WorldWideScience

Sample records for identity belief systems

  1. The Intersectionality of Religious Belief and Sexual Identity

    Science.gov (United States)

    Yadron, Christopher

    2016-01-01

    The potential for conflict or tension between the cultural variables of sexual identity and religious belief for counselors, clients, and counseling students is well-documented by the counseling literature. The tension has existed primarily due to competing religious values for counselors and clients most often with respect to the phenomena of…

  2. Beliefs and brownies: in search for a new identity for 'belief' research

    DEFF Research Database (Denmark)

    Skott, Jeppe

    2014-01-01

    Belief research (BR) has contributed with better understandings of teachers’ acts and meaning making, but is fraught with conceptual and methodological problems. Also, the premise that teachers’ beliefs impact practice is often not confirmed. I compare BR with a conceptual framework, Patterns...... of the rationale of BR, but involves a fundamental shift of identity for research on affect, which alleviates some of the problems of BR and is useful for understanding the dynamics of teachers’ contribution to classroom practice....

  3. Breast Health Belief Systems Study

    National Research Council Canada - National Science Library

    Williams, Mary

    1999-01-01

    .... The hypothesis underlying this research is that a breast health promotion approach that is based in specific belief systems among three disparate African American rural populations of low socioeconomic status (SES...

  4. The Role of Moral Beliefs, Memories, and Preferences in Representations of Identity.

    Science.gov (United States)

    Heiphetz, Larisa; Strohminger, Nina; Young, Liane L

    2017-04-01

    People perceive that if their memories and moral beliefs changed, they would change. We investigated why individuals respond this way. In Study 1, participants judged that identity would change more after changes to memories and widely shared moral beliefs (e.g., about murder) versus preferences and controversial moral beliefs (e.g., about abortion). The extent to which participants judged that changes would affect their relationships predicted identity change (Study 2) and mediated the relationship between type of moral belief and perceived identity change (Study 3). We discuss the role that social relationships play in judgments of identity and highlight implications for psychology and philosophy. Copyright © 2016 Cognitive Science Society, Inc.

  5. The spiritual and religious identities, beliefs, and practices of academic pediatricians in the United States.

    Science.gov (United States)

    Catlin, Elizabeth Ann; Cadge, Wendy; Ecklund, Elaine Howard; Gage, Elizabeth A; Zollfrank, Angelika Annette

    2008-12-01

    Physicians' spiritual and religious identities, beliefs, and practices are beginning to be explored. The objective of this study was to gather descriptive information about personal religion and spirituality from a random sample of academic American pediatricians and to compare this information with similar data from the public. In 2005, a Web-based survey of a random sample of 208 pediatrician faculty from 13 academic centers ranked by the US News & World Report as "honor roll" hospitals was conducted. Surveys elicited information about personal beliefs and practices as well as their influence on decisions about patient care and clinical practice. Multiple questions were replicated from the General Social Survey to enable comparisons with the public. Descriptive statistics were generated, and logistic regression analyses were conducted on relevant variables. Nearly 88% of respondents were raised in a religious tradition, but just 67.2% claimed current religious identification. More than half (52.6%) reported praying privately; additional spiritual practices reported included relaxation techniques (38.8%), meditation (29.3%), sacred readings (26.7%), and yoga (19%). The majority of academic pediatricians (58.6%) believed that personal spiritual or religious beliefs influenced their interactions with patients/colleagues. These odds increased 5.1-fold when academic pediatricians attended religious services monthly or more (P religious identity. The majority believed spiritual and religious beliefs influenced their practice of pediatrics. Whether secular or faith-based belief systems measurably modify academic pediatric practice is unknown.

  6. Gender Identity and Adversarial Sexual Beliefs as Predictors of Attitudes toward Sexual Harassment.

    Science.gov (United States)

    Murrell, Audrey J.; Dietz-Uhler, Beth L.

    1993-01-01

    Examines impact of gender identity and adversarial sexual beliefs as predictors of attitudes toward sexual harassment for 52 female and 55 male college students. Adversarial beliefs and experience with sexual harassment predict less tolerant attitudes toward harassment for males, whereas strong gender group identity and experience with harassment…

  7. Essentialist beliefs, sexual identity uncertainty, internalized homonegativity and psychological wellbeing in gay men.

