides will be needed at the LHC points, for the activities at the surface and to man the reception and information points. The aim of these major Open Days is to give the local populations the opportunity to discover the fruits of almost 20 years of work carried out at CERN. We are hoping for some 2000 volunteers for the two Open Days, on the Saturday from 9 a.m. to ...

  11. CONSTRUCCIÓN DE UNA RED INSTITUCIONAL DE APOYO PARA LA POBLACIÓN HABITANTE DE LA CALLE: TEJIENDO REDES Construction of an institutional network for homeless support: weaving networks

    Directory of Open Access Journals (Sweden)

    Zulma Giraldo Rátiva

    2007-06-01

    Full Text Available Antecedentes. La problemática de la habitancia en calle es un factor que se incrementa diariamente como efecto de situaciones de tipo socioeconómico, político e ideológico. Los antecedentes investigativos demuestran que el abordaje desde la terapia ocupacional y otras disciplinas en cuanto a la habitancia en calle, redes sociales e inclusión social a la luz de los derechos humanos no ha sido ampliamente desarrollados por lo que se hace necesario profundizar esta temática. Objetivos. Abordar la problemática de la habitancia en calle a la luz del modelo de los derechos humanos y la relevancia de las redes institucionales en el proceso de inclusión social de esta población. Fortalecer una red de apoyo institucional ofreciendo una opción de participación social para el habitante y ex-habitante de calle. Material y métodos. Esta investigación aborda a la población habitante y ex-habitante de calle en Bogotá. Las instituciones partícipes de este proceso de fortalecimiento de la red se encuentran ubicadas dentro de Bogotá. Resultados. De las 43 instituciones detectadas, 29 brindaron información, siendo 14 instituciones a las que no se pudo tener acceso, por motivos como: cambio de residencia, números telefónicos incorrectos y ausencia del personal encargado que suministrara información. Conclusión. Dentro de las instituciones detectadas existen diferentes niveles de atención para la población infantil y adulta habitante y ex-habitante de calle , (prevención, promoción, rehabilitación además de acompañamiento y seguimiento por dichas instituciones dentro del sector público y privado.Antecedents. The problematic of homeless a factor that is increased daily as effect of socioeconomic, political and ideological circumstances. The antecedents demonstrate that the boarding from occupational therapy and other social disciplines as far as the homeless, networks and social inclusion to the light of the human rights widely has not

  12. Communication cliques in mobile phone calling networks

    Science.gov (United States)

    Li, Ming-Xia; Xie, Wen-Jie; Jiang, Zhi-Qiang; Zhou, Wei-Xing

    2015-11-01

    People in modern societies form different social networks through numerous means of communication. These communication networks reflect different aspects of human's societal structure. The billing records of calls among mobile phone users enable us to construct a directed calling network (DCN) and its Bonferroni network (SVDCN) in which the preferential communications are statistically validated. Here we perform a comparative investigation of the cliques of the original DCN and its SVDCN constructed from the calling records of more than nine million individuals in Shanghai over a period of 110 days. We find that the statistical properties of the cliques of the two calling networks are qualitatively similar and the clique members in the DCN and the SVDCN exhibit idiosyncratic behaviors quantitatively. Members in large cliques are found to be spatially close to each other. Based on the clique degree profile of each mobile phone user, the most active users in the two calling networks can be classified in to several groups. The users in different groups are found to have different calling behaviors. Our study unveils interesting communication behaviors among mobile phone users that are densely connected to each other.

  13. 以点名为契机构建良好的高校师生关系%Good Relationship Construction between Teachers and Students through Call-over

    Institute of Scientific and Technical Information of China (English)

    赵洪霞

    2016-01-01

    Call-over is not only an important tool to maintain class order, but a way to establish great relationship between students and teachers. In recent years, the relation between teachers and students becomes more and more indifferent. Under this situation, the article believes that through call-over, teachers should connect the students’ names and appearances, and understand students’ characteristics, interests, studying styles to build a better teacher-student relationship.%点名既是维持课堂秩序、保障有序教学的重要手段,也是建立良好师生关系的重要途径。在高校师生关系存在着淡漠化倾向的当下,文章从常见的点名方式出发,提出有效的点名应是真正把学生的名和脸结合起来,了解学生的性格、兴趣、学习风格等,为构建良好的师生关系服务。

  14. Too close to call

    DEFF Research Database (Denmark)

    Kurrild-Klitgaard, Peter

    2012-01-01

    The note briefly outlines a new model for the explanation of US presidential elections, founded on (a) recent economic growth and (b) a measure of what may be called “’the cost of ruling”. The former is based in changes in real disposable income for the period following a mid-term election, while...... the latter combines factors of incumbency and terms-in-office. The model is applied to data from the US presidential elections 1932-2008 and has considerable explanatory power for the variation in the incumbent party’s candidate’s share of the two-party vote (R2=0.74). The model is controlled against...

  15. Advertisement calls of Bolivian species of Scinax (Amphibia, Anura, Hylidae)

    OpenAIRE

    Riva, de la, Ignacio; Márquez, Rafael; Bosch, Jaime

    1994-01-01

    The advertisement calls of eight Bolivian species of Scinax are described including information on the calling behaviour of each species. A characteristic audiospectrogram and oscillogram are presented for each species, as well as numerical information about the spectral and temporal features of the calls. Two phenograms based on the characteristics of the mating calls are constructed, the first one using a traditional multivariate technique (UPGMA) and the second one using audiospectrogram c...

  16. Attack on and Improvement of the Running Mode of the Two-Party Cryptographic Protocols%对两个双方密码协议运行模式的攻击及改进

    Institute of Scientific and Technical Information of China (English)

    姬东耀; 冯登国

    2003-01-01

    In this paper,the running modes of the two-party cryptographic protocols are used to analyze the two authentication and key agreenment protocols,and attack on the protocols is discovered. Finally,two improved protocols are given.

  17. Development of Electronic Passport Scheme for Cryptographic Security and Face, Fingerprint Biometrics using ASP.Net

    Directory of Open Access Journals (Sweden)

    V.K. NARENDIRA KUMAR

    2012-02-01

    Full Text Available Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics face and fingerprints. The privacy and security implications of this impending worldwide experiment in biometrics face and fingerprints authentication technology. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and face and fingerprint biometric passport using ASP.Net.

  18. Partition Decomposition for Roll Call Data

    CERN Document Server

    Leibon, Greg; Rockmore, Daniel N; Savell, Robert

    2011-01-01

    In this paper we bring to bear some new tools from statistical learning on the analysis of roll call data. We present a new data-driven model for roll call voting that is geometric in nature. We construct the model by adapting the "Partition Decoupling Method," an unsupervised learning technique originally developed for the analysis of families of time series, to produce a multiscale geometric description of a weighted network associated to a set of roll call votes. Central to this approach is the quantitative notion of a "motivation," a cluster-based and learned basis element that serves as a building block in the representation of roll call data. Motivations enable the formulation of a quantitative description of ideology and their data-dependent nature makes possible a quantitative analysis of the evolution of ideological factors. This approach is generally applicable to roll call data and we apply it in particular to the historical roll call voting of the U.S. House and Senate. This methodology provides a...

  19. Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications.

    Science.gov (United States)

    Gangadari, Bhoopal Rao; Rafi Ahamed, Shaik

    2016-09-01

    In biomedical, data security is the most expensive resource for wireless body area network applications. Cryptographic algorithms are used in order to protect the information against unauthorised access. Advanced encryption standard (AES) cryptographic algorithm plays a vital role in telemedicine applications. The authors propose a novel approach for design of substitution bytes (S-Box) using second-order reversible one-dimensional cellular automata (RCA(2)) as a replacement to the classical look-up-table (LUT) based S-Box used in AES algorithm. The performance of proposed RCA(2) based S-Box and conventional LUT based S-Box is evaluated in terms of security using the cryptographic properties such as the nonlinearity, correlation immunity bias, strict avalanche criteria and entropy. Moreover, it is also shown that RCA(2) based S-Boxes are dynamic in nature, invertible and provide high level of security. Further, it is also found that the RCA(2) based S-Box have comparatively better performance than that of conventional LUT based S-Box.

  20. A chaos-based approach to the design of cryptographically secure substitutions

    Energy Technology Data Exchange (ETDEWEB)

    Amigo, Jose M. [Centro de Investigacion Operativa, Universidad Miguel Hernandez, 03202 Elche (Spain)]. E-mail: jm.amigo@umh.es; Szczepanski, Janusz [Institute of Fundamental Technological Research, Polish Academy of Sciences, Swietokrzyska 21, PL-00-049 Warsaw (Poland); Kocarev, Ljupco [Institute for Nonlinear Science, University of California, San Diego. 9500 Gilman Drive, La Jolla, CA 92093-0402 (United States)

    2005-08-01

    We show that chaotic maps may be used for designing so-called substitution boxes for ciphers resistant to linear and differential cryptanalysis, providing an alternative to the algebraic methods. Our approach is based on the approximation of mixing maps by periodic transformations. The expectation behind is, of course, that the nice chaotic properties of such maps will be inherited by their approximations, at least if the convergence rate is appropriate and the associated partitions are sufficiently fine. We show that this is indeed the case and that, in principle, substitutions with close-to-optimal immunity to linear and differential cryptanalysis can be designed along these guidelines. We provide also practical examples and numerical evidence for this approximation philosophy.

  1. Security Mechanisms and Access Control Infrastructure for Biometrics Passport using Cryptographic Protocols

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2013-09-01

    Full Text Available Electronic passports (e-passports are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris. A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

  2. Next Generation Electronic Passport Scheme using Cryptographic Authentication Protocols and Multiple Biometrics Technology

    Directory of Open Access Journals (Sweden)

    V.K. Narendira Kumar

    2013-08-01

    Full Text Available Electronic passports (e-passports are to prevent the illegal entry of traveller into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The epassport, as it is sometimes called, represents a bold initiative in the deployment of two new technologies: cryptography security and biometrics (face, fingerprints, palm prints and iris. A passport contains the important personal information of holder such as photo, name, date of birth and place, nationality, date of issue, date of expiry, authority and so on. The goal of the adoption of the electronic passport is not only to expedite processing at border crossings, but also to increase security. The paper explores the privacy and security implications of this impending worldwide experiment in biometrics authentication technology.

  3. Call Centre- Computer Telephone Integration

    Directory of Open Access Journals (Sweden)

    Dražen Kovačević

    2012-10-01

    Full Text Available Call centre largely came into being as a result of consumerneeds converging with enabling technology- and by the companiesrecognising the revenue opportunities generated by meetingthose needs thereby increasing customer satisfaction. Regardlessof the specific application or activity of a Call centre, customersatisfaction with the interaction is critical to the revenuegenerated or protected by the Call centre. Physical(v, Call centreset up is a place that includes computer, telephone and supervisorstation. Call centre can be available 24 hours a day - whenthe customer wants to make a purchase, needs information, orsimply wishes to register a complaint.

  4. Computing the Characteristic Polynomials of a Class of Hyperelliptic Curves for Cryptographic Applications

    Directory of Open Access Journals (Sweden)

    Lin You

    2011-01-01

    the zeta functions or the characteristic polynomials of the related hyperelliptic curves. For the hyperelliptic curve Cq: v2=up+au+b over the field Fq with q being a power of an odd prime p, Duursma and Sakurai obtained its characteristic polynomial for q=p, a=−1, and b∈Fp. In this paper, we determine the characteristic polynomials of Cq over the finite field Fpn for n=1, 2 and a, b∈Fpn. We also give some computational data which show that many of those curves have large prime factors in their Jacobian group orders, which are both practical and vital for the constructions of efficient and secure hyperelliptic curve cryptosystems.

  5. Pre-Mrna Introns as a Model for Cryptographic Algorithm:. Theory and Experiments

    Science.gov (United States)

    Regoli, Massimo

    2010-01-01

    The RNA-Crypto System (shortly RCS) is a symmetric key algorithm to cipher data. The idea for this new algorithm starts from the observation of nature. In particular from the observation of RNA behavior and some of its properties. In particular the RNA sequences have some sections called Introns. Introns, derived from the term "intragenic regions", are non-coding sections of precursor mRNA (pre-mRNA) or other RNAs, that are removed (spliced out of the RNA) before the mature RNA is formed. Once the introns have been spliced out of a pre-mRNA, the resulting mRNA sequence is ready to be translated into a protein. The corresponding parts of a gene are known as introns as well. The nature and the role of Introns in the pre-mRNA is not clear and it is under ponderous researches by Biologists but, in our case, we will use the presence of Introns in the RNA-Crypto System output as a strong method to add chaotic non coding information and an unnecessary behaviour in the access to the secret key to code the messages. In the RNA-Crypto System algorithm the introns are sections of the ciphered message with non-coding information as well as in the precursor mRNA.

  6. An update on the side channel cryptanalysis of MACs based on cryptographic hash functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Okeya, Katsuyuki

    2007-01-01

    into consideration. Next, we propose new hybrid NMAC/HMAC schemes for security against side channel attacks assuming that their underlying block cipher is ideal. We then show that M-NMAC, MDx-MAC and a variant of the envelope MAC scheme based on DM with an ideal block cipher are secure against DPA attacks.......Okeya has established that HMAC/NMAC implementations based on only Matyas-Meyer-Oseas (MMO) PGV scheme and his two refined PGV schemes are secure against side channel DPA attacks when the block cipher in these constructions is secure against these attacks. The significant result of Okeya's analysis...... is that the implementations of HMAC/NMAC with the Davies-Meyer (DM) compression function based hash functions such as MD5 and SHA-1 are vulnerable to side channel attacks. In this paper, first we show a partial key recovery attack on NMAC/HMAC based on Okeya's two refined PGV schemes by taking practical constraints...

  7. Algebraic Construction for Zero-Knowledge Sets

    Institute of Scientific and Technical Information of China (English)

    Rui Xue; Ning-Hui Li; Jiang-Tao Li

    2008-01-01

    Zero knowledge sets is a new cryptographic primitive introduced by Micali, Rabin, and Kilian in FOCS 2003. It has been intensively studied recently. However all the existing ZKS schemes follow the basic structure by Micali et al. That is, the schemes employ the Merkle tree as a basic structure and mercurial commitments as the commitment units to nodes of the tree. The proof for any query consists of an authentication chain. We propose in this paper a new algebraic scheme that is completely different from all the existing schemes. Our new scheme is computationally secure under the standard strong RSA assumption. Neither mercurial commitments nor tree structure is used in the new construction. In fact, the prover in our construction commits the desired set without any trapdoor information, which is another key important difference from the previous approaches.

  8. Teaching design discussion of trivium cryptographic algorithm%Trivium密码算法的教学设计探讨

    Institute of Scientific and Technical Information of China (English)

    韦永壮; 张润莲

    2012-01-01

      Trivium cipher algorithm is ultimately one of the selected algorithm of the European Stream Cipher Scheme ( eSTREAM ). Because of its following characteristic such as simple, graceful, fast software and hardware, security and so on, in academia and industry,it was widely payed attention to. According to existed actual problems of Trivium cryptographic algorithm in the teaching and the characteristics of the students in senior information profession, the structure of Trivium algorithm analyzed, the teaching design were put forward from the view of Boolean function, valuable teaching ideas were provided for peer.%  Trivium密码算法是欧洲流密码计划(eSTREAM)的最终入选算法之一。由于其结构简洁、优美、软硬件实现快速、安全性好等特点,倍受学术界和工业界的广泛关注。针对Trivium密码算法实际教学中存在的问题及信息专业高年级学生的特点,分析了Trivium算法的结构,提出从布尔函数的角度来进行教学设计,包括算法部件分析、加解密过程、性能及安全性等环节,为同行提供有价值的教学思路。

  9. Efficient Approximate JavaScript Call Graph Construction

    NARCIS (Netherlands)

    Benschop, S.

    2014-01-01

    JavaScript has seen an increase in popularity in the last few years, both in the browser as well as on other platforms such as Node.js. However, the tools to help developers reason about JavaScript code remain fairly barebone in comparison with tooling for static languages such as Java. These tools

  10. Application of Affect to CALL

    Institute of Scientific and Technical Information of China (English)

    李露

    2006-01-01

    This essay mainly attempts to discuss some affective factors in CALL, with focus on affective influence on English (foreign language) learning and thus concludes that in the process of CALL related affect should be activated and made good use of to better foreign language teaching and learning.

  11. The difficult medical emergency call

    DEFF Research Database (Denmark)

    Møller, Thea Palsgaard; Kjærulff, Thora Majlund; Viereck, Søren

    2017-01-01

    BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories and the ......BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories...... and the effect of categorization on mortality. METHODS: Register-based study in a 2-year period based on emergency call data from the emergency medical dispatch center in Copenhagen combined with nationwide register data. Logistic regression analysis (N = 78,040 individuals) was used for identification...

  12. The difficult medical emergency call

    DEFF Research Database (Denmark)

    Møller, Thea Palsgaard; Kjærulff, Thora Majlund; Viereck, Søren

    2017-01-01

    BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories and the ......BACKGROUND: Pre-hospital emergency care requires proper categorization of emergency calls and assessment of emergency priority levels by the medical dispatchers. We investigated predictors for emergency call categorization as "unclear problem" in contrast to "symptom-specific" categories...... and the effect of categorization on mortality. METHODS: Register-based study in a 2-year period based on emergency call data from the emergency medical dispatch center in Copenhagen combined with nationwide register data. Logistic regression analysis (N = 78,040 individuals) was used for identification...

  13. Time-Dependent Cryptographic Protocol Logic and Its Formal Semantics%时间相关密码协议逻辑及其形式化语义

    Institute of Scientific and Technical Information of China (English)

    雷新锋; 刘军; 肖军模

    2011-01-01

    在密码协议中,主体的认知与信仰状态是随时间推移而不断变化的.为了在协议分析中体现这种动态性,提出一种时间相关密码协议逻辑.该逻辑基于谓词模态逻辑,通过在谓词及模态词中引入时间参数以体现时间因素,使得逻辑可表达各个主体在协议不同时间点的行为、知识及信仰.给出该逻辑的形式化语义,在避免逻辑语言二义性的同时保证了逻辑的可靠性.该语义基于Kripke结构,将可能世界建立在主体局部世界与时间局部世界的基础上,使得任一可能世界能够反映协议的一个可能的全过程.该逻辑为密码协议,特别是时间相关密码协议提供了灵活的分析方法,增强了基于逻辑方法的协议分析能力.%In cryptographic protocols, the agent's epistemic and doxastic states are changeable over time. To model these dynamics, a time-dependent cryptographic protocol logic is proposed. Our logic is based on the predicate modal logic and the time factor can be expressed in it by invoking a time variable as a parameter of predicates and modal operators. This makes it possible to model every agent's actions, knowledges and beliefs at different time points. We also give the formal semantics of our logic to avoid the ambiguity of its language and make the logic sound. The semantics is based on the kripke structure and the possible world in it is built both on the local world of agent and the specific world of time. This makes every possible world can give a global view of each point of the protocol. Our logic provides a flexible method for analyzing the cryptographic protocols, especially the time-dependent cryptographic protocols, and increases the power of the logical method for analyzing protocols.

  14. The Call of Humanity in The Call of the Wild

    Institute of Scientific and Technical Information of China (English)

    朱露; 张磊

    2011-01-01

    Jack London is one of the greatest American novelists. Many of his works are very popular among readers all over the world. This paper firstly gives a brief introduction of Jack London and The Call of the Wild. Then it analyzes the theme and main Characters of this novel. At last the implied meaning is discussed.

  15. Obfuscation for Cryptographic Purposes

    NARCIS (Netherlands)

    D. Hofheinz (Dennis); J. Malone-Lee; M. Stam; S. Vadhan

    2007-01-01

    textabstractAn obfuscation of a function F should satisfy two requirements: firstly, using it should be possible to evaluate F; secondly, should not reveal anything about F that cannot be learnt from oracle access to F. Several definitions for obfuscation exist. However, most of them are either

  16. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash...... important applications has also been analysed. This successful cryptanalysis of the standard hash functions has made National Institute of Standards and Technology (NIST), USA to initiate an international public competition to select the most secure and efficient hash function as the future hash function...... based MACs are reported. The goals of NIST's SHA-3 competition and its current progress are outlined....

  17. Cryptographic Hash Functions

    DEFF Research Database (Denmark)

    Gauravaram, Praveen; Knudsen, Lars Ramkilde

    2010-01-01

    value should not serve as an image for two distinct input messages and it should be difficult to find the input message from a given hash value. Secure hash functions serve data integrity, non-repudiation and authenticity of the source in conjunction with the digital signature schemes. Keyed hash...

  18. The Wireless Nursing Call System

    DEFF Research Database (Denmark)

    Jensen, Casper Bruun

    2006-01-01

    This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight into the cha......This paper discusses a research project in which social scientists were involved both as analysts and supporters during a pilot with a new wireless nursing call system. The case thus exemplifies an attempt to participate in developing dependable health care systems and offers insight...

  19. Learning as Calling and Responding

    Science.gov (United States)

    Jons, Lotta

    2014-01-01

    According to Martin Buber's philosophy of dialogue, our being-in-the-world is to be conceived of as an existential dialogue. Elsewhere, I have conceptualized the teacher-student-relation accordingly (see Jons 2008), as a matter of calling and responding. The conceptualization rests on a secularised notion of vocation, paving way for…

  20. An Evaluation Framework for CALL

    Science.gov (United States)

    McMurry, Benjamin L.; Williams, David Dwayne; Rich, Peter J.; Hartshorn, K. James

    2016-01-01

    Searching prestigious Computer-assisted Language Learning (CALL) journals for references to key publications and authors in the field of evaluation yields a short list. The "American Journal of Evaluation"--the flagship journal of the American Evaluation Association--is only cited once in both the "CALICO Journal and Language…

  1. Construction and enumeration of Boolean functions with maximum algebraic immunity

    Institute of Scientific and Technical Information of China (English)

    ZHANG WenYing; WU ChuanKun; LIU XiangZhong

    2009-01-01

    Algebraic immunity is a new cryptographic criterion proposed against algebraic attacks. In order to resist algebraic attacks, Boolean functions used in many stream ciphers should possess high algebraic immunity. This paper presents two main results to find balanced Boolean functions with maximum algebraic immunity. Through swapping the values of two bits, and then generalizing the result to swap some pairs of bits of the symmetric Boolean function constructed by Dalai, a new class of Boolean functions with maximum algebraic immunity are constructed. Enumeration of such functions is also given. For a given function p(x) with deg(p(x)) < [n/2], we give a method to construct functions in the form p(x)+q(x) which achieve the maximum algebraic immunity, where every term with nonzero coefficient in the ANF of q(x) has degree no less than [n/2].

  2. Calle y Saberes en Movimiento

    Directory of Open Access Journals (Sweden)

    Laura Daniela Aguirre Aguilar

    2010-01-01

    Full Text Available En México el rezago, el ausentismo, la deserción escolar, el trabajo a temprana edad y el inicio de una vida en la calle, en repetidas ocasiones son consecuencia de un núcleo familiar desarticulado o de una débil relación intrafamiliar, así como de una condición socioeconómica en desventaja. Ante esta problemática, la Secretaría de Educación Pública, instancia gubernamental encargada de garantizar una educación de calidad para la población, trabaja coordinadamente con organizaciones de la sociedad civil e instancias públicas, para la reintegración a los espacios educativos de los niños, niñas y jóvenes en situación de calle.

  3. Call for improving air quality

    Science.gov (United States)

    Showstack, Randy

    2013-01-01

    The European Environmental Bureau (EEB), a federation of citizen organizations, has called for stricter policies in Europe to protect human health and the environment. "Air pollution emanates from sources all around us, be they cars, industrial plants, shipping, agriculture, or waste. The [European Union] must propose ambitious legislation to address all of these sources if it is to tackle the grave public health consequences of air pollution," EEB secretary general Jeremy Wates said on 8 January.

  4. Constructive neural network learning

    OpenAIRE

    Lin, Shaobo; Zeng, Jinshan; Zhang, Xiaoqin

    2016-01-01

    In this paper, we aim at developing scalable neural network-type learning systems. Motivated by the idea of "constructive neural networks" in approximation theory, we focus on "constructing" rather than "training" feed-forward neural networks (FNNs) for learning, and propose a novel FNNs learning system called the constructive feed-forward neural network (CFN). Theoretically, we prove that the proposed method not only overcomes the classical saturation problem for FNN approximation, but also ...

  5. Ultrasound call detection in capybara

    Directory of Open Access Journals (Sweden)

    Selene S.C. Nogueira

    2012-07-01

    Full Text Available The vocal repertoire of some animal species has been considered a non-invasive tool to predict distress reactivity. In rats ultrasound emissions were reported as distress indicator. Capybaras[ vocal repertoire was reported recently and seems to have ultrasound calls, but this has not yet been confirmed. Thus, in order to check if a poor state of welfare was linked to ultrasound calls in the capybara vocal repertoire, the aim of this study was to track the presence of ultrasound emissions in 11 animals under three conditions: 1 unrestrained; 2 intermediately restrained, and 3 highly restrained. The ultrasound track identified frequencies in the range of 31.8±3.5 kHz in adults and 33.2±8.5 kHz in juveniles. These ultrasound frequencies occurred only when animals were highly restrained, physically restrained or injured during handling. We concluded that these calls with ultrasound components are related to pain and restraint because they did not occur when animals were free of restraint. Thus we suggest that this vocalization may be used as an additional tool to assess capybaras[ welfare.

  6. Security assurance capability assessment based on entropy weight method for cryptographic module%基于熵权法的密码模块安全保障能力评估

    Institute of Scientific and Technical Information of China (English)

    粟登银; 徐开勇; 高杨

    2012-01-01

    To solve the problems that the index value of cryptographic modules is not fixed, the index system is hardly built, and the security assurance ability can not be quantitatively assessed, a security assurance capability assessment for cryptographic module was proposed. The description on indexes by interval number was applied to illustrate the security attribute of cryptographic modules. This paper determined the weight vector of each period point by entropy weight coefficient method combined with expert decision weight method. According to the interval multi-attribute decision methodology, a feasible methodology was adopted to solve the interval Information Assurance ( IA) capability evaluation problem of cryptographic modules. Finally, through analyzing two kinds of cryptographic modules, the experimental results show that the proposed method is feasible.%针对密码模块这类信息安全产品指标值不固定、指标系统难以建立、安全保障能力难以定量评估的问题,提出了一种定量描述密码模块安全保障能力的可行方法.方法运用区间数描述密码模块的安全属性,采用熵权法结合主观赋权法确定每个安全属性的权重值,运用区间型多属性决策方法进行综合评价,最后运用所提方法对两种商用密码模块进行了实例分析,计算结果表明所提方法可行.

  7. Unique Physically Anchored Cryptographic Theoretical Calculation of the Fine-Structure Constant {\\alpha} Matching both the g/2 and Interferometric High-Precision Measurements

    CERN Document Server

    Rhodes, Charles Kirkham

    2010-01-01

    The fine-structure constant {\\alpha}, the dimensionless number that represents the strength of electromagnetic coupling in the limit of sufficiently low energy interactions, is the crucial fundamental physical parameter that governs a nearly limitless range of phenomena involving the interaction of radiation with materials. Ideally, the apparatus of physical theory should be competent to provide a calculational procedure that yields a quantitatively correct value for {\\alpha} and the physical basis for its computation. This study presents the first demonstration of an observationally anchored theoretical procedure that predicts a unique value for {\\alpha} that stands in full agreement with the best (~370 ppt) high-precision experimental determinations. In a directly connected cryptographic computation, the method that gives these results also yields the magnitude of the cosmological constant {\\Omega}{\\Lambda} in conformance with the observational data and the condition of perfect flatness ({\\Omega}{\\Lambda} +...