    Science.gov (United States)

    Morandini, James S; Blaszczynski, Alexander; Ross, Michael W; Costa, Daniel S J; Dar-Nimrod, Ilan

    2015-07-01

    The present study examined essentialist beliefs about sexual orientation and their implications for sexual identity uncertainty, internalized homonegativity and psychological wellbeing in a sample of gay men. A combination of targeted sampling and snowball strategies were used to recruit 639 gay identifying men for a cross-sectional online survey. Participants completed a questionnaire assessing sexual orientation beliefs, sexual identity uncertainty, internalized homonegativity, and psychological wellbeing outcomes. Structural equation modeling was used to test whether essentialist beliefs were associated with psychological wellbeing indirectly via their effect on sexual identity uncertainty and internalized homonegativity. A unique pattern of direct and indirect effects was observed in which facets of essentialism predicted sexual identity uncertainty, internalized homonegativity and psychological wellbeing. Of note, viewing sexual orientation as immutable/biologically based and as existing in discrete categories, were associated with less sexual identity uncertainty. On the other hand, these beliefs had divergent relationships with internalized homonegativity, with immutability/biological beliefs associated with lower, and discreteness beliefs associated with greater internalized homonegativity. Of interest, although sexual identity uncertainty was associated with poorer psychological wellbeing via its contribution to internalized homophobia, there was no direct relationship between identity uncertainty and psychological wellbeing. Findings indicate that essentializing sexual orientation has mixed implications for sexual identity uncertainty and internalized homonegativity and wellbeing in gay men. Those undertaking educational and clinical interventions with gay men should be aware of the benefits and of caveats of essentialist theories of homosexuality for this population. (c) 2015 APA, all rights reserved).

  8. Student Beliefs and Attitudes about Authorial Identity in Academic Writing

    Science.gov (United States)

    Pittam, Gail; Elander, James; Lusher, Joanne; Fox, Pauline; Payne, Nicola

    2009-01-01

    Authorial identity is the sense a writer has of themselves as an author and the textual identity they construct in their writing. This article describes two studies exploring psychology students' authorial identity in academic writing. A qualitative focus group study with 19 students showed that authorial identity was largely unfamiliar to…

  9. Identity processes as a predictor of memory beliefs in older adults.

    Science.gov (United States)

    Hilgeman, Michelle M; Allen, Rebecca S; Carden, Keisha D

    2017-07-01

    The impact of identity processes (identity assimilation, identity accommodation, and identity balance) on memory beliefs was explored. Individually administered questionnaires (e.g. depressive symptoms, subjective health, identity processes, memory beliefs) and a brief neuropsychological assessment of cognitive abilities were completed during a one-time interview with 82 participants aged 58-92 years-old (M = 74.68, SD = 10.95). Forty (49.4%) identified their race as White/Caucasian, 38 (46.9%) identified their race as Black/African American, and 3 (3.7%) indicated no primary racial/ethnic group. Hierarchical regression analyses revealed that identity processes account for differences in memory beliefs beyond established predictors. Specifically, identity accommodation and identity balance predicted memory self-efficacy beyond depression and subjective health. These findings are congruent with identity process theory; however, the impact of identity assimilation in this population was unremarkable. Exploratory analyses also indicated that the identity processes have a stronger relationship to some domains of memory self-efficacy (i.e. anxiety, capacity) than others (i.e. perceived change, locus of control). Beliefs about memory and their integration into an adaptable, yet consistent self-concept are an important element of identity for aging individuals. Additional research is needed to determine the unique role of identity accommodation and identity balance in understanding cognitive functioning and ultimately the impact on potential clinical applications, such as related health-seeking behavior among older adults. Tailored interventions could be developed to facilitate optimal utilization of health care services at a time when early diagnosis of memory-related disorders is critical for future planning and care decisions.

  10. Chinese Teachers’ Professional Identity and Beliefs about the Teacher-Student Relationships in an Intercultural Context

    DEFF Research Database (Denmark)

    Wang, Li; Du, Xiangyun

    2014-01-01

    -teacher relationships are shaped by both their prior experiences and backgrounds and the current social and cultural contexts in which they are situated. Changes of context (e.g., from China to Denmark) often lead to a transformation of their professional identity and beliefs. Being a teacher in an intercultural......This paper presents a qualitative study of immigrant Chinese teachers’ professional identity and beliefs about the teacher-student relationship in an intercultural context. Theoretically, this study takes its departure from a sociocultural perspective on understanding professional identity....... The empirical analysis in the study drew mainly upon ethnographic interviews with a group of Chinese language teachers in Denmark concerning their life experiences, perceptions, and beliefs. The results of this study suggest that teachers’ beliefs about their roles as teachers and about student...

  11. Exercise promotion: an integration of exercise self-identity, beliefs, intention, and behaviour

    NARCIS (Netherlands)

    de Bruijn, G.-J.; van den Putte, B.

    2012-01-01

    We explored the role of exercise self-identity within the framework of the theory of planned behaviour (TPB). Participants were 538 undergraduate students who completed measures of exercise self-identity, exercise behaviour, TPB items, and behavioural and control beliefs. Regression analysis showed

  12. Past Experiences, Present Beliefs, Future Practices: Using Narratives to Re(present) Leadership Educator Identity

    Science.gov (United States)

    Priest, Kerry L.; Seemiller, Corey

    2018-01-01

    In an effort to better understand leadership educator preparation, this qualitative study explores leadership educators' identity constructions, or (re)presentations of experiences, beliefs, and practices that contribute to one's professional identity. We used three narrative approaches (storytelling, symbolic interactionism, and anticipatory…

  13. Challenging Normative Sexual and Gender Identity Beliefs through Romeo and Juliet

    Science.gov (United States)

    Ressler, Paula

    2005-01-01

    Paula Ressler, an English teacher, suggests unconventional ways to work with William Shakespeare's "Romeo and Juliet" in the secondary school English curriculum to challenge normative sexual and gender identity beliefs. Reading queerly to explore non-normative sex and gender identities and reading for social justice have the potential to…

  14. Religious identity, beliefs, and views about climate change

    Science.gov (United States)

    Sonya Sachdeva

    2016-01-01

    People can take extraordinary measures to protect that which they view as sacred. They may refuse financial gain, engage in bloody, inter-generational conflicts, mount hunger strikes and even sacrifice their lives. These behaviors have led researchers to propose that religious values shape our identities and give purpose to our lives in a way that secular incentives...

  15. Gendered Cultural Identities: The Influences of Family and Privacy Boundaries, Subjective Norms, and Stigma Beliefs on Family Health History Communication.

    Science.gov (United States)

    Hong, Soo Jung

    2017-05-25

    This study investigates the effects of cultural norms on family health history (FHH) communication in the American, Chinese, and Korean cultures. More particularly, this study focuses on perceived family boundaries, subjective norms, stigma beliefs, and privacy boundaries, including age and gender, that affect people's FHH communication. For data analyses, hierarchical multiple regression and logistic regression methods were employed. The results indicate that participants' subjective norms, stigma beliefs, and perceived family/privacy boundaries were positively associated with current FHH communication. Age- and gender-related privacy boundaries were negatively related to perceived privacy boundaries, however. Finally, the results show that gendered cultural identities have three-way interaction effects on two associations: (1) between perceived family boundaries and perceived privacy boundaries and (2) between perceived privacy boundaries and current FHH communication. The findings have meaningful implications for future cross-cultural studies on the roles of family systems, subjective norms, and stigma beliefs in FHH communication.

  16. Conflicting belief systems: some implications for education

    Directory of Open Access Journals (Sweden)

    E.J. van Niekerk

    1999-03-01

    Full Text Available In this article the conceptions of knowledge and time within Christianity, secular humanism and traditional African religion are juxtaposed. In order to emphasise the vital role o f belief systems in the field of education, some educational implications are inferred from these different conceptions of knowledge and time. The need to create enough space within the South African education system so that parents will be able to send their children to schools where education is conducted according to their particular belief systems is also foregrounded.

  17. Beliefs About the Causal Structure of the Self-Concept Determine Which Changes Disrupt Personal Identity.

    Science.gov (United States)

    Chen, Stephanie Y; Urminsky, Oleg; Bartels, Daniel M

    2016-10-01

    Personal identity is an important determinant of behavior, yet how people mentally represent their self-concepts and their concepts of other people is not well understood. In the current studies, we examined the age-old question of what makes people who they are. We propose a novel approach to identity that suggests that the answer lies in people's beliefs about how the features of identity (e.g., memories, moral qualities, personality traits) are causally related to each other. We examined the impact of the causal centrality of a feature, a key determinant of the extent to which a feature defines a concept, on judgments of identity continuity. We found support for this approach in three experiments using both measured and manipulated causal centrality. For judgments both of one's self and of others, we found that some features are perceived to be more causally central than others and that changes in such causally central features are believed to be more disruptive to identity.

  18. Social Identity Simulation System (SISTEM)

    Science.gov (United States)

    2014-03-31

    Report Individuation Individuation refers to when an individual attempts to preserve self-esteem by psychologically separating oneself from a...its expected costs. The following subsections describe various strategies of social identity entrepreneurship in more detail. Calling for...Haslam, S. A., & Reicher, S. (2007). Identity Entrepreneurship and the consequences of identity failure: the dynamics of leadership in the BBC prison

  19. Chinese Preservice Teachers’ Professional Identity Links with Education Program Performance: The Roles of Task Value Belief and Learning Motivations

    OpenAIRE

    Zhang, Yan; Hawk, Skyler T.; Zhang, Xiaohui; Zhao, Hongyu

    2016-01-01

    Professional identity is a key issue spanning the entirety of teachers’ career development. Despite the abundance of existing research examining professional identity, its link with occupation-related behavior at the primary career stage (i.e., GPA in preservice education) and the potential process that underlies this association is still not fully understood. This study explored the professional identity of Chinese preservice teachers, and its links with task value belief, intrinsic learning...

  20. On teacher beliefs, self-identity and the stages of professional development

    Directory of Open Access Journals (Sweden)

    Danuta Gabrys-Barker

    2010-01-01

    Full Text Available This article describes teachers as a professional group, focusing on pre-service teachers and refining their profiles on the basis of the studies carried out in educational research. Personality as a major contributor to beliefs and teacher presence in the classroom in a more general sense help to building teacher identity over the period of first becoming and then being a fully-functioning classroom practitioner. Teacher self-concept and identity are developmental in nature and undergo constant fluctuations. They make for the success and/or failure, enthusiasm or burnout of every individual teacher, irrespective of his/her teaching contexts. New teachers who enter classrooms for the first time do not enter them empty-handed. They hold beliefs which have various origins and enjoy varying degrees of sustainability over time and the experiences they encounter. These are discussed here, both theoretically and by means of illustrative studies. When considering teachers over their whole careers, clear developmental stages can be distinguished. These are shown in the form of different models presented in the literature on teacher training and development. The article concludes with a brief description of pre-service teachers` profiles.