  8. Advanced Call Center Supporting WAP Access

    Institute of Scientific and Technical Information of China (English)

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both data and speech access, but it needs a powerful terminal-computer. By analyzing traditional call centers and call centers based on web, this paper presents the framework of an advanced call center supporting WAP access. A typical service is also described in detail.

  9. Development of the Crisis Call Outcome Rating Scale.

    Science.gov (United States)

    Bonneson, Mary E.; Hartsough, Don M.

    1987-01-01

    Constructed and tested Crisis Call Outcome Rating Scale, rating scale of caller behavior, as an outcome measure at telephone hotline facility. Psychology students rated caller behavior on role-played audiotapes. Items having respectable item-total correlations comprise final version of scale which detected meaningful differences among audiotapes.…

  10. Constructing Knowledge

    Science.gov (United States)

    Blanton, Patricia

    2003-02-01

    Schools are expected to lay the foundation upon which knowledge can be built and equip students with the tools necessary to accomplish the construction. The role of the teacher in this building process is crucial to the type of structure the student can build. Whether you call it constructivism, discussion teaching, project-based learning, inquiry learning, or any of the other names given to the instructional strategies being suggested by education researchers, the key is getting students to become active participants in the process. While some students may be able to learn from eloquently delivered lectures and dynamic demonstrations, the majority of students cannot effectively retain and apply ideas communicated in this manner.

  11. OVarCall: Bayesian Mutation Calling Method Utilizing Overlapping Paired-End Reads.

    Science.gov (United States)

    Moriyama, Takuya; Shiraishi, Yuichi; Chiba, Kenichi; Yamaguchi, Rui; Imoto, Seiya; Miyano, Satoru

    2017-03-01

    Detection of somatic mutations from tumor and matched normal sequencing data has become a standard approach in cancer research. Although a number of mutation callers have been developed, it is still difficult to detect mutations with low allele frequency even in exome sequencing. We expect that overlapping paired-end read information is effective for this purpose, but no mutation caller has modeled overlapping information statistically in a proper form in exome sequence data. Here, we develop a Bayesian hierarchical method, OVar- Call (https://github.com/takumorizo/OVarCall), where overlapping paired-end read information improves the accuracy of low allele frequency mutation detection. Firstly, we construct two generative models: one is for reads with somatic variants generated from tumor cells and the other is for reads that does not have somatic variants but potentially includes sequence errors. Secondly, we calculate marginal likelihood for each model using a variational Bayesian algorithm to compute Bayes factor for the detection of somatic mutations. We empirically evaluated the performance of OVarCall and confirmed its better performance than other existing methods.

  12. 47 CFR 2.302 - Call signs.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 1 2010-10-01 2010-10-01 false Call signs. 2.302 Section 2.302... RULES AND REGULATIONS Call Signs and Other Forms of Identifying Radio Transmissions § 2.302 Call signs. The table which follows indicates the composition and blocks of international call signs available...

  13. Advanced Call Center Supporting WAP Access

    Institute of Scientific and Technical Information of China (English)

    YUANXiao-hua; CHENJun-liang

    2001-01-01

    Traditional call centers can be accessed via speech only, and the call center based on web provides both da-ta and speech access,but it needs a powerful terminal-computer.By analyzing traditional call centers and call cen-ters based on web, this paper presents the framework of an advanced call center supporting WAP access.A typical service is also described in detail.

  14. 基于安全操作系统的透明加密文件系统的设计%Design and Implementation of a Transparent Cryptographic File System Based on Secure Operating System

    Institute of Scientific and Technical Information of China (English)

    魏丕会; 卿斯汉; 刘海峰

    2003-01-01

    Almost all the important information is saved on physical media as files and managed by file system. Sofilesystem's security is an important promise to information security. We present a transparent cryptographic file sys-tem based on secure operating system(SecTCFS). The users do not aware the exist of the encrypting process. Au-thentication promises that valid user can access the files in the system.

  15. The function of migratory bird calls

    DEFF Research Database (Denmark)

    Reichl, Thomas; Andersen, Bent Bach; Larsen, Ole Næsbye

    the experimental bird could be activated successively to simulate a migrating Robin cruising E-W, W-E, S-N or N-S at a chosen height (mostly about 40 m), at 10 m/s and emitting Robin flight calls of 80 dB(A) at 1 m. The simulated flight of a "ding" sound served as a control. During an experiment the bird was first...... Denmark, Odense, DK-5230 Odense M, Denmark   Many migrating passerines emit special calls during nocturnal flight, the so-called flight calls. Several functions of the calls have been suggested but largely remain speculative. Flight calls have been hypothesized to maintain groups during nocturnal...... migration and to stimulate migratory restlessness in conspecifics. We wished to test if conspecific flight calls influence the flight direction of a nocturnal migrant, the European Robin (Erithacus rubecula), i.e. if flight calls help migrants keeping course. Wild caught birds showing migratory restlessness...

  16. 76 FR 17934 - Infrastructure Protection Data Call

    Science.gov (United States)

    2011-03-31

    ... SECURITY Infrastructure Protection Data Call AGENCY: National Protection and Programs Directorate, DHS...: Infrastructure Protection Data Call. OMB Number: 1670-NEW. Frequency: On occasion. Affected Public: Federal...: The Department of Homeland Security (DHS), National Protection and Programs Directorate (NPPD),...

  17. RFID cryptographic protocol based on two-dimensional region Hash chain%基于二维区间Hash链的RFID安全协议

    Institute of Scientific and Technical Information of China (English)

    熊宛星; 薛开平; 洪佩琳; 麻常莎

    2011-01-01

    Due to the limitation of relevant devices, a lot of security problems exist in a radio frequency identification (RFID) system, one of the core technologies of the future internet of things (IOT). A new protocol based on the two-dimensional region (TDR) Hash chains was proposed after the core ideas of several typical RFID cryptographic protocols were analyzed. TDR could significantly improve the efficiency of database retrieval by identifying each Hash chain with region division. Moreover, a random number was introduced to further enhance the security of RFID systems.%作为未来物联网(IOT)的核心技术之一,无线射频识别(RFID)系统由于设备的局限性而存在许多安全问题.在分析几种典型安全协议核心思想的基础上,提出了基于二维区间(two-dimensional region,TDR) Hash链的安全协议.该协议以区间划分的方式标识各链,从而提高了数据库的检索效率;同时,由于在协议中引入了随机性,RFID系统的安全性得到了进一步增强.

  18. Run-length encoding graphic rules, biochemically editable designs and steganographical numeric data embedment for DNA-based cryptographical coding system.

    Science.gov (United States)

    Kawano, Tomonori

    2013-03-01

    There have been a wide variety of approaches for handling the pieces of DNA as the "unplugged" tools for digital information storage and processing, including a series of studies applied to the security-related area, such as DNA-based digital barcodes, water marks and cryptography. In the present article, novel designs of artificial genes as the media for storing the digitally compressed data for images are proposed for bio-computing purpose while natural genes principally encode for proteins. Furthermore, the proposed system allows cryptographical application of DNA through biochemically editable designs with capacity for steganographical numeric data embedment. As a model case of image-coding DNA technique application, numerically and biochemically combined protocols are employed for ciphering the given "passwords" and/or secret numbers using DNA sequences. The "passwords" of interest were decomposed into single letters and translated into the font image coded on the separate DNA chains with both the coding regions in which the images are encoded based on the novel run-length encoding rule, and the non-coding regions designed for biochemical editing and the remodeling processes revealing the hidden orientation of letters composing the original "passwords." The latter processes require the molecular biological tools for digestion and ligation of the fragmented DNA molecules targeting at the polymerase chain reaction-engineered termini of the chains. Lastly, additional protocols for steganographical overwriting of the numeric data of interests over the image-coding DNA are also discussed.

  19. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  20. How to call the Fire Brigade

    CERN Multimedia

    2003-01-01

    The telephone numbers for the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from "wired" telephones, however, from mobile phones it leads to non-CERN emergency services.

  1. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2002-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  2. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2002-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.  

  3. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Multimedia

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note: the number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  4. HOW TO CALL THE CERN FIRE BRIGADE

    CERN Document Server

    2001-01-01

    The telephone numbers of the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from 'wired' telephones, however, from mobile phones it leads to non-CERN emergency services.

  5. How to call the Fire Brigade

    CERN Multimedia

    2003-01-01

    The telephone numbers for the CERN Fire Brigade are: 74444 for emergency calls 74848 for other calls Note The number 112 will stay in use for emergency calls from "wired" telephones, however, from mobile phones it leads to non-CERN emergency services.

  6. Do market participants learn from conference calls?

    NARCIS (Netherlands)

    Roelofsen, E.; Verbeeten, F.; Mertens, G.

    2014-01-01

    We examine whether market participants learn from the information that is disseminated during the Q-and-A section of conference calls. Specifically, we investigate whether stock prices react to information on intangible assets provided during conference calls, and whether conference calls interactio

  7. Intrusion detection based on system calls and homogeneous Markov chains

    Institute of Scientific and Technical Information of China (English)

    Tian Xinguang; Duan Miyi; Sun Chunlai; Li Wenfa

    2008-01-01

    A novel method for detecting anomalous program behavior is presented, which is applicable to hostbased intrusion detection systems that monitor system call activities. The method constructs a homogeneous Markov chain model to characterize the normal behavior of a privileged program, and associates the states of the Markov chain with the unique system calls in the training data. At the detection stage, the probabilities that the Markov chain model supports the system call sequences generated by the program are computed. A low probability indicates an anomalous sequence that may result from intrusive activities. Then a decision rule based on the number of anomalous sequences in a locality frame is adopted to classify the program's behavior. The method gives attention to both computational efficiency and detection accuracy, and is especially suitable for on-line detection. It has been applied to practical host-based intrusion detection systems.

  8. Lunar base construction requirements

    Science.gov (United States)

    Jolly, Steve; Helleckson, Brent

    1990-01-01

    The following viewgraph presentation is a review of the Lunar Base Constructibility Study carried out in the spring and summer of 1990. The objective of the study was to develop a method for evaluating the constructibility of Phase A proposals to build facilities on orbit or on extraterrestrial surfaces. Space construction was broadly defined as all forms of assembly, disassembly, connection, disconnection, deployment, stowage, excavation, emplacement, activation, test, transportation, etc., required to create facilities in orbit and on the surfaces of other celestial bodies. It was discovered that decisions made in the face of stated and unstated assumptions early in the design process (commonly called Phase A) can lock in non-optimal construction methods. Often, in order to construct the design, alterations must be made to the design during much later phases of the project. Such 'fixes' can be very difficult, expensive, or perhaps impossible. Assessing constructibility should thus be a part of the iterative design process, starting with the Phase A studies and continuing through production. This study assumes that there exists a minimum set of key construction requirements (i.e., questions whose answers form the set of discriminators) that must be implied or specified in order to assess the constructibility of the design. This set of construction requirements constitutes a 'constructibility filter' which then becomes part of the iterative design process. Five inherently different, dichotomous design reference missions were used in the extraction of these requirements to assure the depth and breath of the list.

  9. Static analysis of function calls in Erlang

    Directory of Open Access Journals (Sweden)

    Dániel Horpácsi

    2013-06-01

    Full Text Available Functions and their relations can affect numerous properties and metrics of a functional program. To identify and represent the functions and their calling connections, software analysers commonly apply semantic function analysis, which derives the static call graph of the program, based on its source code. Function calls however may be dynamic and complex, making it difficult to statically identify the callee. Dynamic calls are determined just at run-time, static analysis therefore cannot be expected to fully identify every call. Nevertheless, by utilising the results of a properly performed data-flow analysis as well as taking ambiguous references into account, numerous dynamic calls are discoverable and representable. We consider cases where the identifiers of the callee are statically determined, but they flow into the call expression from a different program point, and also, we manage to handle function calls whose identifiers are not fully identifiable at compile-time. By utilising the improved reference analysis, we extend the static call graph with various information about dynamic function calls. We investigate such a function call analysis in the programming language Erlang.

  10. Bonobos extract meaning from call sequences.

    Directory of Open Access Journals (Sweden)

    Zanna Clay

    Full Text Available Studies on language-trained bonobos have revealed their remarkable abilities in representational and communication tasks. Surprisingly, however, corresponding research into their natural communication has largely been neglected. We address this issue with a first playback study on the natural vocal behaviour of bonobos. Bonobos produce five acoustically distinct call types when finding food, which they regularly mix together into longer call sequences. We found that individual call types were relatively poor indicators of food quality, while context specificity was much greater at the call sequence level. We therefore investigated whether receivers could extract meaning about the quality of food encountered by the caller by integrating across different call sequences. We first trained four captive individuals to find two types of foods, kiwi (preferred and apples (less preferred at two different locations. We then conducted naturalistic playback experiments during which we broadcasted sequences of four calls, originally produced by a familiar individual responding to either kiwi or apples. All sequences contained the same number of calls but varied in the composition of call types. Following playbacks, we found that subjects devoted significantly more search effort to the field indicated by the call sequence. Rather than attending to individual calls, bonobos attended to the entire sequences to make inferences about the food encountered by a caller. These results provide the first empirical evidence that bonobos are able to extract information about external events by attending to vocal sequences of other individuals and highlight the importance of call combinations in their natural communication system.

  11. A Group Action Method for Construction of Strong Substitution Box

    Science.gov (United States)

    Jamal, Sajjad Shaukat; Shah, Tariq; Attaullah, Atta

    2017-06-01

    In this paper, the method to develop cryptographically strong substitution box is presented which can be used in multimedia security and data hiding techniques. The algorithm of construction depends on the action of a projective general linear group over the set of units of the finite commutative ring. The strength of substitution box and ability to create confusion is assessed with different available analyses. Moreover, the ability of resistance against malicious attacks is also evaluated. The substitution box is examined by bit independent criterion, strict avalanche criterion, nonlinearity test, linear approximation probability test and differential approximation probability test. This substitution box is equated with well-recognized substitution boxes such as AES, Gray, APA, S8, prime of residue, Xyi and Skipjack. The comparison shows encouraging results about the strength of the proposed box. The majority logic criterion is also calculated to analyze the strength and its practical implementation.

  12. On the security of \\alpha\\eta: Response to `Some attacks on quantum-based cryptographic protocols'

    CERN Document Server

    Yuen, H P; Corndorf, E; Kanter, G S; Kumar, P; Yuen, Horace P.; Nair, Ranjith; Corndorf, Eric; Kanter, Gregory S.; Kumar, Prem

    2005-01-01

    Lo and Ko, in QIC (6) pp. 40-47 [1], have developed some attacks on the cryptosystem called \\alpha\\eta [2], claiming that these attacks undermine the security of \\alpha\\eta for both direct encryption and key generation. In this paper, we show that their arguments fail in many different ways. In particular, the first attack in [1] requires channel loss or length of known-plaintext that is exponential in the key length and is unrealistic even for moderate key lengths. The second attack in [1] is a Grover search attack based on `asymptotic orthogonality' and was not analyzed quantitatively. We explain why it is not logically possible to ``pull back'' an argument valid only at n=infinity into a limit statement, let alone one valid for a finite number of transmissions n. We illustrate this by a `proof' using a similar asymptotic orthogonality argument that coherent-state BB84 is insecure for \\emph{any} value of loss. Even if a limit statement is true, this attack is \\emph{a priori} irrelevant as it requires an ind...

  13. Constructed Wetlands

    Science.gov (United States)

    these systems can improve water quality, engineers and scientists construct systems that replicate the functions of natural wetlands. Constructed wetlands are treatment systems that use natural processes

  14. Modeling function calls in program control flow in terms of Petri Nets

    Directory of Open Access Journals (Sweden)

    Dmitriy Kharitonov

    Full Text Available This article presents a method for representing the C/C++ function call in terms of compositional Petri Nets. Principles of modeling function and function call in the program are described. Formal composition operations to construct program model from mod ...

  15. Multidimensional views on mobile call network

    Institute of Scientific and Technical Information of China (English)

    Shengqi YANG; Bin WU; Bai WANG

    2009-01-01

    Recent studies on social network have spurred significant interests in human behaviors. Nowadays, various kinds of interpersonal human interactions, from mobile calls to emalls, provide particular avenues to explore the inher-ent properties of communication patterns. In this article, we present a comprehensive study on a massive anonymous call records obtained from a major mobile service operator. The important difference laid in our work and previous mainly topological analyses is that we report on multiple aspects of the dataset. By investigating the calls of the users, we find out that most calls tend to last within one minute. Call du-ration between two females is much longer than that of two males. But calls of males generally involve more stations than that of female, indicating a larger mobile range of the males. We also observed that people tend to communicate more with each other when they share similar characters. Besides, the network is well-connected and robust to random attack. We also demonstrate that the close-knit sub-groups with little discrepancy in the characteristics of its involved users usually evoke more calls. Another interesting discov-ery is that call behaviors among people between workdays and weekends is obviously distinct. Generally speaking, the goal that we research on call network through multidimen-sional analyses is to uncover the intricate patterns of human communications and put up reasonable insights into future service intelligence.

  16. Call Duration Characteristics based on Customers Location

    Directory of Open Access Journals (Sweden)

    Žvinys Karolis

    2014-05-01

    Full Text Available Nowadays a lot of different researches are performed based on call duration distributions (CDD analysis. However, the majority of studies are linked with social relationships between the people. Therefore the scarcity of information, how the call duration is associated with a user's location, is appreciable. The goal of this paper is to reveal the ties between user's voice call duration and the location of call. For this reason we analyzed more than 5 million calls from real mobile network, which were made over the base stations located in rural areas, roads, small towns, business and entertainment centers, residential districts. According to these site types CDD’s and characteristic features for call durations are given and discussed. Submitted analysis presents the users habits and behavior as a group (not an individual. The research showed that CDD’s of customers being them in different locations are not equal. It has been found that users at entertainment, business centers are tend to talk much shortly, than people being at home. Even more CDD can be distorted strongly, when machinery calls are evaluated. Hence to apply a common CDD for a whole network it is not recommended. The study also deals with specific parameters of call duration for distinguished user groups, the influence of network technology for call duration is considered.

  17. When They Talk about CALL: Discourse in a Required CALL Class

    Science.gov (United States)

    Kessler, Greg

    2010-01-01

    This study investigates preservice teachers' discourse about CALL in a required CALL class which combines theory and practice. Thirty-three students in a Linguistics MA program CALL course were observed over a 10-week quarter. For all of these students, it was their first formal exposure to CALL as a discipline. Communication in the class…

  18. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Directory of Open Access Journals (Sweden)

    Laszlo B Kish

    Full Text Available Recently, Bennett and Riedel (BR (http://arxiv.org/abs/1303.7435v1 argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional security of the KLJN method has not been successfully challenged.

  19. Critical analysis of the Bennett-Riedel attack on secure cryptographic key distributions via the Kirchhoff-Law-Johnson-noise scheme.

    Science.gov (United States)

    Kish, Laszlo B; Abbott, Derek; Granqvist, Claes G

    2013-01-01

    Recently, Bennett and Riedel (BR) (http://arxiv.org/abs/1303.7435v1) argued that thermodynamics is not essential in the Kirchhoff-law-Johnson-noise (KLJN) classical physical cryptographic exchange method in an effort to disprove the security of the KLJN scheme. They attempted to demonstrate this by introducing a dissipation-free deterministic key exchange method with two batteries and two switches. In the present paper, we first show that BR's scheme is unphysical and that some elements of its assumptions violate basic protocols of secure communication. All our analyses are based on a technically unlimited Eve with infinitely accurate and fast measurements limited only by the laws of physics and statistics. For non-ideal situations and at active (invasive) attacks, the uncertainly principle between measurement duration and statistical errors makes it impossible for Eve to extract the key regardless of the accuracy or speed of her measurements. To show that thermodynamics and noise are essential for the security, we crack the BR system with 100% success via passive attacks, in ten different ways, and demonstrate that the same cracking methods do not function for the KLJN scheme that employs Johnson noise to provide security underpinned by the Second Law of Thermodynamics. We also present a critical analysis of some other claims by BR; for example, we prove that their equations for describing zero security do not apply to the KLJN scheme. Finally we give mathematical security proofs for each BR-attack against the KLJN scheme and conclude that the information theoretic (unconditional) security of the KLJN method has not been successfully challenged.

  20. Construction management

    CERN Document Server

    Pellicer, Eugenio; Teixeira, José C; Moura, Helder P; Catalá, Joaquín

    2014-01-01

    The management of construction projects is a wide ranging and challenging discipline in an increasingly international industry, facing continual challenges and demands for improvements in safety, in quality and cost control, and in the avoidance of contractual disputes. Construction Management grew out of a Leonardo da Vinci project to develop a series of Common Learning Outcomes for European Managers in Construction. Financed by the European Union, the project aimed to develop a library of basic materials for developing construction management skills for use in a pan-European context. Focused exclusively on the management of the construction phase of a building project from the contractor's point of view, Construction Management covers the complete range of topics of which mastery is required by the construction management professional for the effective delivery of new construction projects. With the continued internationalisation of the construction industry, Construction Management will be required rea...

  1. 基于Swarm平台的理性密码协议建模与仿真%Modeling and Simulation of Rational Cryptographic Protocols based on Swarm

    Institute of Scientific and Technical Information of China (English)

    杨雪君; 陈宁江

    2014-01-01

    Aiming at the question of number of strategies were chosen by participants in real world when the rational cryptographic protocols running, a model and the algorithm of solving this problem is designed, which simulated the rational actions on the Swarm platform of intelligent agents. Firstly, payoff matrix was deifned in this article, and then, the state-copy formulation of participants is listed up;3 Nash Equilibrium values discovered by solving the formulation, i.e., the different value which all the participants were used to honest strategy, tactics and non honesty mixed strategy, and game algorithm is designed according to the different values; at last, each object is deifned in the main game needed on the Swarm, however, the basic object function can not fully meet rational cryptographic protocols on the Swarm, so the transformation of the Swarm platform part of the main object function given the key code transformation, the game of interaction in the whole swarm is implemented on the Swarm. As the result shows, rational participants will be dififcult to reach Nash Equilibrium through rounds of game when the pay off function is constant. However, by using incentives to encourage the proifts of honest participants, rational participants will be easy to Nash Equilibrium with less rounds of game, and the proportion of the honest participants is at least half the list. There are some reference values by using the algorithmic game theory that presents the methods which simulated on the Swarm platform for researching rational cryptographic protocols in this article.%针对现实世界中理性密码协议的参与者博弈过程不易观察和预测的问题,文章在多智能主体的仿真平台Swarm上对理性密码协议中参与者的诚实策略和非诚实策略行为进行了建模和仿真。文章首先定义了主体的收益矩阵,进一步根据收益矩阵建立了参与者在整个博弈过程中的状态复制方程;然后求解出该方程

  2. The Call to Teach and Teacher Hopefulness

    Science.gov (United States)

    Bullough, Robert V., Jr.; Hall-Kenyon, Kendra M.

    2011-01-01

    The purpose of this paper is to explore teacher motivation and well-being. Our analysis focuses on two central concepts, the notion of a "calling to teach" and of teacher "hopefulness." Data from 205 preservice and inservice teachers were collected to determine teachers' sense of calling and level of hope. Results indicate that overwhelmingly,…

  3. A CALL for Improved School Leadership

    Science.gov (United States)

    Halverson, Richard; Kelley, Carolyn; Shaw, James

    2014-01-01

    The Comprehensive Assessment of Leadership for Learning (CALL) is a formative assessment that provides feedback to schools on the research-based leadership practices necessary to improve teaching and learning. Instead of focusing on an individual leader, CALL measures leadership practices in tasks carried out by actors across the school and…

  4. Answering the "Call of the Mountain"

    NARCIS (Netherlands)

    Chaves Villegas, Martha

    2016-01-01

    In response to the age of the ‘anthropocene,’ as some authors are calling this epoch in which one single species is disrupting major natural systems (Steffen et al 2011), there are calls for more radical, learning-based sustainability that generates deep transformations in individuals an

  5. Integrated Language Skills CALL Course Design

    Science.gov (United States)

    Watson, Kevin; Agawa, Grant

    2013-01-01

    The importance of a structured learning framework or interrelated frameworks is the cornerstone of a solid English as a foreign language (EFL) computer-assisted language learning (CALL) curriculum. While the benefits of CALL are widely promoted in the literature, there is often an endemic discord separating theory and practice. Oftentimes the…

  6. 33 CFR 401.64 - Calling in.

    Science.gov (United States)

    2010-07-01

    ... 33 Navigation and Navigable Waters 3 2010-07-01 2010-07-01 false Calling in. 401.64 Section 401.64... SEAWAY REGULATIONS AND RULES Regulations Radio Communications § 401.64 Calling in. (a) Every vessel, intending to transit or in transit, shall report on the assigned frequency to the designated Seaway...

  7. Answering the "Call of the Mountain"

    NARCIS (Netherlands)

    Chaves Villegas, Martha

    2016-01-01

    In response to the age of the ‘anthropocene,’ as some authors are calling this epoch in which one single species is disrupting major natural systems (Steffen et al 2011), there are calls for more radical, learning-based sustainability that generates deep transformations in individuals

  8. 78 FR 76218 - Rural Call Completion

    Science.gov (United States)

    2013-12-17

    ... providers of VoIP service, other providers could circumvent the rules by working with a VoIP service... expect the Commission will obtain the data we need to identify and analyze patterns of call completion... below will allow the Commission to better identify patterns of rural call completion problems and...

  9. CALL in Lebanese Elementary ESL Writing Classrooms

    Science.gov (United States)

    Fidaoui, Diana; Bahous, Rima; Bacha, Nahla N.

    2010-01-01

    This article discusses the effectiveness of using computer assisted language learning (CALL) in motivating fourth-grade English as a second language (ESL) students to develop better writing skills. It also seeks to explore the perceptions of ESL teachers and students regarding the use of CALL in the ESL classroom. The study involved 48 fourth…

  10. Call Admission Control in Mobile Cellular Networks

    CERN Document Server

    Ghosh, Sanchita

    2013-01-01

    Call Admission Control (CAC) and Dynamic Channel Assignments (DCA) are important decision-making problems in mobile cellular communication systems. Current research in mobile communication considers them as two independent problems, although the former greatly depends on the resulting free channels obtained as the outcome of the latter. This book provides a solution to the CAC problem, considering DCA as an integral part of decision-making for call admission. Further, current technical resources ignore movement issues of mobile stations and fluctuation in network load (incoming calls) in the control strategy used for call admission. In addition, the present techniques on call admission offers solution globally for the entire network, instead of considering the cells independently.      CAC here has been formulated by two alternative approaches. The first approach aimed at handling the uncertainty in the CAC problem by employing fuzzy comparators.  The second approach is concerned with formulation of CAC ...

  11. Call cultures in orang-utans?

    Directory of Open Access Journals (Sweden)

    Serge A Wich

    Full Text Available BACKGROUND: Several studies suggested great ape cultures, arguing that human cumulative culture presumably evolved from such a foundation. These focused on conspicuous behaviours, and showed rich geographic variation, which could not be attributed to known ecological or genetic differences. Although geographic variation within call types (accents has previously been reported for orang-utans and other primate species, we examine geographic variation in the presence/absence of discrete call types (dialects. Because orang-utans have been shown to have geographic variation that is not completely explicable by genetic or ecological factors we hypothesized that this will be similar in the call domain and predict that discrete call type variation between populations will be found. METHODOLOGY/PRINCIPAL FINDINGS: We examined long-term behavioural data from five orang-utan populations and collected fecal samples for genetic analyses. We show that there is geographic variation in the presence of discrete types of calls. In exactly the same behavioural context (nest building and infant retrieval, individuals in different wild populations customarily emit either qualitatively different calls or calls in some but not in others. By comparing patterns in call-type and genetic similarity, we suggest that the observed variation is not likely to be explained by genetic or ecological differences. CONCLUSION/SIGNIFICANCE: These results are consistent with the potential presence of 'call cultures' and suggest that wild orang-utans possess the ability to invent arbitrary calls, which spread through social learning. These findings differ substantially from those that have been reported for primates before. First, the results reported here are on dialect and not on accent. Second, this study presents cases of production learning whereas most primate studies on vocal learning were cases of contextual learning. We conclude with speculating on how these findings might

  12. External GSM phone calls now made simpler

    CERN Multimedia

    2007-01-01

    On 2 July, the IT/CS Telecom Service introduced a new service making external calls from CERN GSM phones easier. A specific prefix is no longer needed for calls outside CERN. External calls from CERN GSM phones are to be simplified. It is no longer necessary to use a special prefix to call an external number from the CERN GSM network.The Telecom Section of the IT/CS Group is introducing a new system that will make life easier for GSM users. It is no longer necessary to use a special prefix (333) to call an external number from the CERN GSM network. Simply dial the number directly like any other Swiss GSM customer. CERN currently has its own private GSM network with the Swiss mobile operator, Sunrise, covering the whole of Switzerland. This network was initially intended exclusively for calls between CERN numbers (replacing the old beeper system). A special system was later introduced for external calls, allowing them to pass thr...