  1. Preservice Teachers' Belief Systems toward Curricular Outcomes for Physical Education

    Science.gov (United States)

    Kulinna, Pamela Hodges; Brusseau, Timothy; Ferry, Matthew; Cothran, Donetta

    2010-01-01

    This study was grounded in the belief systems and physical activity literature and investigated preservice teachers' belief systems toward curricular outcomes for physical education programs. Preservice teachers (N = 486; men = 62%, women = 38%) from 18 U.S. colleges/universities shared their beliefs about curricular outcomes. Preservice teachers…

  2. The Partisan Brain: An Identity-Based Model of Political Belief.

    Science.gov (United States)

    Van Bavel, Jay J; Pereira, Andrea

    2018-03-01

    Democracies assume accurate knowledge by the populace, but the human attraction to fake and untrustworthy news poses a serious problem for healthy democratic functioning. We articulate why and how identification with political parties - known as partisanship - can bias information processing in the human brain. There is extensive evidence that people engage in motivated political reasoning, but recent research suggests that partisanship can alter memory, implicit evaluation, and even perceptual judgments. We propose an identity-based model of belief for understanding the influence of partisanship on these cognitive processes. This framework helps to explain why people place party loyalty over policy, and even over truth. Finally, we discuss strategies for de-biasing information processing to help to create a shared reality across partisan divides. Copyright © 2018 Elsevier Ltd. All rights reserved.

  3. System reliability prediction using data from non-identical environments

    International Nuclear Information System (INIS)

    Bergman, B.; Ringi, M.

    1997-01-01

    Since information changes one's mind and probability assessments reflect one's degree of beliefs, a reliability prediction model should enclose all relevant information. Almost always ignored in existing reliability models is the dependence on component life lengths, induced by a common but unknown environment. Furthermore, existing models seldom permit learning from components' performance in similar systems, under the knowledge of non-identical operating environments. In an earlier paper by the present authors the first type of aspects were taken into account and in this paper that model is generalised so that failure data generated from several similar systems in non-identical environments may be used for the prediction of any similar system in its specific environment

  4. Topological structures of complex belief systems (II): Textual materialization

    OpenAIRE

    Nescolarde Selva, Josué; Usó i Domènech, Josep Lluís

    2013-01-01

    Mythical and religious belief systems in a social context can be regarded as a conglomeration of sacrosanct rites, which revolve around substantive values that involve an element of faith. Moreover, we can conclude that ideologies, myths and beliefs can all be analyzed in terms of systems within a cultural context. The significance of being able to define ideologies, myths and beliefs as systems is that they can figure in cultural explanations. This, in turn, means that such systems can figur...

  5. Chinese preservice teachers’ professional identity links with education program performance: The roles of task value belief and learning motivations

    Directory of Open Access Journals (Sweden)

    Yan eZhang

    2016-04-01

    Full Text Available AbstractProfessional identity is a key issue spanning the entirety of teachers’ career development. Despite the abundance of existing research examining professional identity, its link with occupation-related behavior at the primary career stage (i.e., GPA in preservice education and the potential process that underlies this association is still not fully understood. This study explored the professional identity of Chinese preservice teachers, and its links with task value belief, intrinsic learning motivation, extrinsic learning motivation, and performance in the education program. Grade-point average (GPA of courses (both subject and pedagogy courses was examined as an indicator of performance, and questionnaires were used to measure the remaining variables. Data from 606 preservice teachers in the first three years of a teacher-training program indicated that: (1 variables in this research were all significantly correlated with each other, except the correlation between intrinsic learning motivation and program performance; (2 professional identity was positively linked to task value belief, intrinsic and extrinsic learning motivations, and program performance in a structural equation model (SEM; (3 task value belief was positively linked to intrinsic and extrinsic learning motivation; (4 higher extrinsic (but not intrinsic learning motivation was associated with increased program performance; and (5 task value belief and extrinsic learning motivation were significant mediators in the model.

  6. Chinese Preservice Teachers' Professional Identity Links with Education Program Performance: The Roles of Task Value Belief and Learning Motivations.

    Science.gov (United States)

    Zhang, Yan; Hawk, Skyler T; Zhang, Xiaohui; Zhao, Hongyu

    2016-01-01

    Professional identity is a key issue spanning the entirety of teachers' career development. Despite the abundance of existing research examining professional identity, its link with occupation-related behavior at the primary career stage (i.e., GPA in preservice education) and the potential process that underlies this association is still not fully understood. This study explored the professional identity of Chinese preservice teachers, and its links with task value belief, intrinsic learning motivation, extrinsic learning motivation, and performance in the education program. Grade-point average (GPA) of courses (both subject and pedagogy courses) was examined as an indicator of performance, and questionnaires were used to measure the remaining variables. Data from 606 preservice teachers in the first 3 years of a teacher-training program indicated that: (1) variables in this research were all significantly correlated with each other, except the correlation between intrinsic learning motivation and program performance; (2) professional identity was positively linked to task value belief, intrinsic and extrinsic learning motivations, and program performance in a structural equation model (SEM); (3) task value belief was positively linked to intrinsic and extrinsic learning motivation; (4) higher extrinsic (but not intrinsic) learning motivation was associated with increased program performance; and (5) task value belief and extrinsic learning motivation were significant mediators in the model.

  7. Chinese Preservice Teachers’ Professional Identity Links with Education Program Performance: The Roles of Task Value Belief and Learning Motivations

    Science.gov (United States)

    Zhang, Yan; Hawk, Skyler T.; Zhang, Xiaohui; Zhao, Hongyu

    2016-01-01

    Professional identity is a key issue spanning the entirety of teachers’ career development. Despite the abundance of existing research examining professional identity, its link with occupation-related behavior at the primary career stage (i.e., GPA in preservice education) and the potential process that underlies this association is still not fully understood. This study explored the professional identity of Chinese preservice teachers, and its links with task value belief, intrinsic learning motivation, extrinsic learning motivation, and performance in the education program. Grade-point average (GPA) of courses (both subject and pedagogy courses) was examined as an indicator of performance, and questionnaires were used to measure the remaining variables. Data from 606 preservice teachers in the first 3 years of a teacher-training program indicated that: (1) variables in this research were all significantly correlated with each other, except the correlation between intrinsic learning motivation and program performance; (2) professional identity was positively linked to task value belief, intrinsic and extrinsic learning motivations, and program performance in a structural equation model (SEM); (3) task value belief was positively linked to intrinsic and extrinsic learning motivation; (4) higher extrinsic (but not intrinsic) learning motivation was associated with increased program performance; and (5) task value belief and extrinsic learning motivation were significant mediators in the model. PMID:27199810

  8. Childhood physical abuse and differential development of paranormal belief systems.

    Science.gov (United States)

    Perkins, Stefanie L; Allen, Rhiannon

    2006-05-01

    This study compared paranormal belief systems in individuals with and without childhood physical abuse histories. The Revised Paranormal Belief Scale and the Assessing Environments III Questionnaire were completed by 107 University students. Psi, precognition, and spiritualism, which are thought to provide a sense of personal efficacy and control, were among the most strongly held beliefs in abused subjects, and were significantly higher in abused versus nonabused subjects. Superstition and extraordinary life forms, thought to have an inverse or no relation to felt control, were the least strongly held beliefs in abused subjects, and, along with religious beliefs, did not differ between the two abuse groups. Witchcraft was unexpectedly found to be the most strongly held belief among those with abuse histories. Results suggest that by providing a sense of control, certain paranormal beliefs may offer a powerful emotional refuge to individuals who endured the stress of physical abuse in childhood.

  9. Identity management and witness protection system

    OpenAIRE

    Paunović, Saša; Starčević, Dušan; Nešić, Lazar

    2013-01-01

    The protection of participants in criminal proceedings is one of the most important tools for prosecution of war crimes and organized crime cases. The paper presents the basic characteristics and the importance of implementing the Program of protection in criminal proceedings, with emphasis on the protection system and management of identity. Special attention was paid to challenges facing the protection system in criminal proceedings and the management of identities, which are caused by the ...

  10. 116 THE IGALA TRADITIONAL RELIGIOUS BELIEF SYSTEM ...

    African Journals Online (AJOL)

    Ike Odimegwu

    supreme God called Ọjọ, but that it is a function of intercourse between ..... other deities at the same time; implicit monotheism,. i.e. a belief in a supreme deity yet no definite denial of other gods; and lastly, explicit monotheism, a belief in a ...

  11. Ultrasonic identity data storage and archival system

    International Nuclear Information System (INIS)

    Mc Kenzie, J.M.; Self, B.G.; Walker, J.E.

    1987-01-01

    Ultrasonic seals are being used to determine if an underwater stored spent fuel container has been compromised and can be used to determine if a nuclear material container has been compromised. The Seal Pattern Reader (SPAR) is a microprocessor controlled instrument which interrogates an ultrasonic seal to obtain its identity. The SPAR can compare the present identity with a previous identity, which it obtains from a magnetic bubble cassette memory. A system has been developed which allows an IAEA inspector to transfer seal information obtained at a facility by the SPAR to an IAEA-based data storage and retrieval system, using the bubble cassette memory. Likewise, magnetic bubbles can be loaded at the IAEA with seal signature data needed at a facility for comparison purposes. The archived signatures can be retrieved from the data base for relevant statistical manipulation and for plotting

  12. Which Penguin Is This? Attributing False Beliefs about Object Identity at 18 Months

    Science.gov (United States)

    Scott, Rose M.; Baillargeon, Renee

    2009-01-01

    Recent research has shown that infants as young as 13 months can attribute false beliefs to agents, suggesting that the psychological-reasoning subsystem necessary for attributing reality-incongruent informational states (Subsystem-2, SS2) is operational in infancy. The present research asked whether 18-month-olds' false-belief reasoning extends…

  13. Chapter 14. Systems of identical particles

    International Nuclear Information System (INIS)

    Anon.