  13. Usability Constructs

    DEFF Research Database (Denmark)

    Hertzum, Morten; Clemmesen, Torkil; Hornbæk, Kasper Anders Søren

    2007-01-01

    Whereas research on usability predominantly employs universal definitions of the aspects that comprise usability, people experience their use of information systems through personal constructs. Based on 48 repertory-grid interviews, this study investigates how such personal constructs are affecte...

  14. Arginine vasotocin promotes calling behavior and call changes in male túngara frogs.

    Science.gov (United States)

    Kime, Nicole M; Whitney, Tina K; Davis, Ellen S; Marler, Catherine A

    2007-01-01

    In the túngara frog, Physalaemus pustulosus, males alter calling behavior with changes in their social environment, adding 'chucks' to their advertisement calls in response to the calls of conspecific males. Other studies demonstrate that adding chucks increases the attractiveness of calls to females but also increases the risk of bat predation. In the current study, subcutaneous injections of the neuropeptide hormone arginine vasotocin (AVT) significantly increased chuck production in male túngara frogs. The effects of AVT on chuck production did not depend on the presence of playback stimuli, suggesting that AVT increased either the males' general motivation to produce chucks or their responsiveness to the calls of distant males. Injections of AVT also increased the probability that males would call and decreased the latency to call after injection, supporting the hypothesis that AVT influences motivation to call. Finally, AVT inhibited a drop in call rate after the termination of a playback stimulus and increased call rate at a lower dose of AVT. The effects of AVT on chucks and call rate appear to be independent of each other, as there was no correlation between change in chuck production and change in call rate in individual males. We conclude that AVT may play an important role in socially-mediated call changes that result from competition for mates. The behavioral changes induced by AVT might increase a male's attractiveness to females, and also may be consistent with an aggressive response to another túngara frog male. Copyright 2007 S. Karger AG, Basel.

  15. Electrochemical construction

    Science.gov (United States)

    Einstein, Harry; Grimes, Patrick G.

    1983-08-23

    An electrochemical cell construction features a novel co-extruded plastic electrode in an interleaved construction with a novel integral separator-spacer. Also featured is a leak and impact resistant construction for preventing the spill of corrosive materials in the event of rupture.

  16. 76 FR 4896 - Call for Candidates

    Science.gov (United States)

    2011-01-27

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ACCOUNTING STANDARDS ADVISORY BOARD Call for Candidates AGENCY: Federal Accounting Standards Advisory Board. ACTION: Notice... Federal Accounting Standards Advisory Board (FASAB) is currently seeking candidates (candidates must...

  17. Mourning Dove Call-count Survey

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — The Mourning Dove (Zenaida macroura) Call-Count Survey was developed to provide an index to population size and to detect annual changes in mourning dove breeding...

  18. Computer Assisted Language Learning (CALL) Software: Evaluation ...

    African Journals Online (AJOL)

    Computer Assisted Language Learning (CALL) Software: Evaluation of its Influence in a Language Learning Process. ... Current Issue · Archives · Journal Home > Vol 12, No 1 (2011) >. Log in or Register to get access to full text downloads.

  19. The function of migratory bird calls

    DEFF Research Database (Denmark)

    Reichl, Thomas; Andersen, Bent Bach; Larsen, Ole Næsbye

    The function of migratory bird calls: do they influence orientation and navigation?   Thomas Reichl1, Bent Bach Andersen2, Ole Naesbye Larsen2, Henrik Mouritsen1   1Institute of Biology, University of Oldenburg, Oldenburg, D-26111 Oldenburg, Germany 2Institute of Biology, University of Southern...... migration and to stimulate migratory restlessness in conspecifics. We wished to test if conspecific flight calls influence the flight direction of a nocturnal migrant, the European Robin (Erithacus rubecula), i.e. if flight calls help migrants keeping course. Wild caught birds showing migratory restlessness...... the experimental bird could be activated successively to simulate a migrating Robin cruising E-W, W-E, S-N or N-S at a chosen height (mostly about 40 m), at 10 m/s and emitting Robin flight calls of 80 dB(A) at 1 m. The simulated flight of a "ding" sound served as a control. During an experiment the bird was first...

  20. 47 CFR 22.921 - 911 call processing procedures; 911-only calling mode.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false 911 call processing procedures; 911-only calling mode. 22.921 Section 22.921 Telecommunication FEDERAL COMMUNICATIONS COMMISSION (CONTINUED) COMMON CARRIER SERVICES PUBLIC MOBILE SERVICES Cellular Radiotelephone Service § 22.921 911 call...

  1. A two-phase system call arguments attribute analyzing method

    Institute of Scientific and Technical Information of China (English)

    LI Hong-jiao; LI Jian-hua

    2008-01-01

    To detect more attacks aiming at key security data in program behavior-based anomaly detection, the data flow properties were formulated as unary and binary relations on system call arguments. A new method named two-phrase analysis (2PA) is designed to analyze the efficient relation dependency, and its description as well as advantages are discussed. During the phase of static analysis, a dependency graph was constructed according to the program's data dependency graph, which was used in the phase of dynamic learning to learn specified binary relations. The constructed dependency graph only stores the information of related arguments and events, thus improves the efficiency of the learning algorithm and reduces the size of learned relation de-pendencies. Performance evaluations show that the new method is more efficient than existing methods.

  2. Symbolic Analysis of Cryptographic Protocols

    DEFF Research Database (Denmark)

    Dahl, Morten

    Compos- able framework by Canetti for specifying and analysing protocols, and show that our model is sound with respect to its standard computational interpretation. Our model supports powerful primitives such as homomorphic encryption and non-interactive zero-knowledge proofs, which we show may be used...

  3. Mechanical Verification of Cryptographic Protocols

    Science.gov (United States)

    Cheng, Xiaochun; Ma, Xiaoqi; Huang, Scott C.-H.; Cheng, Maggie

    Information security is playing an increasingly important role in modern society, driven especially by the uptake of the Internet for information transfer. Large amount of information is transmitted everyday through the Internet, which is often the target of malicious attacks. In certain areas, this issue is vital. For example, military departments of governments often transmit a great amount of top-secret data, which, if divulged, could become a huge threat to the public and to national security. Even in our daily life, it is also necessary to protect information. Consider e-commerce systems as an example. No one is willing to purchase anything over the Internet before being assured that all their personal and financial information will always be kept secure and will never be leaked to any unauthorised person or organisation.

  4. Petri Nets in Cryptographic Protocols

    DEFF Research Database (Denmark)

    Crazzolara, Federico; Winskel, Glynn

    2001-01-01

    A process language for security protocols is presented together with a semantics in terms of sets of events. The denotation of process is a set of events, and as each event specifies a set of pre and postconditions, this denotation can be viewed as a Petri net. By means of an example we illustrat...

  5. Modal Logics for Cryptographic Processes

    DEFF Research Database (Denmark)

    Frendrup, U.; Huttel, Hans; Jensen, N. J.

    2002-01-01

    We present three modal logics for the spi-calculus and show that they capture strong versions of the environment sensitive bisimulation introduced by Boreale et al. Our logics differ from conventional modal logics for process calculi in that they allow us to describe the knowledge of an attacker ...

  6. Cryptographic Analysis in Cubic Time

    DEFF Research Database (Denmark)

    Nielson, Flemming; Nielson, Hanne Riis; Seidl, H.

    2004-01-01

    The spi-calculus is a variant of the polyadic pi-calculus that admits symmetric cryptography and that admits expressing communication protocols in a precise though still abstract way. This paper shows that context-independent control flow analysis can be calculated in cubic time despite the fact ...

  7. SMART AS A CRYPTOGRAPHIC PROCESSOR

    Directory of Open Access Journals (Sweden)

    Saroja Kanchi

    2016-05-01

    Full Text Available SMaRT is a 16-bit 2.5-address RISC-type single-cycle processor, which was recently designed and successfully mapped into a FPGA chip in our ECE department. In this paper, we use SMaRT to run the well-known encryption algorithm, Data Encryption Standard. For information security purposes, encryption is a must in today’s sophisticated and ever-increasing computer communications such as ATM machines and SIM cards. For comparison and evaluation purposes, we also map the same algorithm on the HC12, a same-size but CISC-type off-the-shelf microcontroller, Our results show that compared to HC12, SMaRT code is only 14% longer in terms of the static number of instructions but about 10 times faster in terms of the number of clock cycles, and 7% smaller in terms of code size. Our results also show that 2.5- address instructions, a SMaRT selling point, amount to 45% of the whole R-type instructions resulting in significant improvement in static number of instructions hence code size as well as performance. Additionally, we see that the SMaRT short-branch range is sufficiently wide in 90% of cases in the SMaRT code. Our results also reveal that the SMaRT novel concept of locality of reference in using the MSBs of the registers in non-subroutine branch instructions stays valid with a remarkable hit rate of 95%!

  8. Calling patterns in human communication dynamics

    CERN Document Server

    Jiang, Zhi-Qiang; Li, Ming-Xia; Podobnik, Boris; Zhou, Wei-Xing; Stanley, H Eugene; 10.1073/pnas.1220433110

    2013-01-01

    Modern technologies not only provide a variety of communication modes, e.g., texting, cellphone conversation, and online instant messaging, but they also provide detailed electronic traces of these communications between individuals. These electronic traces indicate that the interactions occur in temporal bursts. Here, we study the inter-call durations of the 100,000 most-active cellphone users of a Chinese mobile phone operator. We confirm that the inter-call durations follow a power-law distribution with an exponential cutoff at the population level but find differences when focusing on individual users. We apply statistical tests at the individual level and find that the inter-call durations follow a power-law distribution for only 3460 individuals (3.46%). The inter-call durations for the majority (73.34%) follow a Weibull distribution. We quantify individual users using three measures: out-degree, percentage of outgoing calls, and communication diversity. We find that the cellphone users with a power-law...

  9. Dynamic routing based on call quality

    CERN Document Server

    Hammami, Oussama; Gabrielyan, Emin

    2009-01-01

    The telephony over IP (ToIP) is becoming a new trend in technology widely used nowadays in almost all business sectors. Its concepts rely on transiting the telephone communications through the IP network. Today, this technology is deployed increasingly what the cause of emergence of companies is offering this service as Switzernet. For several highly demanded destinations, recently fake vendors appeared in the market offering voice termination but providing only false answer supervision. The answered signal is returned immediately and calls are being charged without being connected. Different techniques are used to keep the calling party on the line. One of these techniques is to play a record of a ring back tone (while the call is already being charged). Another, more sophisticated technique is to play a human voice randomly picked up from a set of records containing contents similar to: hello, hello, I cannot hear you Apart the fact that the fallaciously established calls are charged at rates of real calls,...

  10. Ship construction

    National Research Council Canada - National Science Library

    Eyres, D.J; Bruce, G.J

    2012-01-01

    .... "Acting as both a professional reference on current approaches in shipyard practice and a comprehensive introduction for students in any marine discipline, Ship Construction covers the complete...

  11. Constructive Fun.

    Science.gov (United States)

    Simanek, Donald E.

    1994-01-01

    Compares and reviews currently available brands of steel construction sets that are useful to physics teachers for building demonstrations, prototypes of mechanisms, robotics, and remote control devices. (ZWH)

  12. Dispatching function calls across accelerator devices

    Energy Technology Data Exchange (ETDEWEB)

    Jacob, Arpith C.; Sallenave, Olivier H.

    2017-01-17

    In one embodiment, a computer-implemented method for dispatching a function call includes receiving, at a supervisor processing element (PE) and from an origin PE, an identifier of a target device, a stack frame of the origin PE, and an address of a function called from the origin PE. The supervisor PE allocates a target PE of the target device. The supervisor PE copies the stack frame of the origin PE to a new stack frame on a call stack of the target PE. The supervisor PE instructs the target PE to execute the function. The supervisor PE receives a notification that execution of the function is complete. The supervisor PE copies the stack frame of the target PE to the stack frame of the origin PE. The supervisor PE releases the target PE of the target device. The supervisor PE instructs the origin PE to resume execution of the program.

  13. Malware Classification based on Call Graph Clustering

    CERN Document Server

    Kinable, Joris

    2010-01-01

    Each day, anti-virus companies receive tens of thousands samples of potentially harmful executables. Many of the malicious samples are variations of previously encountered malware, created by their authors to evade pattern-based detection. Dealing with these large amounts of data requires robust, automatic detection approaches. This paper studies malware classification based on call graph clustering. By representing malware samples as call graphs, it is possible to abstract certain variations away, and enable the detection of structural similarities between samples. The ability to cluster similar samples together will make more generic detection techniques possible, thereby targeting the commonalities of the samples within a cluster. To compare call graphs mutually, we compute pairwise graph similarity scores via graph matchings which approximately minimize the graph edit distance. Next, to facilitate the discovery of similar malware samples, we employ several clustering algorithms, including k-medoids and DB...

  14. Dispatching function calls across accelerator devices

    Energy Technology Data Exchange (ETDEWEB)

    Jacob, Arpith C.; Sallenave, Olivier H.

    2017-01-10

    In one embodiment, a computer-implemented method for dispatching a function call includes receiving, at a supervisor processing element (PE) and from an origin PE, an identifier of a target device, a stack frame of the origin PE, and an address of a function called from the origin PE. The supervisor PE allocates a target PE of the target device. The supervisor PE copies the stack frame of the origin PE to a new stack frame on a call stack of the target PE. The supervisor PE instructs the target PE to execute the function. The supervisor PE receives a notification that execution of the function is complete. The supervisor PE copies the stack frame of the target PE to the stack frame of the origin PE. The supervisor PE releases the target PE of the target device. The supervisor PE instructs the origin PE to resume execution of the program.

  15. Hourly associations between heat and ambulance calls.

    Science.gov (United States)

    Guo, Yuming

    2017-01-01

    The response speed of ambulance calls is very crucial to rescue patients suffering immediately life threatening conditions. The serious health outcomes might be caused by exposing to extreme heat only several hours before. However, limited evidence is available on this topic. This study aims to examine the hourly association between heat and ambulance calls, to improve the ambulance services and to better protect health. Hourly data on ambulance calls for non-accidental causes, temperature and air pollutants (PM10, NO2, and O3) were collected from Brisbane, Australia, during 2001 and 2007. A time-stratified case-crossover design was used to examine the associations between hourly ambulance calls and temperature during warm season (Nov, Dec, Jan, Feb, and Mar), while adjusting for potential confounders. Stratified analyses were performed for sex and age groups. Ambulance calls peaked at 10am for all groups, except those aged heat-ambulance calls relationships were non-linear for all groups, with thresholds between 27 °C and 31 °C. The associations appeared immediately, and lasted for about 24 h. There were no significant modification effect by sex and age. The findings suggest that hot hourly temperatures (>27 °C) increase the demands of ambulance. This information is helpful to increase the efficiency of ambulance service then save lives, for example, preparing more ambulance before appearance of extremely hot temperature in combination with weather forecast. Also, people should better arrange their time for outdoor activities to avoid exposing to extreme hot temperatures. Copyright © 2016 Elsevier Ltd. All rights reserved.

  16. Analysis of The Call of The Wild

    Institute of Scientific and Technical Information of China (English)

    于婷婷

    2012-01-01

    The Call of The Wild is the most famous novel written by Jack London. In this novel, London depicts the story of a powerful dog called Buck, which happened in the Gold Rush Times when a great number of people came to Alaska to find gold. It tells us how Buck learns to struggle and strive, and how his wildness is aroused. By narrating Buck' s experience, London shows us some of the temporary social characters: the indispensable struggle for mastery and the nature of humanbeings -- wild etc. It reflects the major thoughts of that time. This essay will analyze this theme -- the indispensable struggle for mastery.

  17. Securing Remote Procedure Calls over HTTPS

    CERN Document Server

    Kale, Ajinkya; Pradhan, Sudeep

    2009-01-01

    Remote Procedure Calls (RPC) are widely used over the Internet as they provide a simple and elegant way of interaction between the client and the server. This paper proposes a solution for securing the remote procedure calls (RPC) by tunneling it through HTTPS (Hypertext Transfer Protocol over Secure Socket Layer). RPC over HTTP actually uses the Secure Socket Layer (SSL) protocol as a transport for the traffic. SSL mandates that the server authenticates itself to the client using a digital certificate (and associated private key). SSL is normally configured to encrypt traffic before transmitting it between the server and client and vice versa.

  18. ParticleCall: A particle filter for base calling in next-generation sequencing systems

    Directory of Open Access Journals (Sweden)

    Shen Xiaohu

    2012-07-01

    Full Text Available Abstract Background Next-generation sequencing systems are capable of rapid and cost-effective DNA sequencing, thus enabling routine sequencing tasks and taking us one step closer to personalized medicine. Accuracy and lengths of their reads, however, are yet to surpass those provided by the conventional Sanger sequencing method. This motivates the search for computationally efficient algorithms capable of reliable and accurate detection of the order of nucleotides in short DNA fragments from the acquired data. Results In this paper, we consider Illumina’s sequencing-by-synthesis platform which relies on reversible terminator chemistry and describe the acquired signal by reformulating its mathematical model as a Hidden Markov Model. Relying on this model and sequential Monte Carlo methods, we develop a parameter estimation and base calling scheme called ParticleCall. ParticleCall is tested on a data set obtained by sequencing phiX174 bacteriophage using Illumina’s Genome Analyzer II. The results show that the developed base calling scheme is significantly more computationally efficient than the best performing unsupervised method currently available, while achieving the same accuracy. Conclusions The proposed ParticleCall provides more accurate calls than the Illumina’s base calling algorithm, Bustard. At the same time, ParticleCall is significantly more computationally efficient than other recent schemes with similar performance, rendering it more feasible for high-throughput sequencing data analysis. Improvement of base calling accuracy will have immediate beneficial effects on the performance of downstream applications such as SNP and genotype calling. ParticleCall is freely available at https://sourceforge.net/projects/particlecall.

  19. 76 FR 36130 - Call for Candidates

    Science.gov (United States)

    2011-06-21

    ... From the Federal Register Online via the Government Publishing Office FEDERAL ACCOUNTING STANDARDS ADVISORY BOARD Call for Candidates AGENCY: Federal Accounting Standards Advisory Board. ACTION: Request for... Accounting Standards Advisory Board (FASAB or the Board) with the requested materials in response to...

  20. Authenticity in CALL: Three Domains of "Realness"

    Science.gov (United States)

    Buendgens-Kosten, Judith

    2013-01-01

    This paper discusses the role of authenticity and authenticity claims in computer assisted language learning (CALL). It considers authenticity as the result of a social negotiation process rather than an innate feature of a text, object, person, or activity. From this basis, it argues that authenticity claims play an important role in both second…

  1. A Call for School Counseling Practitioner Research

    Science.gov (United States)

    Kaffenberger, Carol J.

    2012-01-01

    Despite the repeated call to increase the number of practitioner research manuscripts being published in counseling publications, practitioner research accounts for less than five percent of all manuscripts published. This article describes the challenges faced by practitioners seeking to publish their research, defines practitioner research, and…

  2. A Simple Selection System Called "Jobmatch."

    Science.gov (United States)

    Sheibar, Paul

    1979-01-01

    An automated candidate-job matching system called "Jobmatch" has been implemented at Citibank, in New York City, involving job analysis, performance appraisal techniques, clerical employment, and internal mobility. A job task scale is used by supervisor and employee to determine job and candidate matching through a series of computer…

  3. When to call a linear system nonnegative

    NARCIS (Netherlands)

    Nieuwenhuis, J.W.

    1998-01-01

    In this paper we will consider discrete time invariant linear systems that allow for an input-state-output representation with a finite dimensional state space, and that have a finite number of inputs and outputs. The basic issue in this paper is when to call these systems nonnegative. An important

  4. Calling, is there anything special about it?

    African Journals Online (AJOL)

    2016-07-15

    Jul 15, 2016 ... While we admit that it is a core concept in theology and ministerial practice, we ask, ... It was this commitment to his calling that inspired us to explore the theme of ..... 'vocation', ended on a very personal note, emphasising the.

  5. Bridging CALL & HCI: Input from Participatory Design

    Science.gov (United States)

    Cardenas-Claros, Monica S.; Gruba, Paul A.

    2010-01-01

    Participatory design (PD), or the collaboration between software engineers and end users throughout the design process, may help improve CALL design practices. In this case study, four ESL learners, a software designer, and a language teacher created and evaluated a series of paper prototypes concerning help options in computer-based second…

  6. Bridging CALL & HCI: Input from Participatory Design

    Science.gov (United States)

    Cardenas-Claros, Monica S.; Gruba, Paul A.

    2010-01-01

    Participatory design (PD), or the collaboration between software engineers and end users throughout the design process, may help improve CALL design practices. In this case study, four ESL learners, a software designer, and a language teacher created and evaluated a series of paper prototypes concerning help options in computer-based second…

  7. Optimization of Overflow Policies in Call Centers

    DEFF Research Database (Denmark)

    Koole, G.M.; Nielsen, B.F.; Nielsen, T.B.

    2015-01-01

    We examine how overflow policies in a multi-skill call center should be designed to accommodate performance measures that depend on waiting time percentiles such as service level. This is done using a discrete Markovian approximation of the waiting time of the first customers waiting in line...... and customers are treated in a FCFS order....

  8. What Is This Thing Called Learner's Lexicography?

    DEFF Research Database (Denmark)

    Nielsen, Sandro

    2010-01-01

    Learner lexicography as a research area has attracted increased attention during the past decades, but what is actually the true nature of learner lexicography? This question calls for a complex answer. Learner lexicography has as its objective to develop principles that help practitioners to pro...

  9. Calling for Goddesses in Winesburg Ohio

    Institute of Scientific and Technical Information of China (English)

    付燕

    2013-01-01

    Winesburg Ohio, by Sherwood Anderson, depicts a group of people living in a transitional period where the human soci⁃ety was undergoing a sudden change from an agrarian society into a modern industrial one. This article will interpret Anderson’s call from the aspect of“Goddess Revival”.

  10. Make a 21st century phone call

    CERN Multimedia

    Katarina Anthony

    2014-01-01

    Want to avoid roaming charges? Click to call anyone at CERN? How about merging your CERN landline with your existing smartphone? That's all easily done with Lync, CERN's new opt-in service that can take your calls to the next level.   The Lync application on Windows (left) and iPhone (right). Lync unites CERN's traditional telephone service with the digital sphere. "Lync gives you the gift of mobility, by letting you access your CERN landline on the go," explains Pawel Grzywaczewski, service manager of the Lync system. "Once you've registered your CERN telephone with the service, you can run the Lync application and make calls from a range of supported devices. No matter where you are in the world - be it simply out to lunch or off at an international conference - you can make a CERN call as though you were in the office. All you need is an Internet connection!" Following a recent upgrade, CERN's Lync service now has...

  11. Construction Cost Prediction by Using Building Information Modeling

    National Research Council Canada - National Science Library

    Remon F. Aziz

    2015-01-01

    The increased interest in using Building Information Modeling (BIM) in detailed construction cost estimates calls for methodologies to evaluate the effectiveness of BIM-Assisted Detailed Estimating (BADE...

  12. Time series modeling of daily abandoned calls in a call centre ...

    African Journals Online (AJOL)

    Time series modeling of daily abandoned calls in a call centre. ... were shown to be both parsimonious and adequate using the P-P plots, Q-Q plots and residual analysis. ... The data for application were got from a GSM telephone provider.

  13. LA CONSTRUCCIÓN TEÓRICA Y PRÁCTICA DE UN NUEVO HÁBITAT MODERNO: UNOS PATIOS Y UNA CALLE (1946-1954 / The theoretical and practical construction of a new modern habitat: some patios and a street (1946-1954

    Directory of Open Access Journals (Sweden)

    Juan Pedro Sanz Alarcón

    2013-11-01

    European architects in exile, with the figure of the Spanish architect Sert as an outstanding example in the United States, favoured new lines of work. His 1946 proposals in the Peruvian city of Chimbote showed “a more human” concern than the previous examples. The great leap in these approaches took place in the early 50s when the young collaborators of Le Corbusier were entrusted with the construction of the Unité d’Habitation at Marseilles, and through the well-known ATBAT-Afrique group, in the construction of new suburbs in Casablanca. The proposals of patio houses developed there by Ecochard and Candilis, along with the urban proposals of the Smithsons in London, came together in the CIAM IX that brought about the creation of TEAM 10. This was the turning point and the start towards a new concept of the contemporary habitat.

  14. BUSINESS MODELS FOR EXTENDING OF 112 EMERGENCY CALL CENTER CAPABILITIES WITH E-CALL FUNCTION INSERTION

    Directory of Open Access Journals (Sweden)

    Pop Dragos Paul

    2010-12-01

    Full Text Available The present article concerns present status of implementation in Romania and Europe of eCall service and the proposed business models regarding eCall function implementation in Romania. eCall system is used for reliable transmission in case of crush between In Vehicle System and Public Service Answering Point, via the voice channel of cellular and Public Switched Telephone Network (PSTN. eCall service could be initiated automatically or manual the driver. All data presented in this article are part of researches made by authors in the Sectorial Contract Implementation study regarding eCall system, having as partners ITS Romania and Electronic Solution, with the Romanian Ministry of Communication and Information Technology as beneficiary.

  15. Towards Building an Intelligent Call Routing System

    Directory of Open Access Journals (Sweden)

    Thien Khai Tran

    2016-01-01

    Full Text Available This paper presents EduICR - an Intelligent Call Routing system. This system can route calls to the most appropriate agent using routing rules built by the text classifier. EduICR includes the following main components: telephone communication network; Vietnamese speech recognition; Text classifier/ Natural language processor and Vietnamese speech synthesis. To our best knowledge, this is one of the first systems in Vietnam to implement the integration mechanism of text processing and speech processing. This allows voice applications to be more intelligent, able to communicate with humans in natural language with high accuracy and reasonable speed. Having been built and tested in real environment, our system proves its accuracy attaining more than 95%.

  16. Designing CALL Tasks for College English Learners

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    <正>As CALL(Computer Assisted Language Learning) became a new trend among China’s college English learners nowadays,it is time that teachers reflected on their teaching methodology innovation with the new technological advancement,one part of it is writing CALL tasks for their own individual classes.This paper presents a few basic principles and rationales of designing such tasks,and hope to work as a reminder for task writers.These principles and rationales include how to realize CLT(communicative language teaching) and learner-centredness and foster learner autonomy.In order to achieve this,it is reminded that task writers pay attention to a few points,like the communicativeness,contextualization,authenticity,and relatedness in task writing. Aspects of syllabus design,choice of texts,contents of activities and tasks and sequencing are put under investigation.