    1977-01-01

    For the systems of identical particles it is necessary to introduce the postulate of symmetrization to describe quantum systems. Physical implications of this postulate are presented: bosons, fermions and Pauli exclusion principle; quantum statistics; interferences between direct process and exchange process. Permutation operators are also exposed. In complement are studied: approximation of central field, electron configurations, energy levels of helium atom (configurations, terms, multiplets), physical properties of electron gas (application to solids) [fr

  14. The Prediction of Identity Crisis and Addiction Tendency Based on Islamic Beliefs and Family Climate among the nursing and midwifery students

    OpenAIRE

    Fatemeh Sadat Marashian; Sahar Safarzadeh

    2017-01-01

    Background and purpose: Recognition identity crisis versus constructing the identity and committing delinquent behaviors, such as addiction tendency and recognizing its predictive variables stand amongst the most crucial issues throughout early adulthood. The present research aimed to shed light upon the prediction of identity crisis and addiction tendency based on the practical commitment to Islamic beliefs and affective family climate among the nursing and midwifery students in Islamic Azad...

  15. A Belief Rule-Based Expert System to Diagnose Influenza

    DEFF Research Database (Denmark)

    Hossain, Mohammad Shahadat; Khalid, Md. Saifuddin; Akter, Shamima

    2014-01-01

    , development and application of an expert system to diagnose influenza under uncertainty. The recently developed generic belief rule-based inference methodology by using the evidential reasoning (RIMER) approach is employed to develop this expert system, termed as Belief Rule Based Expert System (BRBES......). The RIMER approach can handle different types of uncertainties, both in knowledge representation, and in inference procedures. The knowledge-base of this system was constructed by using records of the real patient data along with in consultation with the Influenza specialists of Bangladesh. Practical case...

  16. A typology of vaping: Identifying differing beliefs, motivations for use, identity and political interest amongst e-cigarette users.

    Science.gov (United States)

    Farrimond, Hannah

    2017-10-01

    The aim of this study was to identify and differentiate socially shared accounts of e-cigarette use (vaping) using Q-methodology, combining factor analysis with qualitative comments. Seventy statements on e-cigarettes, drawn from media, academic and online discussions, were sorted by participants along a continuum of agreement/disagreement, commenting on strongly ranked items. Each participant thus created their own 'account' of their vaping. A by-person correlation matrix of the sorts was conducted, then factor analysed, to identify similar accounts (pmotivated to maintain the rights of adults to vape. In Factor Two, 'Vaping as Medical Treatment', vaping was understood as a pragmatic choice about how to medicate one's smoking addiction, with the aim being to treat and ultimately reduce nicotine dependence. In Factor Three, 'Ambivalent E-Cigarette Use', participants reported fewer benefits and harboured more negative beliefs about e-cigarettes; they also strongly rejected a vaper identity, having no interest in online forums or being labelled a 'vaper' themselves. The UK e-cigarette users in this sample were not a homogeneous group; differing in their beliefs, motivations for use, identity and political interest. In particular they diverged on whether they accepted a medicalized account of vaping and identified as a vaper. Public health messages targeted to one group of e-cigarette users may not resonate with others. Crown Copyright © 2017. Published by Elsevier B.V. All rights reserved.

  17. Mixed Methods Analysis of Multicultural Identity and Psychological Help Seeking Beliefs in College Students

    Science.gov (United States)

    Walter, Jeffrey P.

    2012-01-01

    Research on the psychological help-seeking beliefs and behaviors of college students has provided evidence for differences among students based on demographic factors, with different variables being salient for different cultural groups. This mixed methods study focuses on understanding how common psychological help-seeking variables, including…

  18. The belief systems of protesting college students.

    Science.gov (United States)

    Blumenthal, M D

    1973-06-01

    A group of 29 college students who had been arrested or nominated as having participated in a street disturbance aimed at producing social change were interviewed. The interview schedule was highly similar to one which had been used to investigate attitudes toward violence in a random, representative sample of American men. The data collected from the arrestees are compared with data from college students in the national sample. This study shows that the arrestees are more likely to think that violence is necessary to produce social change than are college students generally, and are more likely to believe that existing social institutions are inadequate. As a group, the arrestees are more identified with white student demonstrators and black protestors than are college students generally. The arrestees are also likely to regard the police as untrusworthy, looking for trouble, and apt to dislike people like themselves. In addition to the negative attitudes toward the police held by the student arrestees, they are more likely to regard police actions as violence (and hence provocative) than are other college students. The arrestees are far more likely than other college students to cleave to humanistic values. However, most of the differences between the arrestees and other American college students could be predicted from a general model of the justification of violence, so that it appears that the student activists' beliefs differ not so much in kind from those of other Americans as they do in degree.