  17. Disentangling Social Networks inferred from Call Logs

    CERN Document Server

    Cebrian, Manuel; Kirkpatrick, Scott

    2010-01-01

    Analysis of an unusually detailed telephone call data set --- a month of nearly all mobile and landline phone calls placed during August 2005 the United Kingdom --- allows us to identify several different types of social networks that are formed, and relate them to different activities that generate them. We distinguish, among others, work-related and personal or leisure-focused activities and show that the networks they form have very different characteristics. Our principal tool for the analysis, k-core decomposition, shows that distinct distributions of connectivity are present in the two spheres, and that this differentiation affects dramatically the dynamics of information diffusion. Both differ from the simpler and more globally connected structure evident in communications data such as the Internet AS graph.

  18. Construction aggregates

    Science.gov (United States)

    Nelson, T.I.; Bolen, W.P.

    2007-01-01

    Construction aggregates, primarily stone, sand and gravel, are recovered from widespread naturally occurring mineral deposits and processed for use primarily in the construction industry. They are mined, crushed, sorted by size and sold loose or combined with portland cement or asphaltic cement to make concrete products to build roads, houses, buildings, and other structures. Much smaller quantities are used in agriculture, cement manufacture, chemical and metallurgical processes, glass production and many other products.

  19. Responsible construction?

    OpenAIRE

    Lou, Eric; Lee,Angela; WU, SONG; Mathison, Gill

    2015-01-01

    The ability of the construction industry to innovate in order to improve its practice has been widely debated over the years. As more and more organisations in other sectors, globally, are addressing 21st century consumer challenges: encompassing fair-trade, ethically sourced and more recycled products; and are reporting on their corporate responsibility performance (such as Marks and Spencer's Plan A, The Co-operative, The Body Shop etc), isn't it about time the construction industry followe...

  20. What is that Thing Called Computer Science?

    Directory of Open Access Journals (Sweden)

    Nadya Schokosva

    2013-07-01

    Full Text Available XXI century society, called Knowledge Society, has a direct dependency of the software products, considered by many as the most important development of modern technology. This dependence generates the need of scientists and professionals who research and develop products that meet social demands. This article describes the computer science area as one of the most demanded professions in this reality, and in order to make it known to more people.

  1. Sleep Inertia and On-Call Readiness

    Science.gov (United States)

    2000-03-01

    effects of polyphasic & M.J. Colligan (Eds.), New York, and ultrashort sleep schedules. In: Why Spectrum, pp. 553-580. we nap, Evolution, Chronobiology...and Naitoh, P., Kelly, T., & Babkoff, H. (1993) Functions of Polyphasic and Ultrashort Sleep inertia, best time not to wake up? Sleep , C. Stampi Editor...UNCLASSIFIED Defense Technical Information Center Compilation Part Notice ADP010467 TITLE: Sleep Inertia and On-Call Readiness DISTRIBUTION: Approved

  2. Evaluating erroneous offside calls in soccer

    Science.gov (United States)

    Hüttermann, Stefanie; Noël, Benjamin; Memmert, Daniel

    2017-01-01

    The ability to simultaneously attend to multiple objects declines with increases in the visual angle separating distant objects. We explored whether these laboratory-measured limits on visual attentional spread generalize to a real life context: offside calls by soccer assistant referees. We coded all offside calls from a full year of first division German soccer matches. By determining the x-y coordinates of the relevant players and assistant referee on the soccer field we were able to calculate how far assistant referees had to spread their visual attention to perform well. Counterintuitively, assistant referees made fewer errors when they were farther away from the action due to an advantageous (smaller) visual angle on the game action. The pattern held even when we accounted for individual differences in a laboratory-based attentional spread measure of ten of the assistant referees. Our finding that errors are linked to smaller visual angles may explain the complaints of fans in some situations: Those seated directly behind the assistant referee, further from the players, might actually have it easier to make the right call because the relevant players would form a smaller visual angle. PMID:28333996

  3. “Computer Assisted Language Learning” (CALL

    Directory of Open Access Journals (Sweden)

    Nazlı Gündüz

    2005-10-01

    Full Text Available This article will provide an overview of computers; an overview of the history of CALL, itspros and cons, the internet, World Wide Web, Multimedia, and research related to the uses of computers in the language classroom. Also, it also aims to provide some background for the beginnerson using the Internet in language classes today. It discusses some of the common types of Internetactivities that are being used today, what the minimum requirements are for using the Internet forlanguage learning, and some easy activities you can adapt for your classes. Some special terminology related to computers will also be used in this paper. For example, computer assisted language learning(CALL refers to the sets of instructions which need to be loaded into the computer for it to be able to work in the language classroom. It should be borne in mind that CALL does not refer to the use of acomputer by a teacher to type out a worksheet or a class list or preparing his/her own teaching alone.Hardware refers to any computer equipment used, including the computer itself, the keyboard, screen (or the monitor, the disc-drive, and the printer. Software (computer programs refers to the sets of instructions which need to be loaded into the computer for it to be able to work.

  4. Evaluating erroneous offside calls in soccer.

    Science.gov (United States)

    Hüttermann, Stefanie; Noël, Benjamin; Memmert, Daniel

    2017-01-01

    The ability to simultaneously attend to multiple objects declines with increases in the visual angle separating distant objects. We explored whether these laboratory-measured limits on visual attentional spread generalize to a real life context: offside calls by soccer assistant referees. We coded all offside calls from a full year of first division German soccer matches. By determining the x-y coordinates of the relevant players and assistant referee on the soccer field we were able to calculate how far assistant referees had to spread their visual attention to perform well. Counterintuitively, assistant referees made fewer errors when they were farther away from the action due to an advantageous (smaller) visual angle on the game action. The pattern held even when we accounted for individual differences in a laboratory-based attentional spread measure of ten of the assistant referees. Our finding that errors are linked to smaller visual angles may explain the complaints of fans in some situations: Those seated directly behind the assistant referee, further from the players, might actually have it easier to make the right call because the relevant players would form a smaller visual angle.

  5. Knowledge-based planning for construction projects

    Energy Technology Data Exchange (ETDEWEB)

    Zozaya-Gorostiza, C.A.

    1988-01-01

    This study investigates the development of knowledge-based computer tools that assist an engineer during the construction planning process. A knowledge-based expert-system architecture which provides means for representing and using project planning knowledge is described. This architecture, called PLANEX, has been used for developing three prototype knowledge-based systems for construction, excavation, and manufacturing project planning. One of these prototypes, called CONSTRUCTION PLANEX, assists in the planning for the excavation and structural erection of concrete and steel buildings. This system uses construction planning knowledge to generate project activity networks, recommend appropriate construction technologies, estimate durations and costs and prepare project schedules. CONSTRUCTION PLANEX has been applied in laboratory simulations in three ways: interactively as an intelligent assistant, independently as an automated planner, and as part of an integrated building design environment. Example applications have ranged from two to twenty stories. The development of the PLANEX architecture and the CONSTRUCTION PLANEX system produced contributions in several research areas.

  6. Precision Cryptographic Calculation of the Observed Values of the Cosmological Constants {\\Omega}{\\Lambda} and {\\Omega}m as a Manifestation of the Higgs State in the Extension Field

    CERN Document Server

    Rhodes, Charles

    2010-01-01

    The Higgs concept can be assigned a precise quantitative cosmic identity with a physically anchored cryptographic analysis. Specifically demonstrated is the direct correspondence of the supersymmetric solution pair (BHh1 and BHh2) of the Higgs Congruence in the extension field to the observed magnitudes of the cosmological constants and . These results are in perfect agreement with the maximally preferred magnitudes of these quantities as experimentally determined (0.712 < {\\Omega}{\\Lambda}< 0.758 and 0.242 < {\\Omega}m< 0.308) by the concordance of measured ranges. The corresponding theoretical values found also satisfy exactly the condition for perfect flatness, an outcome that is legislated by the concept of supersymmetry in . Since previous work has established that the fine-structure constant {\\alpha} can be uniquely computed in the corresponding physically defined prime field , in sharp accord with the best high-precision measurement (~370 ppt) of {\\alpha}, the computation of and with the ide...

  7. LAS CHICAS EN LA CASA, LOS CHICOS EN LA CALLE. CONSTRUCCIÓN GENÉRICA, VIOLENCIA Y PRÁCTICAS DE SOCIABILIDAD EN VILLA EL NAILON, CÓRDOBA / The girls in the house, the boys on the street. General construction, violence and sociability practices in Córdoba

    Directory of Open Access Journals (Sweden)

    María Elena Previtali

    2010-12-01

    which from the earliest infancy they structure the uses of the different spaces of the villa with the divisions and inequalities in the relations of conyugality. The analysis of labor practices and of friendship are constituted also in central areas to understand how the use of the violence in the exchanges between young people and groups regulate the relations and are constituted in symbolic spaces to construct and to demonstrate masculinities or femininity that face and are not bent easily.   Keywords: young; spaces; couples; gender; violence.

  8. Entrepreneurship research and practice: a call to action for psychology.

    Science.gov (United States)

    Hisrich, Robert; Langan-Fox, Janice; Grant, Sharon

    2007-09-01

    Entrepreneurship is a major source of employment, economic growth, and innovation, promoting product and service quality, competition, and economic flexibility. It is also a mechanism by which many people enter the society's economic and social mainstream, aiding culture formation, population integration, and social mobility. This article aims to illuminate research opportunities for psychologists by exposing gaps in the entrepreneurship literature and describing how these gaps can be filled. A "call to action" is issued to psychologists to develop theory and undertake empirical research focusing on five key topic areas: the personality characteristics of entrepreneurs, the psychopathology of entrepreneurs, entrepreneurial cognition, entrepreneurship education, and international entrepreneurship. Methodological issues are discussed and recommendations provided. It is shown that psychologists can help identify the factors that influence new venture creation and success and inform the construction of public policy to facilitate entrepreneurship.

  9. SNP calling by sequencing pooled samples

    Directory of Open Access Journals (Sweden)

    Raineri Emanuele

    2012-09-01

    Full Text Available Abstract Background Performing high throughput sequencing on samples pooled from different individuals is a strategy to characterize genetic variability at a small fraction of the cost required for individual sequencing. In certain circumstances some variability estimators have even lower variance than those obtained with individual sequencing. SNP calling and estimating the frequency of the minor allele from pooled samples, though, is a subtle exercise for at least three reasons. First, sequencing errors may have a much larger relevance than in individual SNP calling: while their impact in individual sequencing can be reduced by setting a restriction on a minimum number of reads per allele, this would have a strong and undesired effect in pools because it is unlikely that alleles at low frequency in the pool will be read many times. Second, the prior allele frequency for heterozygous sites in individuals is usually 0.5 (assuming one is not analyzing sequences coming from, e.g. cancer tissues, but this is not true in pools: in fact, under the standard neutral model, singletons (i.e. alleles of minimum frequency are the most common class of variants because P(f ∝ 1/f and they occur more often as the sample size increases. Third, an allele appearing only once in the reads from a pool does not necessarily correspond to a singleton in the set of individuals making up the pool, and vice versa, there can be more than one read – or, more likely, none – from a true singleton. Results To improve upon existing theory and software packages, we have developed a Bayesian approach for minor allele frequency (MAF computation and SNP calling in pools (and implemented it in a program called snape: the approach takes into account sequencing errors and allows users to choose different priors. We also set up a pipeline which can simulate the coalescence process giving rise to the SNPs, the pooling procedure and the sequencing. We used it to compare the

  10. Calling patterns in human communication dynamics.

    Science.gov (United States)

    Jiang, Zhi-Qiang; Xie, Wen-Jie; Li, Ming-Xia; Podobnik, Boris; Zhou, Wei-Xing; Stanley, H Eugene

    2013-01-29

    Modern technologies not only provide a variety of communication modes (e.g., texting, cell phone conversation, and online instant messaging), but also detailed electronic traces of these communications between individuals. These electronic traces indicate that the interactions occur in temporal bursts. Here, we study intercall duration of communications of the 100,000 most active cell phone users of a Chinese mobile phone operator. We confirm that the intercall durations follow a power-law distribution with an exponential cutoff at the population level but find differences when focusing on individual users. We apply statistical tests at the individual level and find that the intercall durations follow a power-law distribution for only 3,460 individuals (3.46%). The intercall durations for the majority (73.34%) follow a Weibull distribution. We quantify individual users using three measures: out-degree, percentage of outgoing calls, and communication diversity. We find that the cell phone users with a power-law duration distribution fall into three anomalous clusters: robot-based callers, telecom fraud, and telephone sales. This information is of interest to both academics and practitioners, mobile telecom operators in particular. In contrast, the individual users with a Weibull duration distribution form the fourth cluster of ordinary cell phone users. We also discover more information about the calling patterns of these four clusters (e.g., the probability that a user will call the c(r)-th most contact and the probability distribution of burst sizes). Our findings may enable a more detailed analysis of the huge body of data contained in the logs of massive users.

  11. The Seneca Amplification Construction

    Directory of Open Access Journals (Sweden)

    Wallace Chafe

    2012-01-01

    Full Text Available The polysynthetic morphology of the Northern Iroquoian languages presents a challenge to studies of clause combining. The discussion here focuses on a Seneca construction that may appear within a single clause but may also straddle clause boundaries. It amplifies the information provided by a referent, here called the trigger, that is introduced by the pronominal prefix within a verb or occasionally in some other way. The particle neh signals that further information about that referent will follow. This construction is found at four levels of syntactic complexity. At the first level the trigger and its amplification occur within the same prosodic phrase and the amplification is a noun. At the second level the amplification occurs in a separate prosodic phrase but remains a noun. At the third level the amplification exhibits verb morphology but has been lexicalized with a nominal function. At the fourth level the amplification functions as a full clause and neh serves as a marker of clause combining. Several varieties of amplification are discussed, as are cases in which the speaker judges that no amplification is needed. It is suggested that the typologically similar Caddo language illustrates a situation in which this construction could never arise, simply because Caddo verbs lack the pronominal element that triggers the construction in Seneca.

  12. Construction safety

    CERN Document Server

    Li, Rita Yi Man

    2013-01-01

    A close-to-ideal blend of suburb and city, speedy construction of towers of Babylon, the sparkling proportion of glass and steel buildings’ facade at night showcase the wisdom of humans. They also witness the footsteps, sweats and tears of architects and engineers. Unfortunately, these signatures of human civilizations are swathed in towering figures of construction accidents. Fretting about these on sites, different countries adopt different measures on sites. This book firstly sketches the construction accidents on sites, followed by a review on safety measures in some of the developing countries such as Bermuda, Egypt, Kuwait and China; as well as developed countries, for example, the United States, France and Singapore. It also highlights the enormous compensation costs with the courts’ experiences in the United Kingdom and Hong Kong.

  13. Call for another special issue / book

    Science.gov (United States)

    Bostenaru Dan, M.

    2009-04-01

    We would like to continue the series of special issue or maybe edit a book on this topic. To complete the formerly edited special issues we would like to link natural hazards research to cultural heritage research. We see a way of doing this connected to "integrated conservation", which sees the involvment of urban planning in conservation, as well as the (urban) sociology, the integration of the user, the participatism. We further call for investigation of GIS applications for the investigation of natural hazards' impact in this field. We are open for further ideas and wait for you at the Splinter meeting.

  14. First Class Call Stacks: Exploring Head Reduction

    Directory of Open Access Journals (Sweden)

    Philip Johnson-Freyd

    2016-06-01

    Full Text Available Weak-head normalization is inconsistent with functional extensionality in the call-by-name λ-calculus. We explore this problem from a new angle via the conflict between extensionality and effects. Leveraging ideas from work on the λ-calculus with control, we derive and justify alternative operational semantics and a sequence of abstract machines for performing head reduction. Head reduction avoids the problems with weak-head reduction and extensionality, while our operational semantics and associated abstract machines show us how to retain weak-head reduction's ease of implementation.

  15. Call center. Centrados en el cliente

    OpenAIRE

    Leal-Alonso-de-Castañeda, José Enrique

    2003-01-01

    La empresa actual ha de estar preparada para responder al Cliente tal y como éste espera, porque no se busca un cliente puntual, sino un cliente fiel. La globalización de la economía y del acceso a los mercados exige que la empresa sea capaz de atraer al cliente no sólo con un servicio de calidad, sino además con una atención de calidad. La implantación de un Call Center (Centro de Atención al Cliente, Centro de Atención de Llamadas) constituye por todo ello una estrategia de negocio qu...

  16. [Emergency calls in the Samu system].

    Science.gov (United States)

    Barrier, G

    2001-07-01

    The French emergency medical system is public and medical. Named Samu, it is almost entirely managed by anesthesiologists specially trained for emergency medical assistance and advanced medical support. The system comprises a reception and dispatching center for emergency calls, directly connected to police and firemen, but assuring patient confidentiality. This fixed center is managing mobile units which are Medical Intensive Care Ambulances (MICA named Smur in France). The Samu's mission consists in performing urgent individual medical assistance and also medical services for treatment of mass casualties. It is also to find adequate hospital units for the patients, to perform medical transport and to be a consultant for general practitioners in emergency.

  17. Theology links Christian ministry with God's call.

    Science.gov (United States)

    O'Connell, L J

    1984-03-01

    Catholic health care ministry originates in and is shaped by the theme of call in the Old and New Testaments. To be specifically Catholic, health professionals and facilities must define their ministries according to the values expressed in this theological tradition. Sponsorship. The opportunity to provide health care enables religious communities to contribute to God's ongoing creation process and to reiterate Christ's call to minister to others. Although health care facility sponsorship thrusts religious communities into the arena of big business, the abandonment of the health care mission could be considered a betrayal of evangelical values. Quality of life. The implicit concern for human dignity that distinguishes Catholic health care facilities should be evident in personalized patient care, just working conditions, and a commitment to healing in the civic community. Stewardship in ethics. The development of business policies and procedures and institutional responses to social change should be carefully considered in light of the Catholic understanding of loving covenant and the Christian way of life. Shared ministry. Health care facilities have played a leading role in implementing the Second Vatican Council's vision of ministry. Sponsoring communities' continued willingness to share responsibilities with laity will be imperative in meeting the health care demands of the future.

  18. Detecting Motifs in System Call Sequences

    CERN Document Server

    Wilson, William O; Aickelin, Uwe

    2010-01-01

    The search for patterns or motifs in data represents an area of key interest to many researchers. In this paper we present the Motif Tracking Algorithm, a novel immune inspired pattern identification tool that is able to identify unknown motifs which repeat within time series data. The power of the algorithm is derived from its use of a small number of parameters with minimal assumptions. The algorithm searches from a completely neutral perspective that is independent of the data being analysed, and the underlying motifs. In this paper the motif tracking algorithm is applied to the search for patterns within sequences of low level system calls between the Linux kernel and the operating system's user space. The MTA is able to compress data found in large system call data sets to a limited number of motifs which summarise that data. The motifs provide a resource from which a profile of executed processes can be built. The potential for these profiles and new implications for security research are highlighted. A...

  19. Milton Nascimento: una calle llamada mundo

    Directory of Open Access Journals (Sweden)

    Alberto Carlos De Souza

    2011-08-01

    Full Text Available El punto de partida de este estudio consistirá en la exploración de la musicalidad de Milton Nascimento y de sus compañeros del “movimiento” “Clube da Esquina”, destacándose la relevancia del conjunto de esa obra para la cultura brasilera. El referido “movimiento” floreció en Minas Gerais en el auge de uno de los períodos más críticos de la historia contemporánea brasilera: la dictadura militar. En tanto, el “Clube da Esquina” – dado a la diversidad de los temas tratados en sus letras y su singularidad poética -, luego se difundió por todo el espacio cultural brasilero. Hablar del “Clube da Esquina” no es tarea fácil porque hay una dolorosa ausencia o pálida presencia de este movimiento en estudios que se ocupan de nuestra música popular. El “Clube da Esquina” fue un círculo de amigos que se reunieron en un pequeño pub en la esquina de la Calle Divinópolis y Calle Paraisópolis, en un bucólico barrio de Belo Horizonte (Minas Gerais - Brasil, llamado Santa Teresa. Era parte de esa hermandad, interesada en música, cine y poesía, Milton Nascimento, Wagner Tiso, Fernando Brant, Toninho Horta, Beto Guedes, Moura Tavinho, los hermanos Lô y Marcio Borges, Robertinho Silva, Nivaldo Ornelas, Ronaldo Bastos, Murilo Antunes Nelson Angelo y Novelli, entre otros. En estas reuniones, regadas con mucha cerveza, Milton Nascimento y sus compañeros. Milton fue y sigue siendo la mayor referencia del movimiento “Clube da Esquina”. Abstract The starting point of this study will explore the music of Milton Nascimento and his fellow "movement" "Clube da Esquina", highlighting the relevance of all this work to the Brazilian culture. The aforementioned "movement" flourished in Minas Gerais at the height of one of the most critical periods in Brazilian contemporary history: the military dictatorship. Meanwhile, the "Clube da Esquina" - given the diversity of topics in his lyrics and his unique poetic - and then spread

  20. Layout Construction

    DEFF Research Database (Denmark)

    Frandsen, Gudmund Skovbjerg; Palsberg, Jens; Schmidt, Erik Meineche

    We design a system for generating newspaper layout proposals. The input to the system consists of editorial information (text, pictures, etc) and style information (non-editorial information that specifies the aesthetic appearance of a layout). We consider the automation of layout construction...

  1. Construction work

    CERN Multimedia

    2004-01-01

    Construction work on building 179 will start on the 16th February 2004 and continue until November 2004. The road between buildings 179 and 158 will temporarily become a one way street from Route Democrite towards building 7. The parking places between buildings 179 and 7 will become obsolete. The ISOLDE collaboration would like to apologize for any inconveniences.

  2. Layout Construction

    DEFF Research Database (Denmark)

    Frandsen, Gudmund Skovbjerg; Palsberg, Jens; Schmidt, Erik Meineche

    We design a system for generating newspaper layout proposals. The input to the system consists of editorial information (text, pictures, etc) and style information (non-editorial information that specifies the aesthetic appearance of a layout). We consider the automation of layout construction...

  3. Construction of a low-cost luximeter

    Science.gov (United States)

    Pedroso, L. S.; de Macedo, J. A.; de Araújo, M. S. T.; Voelzke, M. R.

    2016-04-01

    This paper proposes the construction of an electronic instrument called digital luximeter, combining simplicity and low cost, making it simpler and cheaper than those on the market. Its construction tends to facilitate dissemination and access to this type of measuring instrument between high school teachers and educational institutions, making it ideal to be a science lab.

  4. Call research: major themes and issues Call research: major themes and issues

    Directory of Open Access Journals (Sweden)

    Mike Levy

    2008-04-01

    Full Text Available Ao invés de apresentar uma perspectiva subjetiva sobre temas principais e questões de pesquisa em CALL, este artigo pretende oferecer um relatório em que, pelo menos em parte, os conceitos desenvolvidos são extraídos a partir de evidências empíricas. Espera-se que esse enfoque venha a oferecer uma descrição mais objetiva do trabalho contemporâneo de pesquisa em CALL. Para alcançar este objetivo, o presente trabalho está baseado em um corpus de 47 artigos de pesquisas em CALL, publicados em livros e periódicos de 1999. Com este fundamento, apresenta-se um modelo para a descrição e análise das pesquisas em CALL, assim como são representadas na literatura. Dois principais direcionamentos e outros três importantes, porém menos freqüentes, são descritos em detalhes, usando exemplos do corpus; e também consideram-se as implicações para pesquisas futuras. Uma ênfase particular será dada à identificação das metas dos pesquisadores de CALL e ao esclarecimento dos atributos singulares da pesquisa neste campo. Rather than provide a purely subjective perspective on major themes and issues in CALL research, this paper aims to provide an account where, at least in part, the views advanced are drawn from empirical evidence. It is hoped that this approach will provide a more objective description of contemporary CALL research work. To achieve this goal, the present paper is based upon a corpus of 47 CALL research articles published in books and journals in 1999. With this foundation it sets out a framework for the description and analysis of CALL research as it is represented in the literature. Two major directions and three important, though less frequent, directions are described in detail, using examples from the corpus, and the implications for research in the future are considered. Particular emphasis will be placed on identifying the goals of CALL researchers and on clarifying the unique attributes of research in this

  5. Foreign Language Learners' Beliefs about CALL: The Case of a U.S. Midwestern University

    Science.gov (United States)

    Sydorenko, Tetyana; Hsieh, Ching-Ni; Ahn, Seongmee; Arnold, Nike

    2017-01-01

    A significant body of research has examined language learners' attitudes toward particular technologies used in foreign language classrooms. However, literature is scarce on foreign language learners' beliefs toward computer-assisted language learning (CALL) in general. To narrow this gap, we investigated the constructs that compose a system of…

  6. Institutional dynamic of the call center industry in Denmark and France

    DEFF Research Database (Denmark)

    Sørensen, Ole H.; Beraud, Mathieu; Colin, Thierry

    2005-01-01

    The call centre development is substantially increasing in the most part of industrialized countries. Coming to the fore and seeking for staff, this sector is still looking for benchmarks, especially in terms of employment. Currently it can be said that the sector is under construction since its ...

  7. Performance of multi-service system with retrials due to blocking and called-party-busy

    DEFF Research Database (Denmark)

    Stepanov, S.N.; Kokina, O.A.; Iversen, Villy Bæk

    2008-01-01

    In this paper we construct a model of a multi-service system with an arbitrary number of bandwidth flow demands, taking into account retrials due to both blocking along the route and to called-party-busy. An approximate algorithm for estimation of key performance measures is proposed...

  8. Institutional dynamic of the call center industry in Denmark and France

    DEFF Research Database (Denmark)

    Sørensen, Ole H.; Beraud, Mathieu; Colin, Thierry

    2005-01-01

    The call centre development is substantially increasing in the most part of industrialized countries. Coming to the fore and seeking for staff, this sector is still looking for benchmarks, especially in terms of employment. Currently it can be said that the sector is under construction since its ...

  9. Learner Attitudes towards CALL Applications at YADIM

    Directory of Open Access Journals (Sweden)

    Zuhal OKAN & Pınar TORUN

    2007-12-01

    Full Text Available The use of educational technology to assist learners in their language studies has become agreat concern for scholars over the past decade. YADIM (School for Foreign Languages at ÇukurovaUniversity in Turkey has invested substantially to introduce students to computer-based languagelearning materials and to integrate technology into existing curriculum. This paper reports on attitudesof YADİM students towards the use of computer-assisted language learning (CALL and theirperceptions on CALL’s relevancy to their regular classroom work. Surveys and follow-up interviewsexplored how learners see the role of the instructor and the accessibility of the labs. The paper alsolooks at how students assess the impact of technology on their language learning process.

  10. Comprometimento organizacional de trabalhadores de call center

    Directory of Open Access Journals (Sweden)

    Kely César Martins Paiva

    2015-09-01

    Full Text Available RESUMOO Neste artigo, analisa-se como se apresenta o comprometimento organizacional de trabalhadores de um call center, localizado em Belo (A Horizonte (Minas Gerais, Brasil. Após o delineamento conceitual UJ do tema central, são expostos os resultados de um estudo de caso descritivo, realizado com abordagens quantitativa e qualitativa. Os dados de 399 questionários e 22 entrevistas são, respectivamente, tratados estatisticamente e submetidos à análise de conteúdo. A base de comprometimento que predominou entre esses infoproletários foi "obrigação pelo desempenho" e, em menor grau, "afetiva". Foi observado que quanto maior é o seu tempo de experiência nesse tipo de organização, menores são os níveis de comprometimento de modo geral, fatos esclarecidos, parcialmente, por meio das entrevistas.

  11. Acoustic signal detection of manatee calls

    Science.gov (United States)

    Niezrecki, Christopher; Phillips, Richard; Meyer, Michael; Beusse, Diedrich O.