  19. Synchronization of identical chaotic systems through external chaotic driving

    International Nuclear Information System (INIS)

    Patidar, V.; Sud, K.K.

    2005-11-01

    In recent years, the study of synchronization of identical chaotic systems subjected to a common fluctuating random driving signal has drawn considerable interest. In this communication, we report that it is possible to achieve synchronization between two identical chaotic systems, which are not coupled directly but subjected to an external chaotic signal. The external chaotic signal may be obtained from any chaotic system identical or non-identical to both identical chaotic systems. Results of numerical simulations on well known Roessler and jerk dynamical systems have been presented. (author)

  20. Adolescent Identity: Rational vs. Experiential Processing, Formal Operations, and Critical Thinking Beliefs.

    Science.gov (United States)

    Klaczynski, Paul A.; Fauth, James M.; Swanger, Amy

    1998-01-01

    The extent to which adolescents rely on rational versus experiential information processing was studied with 49 adolescents administered multiple measures of formal operations, two critical thinking questionnaires, a measure of rational processing, and a measure of ego identity status. Implications for studies of development are discussed in terms…

  1. Integrated Identity and Access Management System for Tertiary ...

    African Journals Online (AJOL)

    Nigerian Journal of Technology ... identity management and access control and the unavailability of actionable information on pattern of ... This Tertiary Identity and Access Management System (T-IAMS) is a fingerprint biometric database that ...

  2. designing a framework for a unified electronic identity system

    African Journals Online (AJOL)

    DJFLEX

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used ... online commerce and public sector organizations. Because ..... SearchUnifiedCommunications.com Definitions, Access date.

  3. Stalinist ritual and belief system : Reflections on "political religion"

    NARCIS (Netherlands)

    van Ree, E.

    2016-01-01

    This article offers a critical assessment of the Political Religion Theory on the basis of a comparative analysis of the Orthodox and Stalinist belief systems and ritual. The theory works under the assumption that sacralisation of secular objects endows these objects with a transcendental, divine

  4. Marital Meaning: Exploring Young Adults' Belief Systems about Marriage

    Science.gov (United States)

    Hall, Scott S.

    2006-01-01

    The purpose of the study is to examine the meaning that the institution of marriage can hold for young, unmarried adults, based on their systems (or collections) of beliefs about marriage. Based on symbolic interactionism, it is argued that marital meaning has implications for how people behave prior to and during marriage that may relate to…

  5. Mapping the criminal mind: idiographic assessment of criminal belief systems.

    Science.gov (United States)

    Walters, Glenn D

    2005-02-01

    An idiographic procedure designed to assess the belief systems of criminal offenders is described, investigated, and clarified. This measure, the Cognitive Map of Major Belief Systems (CMMBS), assesses the five belief systems (self-view, world-view, past-view, present-view, future-view) held to occupy the higher echelons of human cognition. Modest to moderate test-retest reliability was achieved when 19 inmates, enrolled in one of three drug-counseling groups, completed the CMMBS on two separate occasions, 2 weeks apart. It was also ascertained that the drug treatment specialist who served as therapist for all three groups "blindly" matched the 19 CMMBS records to the inmates who produced them. A case study of one of the 19 participants was used to illustrate how the CMMBS is employed with individual offenders and how belief systems interact with major schematic subnetworks such as attributions, outcome expectancies, efficacy expectancies, goals, values, and thinking styles to create crime-supporting lifestyles.

  6. Preservice Science Teachers' Efficacy Regarding a Socioscientific Issue: A Belief System Approach

    Science.gov (United States)

    Kilinç, Ahmet; Kartal, Tezcan; Eroglu, Baris; Demiral, Ümit; Afacan, Özlem; Polat, Dilber; Demirci Guler, Mutlu P.; Görgülü, Özkan

    2013-01-01

    The aim of the present study was to understand the nature of teaching efficacy beliefs related to a socioscientific issue (SSI). We investigated Turkish preservice science teachers' teaching efficacy beliefs about genetically modified (GM) foods using a belief system approach. We assumed that preservice teachers' beliefs about GM foods (content…

  7. Self-deception in terminal patients: belief system at stake

    Directory of Open Access Journals (Sweden)

    Luis E Echarte

    2016-02-01

    Full Text Available A substantial minority of patients with terminal illness hold unrealistically hopeful beliefs about the severity of their disease or the nature of its treatment, considering therapy as curative rather than palliative. We propose that this attitude may be understood as self-deception, following the current psychological theories about this topic. In this article we suggest that the reason these patients deceive themselves is to preserve their belief systems. According to some philosophical accounts, the human belief system (HBS is constituted as a web with a few stable central nodes –deep seated beliefs– intimately related with the self. We hypothesize that the mind may possess defensive mechanisms, mostly non-conscious, that reject certain sensory inputs (e.g., a fatal diagnosis that may undermine deep-seated beliefs. This interpretation is in line with the theory of cognitive dissonance. Following this reasoning, we also propose that HBS-related self-deception would entail a lower cognitive load than that associated with confronting the truth: whereas the latter would engage a myriad of high cognitive functions to re-configure crucial aspects of the self, including the setting of plans, goals, or even a behavioral output, the former would be mostly non-conscious. Overall, we believe that our research supports the hypothesis that in cases of terminal illness, (self-deceiving requires less effort than accepting the truth.