    2003-04-01

    The West Indian manatee (trichechus manatus latirostris) has become endangered partly because of a growing number of collisions with boats. A system to warn boaters of the presence of manatees, that can signal to boaters that manatees are present in the immediate vicinity, could potentially reduce these boat collisions. In order to identify the presence of manatees, acoustic methods are employed. Within this paper, three different detection algorithms are used to detect the calls of the West Indian manatee. The detection systems are tested in the laboratory using simulated manatee vocalizations from an audio compact disc. The detection method that provides the best overall performance is able to correctly identify ~=96% of the manatee vocalizations. However the system also results in a false positive rate of ~=16%. The results of this work may ultimately lead to the development of a manatee warning system that can warn boaters of the presence of manatees.

  12. Learner Attitudes towards CALL Applications at YADIM

    Directory of Open Access Journals (Sweden)

    Zuhal OKAN & Pınar TORUN

    2014-01-01

    Full Text Available The use of educational technology to assist learners in their language studies has become agreat concern for scholars over the past decade. YADIM (School for Foreign Languages at ÇukurovaUniversity in Turkey has invested substantially to introduce students to computer-based languagelearning materials and to integrate technology into existing curriculum. This paper reports on attitudesof YADİM students towards the use of computer-assisted language learning (CALL and theirperceptions on CALL’s relevancy to their regular classroom work. Surveys and follow-up interviewsexplored how learners see the role of the instructor and the accessibility of the labs. The paper alsolooks at how students assess the impact of technology on their language learning process.

  13. Sandwich construction

    Science.gov (United States)

    Marshall, A.

    A form of composites known as structural sandwich construction is presented in terms of materials used, design details for solving edging and attachment problems, and charts of design material analysis. Sandwich construction is used in nearly all commercial airliners and helicopters, and military air and space vehicles, and it is shown that this method can stiffen a structure without causing a weight increase. The facing material can be made of 2024 or 7075 aluminum alloy, titanium, or stainless steel, and the core material can be wood or foam. The properties of paper honeycomb and various aluminum alloy honeycombs are presented. Factors pertaining to adhesive materials are discussed, including products given off during cure, bonding pressure, and adaptability. Design requirements and manufacturing specifications are resolved using numerous suggestions.

  14. Fireplace construction

    Energy Technology Data Exchange (ETDEWEB)

    Billmeyer, T.F.; Faehling, F.L.

    1979-05-08

    A prebuilt fireplace construction for installation in a building structure, such as a mobile home, is presented. The construction includes a firebox having an open side and a combustion gas outlet adapted to be placed in fluid communication with a flue. A transparent door is provided for substantially sealing the open side and a housing at least partially surrounds the firebox in close proximity thereto to define an air space therebetween. The air space has a relatively low inlet and a relatively high outlet. A conduit isolated from the air space is provided and is adapted to be placed in fluid communication with a source of outside air. The conduit opens into the firebox to provide combustion air. A baffle is interposed between the opening of the conduit into the firebox and the combustion area thereof.

  15. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies

    DEFF Research Database (Denmark)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew

    2012-01-01

    into R through native R, RSOAP, Rserve, and RPy interfaces, with the performance of native BioPerl, Biopython, BioJava, and BioRuby implementations, and with call stack bindings to BioJava and the European Molecular Biology Open Software Suite. In general, call stack approaches outperform native Bio......, and languages sharing the Java Virtual Machine stack. This functionality provides strategies for sharing of software between Bio* projects, which can be exploited more often. Here, we present cross-language examples for sequence translation, and measure throughput of the different options. We compare calling......* implementations and these, in turn, outperform RPC-based approaches. To test and compare strategies, we provide a downloadable BioNode image with all examples, tools, and libraries included. The BioNode image can be run on VirtualBox-supported operating systems, including Windows, OSX, and Linux....

  16. Sharing programming resources between Bio* projects through remote procedure call and native call stack strategies.

    Science.gov (United States)

    Prins, Pjotr; Goto, Naohisa; Yates, Andrew; Gautier, Laurent; Willis, Scooter; Fields, Christopher; Katayama, Toshiaki

    2012-01-01

    Open-source software (OSS) encourages computer programmers to reuse software components written by others. In evolutionary bioinformatics, OSS comes in a broad range of programming languages, including C/C++, Perl, Python, Ruby, Java, and R. To avoid writing the same functionality multiple times for different languages, it is possible to share components by bridging computer languages and Bio* projects, such as BioPerl, Biopython, BioRuby, BioJava, and R/Bioconductor. In this chapter, we compare the two principal approaches for sharing software between different programming languages: either by remote procedure call (RPC) or by sharing a local call stack. RPC provides a language-independent protocol over a network interface; examples are RSOAP and Rserve. The local call stack provides a between-language mapping not over the network interface, but directly in computer memory; examples are R bindings, RPy, and languages sharing the Java Virtual Machine stack. This functionality provides strategies for sharing of software between Bio* projects, which can be exploited more often. Here, we present cross-language examples for sequence translation, and measure throughput of the different options. We compare calling into R through native R, RSOAP, Rserve, and RPy interfaces, with the performance of native BioPerl, Biopython, BioJava, and BioRuby implementations, and with call stack bindings to BioJava and the European Molecular Biology Open Software Suite. In general, call stack approaches outperform native Bio* implementations and these, in turn, outperform RPC-based approaches. To test and compare strategies, we provide a downloadable BioNode image with all examples, tools, and libraries included. The BioNode image can be run on VirtualBox-supported operating systems, including Windows, OSX, and Linux.

  17. Unique voices in harmony: Call-and-response to address race and physics teaching

    Science.gov (United States)

    Cochran, Geraldine L.; White, Gary D.

    2017-09-01

    In the February 2016 issue of The Physics Teacher, we announced a call for papers on race and physics teaching. The response was muted at first, but has now grown to a respectable chorale-sized volume. As the manuscripts began to come in and the review process progressed, Geraldine Cochran graciously agreed to come on board as co-editor for this remarkable collection of papers, to be published throughout the fall of 2017 in TPT. Upon reviewing the original call and the responses from the physics community, the parallels between generating this collection and the grand call-and-response tradition became compelling. What follows is a conversation constructed by the co-editors that is intended to introduce the reader to the swell of voices that responded to the original call. The authors would like to thank Pam Aycock for providing many useful contributions to this editorial.

  18. Calling under pressure: Short-finned pilot whales make social calls during deep foraging dives

    DEFF Research Database (Denmark)

    Jensen, Frants Havmand; Marrero Perez, Jacobo; Johnson, Mark

    2011-01-01

    Toothed whales rely on sound to echolocate prey and communicate with conspecifics, but little is known about how extreme pressure affects pneumatic sound production in deep-diving species with a limited air supply. The short-finned pilot whale (Globicephala macrorhynchus) is a highly social species...... that the energy content of calls is lower at depths where lungs are collapsed and where the air volume available for sound generation is limited by ambient pressure. Frequency content was unaffected, providing a possible cue for group or species identification of diving whales. Social calls may be important...... to maintain social ties for foraging animals, but may be impacted adversely by vessel noise....

  19. Calle y calles de Brasil: imágenes, lecturas y etnografías

    OpenAIRE

    Montoya-Uriarte, Urpi; Universidad Federal de Bahía (Brasil)

    2015-01-01

    En este artículo me propongo reflexionar acerca de la calle de la ciudad contemporánea, movida por una pasión por lo urbano y una formación en antropología. La vida de las calles nos dice mucho sobre el tipo de ciudad en las que se encuentran. Sin embargo, son pocos los esfuerzos para captarla en sus detalles, particularidades, singularidades. Como urbanistas, parecemos conformarnos con las imágenes mentales que tenemos de ellas y como intelectuales, muchas veces, nos contentamos con reproduc...

  20. Efficient construction of approximate call graphs for JavaScript IDE services

    DEFF Research Database (Denmark)

    Feldthaus, Asger; Schäfer, Max; Sridharan, Manu

    2013-01-01

    The rapid rise of JavaScript as one of the most popular programming languages of the present day has led to a demand for sophisticated IDE support similar to what is available for Java or C#. However, advanced tooling is hampered by the dynamic nature of the language, which makes any form of stat...

  1. Medicine and the call for a moral epistemology, part II: constructing a synthesis of values.

    Science.gov (United States)

    Tauber, Alfred I

    2008-01-01

    The demands and needs of an individual patient require diverse value judgments to interpret and apply clinical data. Indeed, objective assessment takes on particular meaning in the context of the social and existential status of the patient, and thereby a complex calculus of values determines therapeutic goals. I have previously formulated how this moral thread of care becomes woven into the epistemological project as a "moral epistemology." Having argued its ethical justification elsewhere, I offer another perspective here: clinical choices employ diverse values directed at an array of goals, some of which are derived from a universal clinical science and others from the particular physiological, psychological, and social needs of the patient. Integrating these diverse elements that determine clinical care requires a complex synthesis of facts and judgments from several domains. This constructivist process relies on clinical facts, as well as on personal judgments and subjective assessments in an ongoing negotiation between patient and doctor. A philosophy of medicine must account for the conceptual basis of this process by identifying and addressing the judgments that govern the complex synthesis of these various elements.

  2. CALL and Less Commonly Taught Languages: Challenges and Opportunities

    Science.gov (United States)

    Ward, Monica

    2015-01-01

    Computer-Assisted Language Learning (CALL) researchers face many challenges in developing effective, high-quality CALL. CALL research has a very strong focus on the Most Commonly Taught Languages (MCLTs), particularly English. CALL researchers working with Less Commonly Taught Languages (LCTLs) face further constraints. LCTLs can range from…

  3. 47 CFR 74.791 - Digital call signs.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 4 2010-10-01 2010-10-01 false Digital call signs. 74.791 Section 74.791... Booster Stations § 74.791 Digital call signs. (a) Digital low power stations. Call signs for digital low... −D. (b) Digital television translator stations. Call signs for digital television translator...

  4. From Systematic Review to Call for Action.

    Science.gov (United States)

    Sawin, Erika Metzler; Sobel, Linda L; Annan, Sandra L; Schminkey, Donna L

    2017-06-01

    Intimate partner violence (IPV) is a global public health and criminal justice concern with significant impacts; especially high rates are seen among rural Hispanic American (HA) communities, the fastest growing population in the United States. They experience additional barriers to care including extreme poverty, lesser education, gender norms, and language and immigration issues. A systematic literature review was conducted using Cooper's framework to identify evidence supporting associations between interventions and prevention, reduction, and elimination of IPV among rural HA women. Searches conducted on databases including CINAHL, PubMed, Medline, Women's Studies International, MedicLatina, and JSTOR used the MeSH terms Hispanic Americans (Latino/a and Hispanic), domestic violence, and intimate partner violence. Selected studies were published between January 1, 2000, and January 1, 2014. Of the 617 yielded articles, only 6 met the inclusion criteria. Of these, none closely examined rurality or provided valid and reliable measures of outcomes, instead reporting program descriptions and suggested interventions. We identify key findings to guide program, screening, and tool development. Our study identifies a gap in knowledge, research, and effective practices and issues a call for action to create evidence-based tools to prevent, reduce, and eliminate IPV in these underserved populations.

  5. Pathological aspects of so called "hilar cholangiocarcinoma"

    Science.gov (United States)

    Castellano-Megías, Víctor M; Ibarrola-de Andrés, Carolina; Colina-Ruizdelgado, Francisco

    2013-01-01

    Cholangiocarcinoma (CC) arising from the large intrahepatic bile ducts and extrahepatic hilar bile ducts share clinicopathological features and have been called hilar and perihilar CC as a group. However, “hilar and perihilar CC” are also used to refer exclusively to the intrahepatic hilar type CC or, more commonly, the extrahepatic hilar CC. Grossly, a major distinction can be made between papillary and non-papillary tumors. Histologically, most hilar CCs are well to moderately differentiated conventional type (biliary) carcinomas. Immunohistochemically, CK7, CK20, CEA and MUC1 are normally expressed, being MUC2 positive in less than 50% of cases. Two main premalignant lesions are known: biliary intraepithelial neoplasia (BilIN) and intraductal papillary neoplasm of the biliary tract (IPNB). IPNB includes the lesions previously named biliary papillomatosis and papillary carcinoma. A series of 29 resected hilar CC from our archives is reviewed. Most (82.8%) were conventional type adenocarcinomas, mostly well to moderately differentiated, although with a broad morphological spectrum; three cases exhibited a poorly differentiated cell component resembling signet ring cells. IPNB was observed in 5 (17.2%), four of them with an associated invasive carcinoma. A clear cell type carcinoma, an adenosquamous carcinoma and two gastric foveolar type carcinomas were observed. PMID:23919110

  6. Let's call it Nonlocal Quantum Physics

    CERN Document Server

    Requardt, M

    2000-01-01

    In the following we undertake to derive quantum theory as a stochastic low-energy and coarse-grained theory from a more primordial discrete and basically geometric theory living on the Planck scale and which (as we argue) possibly underlies also \\tit{string theory}. We isolate the so-called \\tit{ideal elements} which represent at the same time the cornerstones of the framework of ordinary quantum theory and show how and why they encode the \\tit{non-local} aspects, being ubiquituous in the quantum realm, in a, on the surface, local way. We show that the quantum non-locality emerges in our approach as a natural consequence of the underlying \\tit{two-storey} nature of space-time or the physical vacuum, that is, quantum theory turns out to be a residual effect of the geometric depth structure of space-time on the Planck scale. We indicate how the \\tit{measurement problem} and the emergence of the \\tit{macroscopic sub-regime} can be understood in this framework.

  7. REMINDER: In a medical emergency call 74444

    CERN Multimedia

    2005-01-01

    What happened? A CERN colleague, complaining of pains that might indicate serious heart problem, went to the ?infirmary' on the Prévessin site for medical aid. He was unaware that the ?infirmary' was in fact no such thing, but the office of the French contractors' medical practitioner, and, on top of that, it was closed. He therefore took his own car and went to the CERN Fire Station on the Meyrin Site (Building 65). The firemen and the CERN medical team took care of him and requested helicopter transport to the Geneva cantonal hospital, where he responded well to medical treatment. What do we learn from this event? You must call the CERN internal number 74444 in the event of serious and acute illness, and do not have to present yourself in person or get somebody to go with you. This number is not reserved exclusively for accident, pollution, fire etc. The Firemen can prodice professional assistance at all times as required: first aid on the spot, amulance transport and medical assistance as necessary. ...

  8. Mitigating Handoff Call Dropping in Wireless Cellular Networks: A Call Admission Control Technique

    Science.gov (United States)

    Ekpenyong, Moses Effiong; Udoh, Victoria Idia; Bassey, Udoma James

    2016-06-01

    Handoff management has been an important but challenging issue in the field of wireless communication. It seeks to maintain seamless connectivity of mobile users changing their points of attachment from one base station to another. This paper derives a call admission control model and establishes an optimal step-size coefficient (k) that regulates the admission probability of handoff calls. An operational CDMA network carrier was investigated through the analysis of empirical data collected over a period of 1 month, to verify the performance of the network. Our findings revealed that approximately 23 % of calls in the existing system were lost, while 40 % of the calls (on the average) were successfully admitted. A simulation of the proposed model was then carried out under ideal network conditions to study the relationship between the various network parameters and validate our claim. Simulation results showed that increasing the step-size coefficient degrades the network performance. Even at optimum step-size (k), the network could still be compromised in the presence of severe network crises, but our model was able to recover from these problems and still functions normally.

  9. Constructing Catalonia

    Directory of Open Access Journals (Sweden)

    Bill Philips

    2009-07-01

    Full Text Available Catalonia, in common with other nations, has long been concerned with the question of identity and difference. Its problematic relationship with Spain has led to an emphasis on differentiating itself from its larger neighbour (if we are to accept, as most Spaniards do not, that Catalonia is not Spain, a situation complicated by the loss of the Spanish colonies of Cuba and The Philippines in 1898, and the Spanish Civil War and subsequent dictatorship from 1936 to 1976. Beginning in the late nineteenth century, the construction of a Catalan identity followed a similar route to that taken by other European nations such as England, Ireland and, indeed, Spain, including an emphasis on rural values, activities and the countryside, and the conversion of specifically local traditions into national past times. It is only in the last ten years or so that this model of Catalan identity has been recognised for what it is – a model constructed and encouraged for and by specific nationalist political interests. Ironically, Catalonia’s identity abroad has also been constructed and manipulated for political purposes, but from quite a different perspective. Orwell’s /Homage to Catalonia/ (1938 narrates an extremely blinkered version of the Spanish Civil War which has achieved iconic status as a result of cold war politics. Subsequent portrayals of the Spanish Civil War – Valentine Cunningham’s /The Penguin Book of Spanish Civil War Verse/ (ed., Penguin, 1980, or Ken Loach’s 1995 film /Land and Freedom/ base their arguments unquestioningly on /Homage to Catalonia/, perpetuating a view of the nation’s recent history that is both reductive and inaccurate

  10. Glucocorticoid and androgen signaling pathways diverge between advertisement calling and non-calling fish.

    Science.gov (United States)

    Genova, Rachel M; Marchaterre, Margaret A; Knapp, Rosemary; Fergus, Daniel; Bass, Andrew H

    2012-09-01

    Behavioral and neuroendocrine mechanisms of social vocalization in teleost fish are influenced by the glucocorticoid cortisol and the androgen 11-ketotestosterone (11kT). The relative abundance of both 11kT, which binds to androgen receptors (ARα, ARβ), and cortisol, which binds to glucocorticoid receptors (GR-1, GR-2), is regulated by 11β-hydroxylase (11βH) that converts 11-deoxycortisol to cortisol and testosterone to 11β-OH-testosterone, and 11β-hydroxysteroid dehydrogenase (11βHSD) that converts cortisol to the inactive metabolite cortisone and 11β-OH-testosterone to 11kT. In midshipman fish, we tested the hypothesis that plasma steroid levels, mRNA abundance for 11βH and 11βHSD in the vocal muscle and testis (known site of 11kT synthesis), and mRNA abundances for ARs and GRs in vocal muscle, would differ between males that did or did not recently produce 'hum' advertisement calls. Quantitative real-time PCR demonstrated that non-calling male vocal muscle had significantly higher mRNA levels for all receptors except ARα, and a strong trend for higher 11βHSD; 11βH was similar to that in calling males. Calling males had higher plasma and testis 11kT, but lower plasma cortisol, levels. Testis enzyme levels did not differ between male groups, although calling males showed a positive linear correlation between plasma 11kT and testis 11βHSD mRNA levels, consistent with testis being the main source of plasma 11kT. We propose that higher vocal muscle 11βHSD levels in non-calling males reflect increased local conversion of elevated cortisol to cortisone, providing protection from cortisol-related toxicity, while increased receptor expression in non-calling males functions as a preparatory mechanism for meeting the physiological demands of future vocalization. Copyright © 2012 Elsevier Inc. All rights reserved.

  11. Constructing Pairs of Compatible Characters

    Institute of Scientific and Technical Information of China (English)

    Mathias Kratzer

    2003-01-01

    Given a finite group X such that both the conjugacy of elements in X and the length of any conjugacy class in X can be decided/computed efficiently,the first algorithm described in this article constructs a uniquely determined sequence of representatives for all the conjugacy classes of X. In particular, based on this sequence, any two characters of different groups isomorphic to X become comparable against each other which is utilized by a second algorithm designed to construct so-called compatible characters of given finite groups G and H having isomorphic subgroups U ≤ G and V ≤ H, respectively.

  12. Optimal temporal placement of the call in beach volleyball

    Directory of Open Access Journals (Sweden)

    Stefan Künzell

    2016-05-01

    Full Text Available The call is a tactical component in beach volleyball attacks. Through the call, the setter indicates to his or her teammate an open spot in the opponent’s court. In two experimental conditions, we investigated the interval between the call and the ball-hand contact (“call shot interval”, CSI of top-level athletes. We show that the probability that a given call is followed is dependent on the duration of the CSI and the number of call options. Longer CSIs result in an increased probability that the given call will be followed, whilst increasing the call options results in a decrease in probability. On average, there is a 50% probability that the call will be followed if the call precedes the shot by 460 ms and if a single call option (“line” is expected. If the attacker has to choose between three call options (“line”, “cut”, “no-one” a 50% probability that the call will be followed is observed at an CSI of 542 ms. It did not appear that gender influenced the ability to follow a call. We recommend that in practice and in competition, players and coaches should consider the proper duration of the CSI for effective calling.

  13. Elastic calls in an integrated services network: the greater the call size variability the better the QoS

    NARCIS (Netherlands)

    Litjens, Remco; Boucherie, Richardus J.

    2003-01-01

    We study a telecommunications network integrating stream calls and elastic calls that share a given number of available traffic channels. The prioritised speech calls are handled as in a traditional Erlang loss model, while the delay-tolerant elastic calls are served with the remaining (varying)

  14. Arginine vasotocin injection increases probability of calling in cricket frogs, but causes call changes characteristic of less aggressive males.

    Science.gov (United States)

    Marler, C A; Chu, J; Wilczynski, W

    1995-12-01

    Male cricket frogs, Acris crepitans communicate to males and females using advertisement calls, which are arranged into call groups. Calls at the middle and end, but not beginning of the call group, are modified in response to male-male aggressive interactions. We found in this field study of male cricket frogs in natural breeding choruses that the peptide hormone arginine vasotocin (AVT) not only increased the probability that males called after injections, but also caused modifications in middle and end calls to produce calls characteristic of less aggressive males. Moreover, AVT-injected males showed significantly greater increases in call dominant frequency than saline-injected males, again, a characteristic of less aggressive males. Cricket frog calls are used to both repel males and attract females, thus call changes may relate to male-male and/or male-female interactions. Saline-injected males also demonstrated significant changes in several call traits, including changes that occurred in the beginning and middle calls of the call groups, but not the end calls. AVT appeared to block some call changes produced through handling. These data suggest that AVT can influence acoustic communication in frogs in several ways, including effects on call characteristics and dominant frequency, as well as potentially blocking some handling effects.

  15. Elastic calls in an integrated services network: the greater the call size variability the better the QoS

    NARCIS (Netherlands)

    Litjens, Remco; Boucherie, Richard J.

    2003-01-01

    We study a telecommunications network integrating stream calls and elastic calls that share a given number of available traffic channels. The prioritised speech calls are handled as in a traditional Erlang loss model, while the delay-tolerant elastic calls are served with the remaining (varying) ser

  16. Self constructing in adolescence

    Directory of Open Access Journals (Sweden)

    Vranješević Jelena

    2003-01-01

    Full Text Available The aim of this study was to explore “theories” adolescents have about themselves, i.e. about the changes in the ways they construe themselves in the period of middle adolescence: how they construe changes and estimate them according to some dimensions relevant for change (appreciation of change, its importance, expectancy, timing, comprehensiveness, intensity and visibility in social surroundings. The study was explorative and it was performed on the sample of 96 adolescents aged 15-17 (middle adolescence. Instruments used for the study were: interview and Role Construct Repertory Grid, adjusted to the need of study. The results show that the adolescents’ construct system is highly monolithic and tight in regard to constructs (black and white construing, but at the same time vague and predictively unclear in regard to elements, i. e. the stated changes, meaning that adolescents are not able to construe those changes according to certain constructs. It seems that this study included the beginning of the loosening phase (creativity cycle in which the system is still tight and, therefore, protects from threat and anxiety, while the elements are not predictively (this is what Erikson calls moratorium, i.e. the process of active experimenting. Changes which are fully predictively are those which refer to adults' roles, such as: self confident, experienced, independent and has responsibilities, worries. On the hand, changes which are predictably the most clear to adolescents (and not appreciated are depression and nervousness. Adolescents face an implicative dilemma: positive implications of maturity are not enough, while negative implications, such as nervousness, depression and not trusting people are clear, predictable and negative. This dilemma can be the cause of their ambivalence towards growing-up and accepting the roles of adults.

  17. Collapse simulation of building constructions

    Directory of Open Access Journals (Sweden)

    Nekrest'yanov Viktor Nikolaevich

    Full Text Available The physical reasons for building structures destruction are both the forces arising at stress-strain state of construction elements and external influences arising at emergency situations, as well as their moments, impulses and periodic impulses with the frequencies close to of fluctuations frequencies of construction elements. We shall call the mathematical calculation models for the parameters-reasons of destructions the basic models. The basic models of destruction of building structures elements allow not only providing necessary level of reliability and survivability of the elements and the construction as a whole already at the stage of their design, but also giving the chance, at their corresponding completion, to provide rational decisions on the general need of recovery works and their volume depending on destruction level. Especially important for rational design decisions development, which ensure the demanded constructional safety of building structures, is library creation of the basic mathematical models of standard processes of bearing elements destructions for standard construction designs for the purpose of the further forecast (assessment of the level and probabilities of standard destructions. Some basic mathematical models of destructions processes of the standard elements of building structures are presented in the present article. A model of accounting for construction defects and a model of obtaining requirements to probabilities of partial destructions of a construction are given. Both of these models are probabilistic.

  18. Biomimetic agent based modelling using male Frog calling behaviour as a case study

    DEFF Research Database (Denmark)

    Jørgensen, Søren V.; Demazeau, Yves; Christensen-Dalsgaard, Jakob

    2014-01-01

    by individuals to generate their observed population behaviour. A number of existing agent-modelling frameworks are considered, but none have the ability to handle large numbers of time-dependent event-generating agents; hence the construction of a new tool, RANA. The calling behaviour of the Puerto Rican Tree......A new agent-based modelling tool has been developed to allow the modelling of populations of individuals whose interactions are characterised by tightly timed dynamics. The tool was developed to model male frog calling dynamics, to facilitate research into what local rules may be employed...

  19. Biomimetic agent based modelling using male Frog calling behaviour as a case study

    DEFF Research Database (Denmark)

    Jørgensen, Søren V.; Demazeau, Yves; Christensen-Dalsgaard, Jakob

    2014-01-01

    by individuals to generate their observed population behaviour. A number of existing agent-modelling frameworks are considered, but none have the ability to handle large numbers of time-dependent event-generating agents; hence the construction of a new tool, RANA. The calling behaviour of the Puerto Rican Tree...... Frog, E. coqui, is implemented as a case study for the presentation and discussion of the tool, and results from this model are presented. RANA, in its present stage of development, is shown to be able to handle the problem of modelling calling frogs, and several fruitful extensions are proposed...

  20. Fireplace construction

    Energy Technology Data Exchange (ETDEWEB)

    Billmeyer, T.F.

    1978-10-03

    A prebuilt fireplace construction for installation in a building structure includes a firebox having an open forward side and an outlet for combustion gases and a housing at least partially surrounding the firebox with the combustion gas outlet extending through the top of the housing. A rotatable damper is disposed within the housing and is controlled externally by a rotatable shaft extending forwardly through the housing which is engaged by an external actuator operable from the front of the fireplace. An inlet conduit for combustion air is built into the housing for the fireplace beneath the level of the firebox for supply of combustion air to the firebox in the event doors are later added to close off the firebox.

  1. New degradation call admission control for increasing WCDMA system capacity

    Institute of Scientific and Technical Information of China (English)

    Liu Ningqing; Lu Zhi; Gu Xuemai

    2006-01-01

    Propose a new degradation call admission control(DCAC)scheme, which can be used in wideband code division multiple access communication system. So-called degradation is that non-real time call has the characteristic of variable bit rate, so decreasing its bit rate can reduce the load of the system, consequently the system can admit new call which should be blocked when the system is close to full load, therefore new call's access probability increases. This paper brings forward design project and does system simulation, simulation proves that DCAC can effectively decrease calls' blocking probability and increase the total number of the on-line users.

  2. Effectiveness of the Call in Beach Volleyball Attacking Play

    Directory of Open Access Journals (Sweden)

    Künzell Stefan

    2014-12-01

    Full Text Available In beach volleyball the setter has the opportunity to give her or his hitter a “call”. The call intends that the setter suggests to her or his partner where to place the attack in the opponent’s court. The effectiveness of a call is still unknown. We investigated the women’s and men’s Swiss National Beach Volleyball Championships in 2011 and analyzed 2185 attacks. We found large differences between female and male players. While men called in only 38.4% of attacks, women used calls in 85.5% of attacks. If the male players followed a given call, 63% of the attacks were successful. The success rate of attacks without any call was 55.8% and 47.6% when the call was ignored. These differences were not significant (χ2(2 = 4.55, p = 0.103. In women’s beach volleyball, the rate of successful attacks was 61.5% when a call was followed, 35% for attacks without a call, and 42.6% when a call was ignored. The differences were highly significant (χ2(2 = 23.42, p < 0.0005. Taking into account the findings of the present study, we suggested that the call was effective in women’s beach volleyball, while its effect in men’s game was unclear. Considering the quality of calls we indicate that there is a significant potential to increase the effectiveness of a call.

  3. Validation of the Cognitive Assessment of Later Life Status (CALLS instrument: a computerized telephonic measure

    Directory of Open Access Journals (Sweden)

    Parsons Thomas D

    2007-05-01

    Full Text Available Abstract Background Brief screening tests have been developed to measure cognitive performance and dementia, yet they measure limited cognitive domains and often lack construct validity. Neuropsychological assessments, while comprehensive, are too costly and time-consuming for epidemiological studies. This study's aim was to develop a psychometrically valid telephone administered test of cognitive function in aging. Methods Using a sequential hierarchical strategy, each stage of test development did not proceed until specified criteria were met. The 30 minute Cognitive Assessment of Later Life Status (CALLS measure and a 2.5 hour in-person neuropsychological assessment were conducted with a randomly selected sample of 211 participants 65 years and older that included equivalent distributions of men and women from ethnically diverse populations. Results Overall Cronbach's coefficient alpha for the CALLS test was 0.81. A principal component analysis of the CALLS tests yielded five components. The CALLS total score was significantly correlated with four neuropsychological assessment components. Older age and having a high school education or less was significantly correlated with lower CALLS total scores. Females scored better overall than males. There were no score differences based on race. Conclusion The CALLS test is a valid measure that provides a unique opportunity to reliably and efficiently study cognitive function in large populations.

  4. ASR performance analysis of an experimental call routing system

    CSIR Research Space (South Africa)

    Modipa, T

    2009-11-01

    Full Text Available Call routing is an important application of Automatic Speech Recognition (ASR) technology. In this paper the authors discuss the main issues affecting the performance of a call routing system and describe the ASR component of the "Auto...

  5. 76 FR 17933 - Infrastructure Protection Data Call Survey

    Science.gov (United States)

    2011-03-31

    ... SECURITY Infrastructure Protection Data Call Survey AGENCY: National Protection and Programs Directorate... Directorate, Office of Infrastructure Protection. Title: Infrastructure Protection Data Call. OMB Number: 1670.... SUMMARY: The Department of Homeland Security (DHS), National Protection and Programs Directorate...

  6. Purpose, Mission, and Context: The Call for Educating Future Leaders

    Science.gov (United States)

    Chunoo, Vivechkanand; Osteen, Laura

    2016-01-01

    This chapter calls on higher education to reclaim its role in leadership education. Specifically it examines higher education's purpose, context, and mission as clarion calls to embed leadership education throughout higher education institutions and focuses on why this is important.

  7. A General Study on the Major Features of CALL

    Institute of Scientific and Technical Information of China (English)

    喻晖

    2009-01-01

    As Computer Assisted language Learning (CALL) has become a hot issue in the second language acquisition, this paper attempts to discuss two of the important features of CALL: the student-centered and interactiveness. It is ex-plained in the paper that these two features are the most important features characterized by CALL and they can be bet-ter realized in a CALL class than in a traditional class.

  8. Environmental Influences On Diel Calling Behavior In Baleen Whales

    Science.gov (United States)

    2015-09-30

    1 DISTRIBUTION STATEMENT A. Approved for public release; distribution is unlimited. Environmental Influences On Diel Calling Behavior In...understanding of the social and environmental factors that influence variability in the calling behavior of baleen whales. One of the most prevalent...observations in passive acoustic recordings over scales of days to months is diel calling behavior (i.e., higher calling rates by day versus night or

  9. Construction and compression of Dwarf

    Institute of Scientific and Technical Information of China (English)

    XIANG Long-gang; FENG Yu-cai; GUI Hao

    2005-01-01

    There exists an inherent difficulty in the original algorithm for the construction of Dwarf, which prevents it from constructing true Dwarfs. We explained when and why it introduces suffix redundancies into the Dwarf structure. To solve this problem, we proposed a completely new algorithm called PID. It bottom-up computes partitions of a fact table, and inserts them into the Dwarf structure. Ifa partition is an MSV partition, coalesce its sub-Dwarf; otherwise create necessary nodes and cells. Our performance study showed that PID is efficient. For further condensing of Dwarf, we proposed Condensed Dwarf, a more compressed structure, combining the strength of Dwarf and Condensed Cube. By eliminating unnecessary stores of "ALL" cells from the Dwarf structure, Condensed Dwarf could effectively reduce the size of Dwarf, especially for Dwarfs of the real world, which was illustrated by our experiments. Its query processing is still simple and, only two minor modifications to PID are required for the construction of Condensed Dwarf.

  10. 46 CFR 169.750 - Radio call sign.

    Science.gov (United States)

    2010-10-01

    ... 46 Shipping 7 2010-10-01 2010-10-01 false Radio call sign. 169.750 Section 169.750 Shipping COAST... Control, Miscellaneous Systems, and Equipment Markings § 169.750 Radio call sign. Each vessel certificated for exposed or partially protected water service must have its radio call sign permanently...

  11. 78 FR 35956 - Utah Resource Advisory Council Subgroup Conference Call

    Science.gov (United States)

    2013-06-14

    ... Bureau of Land Management Utah Resource Advisory Council Subgroup Conference Call AGENCY: Bureau of Land Management, Interior. ACTION: Conference Call. SUMMARY: In accordance with the Federal Land Policy and... Advisory Council (RAC) Subgroup will host a conference call. DATES: The Utah RAC Subgroup will host...

  12. 75 FR 16163 - Notice of FHA Debenture Call

    Science.gov (United States)

    2010-03-31

    ... URBAN DEVELOPMENT Notice of FHA Debenture Call AGENCY: Office of the Assistant Secretary for Housing... the Secretary of the Treasury, announces the call of all FHA debentures, with a coupon rate of 5..., ``outstanding'' as of March 31, 2010. The date of the call is July 1, 2010. The debentures will be redeemed...

  13. 76 FR 17429 - Notice of FHA Debenture Call

    Science.gov (United States)

    2011-03-29

    ... URBAN DEVELOPMENT Notice of FHA Debenture Call AGENCY: Office of the Assistant Secretary for Housing--Federal Housing Commissioner, HUD. ACTION: Notice. SUMMARY: This Notice announces a debenture call of... the approval of the Secretary of the Treasury, announces the call of all FHA debentures, with a...

  14. 76 FR 43688 - Committee Meeting via Conference Call

    Science.gov (United States)

    2011-07-21

    ... HUMAN SERVICES Administration for Children and Families Committee Meeting via Conference Call AGENCY..., August 16, 2011, from 1 p.m. to 2:30 pm E.S.T. This meeting, to be held via audio conference call, is open to the public. Details for accessing the full Committee Conference Call are cited below: Toll...

  15. 29 CFR 785.17 - On-call time.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 3 2010-07-01 2010-07-01 false On-call time. 785.17 Section 785.17 Labor Regulations... On-call time. An employee who is required to remain on call on the employer's premises or so close thereto that he cannot use the time effectively for his own purposes is working while “on call”....

  16. 77 FR 18258 - Notice of FHA Debenture Call

    Science.gov (United States)

    2012-03-27

    ... URBAN DEVELOPMENT Notice of FHA Debenture Call AGENCY: Office of the Assistant Secretary for Housing--Federal Housing Commissioner, HUD. ACTION: Notice. SUMMARY: This Notice announces a debenture call of... impairments may access this number through TTY by calling the toll-free Federal Relay Service at...

  17. Linguistics, Procedure and Technique in CALL Teacher Education

    Science.gov (United States)

    Torsani, Simone

    2015-01-01

    Research in CALL education has identified a series of goals and constraints for technology in language education that need to be taken into account when designing a CALL syllabus. This article presents a theoretical framework for syllabus design based on the identification of three areas of expertise within CALL: linguistic knowledge, procedural…

  18. Evolution of advertisement calls in African clawed frogs

    Science.gov (United States)

    Tobias, Martha L.; Evans, Ben J.; Kelley, Darcy B.

    2014-01-01

    Summary For most frogs, advertisement calls are essential for reproductive success, conveying information on species identity, male quality, sexual state and location. While the evolutionary divergence of call characters has been examined in a number of species, the relative impacts of genetic drift or natural and sexual selection remain unclear. Insights into the evolutionary trajectory of vocal signals can be gained by examining how advertisement calls vary in a phylogenetic context. Evolution by genetic drift would be supported if more closely related species express more similar songs. Conversely, a poor correlation between evolutionary history and song expression would suggest evolution shaped by natural or sexual selection. Here, we measure seven song characters in 20 described and two undescribed species of African clawed frogs (genera Xenopus and Silurana) and four populations of X. laevis. We identify three call types — click, burst and trill — that can be distinguished by click number, call rate and intensity modulation. A fourth type is biphasic, consisting of two of the above. Call types vary in complexity from the simplest, a click, to the most complex, a biphasic call. Maximum parsimony analysis of variation in call type suggests that the ancestral type was of intermediate complexity. Each call type evolved independently more than once and call type is typically not shared by closely related species. These results indicate that call type is homoplasious and has low phylogenetic signal. We conclude that the evolution of call type is not due to genetic drift, but is under selective pressure. PMID:24723737

  19. Calling and Career Preparation: Investigating Developmental Patterns and Temporal Precedence

    Science.gov (United States)

    Hirschi, Andreas; Herrmann, Anne

    2013-01-01

    The presence of a calling and career development are assumed to be closely related. However, the nature of and reason for this relationship have not been thoroughly investigated. We hypothesized the existence of reciprocal effects between calling and three dimensions of career preparation and assessed the change of the presence of a calling,…

  20. Evolution of advertisement calls in African clawed frogs.

    Science.gov (United States)

    Tobias, Martha L; Evans, Ben J; Kelley, Darcy B

    2011-01-01

    For most frogs, advertisement calls are essential for reproductive success, conveying information on species identity, male quality, sexual state and location. While the evolutionary divergence of call characters has been examined in a number of species, the relative impacts of genetic drift or natural and sexual selection remain unclear. Insights into the evolutionary trajectory of vocal signals can be gained by examining how advertisement calls vary in a phylogenetic context. Evolution by genetic drift would be supported if more closely related species express more similar songs. Conversely, a poor correlation between evolutionary history and song expression would suggest evolution shaped by natural or sexual selection. Here, we measure seven song characters in 20 described and two undescribed species of African clawed frogs (genera Xenopus and Silurana) and four populations of X. laevis. We identify three call types - click, burst and trill - that can be distinguished by click number, call rate and intensity modulation. A fourth type is biphasic, consisting of two of the above. Call types vary in complexity from the simplest, a click, to the most complex, a biphasic call. Maximum parsimony analysis of variation in call type suggests that the ancestral type was of intermediate complexity. Each call type evolved independently more than once and call type is typically not shared by closely related species. These results indicate that call type is homoplasious and has low phylogenetic signal. We conclude that the evolution of call type is not due to genetic drift, but is under selective pressure.

  1. 47 CFR 90.241 - Radio call box operations.

    Science.gov (United States)

    2010-10-01

    ... remains on for a period in excess of three minutes. The automatic cutoff system must be designed so the... Safety Pool for highway call box systems subject to the following requirements: (1) Call box transmitters... effective radiated power (ERP). (3) The height of a call box antenna may not exceed 6.1 meters (20...

  2. 47 CFR 25.284 - Emergency Call Center Service.

    Science.gov (United States)

    2010-10-01

    ... 47 Telecommunication 2 2010-10-01 2010-10-01 false Emergency Call Center Service. 25.284 Section... SATELLITE COMMUNICATIONS Technical Operations § 25.284 Emergency Call Center Service. (a) Providers of mobile satellite service to end-user customers (part 25, subparts A-D) must provide Emergency Call...

  3. 26 CFR 1.1092(c)-1 - Qualified covered calls.

    Science.gov (United States)

    2010-04-01

    ... (CONTINUED) INCOME TAXES Wash Sales of Stock Or Securities § 1.1092(c)-1 Qualified covered calls. (a) In... equity call option with standardized terms on Corporation X stock will not be deep in the money if the... equity call option with standardized terms on Corporation Y stock will not be deep in the money if the...

  4. Pricing of convertible bonds with hard call features

    NARCIS (Netherlands)

    Wever, Jolle O.; Smid, Peter P.M.; Koning, Ruud H.

    2002-01-01

    This paper discusses the development of a valuation model for convertible bonds with hard call features. We define a hard call feature as the possibility for the issuer to redeem a convertible bond before maturity by paying the call price to the bondholder. We use the binomial approach to model conv

  5. The So-Called 'Face on Mars'

    Science.gov (United States)

    2002-01-01

    (Released 13 April 2002) The Science The so called 'Face on Mars' can be seen slightly above center and to the right in this THEMIS visible image. This 3-km long knob, located near 10o N, 40o W (320o E), was first imaged by the Viking spacecraft in the 1970's and was seen by some to resemble a face carved into the rocks of Mars. Since that time the Mars Orbiter Camera on the Mars Global Surveyor spacecraft has provided detailed views of this hill that clearly show that it is a normal geologic feature with slopes and ridges carved by eons of wind and downslope motion due to gravity. A similar-size hill in Phoenix, Arizona resembles a camel lying on the ground, and Phoenicians whimsically refer to it as Camelback Mountain. Like the hills and knobs of Mars, however, Camelback Mountain was carved into its unusual shape by thousands of years of erosion. The THEMIS image provides a broad perspective of the landscape in this region, showing numerous knobs and hills that have been eroded into a remarkable array of different shapes. Many of these knobs, including the 'Face', have several flat ledges partway up the hill slopes. These ledges are made of more resistant layers of rock and are the last remnants of layers that once were continuous across this entire region. Erosion has completely removed these layers in most places, leaving behind only the small isolated hills and knobs seen today. Many of the hills and ridges in this area also show unusual deposits of material that occur preferentially on the cold, north-facing slopes. It has been suggested that these deposits were 'pasted' on the slopes, with the distinct, rounded boundary on their upslope edges being the highest remaining point of this pasted-on layer. In several locations, such as in the large knob directly south of the 'Face', these deposits occur at several different heights on the hill. This observation suggests the layer once draped the entire knob and has since been removed from all but the north

  6. Una calle nunca es una calle: el mundo de los frigoríficos

    OpenAIRE

    Moschen, Susana; Rodríguez Iozza, Gisela B.; Scaglia, Roxana B.; Dobarro, Claudia; Omelusik, M. Alejandra

    2008-01-01

    Repensando nuestra práctica docente, desde lo trabajado en el transcurso de la Especial Preparación correspondiente al área de Ciencias Sociales y en el Seminario: Patrimonio y Educación Preuniversitaria, es que nos propusimos la incorporación al Proyecto de Ciencias Sociales, como estudio de caso: los frigoríficos Swift y Armour. Se trata de un sitio histórico, una de las nominaciones a la lista patrimonial existente a nivel nacional, a escala de la microrregión del Gran La Plata; la calle N...

  7. Elastic calls in an integrated services network: the greater the call size variability the better the QoS

    NARCIS (Netherlands)

    Litjens, R.; Boucherie, Richardus J.

    2002-01-01

    We study a telecommunications network integrating prioritized stream calls and delay tolerant elastic calls that are served with the remaining (varying) service capacity according to a processor sharing discipline. The remarkable observation is presented and analytically supported that the expected

  8. The Phonetics and Phonology of the Polish Calling Melodies.

    Science.gov (United States)

    Arvaniti, Amalia; Żygis, Marzena; Jaskuła, Marek

    2016-01-01

    Two calling melodies of Polish were investigated, the routine call, used to call someone for an everyday reason, and the urgent call, which conveys disapproval of the addressee's actions. A Discourse Completion Task was used to elicit the two melodies from Polish speakers using twelve names from one to four syllables long; there were three names per syllable count, and speakers produced three tokens of each name with each melody. The results, based on eleven speakers, show that the routine calling melody consists of a low F0 stretch followed by a rise-fall-rise; the urgent calling melody, on the other hand, is a simple rise-fall. Systematic differences were found in the scaling and alignment of tonal targets: the routine call showed late alignment of the accentual pitch peak, and in most instances lower scaling of targets. The accented vowel was also affected, being overall louder in the urgent call. Based on the data and comparisons with other Polish melodies, we analyze the routine call as LH* !H-H% and the urgent call as H* L-L%. We discuss the results and our analysis in light of recent findings on calling melodies in other languages, and explore their repercussions for intonational phonology and the modeling of intonation. © 2017 S. Karger AG, Basel.

  9. Individual distinctiveness in call types of wild western female gorillas.

    Directory of Open Access Journals (Sweden)

    Roberta Salmi

    Full Text Available Individually distinct vocalizations play an important role in animal communication, allowing call recipients to respond differentially based on caller identity. However, which of the many calls in a species' repertoire should have more acoustic variability and be more recognizable is less apparent. One proposed hypothesis is that calls used over long distances should be more distinct because visual cues are not available to identify the caller. An alternative hypothesis proposes that close calls should be more recognizable because of their importance in social interactions. To examine which hypothesis garners more support, the acoustic variation and individual distinctiveness of eight call types of six wild western gorilla (Gorilla gorilla females were investigated. Acoustic recordings of gorilla calls were collected at the Mondika Research Center (Republic of Congo. Acoustic variability was high in all gorilla calls. Similar high inter-individual variation and potential for identity coding (PIC was found for all call types. Discriminant function analyses confirmed that all call types were individually distinct (although for call types with lowest sample size - hum, grumble and scream - this result cannot be generalized, suggesting that neither the distance at which communication occurs nor the call social function alone can explain the evolution of identity signaling in western gorilla communication.

  10. The Barbados Emergency Ambulance Service: High Frequency of Nontransported Calls

    Directory of Open Access Journals (Sweden)

    Sherwin E. Phillips

    2012-01-01

    Full Text Available Objectives. There are no published studies on the Barbados Emergency Ambulance Service and no assessment of the calls that end in nontransported individuals. We describe reasons for the nontransport of potential clients. Methods. We used the Emergency Medical Dispatch (Medical Priority Dispatch System instrument, augmented with five local call types, to collect information on types of calls. The calls were categorised under 7 headings. Correlations between call types and response time were calculated. Results. Most calls were from the category medical (54%. Nineteen (19% percent of calls were in the non-transported category. Calls from call type Cancelled accounted for most of these and this was related to response time, while Refused service was inversely related (. Conclusions. The Barbados Ambulance Service is mostly used by people with a known illness and for trauma cases. One-fifth of calls fall into a category where the ambulance is not used often due to cancellation which is related to response time. Other factors such as the use of alternative transport are also important. Further study to identify factors that contribute to the non-transported category of calls is necessary if improvements in service quality are to be made.

  11. Acoustic structures in the alarm calls of Gunnison's prairie dogs.

    Science.gov (United States)

    Slobodchikoff, C N; Placer, J

    2006-05-01

    Acoustic structures of sound in Gunnison's prairie dog alarm calls are described, showing how these acoustic structures may encode information about three different predator species (red-tailed hawk-Buteo jamaicensis; domestic dog-Canis familaris; and coyote-Canis latrans). By dividing each alarm call into 25 equal-sized partitions and using resonant frequencies within each partition, commonly occurring acoustic structures were identified as components of alarm calls for the three predators. Although most of the acoustic structures appeared in alarm calls elicited by all three predator species, the frequency of occurrence of these acoustic structures varied among the alarm calls for the different predators, suggesting that these structures encode identifying information for each of the predators. A classification analysis of alarm calls elicited by each of the three predators showed that acoustic structures could correctly classify 67% of the calls elicited by domestic dogs, 73% of the calls elicited by coyotes, and 99% of the calls elicited by red-tailed hawks. The different distributions of acoustic structures associated with alarm calls for the three predator species suggest a duality of function, one of the design elements of language listed by Hockett [in Animal Sounds and Communication, edited by W. E. Lanyon and W. N. Tavolga (American Institute of Biological Sciences, Washington, DC, 1960), pp. 392-430].

  12. Acoustic Characteristics of Advertisement Calls in Babina adenopleura

    Institute of Scientific and Technical Information of China (English)

    Xiaobin FANG; Xia QIU; Yilin ZHOU; Luyi YANG; Yi ZHAO; Weihong ZHENG; Jinsong LIU

    2015-01-01

    Acoustic communication is the most important form of communication in anuran amphibians. To understand the acoustic characteristics of male Babina adenopleura, we recorded advertisement calls and analyzed their acoustic parameters during the breeding season. Male B. adenopleura produced calls with a variable number of notes (1–5), and each note contained harmonics. Although 6%of call notes did not exhibit frequency modulation (FM), two call note FM patterns were observed:(1) upward FM;(2) upward–downward FM. With the exception of 1-and 5-note calls, the duration of successive notes decreased monotonically. With the exception of 1 note calls, the fundamental frequency of the first note was lowest, then increased; the greatest change in the fundamental frequency was always between notes 1 and 2. The dominant frequency varied between calls. For example for the ifrst call note the dominant frequency occurred in some cases in the ifrst harmonic (located in the 605.320 ± 64.533 Hz frequency band), the second harmonic (918 ± 9 Hz band), the fourth harmonic (1712 ± 333 Hz band), the sixth harmonic (the 2165 ± 152 Hz band), the seventh harmonic (the 2269 ± 140 Hz band), the eighth harmonic (the 2466 ± 15 Hz band) or the ninth harmonic (the 2636 ± 21 Hz band). Although male B. adenopleura advertisement calls have a distinctive structure, they have similar characteristics to the calls of the music frog, B. daunchina.

  13. Complex and transitive synchronization in a frustrated system of calling frogs

    Science.gov (United States)

    Aihara, Ikkyu; Takeda, Ryu; Mizumoto, Takeshi; Otsuka, Takuma; Takahashi, Toru; Okuno, Hiroshi G.; Aihara, Kazuyuki

    2011-03-01

    This letter reports synchronization phenomena and mathematical modeling on a frustrated system of living beings, or Japanese tree frogs (Hyla japonica). While an isolated male Japanese tree frog calls nearly periodically, he can hear sounds including calls of other males. Therefore, the spontaneous calling behavior of interacting males can be understood as a system of coupled oscillators. We construct a simple but biologically reasonable model based on the experimental results of two frogs, extend the model to a system of three frogs, and theoretically predict the occurrence of rich synchronization phenomena, such as triphase synchronization and 1:2 antiphase synchronization. In addition, we experimentally verify the theoretical prediction by ethological experiments on the calling behavior of three frogs and time series analysis on recorded sound data. Note that the calling behavior of three male Japanese tree frogs is frustrated because almost perfect antiphase synchronization is robustly observed in a system of two male frogs. Thus, nonlinear dynamics of the three-frogs system should be far from trivial.

  14. Representation of individual elements of a complex call sequence in primary auditory cortex

    Directory of Open Access Journals (Sweden)

    Mark Nelson Wallace

    2013-10-01

    Full Text Available Conspecific communication calls can be rhythmic or contain extended, discontinuous series of either constant or frequency modulated harmonic tones and noise bursts separated by brief periods of silence. In the guinea pig, rhythmic calls can produce isomorphic responses within the primary auditory cortex (AI where single units respond to every call element. Other calls such as the chutter comprise a series of short irregular syllables that vary in their spectral content and are more like human speech. These calls can also evoke isomorphic responses, but may only do so in fields in the auditory belt and not in AI. Here we present evidence that cells in AI treat the individual elements within a syllable as separate auditory objects and respond selectively to one or a subset of them. We used a single chutter exemplar to compare single/multi-unit responses in the low-frequency portion of AI - AI(LF and the low-frequency part of the thalamic medial geniculate body - MGB(LF in urethane anaesthetised guinea pigs. Both thalamic and cortical cells responded with brief increases in firing rate to one, or more, of the 8 main elements present in the chutter call. Almost none of the units responded to all 8 elements. While there were many different combinations of responses to between one and five of the elements, MBG(LF and AI(LF neurons exhibited the same specific types of response combinations. Nearby units in the upper layers of the cortex tended to respond to similar combinations of elements while the deep layers were less responsive. Thus the responses from a number of AI units would need to be combined in order to represent the entire chutter call. Our results don’t rule out the possibility of constructive convergence but there was no evidence that a convergence of inputs within AI led to a complete representation of all eight elements.

  15. In- and Out-of-the-Money Convertible Bond Calls

    DEFF Research Database (Denmark)

    Bechman, Ken; Lunde, Asger; Zebedee, Allan

    2014-01-01

    Convertible bond calls typically cause significant reactions in equity prices. The empirical research largely finds negative and positive announcement effects for the in-the-money and the out-of-the-money calls respectively. However, this research has difficulty distinguishing between the two main...... theoretical explanations: the signaling effect and the price pressure effect. In this paper, we differentiate between these two effects by using a unique data set of the in- and the out-of-the-money calls in the United States during the period of 1993 to 2007. We find that the announcement effect for the in......-the-money call is predominantly explained by the subsequent order imbalances; and the stock market's reaction is spread over an entire trading day, which is consistent with the price pressure effect. In contrast, the announcement effect for the out-of-the-money call is driven by the size of the called...

  16. Modeling synchronized calling behavior of Japanese tree frogs

    Science.gov (United States)

    Aihara, Ikkyu

    2009-07-01

    We experimentally observed synchronized calling behavior of male Japanese tree frogs Hyla japonica; namely, while isolated single frogs called nearly periodically, a pair of interacting frogs called synchronously almost in antiphase or inphase. In this study, we propose two types of phase-oscillator models on different degrees of approximations, which can quantitatively explain the phase and frequency properties in the experiment. Moreover, it should be noted that, although the second model is obtained by fitting to the experimental data of the two synchronized states, the model can also explain the transitory dynamics in the interactive calling behavior, namely, the shift from a transient inphase state to a stable antiphase state. We also discuss the biological relevance of the estimated parameter values to calling behavior of Japanese tree frogs and the possible biological meanings of the synchronized calling behavior.

  17. Voice and daytime calling of Scops Owls (Otus scops

    Directory of Open Access Journals (Sweden)

    Mikkola Anita

    2015-12-01

    Full Text Available The Scops Owl (Otus scops is one of the least studied owls in Europe and its loud and monotonous calls are not well documented. This paper summarises published alarm-like calls and presents data on daytime calling recorded in Lesencetomaj, Hungary between 9th and 17th September 2012. Calls were similar to the sound of an alarm on a reversing truck. The bird was most active around midday (11–13 hrs and in the afternoons between 15–17 hrs. No calling occurred before 09.00 or after 19.15 o’clock. Weather affected the intensity of calls and particularly high autumn temperatures are suggested as a possible reason for this unusual activity.

  18. Modular Design of Call Control Layer in Telephony Software

    Directory of Open Access Journals (Sweden)

    Ilija Basicevic

    2011-01-01

    Full Text Available An important property of a telephony system is the call control model on which it is based. It is noted that many call control models in the past, especially those in PSTN/ISDN networks follow centralized model. For such a model, typical is significant coupling of modules belonging to different services with the basic call control module which is aware of all active telephony features in the system. Although sometimes based on distributed model, VoIP call control models still manifest some of the listed problems of their predecessors. In this paper we present a fully distributed model which exhibits minimal coupling of modules belonging to different services and a simple basic call control module. The model is based on taxonomies of call control services which are presented in the paper. Also, the implementation of several typical services is described.

  19. A synthetic operational account of call-by-need evaluation

    DEFF Research Database (Denmark)

    Zerny, Ian; Danvy, Olivier

    2013-01-01

    We present the first operational account of call by need that connects syntactic theory and implementation practice. Syntactic theory: the storeless operational semantics using syntax rewriting to account for demand-driven computation and for caching intermediate results. Implementational practice...... is that the theory of call by need agrees with the theory of call by name, and that the practice of call by need optimizes the practice of call by name. Our operational account takes the form of three new calculi for lazy evaluation of lambda-terms and our synthesis takes the form of three lock-step equivalences......-terms. Our results reveal a genuine and principled unity of computational theory and computational practice, one that readily applies to variations on the general theme of call by need....

  20. 40 CFR 155.48 - Data Call-In.

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Data Call-In. 155.48 Section 155.48... STANDARDS AND REGISTRATION REVIEW Registration Review Procedures § 155.48 Data Call-In. The Agency may issue a Data Call-In notice under FIFRA section 3(c)(2)(B) at any time if the Agency believes that...

  1. Authentic Oral Language Production and Interaction in CALL: An Evolving Conceptual Framework for the Use of Learning Analytics within the SpeakApps Project

    Science.gov (United States)

    Nic Giolla Mhichíl, Mairéad; van Engen, Jeroen; Ó Ciardúbháin, Colm; Ó Cléircín, Gearóid; Appel, Christine

    2014-01-01

    This paper sets out to construct and present the evolving conceptual framework of the SpeakApps projects to consider the application of learning analytics to facilitate synchronous and asynchronous oral language skills within this CALL context. Drawing from both the CALL and wider theoretical and empirical literature of learner analytics, the…

  2. The Influence of Judgment Calls on Meta-Analytic Findings.

    Science.gov (United States)

    Tarrahi, Farid; Eisend, Martin

    2016-01-01

    Previous research has suggested that judgment calls (i.e., methodological choices made in the process of conducting a meta-analysis) have a strong influence on meta-analytic findings and question their robustness. However, prior research applies case study comparison or reanalysis of a few meta-analyses with a focus on a few selected judgment calls. These studies neglect the fact that different judgment calls are related to each other and simultaneously influence the outcomes of a meta-analysis, and that meta-analytic findings can vary due to non-judgment call differences between meta-analyses (e.g., variations of effects over time). The current study analyzes the influence of 13 judgment calls in 176 meta-analyses in marketing research by applying a multivariate, multilevel meta-meta-analysis. The analysis considers simultaneous influences from different judgment calls on meta-analytic effect sizes and controls for alternative explanations based on non-judgment call differences between meta-analyses. The findings suggest that judgment calls have only a minor influence on meta-analytic findings, whereas non-judgment call differences between meta-analyses are more likely to explain differences in meta-analytic findings. The findings support the robustness of meta-analytic results and conclusions.

  3. The Rhetorical Construction of "the Teacher."

    Science.gov (United States)

    Nespor, Jan; Barber, Liz

    1991-01-01

    The authors critically examine the rhetorical structure of a 1987 article by Shulman, especially the textual strategies used to construct "the teacher" as an object of study. Broader issues of representation and power in the social sciences are addressed, concluding with a call for more critical literacy among readers and writers of research…

  4. Adding Recursive Constructs to Bialgebraic Semantics

    DEFF Research Database (Denmark)

    Klin, Bartek

    2004-01-01

    This paper aims at fitting a general class of recursive equations into the framework of ‘well-behaved' structural operational semantics, formalized as bialgebraic semantics by Turi and Plotkin. Rather than interpreting recursive constructs by means of operational rules, separate recursive equations...... are added to semantic descriptions of languages. The equations, together with the remaining rules, are then interpreted in a suitable category and merged by means of certain fixpoint constructions. For a class of recursive equations called regular unfolding rules, this construction yields distributive laws...

  5. Construct Measurement in Management Research

    DEFF Research Database (Denmark)

    Nielsen, Bo Bernhard

    2014-01-01

    Far too often do management scholars resort to crude and often inappropriate measures of fundamental constructs in their research; an approach which calls in question the interpretation and validity of their findings. Scholars often legitimize poor choices in measurement with a lack of availability...... of better measures and/or that they are simply following existing research in adopting previously published measures without critically assessing the validity, appropriateness, and applicability of such measures in terms of the focal study. Motivated by a recent dialog in Journal of Business Research......, this research note raises important questions about the use of proxies in management research and argues for greater care in operationalizing constructs with particular attention to matching levels of theory and measurement....

  6. Sense of coherence, career adaptability and burnout of early-career Black staff in the call centre environment

    Directory of Open Access Journals (Sweden)

    Nisha Harry

    2013-03-01

    Full Text Available Orientation: The call centre is recognised as being a stressful work environment that affects the general wellbeing of call centre agents.Research purpose: This study explored whether call centre agents’ sense of coherence significantly influences their career adaptability and whether their burnout levels significantly moderate the sense of coherence–career adaptability relationship. The research also investigated whether age, gender and years of service (as control variables, along with sense of coherence, predicted career adaptability.Motivation for the study: The positive psychological construct of career adaptability and its association with call centre agents’ sense of coherence, burnout, age, gender and years of service have not yet been investigated in the call centre environment.Research design, approach and method: A cross-sectional quantitative survey design was used. The Orientation to Life, Career Adapt-Abilities Scale and Maslach Burnout Inventory General Scale were administered to a non-probability purposive sample of 409 early-career Black staff employed in three of the largest outsourced financial call centres in Africa.Main findings: Multiple regression analyses revealed that age, gender and meaningfulness significantly predicted call centre agents’ career adaptability, but that their burnout levels do not significantly moderate the sense of coherence–career adaptability relationship.Practical/managerial implications: Enhancing call centre agents’ sense of meaningfulness will increase their levels of career adaptability and career wellbeing.Contribution/value-add: This research is the first to investigate the construct of career adaptability in the call centre environment and adds new knowledge and insights to the existing wellness and positive psychology literature.

  7. Completion of cathode strip chamber (CSC) installation on the so-called YE+2 wheel of CMS on March 2005.

    CERN Multimedia

    Tejinder S. Virdee

    2005-01-01

    The pictures have been taken in the CMS construction hall in Cessy (neighbouring France), called SX5, in March 2005 and show the status of cathode strip chamber (CSC) assembly on the yoke disk YE+2. The chambers are labelled ME+3 and their installation has been completed on March 16th, 2005.

  8. Constructing Sentient Androids

    Institute of Scientific and Technical Information of China (English)

    AMOROSO; Richard; L.

    2015-01-01

    Generally the simplistic distinction between a humanoid robot,a computerized machine capable of replicating a variety of complex human functions automatically,and an android is one of appearance; an android is meant to look and act like a human being even to the extent of being indistinguishable. While one day a yottaflop(1024 bits per second) hyper-supercomputer could have a sufficient holographic database and processing power to be truly indistinguishable from a human being,the issue of the applicability of sentience(self-awareness) to an android comes to the forefront. The currently dominant cognitive model of awareness,closely aligned to the AI model,states that mind equals brain and that once correct algorithms are known all of human intelligence could be replicated artificially. This is the so-called mechanistic view: ‘The laws of physics and chemistry are sufficient to describe all living systems; no additional life principle is required’. In this work we develop the point of view that the regime of Unified Field Mechanics(UFM) supplies an inherent action principle driving both the evolution of complex Self-Organized Living Systems(SOLS) and the physical processes of awareness. These UFM parameters in conjunction with ‘conscious quantum computing’(class of quantum computer modeled with physical parameters of mind-body interaction) putatively leads directly to the construction of sentient(or sentient-like) Androids.

  9. Female chimpanzees use copulation calls flexibly to prevent social competition.

    Directory of Open Access Journals (Sweden)

    Simon W Townsend

    Full Text Available The adaptive function of copulation calls in female primates has been debated for years. One influential idea is that copulation calls are a sexually selected trait, which enables females to advertise their receptive state to males. Male-male competition ensues and females benefit by getting better mating partners and higher quality offspring. We analysed the copulation calling behaviour of wild female chimpanzees (Pan troglodytes schweinfurthii at Budongo Forest, Uganda, but found no support for the male-male competition hypothesis. Hormone analysis showed that the calling behaviour of copulating females was unrelated to their fertile period and likelihood of conception. Instead, females called significantly more while with high-ranking males, but suppressed their calls if high-ranking females were nearby. Copulation calling may therefore be one potential strategy employed by female chimpanzees to advertise receptivity to high-ranked males, confuse paternity and secure future support from these socially important individuals. Competition between females can be dangerously high in wild chimpanzees, and our results indicate that females use their copulation calls strategically to minimise the risks associated with such competition.

  10. How can I help you? User instructions in telephone calls

    NARCIS (Netherlands)

    Steehouder, Michael; Hartman, Daniel

    2003-01-01

    We a small corpus of instructions given in phone calls to customers who need support for programming their universal remote control, to make it suitable for their particular TV set VCR, Audio, etc. Typically, in these calls the operator or 'agent' coaches the client while the client is performing ac

  11. 77 FR 12646 - Government Securities: Call for Large Position Reports

    Science.gov (United States)

    2012-03-01

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Government Securities: Call for Large Position Reports AGENCY: Office of the Assistant Secretary for... ``Treasury'') called for the submission of Large Position Reports by those entities whose...

  12. 78 FR 17469 - Government Securities: Call for Large Position Reports

    Science.gov (United States)

    2013-03-21

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Government Securities: Call for Large Position Reports AGENCY: Office of the Assistant Secretary for... ``Treasury'') called for the submission of Large Position Reports by those entities whose...

  13. 75 FR 77955 - Government Securities: Call for Large Position Reports

    Science.gov (United States)

    2010-12-14

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE TREASURY Government Securities: Call for Large Position Reports AGENCY: Office of the Assistant Secretary for... ``Treasury'') called for the submission of Large Position Reports by those entities whose...

  14. Environmental constraints and call evolution in torrent-dwelling frogs.

    Science.gov (United States)

    Goutte, Sandra; Dubois, Alain; Howard, Samuel D; Marquez, Rafael; Rowley, Jodi J L; Dehling, J Maximilian; Grandcolas, Philippe; Rongchuan, Xiong; Legendre, Frédéric

    2016-04-01

    Although acoustic signals are important for communication in many taxa, signal propagation is affected by environmental properties. Strong environmental constraints should drive call evolution, favoring signals with greater transmission distance and content integrity in a given calling habitat. Yet, few empirical studies have verified this prediction, possibly due to a shortcoming in habitat characterization, which is often too broad. Here we assess the potential impact of environmental constraints on the evolution of advertisement call in four groups of torrent-dwelling frogs in the family Ranidae. We reconstruct the evolution of calling site preferences, both broadly categorized and at a finer scale, onto a phylogenetic tree for 148 species with five markers (∼3600 bp). We test models of evolution for six call traits for 79 species with regard to the reconstructed history of calling site preferences and estimate their ancestral states. We find that in spite of existing morphological constraints, vocalizations of torrent-dwelling species are most probably constrained by the acoustic specificities of torrent habitats and particularly their high level of ambient noise. We also show that a fine-scale characterization of calling sites allows a better perception of the impact of environmental constraints on call evolution.

  15. Dialogue-Based CALL: An Overview of Existing Research

    Science.gov (United States)

    Bibauw, Serge; François, Thomas; Desmet, Piet

    2015-01-01

    Dialogue-based Computer-Assisted Language Learning (CALL) covers applications and systems allowing a learner to practice the target language in a meaning-focused conversational activity with an automated agent. We first present a common definition for dialogue-based CALL, based on three features: dialogue as the activity unit, computer as the…

  16. Evaluation of Static JavaScript Call Graph Algorithms

    NARCIS (Netherlands)

    Dijkstra, J.-J.

    2014-01-01

    This thesis consists of a replication study in which two algorithms to compute JavaScript call graphs have been implemented and evaluated. Existing IDE support for JavaScript is hampered due to the dynamic nature of the language. Previous studies partially solve call graph computation for JavaScript

  17. 76 FR 14684 - Call for Nominations for Resource Advisory Councils

    Science.gov (United States)

    2011-03-17

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Bureau of Land Management Call for Nominations for Resource Advisory Councils AGENCY: Bureau of Land Management, Interior. ACTION: Call for nominations. SUMMARY: The purpose of this notice is to request...

  18. 39 CFR 6.4 - Attendance by conference telephone call.

    Science.gov (United States)

    2010-07-01

    ... 39 Postal Service 1 2010-07-01 2010-07-01 false Attendance by conference telephone call. 6.4 Section 6.4 Postal Service UNITED STATES POSTAL SERVICE THE BOARD OF GOVERNORS OF THE U.S. POSTAL SERVICE MEETINGS (ARTICLE VI) § 6.4 Attendance by conference telephone call. For regularly scheduled meetings...

  19. 75 FR 14622 - Call for Nominations for Resource Advisory Councils

    Science.gov (United States)

    2010-03-26

    ... From the Federal Register Online via the Government Publishing Office DEPARTMENT OF THE INTERIOR Bureau of Land Management Call for Nominations for Resource Advisory Councils AGENCY: Bureau of Land Management, Interior. ACTION: Notice of Resource Advisory Council Call for Nominations. SUMMARY: The...

  20. Establishing Self-access with CALL in Chinese Tertiary Education

    Institute of Scientific and Technical Information of China (English)

    WangYuwen; LiHeng

    2004-01-01

    This paper aims tO bridge up the gap between theoretical perspectives of self-access language learning (SALL) and practice of computer assisted language learning (CALL) in Chinese tertiary education. While much of the paper presented ideas dealing with issues related to SALL and CALL, they are supported by references to relevant literature and research.

  1. Call Centres in Denmark 2004 - Strategy, HR Practices & Performance

    DEFF Research Database (Denmark)

    Sørensen, Ole H.; El-Salanti, Nadia

    This survey is the first scientifically based benchmarking study of the Danish call centre industry. The main results from the study are based on answers from 128 call centres, which correspond to a response rate of 65%. The Danish study is part of a global project coordinated by researchers at C...

  2. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  3. Called to Teach: A Study of Highly Motivated Preservice Teachers.

    Science.gov (United States)

    Serow, Robert C.

    1994-01-01

    Examines the belief that teaching is not merely a job but a calling, analyzing survey and interview data from 527 preservice teachers. Compared to other preservice teachers, those who felt a calling displayed significantly more enthusiasm, commitment to teaching, and willingness to accept sacrifices and extra duties. (SM)

  4. Advertisement calls of Bolivian species of Scinax (Amphibia, Anura, Hylidae)

    NARCIS (Netherlands)

    Riva, de la Ignacio; Márquez, Rafael; Bosch, Jaime

    1994-01-01

    The advertisement calls of eight Bolivian species of Scinax are described including information on the calling behaviour of each species. A characteristic audiospectrogram and oscillogram are presented for each species, as well as numerical information about the spectral and temporal features of the

  5. Called to Do Meaningful Work: A Blessing or a Curse?

    Science.gov (United States)

    van Vuuren, Mark

    2017-01-01

    Two groups of people are particularly inclined to mention a calling when talking about their work motivation: those who are spiritual (because the concept of calling originated in the religious realm) and those in serving occupations (such as hospitals, schools, and nongovernmental organizations). Because Christian professors are in both groups,…

  6. Impact of Using CALL on Iranian EFL Learners' Vocabulary Knowledge

    Science.gov (United States)

    Yunus, Melor Md; Salehi, Hadi; Amini, Mahdi

    2016-01-01

    Computer Assisted Language Learning (CALL) integration in EFL contexts has intensified noticeably in recent years. This integration might be in different ways and for different purposes such as vocabulary acquisition, grammar learning, phonology, writing skills, etc. More explicitly, this study is an attempt to explore the effect of using CALL on…

  7. Advertisement calls of Bolivian species of Scinax (Amphibia, Anura, Hylidae)

    NARCIS (Netherlands)

    Riva, de la Ignacio; Márquez, Rafael; Bosch, Jaime

    1994-01-01

    The advertisement calls of eight Bolivian species of Scinax are described including information on the calling behaviour of each species. A characteristic audiospectrogram and oscillogram are presented for each species, as well as numerical information about the spectral and temporal features of the

  8. Calls to Teen Line: Representative Concerns of Adolescents.

    Science.gov (United States)

    Boehm, Kathryn E.; Schondel, Connie K.; Ivoska, William J.; Marlowe, Alison L.; Manke-Mitchell, Laurie

    1998-01-01

    Study examines whether the concerns of teenagers calling a peer listening service are representative of the concerns of teenagers in the area served. Results indicate that students' biggest concerns involve family problems, peer relationships, self-esteem, and school problems. Concludes that calls to the teen line are representative. (Author/GCP)

  9. 29 CFR 778.221 - “Call-back” pay.

    Science.gov (United States)

    2010-07-01

    ... minimum “call-back” or “call-out” payments made pursuant to employment agreements. Typically, such minimum... illustrated as follows: An employment agreement provides a minimum of 3 hours' pay at time and one-half for... Friday, inclusive, in a workweek beginning on Monday, and are paid overtime compensation at time and...

  10. Immunisation hotline calls as five-in-one vaccine introduced.

    Science.gov (United States)

    Fisher-Jeffes, Lisa; Finlay, Fiona

    2006-04-01

    Announcement of the introduction of the five-in-one vaccine (DTaP/IPV/Hib) into the primary immunisation schedule was made on 9 August 2004. In this study all calls to the immunisation hotline were recorded between 9 August 2004 and 19 November 2004, noting who called and the nature of their enquiry. A total of 208 calls were received during the study period, and of these 23 (11.1%) related to the new vaccine. Calls were from parents (10/23, 43%), health visitors (9/23, 39%) and practice nurses (3/23, 13%). A variety of themes were covered in calls including local availability of the five-in-one vaccine, vaccine safety, mercury content and efficacy. Calls not connected with the new vaccine concerned mostly adolescent MMR (17.3%) as there was a local mumps epidemic. Others related to clarification of a child's immunisation status (13.5%), primary MMR immunisation (13.5%), vaccination scheduling or administration difficulties (12%), other schedule (12.5%) and non-schedule vaccines (2.4%), vaccine reactions (2.4%), travel vaccines (6%), BCG (6%), and a few miscellaneous queries (3%). Overall questions about the new five-in-one vaccine accounted for an extra 23 calls to the immunisation hotline during the study period (11.1% of calls).

  11. Sustainability in CALL Learning Environments: A Systemic Functional Grammar Approach

    Science.gov (United States)

    McDonald, Peter

    2014-01-01

    This research aims to define a sustainable resource in Computer-Assisted Language Learning (CALL). In order for a CALL resource to be sustainable it must work within existing educational curricula. This feature is a necessary prerequisite of sustainability because, despite the potential for educational change that digitalization has offered since…

  12. Automated deadlock detection in synchronized reentrant multithreaded call-graphs

    NARCIS (Netherlands)

    I. Grabe (Immo); F.S. de Boer (Frank); J. van Leeuwen (Jan); A. Muscholl; D. Peleg; J. Pokorny; B. Rumpe

    2010-01-01

    textabstractIn this paper we investigate the synchronization of multithreaded call graphs with reentrance similar to call graphs in Java programs. We model the individual threads as Visibly Pushdown Automata (VPA) and analyse the reachability of a state in the product automaton by means of a Context

  13. Steven MacCall: Winner of LJ's 2010 Teaching Award

    Science.gov (United States)

    Berry, John N., III

    2010-01-01

    This article profiles Steven L. MacCall, winner of "Library Journal's" 2010 Teaching Award. An associate professor at the School of Library and Information Studies (SLIS) at the University of Alabama, Tuscaloosa, MacCall was nominated by Kathie Popadin, known as "Kpop" to the members of her cohort in the online MLIS program at SLIS. Sixteen of…

  14. 75 FR 31458 - Infrastructure Protection Data Call Survey

    Science.gov (United States)

    2010-06-03

    ... SECURITY National Protection and Programs Directorate Infrastructure Protection Data Call Survey AGENCY... Reduction Act of 1995 (Pub. L. 104-13, 44 U.S.C. Chapter 35). The National Protection and Programs... Protection Data Call Survey. Form: Not Applicable. OMB Number: 1670-NEW. Affected Public: Federal, State...

  15. Student Evaluation of CALL Tools during the Design Process

    Science.gov (United States)

    Nesbitt, Dallas

    2013-01-01

    This article discusses the comparative effectiveness of student input at different times during the design of CALL tools for learning kanji, the Japanese characters of Chinese origin. The CALL software "package" consisted of tools to facilitate the writing, reading and practising of kanji characters in context. A pre-design questionnaire…

  16. Effect of tracheosyringeal denervation on call in greenfinch (Carduelis sinica)

    Institute of Scientific and Technical Information of China (English)

    李东风; 李杰; 汪大伟; 蒋锦昌; 杨新宇; 陈浩

    1999-01-01

    After sections of left or right tracheosyringeal nerve (NXⅡts), greenfinches may repeat everyday calls, with no effect on temporal properties. It is suggested that either side of syrinx may produce sound alone and ipsilateral innervation of NXⅡts for the syringeal muscles. After section of left NXIIts, the bird produces the vocal pattern of partial tone increase, and effects on the sound intensity and sentence length average 1.4 and 2.8 times those after section of right NXIIts, suggesting that the innervation of NXIIts has left side dominance. After bilateral section of NXIIts, the call rhythm in company with expiratory motions is 98-146 times/min,on an average, and lose all sentence types and syllable structure of normal call. But the call spectra produced by tympaniform membrane vibrations without innervation still reserve frequency components similar to the tonic frequency and harmonics of normal calls.

  17. Evidence That Calls-Based and Mobility Networks Are Isomorphic.

    Directory of Open Access Journals (Sweden)

    Michele Coscia

    Full Text Available Social relations involve both face-to-face interaction as well as telecommunications. We can observe the geography of phone calls and of the mobility of cell phones in space. These two phenomena can be described as networks of connections between different points in space. We use a dataset that includes billions of phone calls made in Colombia during a six-month period. We draw the two networks and find that the call-based network resembles a higher order aggregation of the mobility network and that both are isomorphic except for a higher spatial decay coefficient of the mobility network relative to the call-based network: when we discount distance effects on the call connections with the same decay observed for mobility connections, the two networks are virtually indistinguishable.

  18. Investigating CALL in the Classroom: Situational Variables to Consider

    Directory of Open Access Journals (Sweden)

    Darlene Liutkus

    2012-01-01

    Full Text Available A new paradigm in second language pedagogy has Computer Assisted Language Learning (CALL playing a significant role. Much of the literature to-date claims that CALL can have a positive impact on students’ second language acquisition (SLA. Mixed method of research produces data to investigate if CALL positively affects student language proficiency, motivation and autonomy. Classroom observation of participants in their natural environment is a qualitative technique used but has situational variables that could skew results if not structured. A questionnaire is a quantitative tool that can offer insight regarding participants’ perception of performance but can contradict what the researcher has observed. This paper will take an in-depth look at variables such as: instructor’s pedagogical application; blending CALL into the curriculum; types of CALL implemented; feedback received and their implications for design of the data collection tools

  19. [Bioacoustic of the advertisement call of Ceratophrys cranwelli (Anura: Ceratophryidae)].

    Science.gov (United States)

    Valetti, Julián Alonso; Salas, Nancy Edith; Martino, Adolfo Ludovico

    2013-03-01

    The advertisement call plays an important role in the life history of anuran amphibians, mainly during the breeding season. Call features represent an important character to discriminate species, and sound emissions are very effective to assure or reinforce genetic incompatibility, especially in the case of sibling species. Since frogs are ectotherms, acoustic properties of their calls will vary with temperature. In this study, we described the advertisement call of C. cranwelli, quantifying the temperature effect on its components. The acoustic emissions were recorded during 2007 using a DAT record Sony TCD-100 with stereo microphone ECM-MS907 Sony and tape TDK DAT-RGX 60. As males emit their calls floating in temporary ponds, water temperatures were registered after recording the advertisement calls with a digital thermometer TES 1300+/-0.1 degreeC. Altogether, 54 calls from 18 males were analyzed. The temporal variables of each advertisement call were measured using oscillograms and sonograms and the analyses of dominant frequency were performed using a spectrogram. Multiple correlation analysis was used to identify the temperature-dependent acoustic variables and the temperature effect on these variables was quantified using linear regression models. The advertisement call of C. cranwelli consists of a single pulse group. Call duration, Pulse duration and Pulse interval decreased with the temperature, whereas the Pulse rate increased with temperature. The temperature-dependent variables were standardized at 25 degreeC according to the linear regression model obtained. The acoustic variables that were correlated with the temperature are the variables which emissions depend on laryngeal muscles and the temperature constraints the contractile properties of muscles. Our results indicated that temperature explains an important fraction of the variability in some acoustic variables (79% in the Pulse rate), and demonstrated the importance of considering the effect of

  20. Occupational voice demands and their impact on the call-centre industry

    Directory of Open Access Journals (Sweden)

    Duffy OM

    2009-04-01

    Full Text Available Abstract Background Within the last decade there has been a growth in the call-centre industry in the UK, with a growing awareness of the voice as an important tool for successful communication. Occupational voice problems such as occupational dysphonia, in a business which relies on healthy, effective voice as the primary professional communication tool, may threaten working ability and occupational health and safety of workers. While previous studies of telephone call-agents have reported a range of voice symptoms and functional vocal health problems, there have been no studies investigating the use and impact of vocal performance in the communication industry within the UK. This study aims to address a significant gap in the evidence-base of occupational health and safety research. The objectives of the study are: 1. to investigate the work context and vocal communication demands for call-agents; 2. to evaluate call-agents' vocal health, awareness and performance; and 3. to identify key risks and training needs for employees and employers within call-centres. Methods and design This is an occupational epidemiological study, which plans to recruit call-centres throughout the UK and Ireland. Data collection will consist of three components: 1. interviews with managers from each participating call-centre to assess their communication and training needs; 2. an online biopsychosocial questionnaire will be administered to investigate the work environment and vocal demands of call-agents; and 3. voice acoustic measurements of a random sample of participants using the Multi-dimensional Voice Program (MDVP. Qualitative content analysis from the interviews will identify underlying themes and issues. A multivariate analysis approach will be adopted using Structural Equation Modelling (SEM, to develop voice measurement models in determining the construct validity of potential factors contributing to occupational dysphonia. Quantitative data will be

  1. Concrete construction engineering handbook

    CERN Document Server

    Nawy, Edward G

    2008-01-01

    Provides coverage of concrete construction engineering and technology. This work features discussions focusing on: the advances in engineered concrete materials; reinforced concrete construction; specialized construction techniques; and, design recommendations for high performance.

  2. Calling behavior of blue and fin whales off California

    Science.gov (United States)

    Oleson, Erin Marie

    Passive acoustic monitoring is an effective means for evaluating cetacean presence in remote regions and over long time periods, and may become an important component of cetacean abundance surveys. To use passive acoustic recordings for abundance estimation, an understanding of the behavioral ecology of cetacean calling is crucial. In this dissertation, I develop a better understanding of how blue (Balaenoptera musculus) and fin (B. physalus ) whales use sound with the goal of evaluating passive acoustic techniques for studying their populations. Both blue and fin whales produce several different call types, though the behavioral and environmental context of these calls have not been widely investigated. To better understand how calling is used by these whales off California I have employed both new technologies and traditional techniques, including acoustic recording tags, continuous long-term autonomous acoustic recordings, and simultaneous shipboard acoustic and visual surveys. The outcome of these investigations has led to several conclusions. The production of blue whale calls varies with sex, behavior, season, location, and time of day. Each blue whale call type has a distinct behavioral context, including a male-only bias in the production of song, a call type thought to function in reproduction, and the production of some calls by both sexes. Long-term acoustic records, when interpreted using all call types, provide a more accurate measure of the local seasonal presence of whales, and how they use the region annually, seasonally and daily. The relative occurrence of different call types may indicate prime foraging habitat and the presence of different segments of the population. The proportion of animals heard calling changes seasonally and geographically relative to the number seen, indicating the calibration of acoustic and visual surveys is complex and requires further study on the motivations behind call production and the behavior of calling whales

  3. Mal-Netminer: Malware Classification Approach Based on Social Network Analysis of System Call Graph

    Directory of Open Access Journals (Sweden)

    Jae-wook Jang

    2015-01-01

    Full Text Available As the security landscape evolves over time, where thousands of species of malicious codes are seen every day, antivirus vendors strive to detect and classify malware families for efficient and effective responses against malware campaigns. To enrich this effort and by capitalizing on ideas from the social network analysis domain, we build a tool that can help classify malware families using features driven from the graph structure of their system calls. To achieve that, we first construct a system call graph that consists of system calls found in the execution of the individual malware families. To explore distinguishing features of various malware species, we study social network properties as applied to the call graph, including the degree distribution, degree centrality, average distance, clustering coefficient, network density, and component ratio. We utilize features driven from those properties to build a classifier for malware families. Our experimental results show that “influence-based” graph metrics such as the degree centrality are effective for classifying malware, whereas the general structural metrics of malware are less effective for classifying malware. Our experiments demonstrate that the proposed system performs well in detecting and classifying malware families within each malware class with accuracy greater than 96%.

  4. Leakage-Resilient Circuits without Computational Assumptions

    DEFF Research Database (Denmark)

    Dziembowski, Stefan; Faust, Sebastian

    2012-01-01

    Physical cryptographic devices inadvertently leak information through numerous side-channels. Such leakage is exploited by so-called side-channel attacks, which often allow for a complete security breache. A recent trend in cryptography is to propose formal models to incorporate leakage into the ......Physical cryptographic devices inadvertently leak information through numerous side-channels. Such leakage is exploited by so-called side-channel attacks, which often allow for a complete security breache. A recent trend in cryptography is to propose formal models to incorporate leakage...... into the model and to construct schemes that are provably secure within them. We design a general compiler that transforms any cryptographic scheme, e.g., a block-cipher, into a functionally equivalent scheme which is resilient to any continual leakage provided that the following three requirements are satisfied...

  5. Identification of sympatric bat species by the echolocation calls

    Institute of Scientific and Technical Information of China (English)

    2008-01-01

    One hundred and thirty-eight echolocation calls of 63 free-flying individuals of five bat species (Rhinolophus ferrumequinum,Myotis formosus,Myotis ikonnikovi,Myotis daubentoni and Murina leucogaster)were recorded (by ultrasonic bat detector (D980)) in Zhi'an village of Jilin Province,China.According to the frequency-time spectra,these calls were categorized into two types:FM/CF (constant frequency) / FM (R.ferrumequinum) and FM (frequency modulated)(M.formosus,M.ikonnikovi,M.daubentoni and M.leucogaster).Sonograms of the calls of R.ferrumequinum could easily be distinguished from those of the other four species.For the calls of the remaining four species,six echolocation call parameters,including starting frequency,ending frequency,peak frequency duration,longest inter-pulse interval and shortest inter-pulse interval,were examined by stepwise discriminant analysis.The results show that 84.1% of calls were correctly classified,which indicates that these parameters of echolocation calls play an important role in identifying bat species.These parameters can be used to test the accuracy of general predictions based on bats' morphology in the same forest and can provide essential information for assessing patterns of bat habitat use.

  6. Spectrographic Analysis of Carrion Crow Calls and Their Detection

    Science.gov (United States)

    Shibuya, Hisashi; Yokota, Yasunari

    In recent years, damage to agricultural products, livestock, and power transmission systems by crows is regarded as a serious problem; countermeasures against crow damage are urgently necessary. This paper proposed a method for detecting crow calls in various environmental sounds. If detection and discernment of crow calls were possible, various actions could be undertaken to prevent the damage. Wildlife call detection, not only that for crows, should be executed in extremely noisy environments. We then introduced both a spectrograph estimation technique with AR modeling in which AR coefficients are temporally smoothed and interpolated and a background noise elimination technique to obtain higher-quality crow call templates. The input sounds are compared with these templates by DP matching in the metric vector space of a logarithmic cepstrum. Every input sound whose minimal distance to the template database is less than the specified threshold value is detected as a crow call. The maximal detection performance can be obtained when five call templates in the template database are utilized; the implication is that carrion crows have five distinguishable call patterns. It is shown that the proposed method achieves 95% detection rate when 1.66% misdetection rate is allowed.

  7. The path most travelled: Mining road usage patterns from massive call data

    CERN Document Server

    Toole, Jameson L; Alhasoun, Fahad; Evsukoff, Alexandre; Gonzalez, Marta C

    2014-01-01

    Rapid urbanization places increasing stress on already burdened transportation systems, resulting in delays and poor levels of service. Billions of spatiotemporal call detail records (CDRs) collected from mobile devices create new opportunities to quantify and solve these problems. However, there is a need for tools to map new data onto existing transportation infrastructure. In this work, we propose a system that leverages this data to identify patterns in road usage. First, we develop an algorithm to mine billions of calls and learn location transition probabilities of callers. These transition probabilities are then upscaled with demographic data to estimate origin-destination (OD) flows of residents between any two intersections of a city. Next, we implement a distributed incremental traffic assignment algorithm to route these flows on road networks and estimate congestion and level of service for each roadway. From this assignment, we construct a bipartite usage network by connecting census tracts to the...

  8. Constructing a logical, regular axis topology from an irregular topology

    Science.gov (United States)

    Faraj, Daniel A.

    2014-07-01

    Constructing a logical regular topology from an irregular topology including, for each axial dimension and recursively, for each compute node in a subcommunicator until returning to a first node: adding to a logical line of the axial dimension a neighbor specified in a nearest neighbor list; calling the added compute node; determining, by the called node, whether any neighbor in the node's nearest neighbor list is available to add to the logical line; if a neighbor in the called compute node's nearest neighbor list is available to add to the logical line, adding, by the called compute node to the logical line, any neighbor in the called compute node's nearest neighbor list for the axial dimension not already added to the logical line; and, if no neighbor in the called compute node's nearest neighbor list is available to add to the logical line, returning to the calling compute node.

  9. The experience of work in a call centre environment

    Directory of Open Access Journals (Sweden)

    Sanet Hauptfleisch

    2006-02-01

    Full Text Available This qualitative research study explored the work experience in a call centre environment in an information technology call centre based in South Africa, which service foreign customers exclusively. Three data collection methods were used, namely narratives, in-depth interviews with call centre consultants, and observation. Following a grounded theory approach, four themes were elicited, namely the perceptions of team members, uncertainty created by a constantly changing environment, perceived distances due to management practices, and depersonalisation experienced while actually dealing with customers. In addition to this, the reported impact of these themes on work performance was explored and compared to existing research.

  10. Well Being and Job Satisfaction Among Call Centre Agents

    DEFF Research Database (Denmark)

    Wiegman, Inger Marie; Mathiesen, Karen; Møller, Niels

    2004-01-01

    A survey among 774 agents in four large Danish companies in house call centres shows that working in a call center is stressfull. Lack of control and autonomy, lack of potentiality and challenges, conflict between qualitative and quantitative demands and monitoring all have an adverse effect on job...... satisfaction. The survey reveals a need for improving working conditions and for development of the work as such in call centres. The survey suggests that the agents both want to participate in the process of development and that they can contribute to the process in a competent way. In the project as part...

  11. Well Being and Job Satisfaction Among Call Centre Agents

    DEFF Research Database (Denmark)

    Wiegman, Inger Marie; Mathiesen, Karen; Møller, Niels

    2004-01-01

    A survey among 774 agents in four large Danish companies in house call centres shows that working in a call center is stressfull. Lack of control and autonomy, lack of potentiality and challenges, conflict between qualitative and quantitative demands and monitoring all have an adverse effect on job...... satisfaction. The survey reveals a need for improving working conditions and for development of the work as such in call centres. The survey suggests that the agents both want to participate in the process of development and that they can contribute to the process in a competent way. In the project as part...

  12. SYSTEMIC INNOVATION IN CONSTRUCTION: THE

    DEFF Research Database (Denmark)

    Jensen, Jens Stissing; Koch, Christian

    2007-01-01

    This paper offers an evaluation of a best practice program called ‘Best in Construction’ (BiC) which aimed to identify and document cases of successful ICT use in the Danish construction industry. The program is evaluated using two different approaches. The first approach is result-based. This ap......This paper offers an evaluation of a best practice program called ‘Best in Construction’ (BiC) which aimed to identify and document cases of successful ICT use in the Danish construction industry. The program is evaluated using two different approaches. The first approach is result......-based. This approach evaluates the outcome of the program against the main intentions formulated in the tender material. Drawing on systemic innovation theory an alternative evaluative approach is suggested which focuses on the build-up of organizational and institutional resources to support the development...... of an emerging ICT trajectory. While the result-based evaluation points to some weaknesses in the quality of the best-practice and cross-organizational elements of the case-material, the systemic approach point to some important sideeffects of the program, such as the stabilization and enrolment of the industry...

  13. Career Construction with a Gay Client: A Case Study

    Science.gov (United States)

    Maree, Jacobus Gideon

    2014-01-01

    This article reports on the value of career construction counselling (CCC) with a gay person. The participant was selected purposively, with the selection criteria calling for a mid-career woman who had sought career counselling. The intervention involved administration of the "Career Construction Interview" (CCI) and the creation of a…

  14. Career Construction with a Gay Client: A Case Study

    Science.gov (United States)

    Maree, Jacobus Gideon

    2014-01-01

    This article reports on the value of career construction counselling (CCC) with a gay person. The participant was selected purposively, with the selection criteria calling for a mid-career woman who had sought career counselling. The intervention involved administration of the "Career Construction Interview" (CCI) and the creation of a…

  15. 基于时滞混沌系统的带密钥Hash函数的设计与分析%Design and Analysis of a Cryptographic Hash Function Based on Time-Delay Chaotic System

    Institute of Scientific and Technical Information of China (English)

    徐杰; 杨娣洁; 隆克平

    2011-01-01

    An algorithm of cryptographic hash function based on time-delay chaotic system is presented in this paper. In this algorithm, initial message is modulated into time-delay chaotic iteration, and the Hash value can be calculated by a HMAC-MD5 algorithm. Thus, every bit of this Hash value is correlative with initial message,and this Hash value is very sensitive to micro changes of the initial message or the initial condition of chaotic system. By theory analyses and simulations, we obtain that the Hash value has irregularity and diffusion properties,and the parameter space is augmented because of the properties of chaos. The nonlinear relation between hash value and initial message can be effectively against linear analysis. Therefore, this Hash function based on time-delay chaotic system can get better anti-attack and anti-collision capacity.%提出了一种基于时滞混沌系统的带密钥Hash函数算法,该算法利用时滞混沌系统非线性动力学特性,将需要传送的明文信息调制在时滞混沌迭代的轨迹中,并通过HMAC-MD5算法计算得出Hash值,Hash值的每个比特都与需传送的明文信息相关.该算法使Hash值对明文信息及时滞混沌迭代初始条件的微小变化高度敏感.理论分析和仿真结果均表明,该算法在保证Hash值的混乱性和散布性的同时,由于其混沌特性的加入而增大了参数空间,并且混沌Hash值与初始明文信息之间的非线性关系可以有效地抵御线性分析.因此,本文设计的基于时滞混沌系统的Hash函数算法具有很好的安全性、抗碰撞性和抗攻击能力,在数字签名等认证技术领域有很好的应用前景.

  16. Yoga Called Good Medicine for High Blood Pressure

    Science.gov (United States)

    ... fullstory_162446.html Yoga Called Good Medicine for High Blood Pressure People who added this practice to a healthy ... elevated blood pressure] are likely to develop hypertension [high blood pressure] unless they improve their lifestyle," said study author ...

  17. SNPMClust: Bivariate Gaussian Genotype Clustering and Calling for Illumina Microarrays

    Directory of Open Access Journals (Sweden)

    Stephen W. Erickson

    2016-07-01

    Full Text Available SNPMClust is an R package for genotype clustering and calling with Illumina microarrays. It was originally developed for studies using the GoldenGate custom genotyping platform but can be used with other Illumina platforms, including Infinium BeadChip. The algorithm first rescales the fluorescent signal intensity data, adds empirically derived pseudo-data to minor allele genotype clusters, then uses the package mclust for bivariate Gaussian model fitting. We compared the accuracy and sensitivity of SNPMClust to that of GenCall, Illumina's proprietary algorithm, on a data set of 94 whole-genome amplified buccal (cheek swab DNA samples. These samples were genotyped on a custom panel which included 1064 SNPs for which the true genotype was known with high confidence. SNPMClust produced uniformly lower false call rates over a wide range of overall call rates.

  18. Anuran Call Study Wertheim National Wildlife Refuge 1999

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — During May of 1999, the Wertheim National Wildlife Refuge participated in a nation - wide anuran call count study. This report outlines the results of that survey.

  19. Anuran Call Survey Summary 2002 Canaan Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Anuran call surveys were conducted at the Canaan Valley National Wildlife Refuge for the first time in 2000 so this report summarizes the results of the refuge’s...

  20. The use of Computer Assisted Language Learning (CALL) Devices ...

    African Journals Online (AJOL)

    The use of Computer Assisted Language Learning (CALL) Devices in ... role of information and communication technologies in language learning and teaching. ... Classroom implications and applications for the effective Computer Assisted ...

  1. Anuran Call Survey Summary 2006 Canaan Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Anuran call surveys were conducted at Canaan Valley National Wildlife Refuge in April-June 2006 using the protocol developed by the North American Amphibian...

  2. Trading Strategy Adipted Optimization of European Call Option

    OpenAIRE

    Fukumi, Toshio

    2005-01-01

    Optimal pricing of European call option is described by linear stochastic differential equation. Trading strategy given by a twin of stochastic variables was integrated w.r.t. Black-Scholes formula to adopt optimal pricing to tarading strategy.

  3. Anuran Call Survey Summary 2000 Canaan Valley National Wildlife Refuge

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — Anuran call surveys were conducted at the Canaan Valley National Wildlife Refuge for the first time in 2000. Surveys for anurans are conducted in conjunction with...

  4. Family History of Colon Cancer Calls for Earlier Screening

    Science.gov (United States)

    ... page: https://medlineplus.gov/news/fullstory_164202.html Family History of Colon Cancer Calls for Earlier Screening ... 2017 (HealthDay News) -- If you've got a family history of colon or rectal cancers, you probably ...

  5. An Intelligent Call Admission Control Decision Mechanism for Wireless Networks

    CERN Document Server

    S., Ramesh Babu H; S, Satyanarayana P

    2010-01-01

    The Call admission control (CAC) is one of the Radio Resource Management (RRM) techniques plays instrumental role in ensuring the desired Quality of Service (QoS) to the users working on different applications which have diversified nature of QoS requirements. This paper proposes a fuzzy neural approach for call admission control in a multi class traffic based Next Generation Wireless Networks (NGWN). The proposed Fuzzy Neural Call Admission Control (FNCAC) scheme is an integrated CAC module that combines the linguistic control capabilities of the fuzzy logic controller and the learning capabilities of the neural networks .The model is based on Recurrent Radial Basis Function Networks (RRBFN) which have better learning and adaptability that can be used to develop the intelligent system to handle the incoming traffic in the heterogeneous network environment. The proposed FNCAC can achieve reduced call blocking probability keeping the resource utilisation at an optimal level. In the proposed algorithm we have c...

  6. Anuran Call Study Wertheim National Wildlife Refuge 2000

    Data.gov (United States)

    US Fish and Wildlife Service, Department of the Interior — For the second consecutive year, Wertheim National Wildlife Refuge participated in a nation-wide anuran call study. This report outlines the results of that survey...

  7. Formative Feedback in an Interactive Spoken CALL System

    OpenAIRE

    Tsourakis, Nikolaos; Rayner, Emmanuel; Baur, Claudia

    2014-01-01

    By definition spoken dialogue CALL systems should be easy to use and understand. However, interaction in this context is often far from unhindered. In this paper we introduce a formative feedback mechanism in our CALL system, which can monitor interaction, report errors and provide advice and suggestions to users. The distinctive feature of this mechanism is the ability to combine information from different sources and decide on the most pertinent feedback, which can also be adapted in terms ...

  8. The Call to Excellence--No Room for Complacency.

    Science.gov (United States)

    Mosher, Ruth

    2015-01-01

    The call of the nurse is to promote, protect, and support health in all areas of life. Christian nurses are further called to imitate Jesus Christ. Yet, complacency is a common attitude among nurses. With new national standards of collecting and publicly reporting patient perceptions of care, positive nursing attitudes and excellent care are imperative to successful outcomes. What does it mean to seek professional excellence?

  9. Processing of communication calls in Guinea pig auditory cortex.

    Directory of Open Access Journals (Sweden)

    Jasmine M S Grimsley

    Full Text Available Vocal communication is an important aspect of guinea pig behaviour and a large contributor to their acoustic environment. We postulated that some cortical areas have distinctive roles in processing conspecific calls. In order to test this hypothesis we presented exemplars from all ten of their main adult vocalizations to urethane anesthetised animals while recording from each of the eight areas of the auditory cortex. We demonstrate that the primary area (AI and three adjacent auditory belt areas contain many units that give isomorphic responses to vocalizations. These are the ventrorostral belt (VRB, the transitional belt area (T that is ventral to AI and the small area (area S that is rostral to AI. Area VRB has a denser representation of cells that are better at discriminating among calls by using either a rate code or a temporal code than any other area. Furthermore, 10% of VRB cells responded to communication calls but did not respond to stimuli such as clicks, broadband noise or pure tones. Area S has a sparse distribution of call responsive cells that showed excellent temporal locking, 31% of which selectively responded to a single call. AI responded well to all vocalizations and was much more responsive to vocalizations than the adjacent dorsocaudal core area. Areas VRB, AI and S contained units with the highest levels of mutual information about call stimuli. Area T also responded well to some calls but seems to be specialized for low sound levels. The two dorsal belt areas are comparatively unresponsive to vocalizations and contain little information about the calls. AI projects to areas S, VRB and T, so there may be both rostral and ventral pathways for processing vocalizations in the guinea pig.

  10. Non-linguistic analysis of call center conversations

    CERN Document Server

    Kopparapu, Sunil Kumar

    2014-01-01

    The book focuses on the part of the audio conversation not related to language such as speaking rate (in terms of number of syllables per unit time) and emotion centric features. This text examines using non-linguistics features to infer information from phone calls to call centers. The author analyzes 'how' the conversation happens and not 'what' the conversation is about by audio signal processing and analysis.

  11. La otra ciudad - Otros sujetos: los habitantes de la calle

    Directory of Open Access Journals (Sweden)

    Marta Elena Correa A.

    2007-01-01

    Full Text Available Este artículo está basado en el estudio "Caracterización demográfica, social, económica y familiar de los habitantes de calle de la comuna 11 de la ciudad de Medellín". En él se plantea la condición del habitante de calle como subproducto de concepciones

  12. Genotype and SNP calling from next-generation sequencing data

    DEFF Research Database (Denmark)

    Nielsen, Rasmus; Paul, Joshua S.; Albrechtsen, Anders

    2011-01-01

    Meaningful analysis of next-generation sequencing (NGS) data, which are produced extensively by genetics and genomics studies, relies crucially on the accurate calling of SNPs and genotypes. Recently developed statistical methods both improve and quantify the considerable uncertainty associated w...... with genotype calling, and will especially benefit the growing number of studies using low- to medium-coverage data. We review these methods and provide a guide for their use in NGS studies....

  13. Constructing an Archive

    DEFF Research Database (Denmark)

    Carbone, Claudia; Wieczorek, Izabela; Francis, Alice;

    2016-01-01

    "Constructing an Archive" contains a collection of student works conducted during the Fall semester of 2015 at the Aarhus School of Architecture, at the master studio Constructing an Archive......."Constructing an Archive" contains a collection of student works conducted during the Fall semester of 2015 at the Aarhus School of Architecture, at the master studio Constructing an Archive....

  14. Women Labour in Call Centres: Understanding Characteristics of Work

    Directory of Open Access Journals (Sweden)

    Gulten Dursun

    2014-07-01

    Full Text Available This paper is concerned with the work experiences of women employees in info-service-based offices as telephone call centres. Call centres have grown rapidly in Tur-key in recent years, creating a large number of new jobs. In particular, it is concerned with the question of whether call centre jobs are offering women new opportunities for career progression, or whether a more common bias is taking place in which women are being drawn into highly routinized jobs. The collection of data was carried out so-urcing a heterogeneous plurality of instruments. Our research confirms that work pro-cesses in call centres are close association of surveillance technologies (technologic panoptican, exploitation and high levels of discipline, highly repetitive and heavily mo-nitored, and that the association with the assembly line and Taylorism have dominated much of the rhetoric on call centres. In addition, we have observed that, the structure of women’s employment in the call centre industry tends to polarise.

  15. Social calls of flying big brown bats (Eptesicus fuscus

    Directory of Open Access Journals (Sweden)

    Genevieve Spanjer Wright

    2013-08-01

    Full Text Available Vocalizations serving a variety of social functions have been reported in many bat species (Order Chiroptera. While echolocation by big brown bats (Eptesicus fuscus has been the subject of extensive study, calls used by this species for communication have received comparatively little research attention. Here, we report on a rich repertoire of vocalizations produced by big brown bats in a large flight room equipped with synchronized high speed stereo video and audio recording equipment. Bats were studied individually and in pairs, while sex, age, and experience with a novel foraging task were varied. We used Discriminant Function Analysis to classify six different vocalizations that were recorded when two bats were present. Contingency table analyses revealed a higher prevalence of social calls when males were present, and some call types varied in frequency of emission based on trial type or bat age. Bats flew closer together around the time some social calls were emitted, indicating that communicative calls may be selectively produced when conspecifics fly near one another. These findings are the first reports of social calls from flying big brown bats and provide insight into the function of communicative vocalizations emitted by this species.

  16. Leveraging Call Center Logs for Customer Behavior Prediction

    Science.gov (United States)

    Parvathy, Anju G.; Vasudevan, Bintu G.; Kumar, Abhishek; Balakrishnan, Rajesh

    Most major businesses use business process outsourcing for performing a process or a part of a process including financial services like mortgage processing, loan origination, finance and accounting and transaction processing. Call centers are used for the purpose of receiving and transmitting a large volume of requests through outbound and inbound calls to customers on behalf of a business. In this paper we deal specifically with the call centers notes from banks. Banks as financial institutions provide loans to non-financial businesses and individuals. Their call centers act as the nuclei of their client service operations and log the transactions between the customer and the bank. This crucial conversation or information can be exploited for predicting a customer’s behavior which will in turn help these businesses to decide on the next action to be taken. Thus the banks save considerable time and effort in tracking delinquent customers to ensure minimum subsequent defaulters. Majority of the time the call center notes are very concise and brief and often the notes are misspelled and use many domain specific acronyms. In this paper we introduce a novel domain specific spelling correction algorithm which corrects the misspelled words in the call center logs to meaningful ones. We also discuss a procedure that builds the behavioral history sequences for the customers by categorizing the logs into one of the predefined behavioral states. We then describe a pattern based predictive algorithm that uses temporal behavioral patterns mined from these sequences to predict the customer’s next behavioral state.

  17. A Method for Calling Copy Number Polymorphism Using Haplotypes

    Directory of Open Access Journals (Sweden)

    Gun Ho eJang

    2013-09-01

    Full Text Available Single nucleotide polymorphism (SNP and copy number variation (CNV are both widespread characteristic of the human genome, but are often called separately on common genotyping platforms. To capture integrated SNP and CNV information, methods have been developed for calling allelic specific copy numbers or so called copy number polymorphism (CNP, using limited inter-marker correlation. In this paper, we proposed a haplotype-based maximum likelihood method to call CNP, which takes advantage of the valuable multi-locus linkage disequilibrium (LD information in the population. We also developed a computationally efficient EM algorithm to estimate haplotype frequencies and optimize individual CNP calls simultaneously, even at presence of missing data. Through simulations, we demonstrated our model is more sensitive and accurate in detecting various CNV regions, compared with commonly-used CNV calling methods including PennCNV, another hidden Markov model using CNP, a scan statistic, segCNV, and cnvHap. Our method often performs better in the regions with higher LD, in longer CNV regions, and in common CNV than the opposite. We implemented our method on the genotypes of 90 HapMap CEU samples and 23 patients with acute lung injury (ALI. For each ALI patient the genotyping was performed twice. The CNPs from our method show good consistency and accuracy comparable to others.

  18. Perceptual specificity in the alarm calls of Gunnison's prairie dogs.

    Science.gov (United States)

    Kiriazis, Judith; Slobodchikoff, C N

    2006-07-01

    Gunnison's prairie dogs have a complex alarm communication system. We show that the escape responses of prairie dogs to naturally occurring live predators differed depending upon the species of predator. We also show that playbacks of alarm calls that were elicited originally by the live predators produced the same escape responses as the live predators themselves. The escape responses fell into two qualitatively different categories: running to the burrow and diving inside for hawks and humans, and standing upright outside the burrow for coyotes and dogs. Within these two categories there were differences in response. For hawks, only the prairie dogs that were in the direct flight path of a stooping red-tailed hawk ran to their burrows and dove inside, while for humans and human alarm call playbacks there was a colony-wide running to the burrows and diving inside. For coyotes and coyote alarm call playbacks there was a colony-wide running to the burrows and standing alert at the burrow rims, while for domestic dogs and playbacks of alarm calls for domestic dogs the prairie dogs assumed an alert posture wherever they were feeding, but did not run to their burrows. These responses to both the live predators and to predator-elicited alarm calls suggest that the alarm calls of Gunnison's prairie dogs contain meaningful referential information about the categories of predators that approach a colony of prairie dogs.

  19. Single Time-Stamped Tries for Retroactive Call Subsumption

    CERN Document Server

    Cruz, Flavio

    2011-01-01

    Tabling is an evaluation strategy for Prolog programs that works by storing answers in a table space and then by using them in similar subgoals. Some tabling engines use call by subsumption, where it is determined that a subgoal will consume answers from a more general subgoal in order to reduce the search space and increase efficiency. We designed an extension, named Retroactive Call Subsumption (RCS), that implements call by subsumption independently of the call order, thus allowing a more general subgoal to force previous called subgoals to become answer consumers. For this extension, we propose a new table space design, the Single Time Stamped Trie (STST), that is organized to make answer sharing across subsumed/subsuming subgoals simple and efficient. In this paper, we present the new STST table space design and we discuss the main modifications made to the original Time Stamped Tries approach to non-retroactive call by subsumption. In experimental results, with programs that stress some deficiencies of ...

  20. Distress calls may honestly signal bird quality to predators.

    Science.gov (United States)

    Laiolo, Paola; Tella, José L; Carrete, Martina; Serrano, David; López, Guillermo

    2004-12-07

    In predator-prey interactions, both interactors may benefit from sharing information about prey vulnerability. We examined the relationship between calls used to discourage close predators (distress calls) and the health condition of the caller to test whether these signals are reliable indicators of prey quality. The structure of calls from captured lesser short-toed larks Calandrella rufescens was related to their body condition and T-cell-mediated immunocompetence. Birds in better nutritional and immunological condition utter harsher calls (i.e. they spread the call energy over a wider range of frequency) than birds in poorer conditions. Hence, the harshness of distress calls seems honestly to signal the health status of prey and thus their ability to escape, on which the predator might base its optimal foraging choice. Previous studies have investigated the honesty of songs that have evolved via sexual selection, but this is the first study, to our knowledge, the demonstrates a relationship between individual quality and a vocalization primarily shaped by natural selection.