  8. Do Humans Have Two Systems to Track Beliefs and Belief-Like States?

    Science.gov (United States)

    Apperly, Ian A.; Butterfill, Stephen A.

    2009-01-01

    The lack of consensus on how to characterize humans' capacity for belief reasoning has been brought into sharp focus by recent research. Children fail critical tests of belief reasoning before 3 to 4 years of age (H. Wellman, D. Cross, & J. Watson, 2001; H. Wimmer & J. Perner, 1983), yet infants apparently pass false-belief tasks at 13 or 15…

  9. Investigating Coherence among Turkish Elementary Science Teachers' Teaching Belief Systems, Pedagogical Content Knowledge and Practice

    Science.gov (United States)

    Bahcivan, Eralp; Cobern, William W.

    2016-01-01

    This study investigated comprehensive science teaching belief systems and their relation to science teachers' pedagogical content knowledge and teaching practices. Rokeach's (1968) belief system was used as a framework for representing the hierarchy among in-service teachers' teaching beliefs. This study employed a multiple case study design with…

  10. Designing a framework for a unified electronic identity system ...

    African Journals Online (AJOL)

    In this paper, a Unified Identity System is proposed where single electronic identity (eID) is issued that can be used across the various platforms of business transaction. The activity/state diagram of the model is presented, and the means of authentication is based on the Secure Assertion Markup Language (SAML) ...

  11. Function Projective Synchronization of Two Identical New Hyperchaotic Systems

    International Nuclear Information System (INIS)

    Li Xin; Chen Yong

    2007-01-01

    A function projective synchronization of two identical hyperchaotic systems is defined and the theorem of sufficient condition is given. Based on the active control method and symbolic computation Maple, the scheme of function projective synchronization is developed to synchronize the two identical new hyperchaotic systems constructed by Yan up to a scaling function matrix with different initial values. Numerical simulations are used to verify the effectiveness of the scheme.

  12. Comparison between different synchronization methods of identical chaotic systems

    International Nuclear Information System (INIS)

    Haeri, Mohammad; Khademian, Behzad

    2006-01-01

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria

  13. A deep belief network with PLSR for nonlinear system modeling.

    Science.gov (United States)

    Qiao, Junfei; Wang, Gongming; Li, Wenjing; Li, Xiaoli

    2017-10-31

    Nonlinear system modeling plays an important role in practical engineering, and deep learning-based deep belief network (DBN) is now popular in nonlinear system modeling and identification because of the strong learning ability. However, the existing weights optimization for DBN is based on gradient, which always leads to a local optimum and a poor training result. In this paper, a DBN with partial least square regression (PLSR-DBN) is proposed for nonlinear system modeling, which focuses on the problem of weights optimization for DBN using PLSR. Firstly, unsupervised contrastive divergence (CD) algorithm is used in weights initialization. Secondly, initial weights derived from CD algorithm are optimized through layer-by-layer PLSR modeling from top layer to bottom layer. Instead of gradient method, PLSR-DBN can determine the optimal weights using several PLSR models, so that a better performance of PLSR-DBN is achieved. Then, the analysis of convergence is theoretically given to guarantee the effectiveness of the proposed PLSR-DBN model. Finally, the proposed PLSR-DBN is tested on two benchmark nonlinear systems and an actual wastewater treatment system as well as a handwritten digit recognition (nonlinear mapping and modeling) with high-dimension input data. The experiment results show that the proposed PLSR-DBN has better performances of time and accuracy on nonlinear system modeling than that of other methods. Copyright © 2017 Elsevier Ltd. All rights reserved.

  14. MODELING INFORMATION SYSTEM AVAILABILITY BY USING BAYESIAN BELIEF NETWORK APPROACH

    Directory of Open Access Journals (Sweden)

    Semir Ibrahimović

    2016-03-01

    Full Text Available Modern information systems are expected to be always-on by providing services to end-users, regardless of time and location. This is particularly important for organizations and industries where information systems support real-time operations and mission-critical applications that need to be available on 24  7  365 basis. Examples of such entities include process industries, telecommunications, healthcare, energy, banking, electronic commerce and a variety of cloud services. This article presents a modified Bayesian Belief Network model for predicting information system availability, introduced initially by Franke, U. and Johnson, P. (in article “Availability of enterprise IT systems – an expert based Bayesian model”. Software Quality Journal 20(2, 369-394, 2012 based on a thorough review of several dimensions of the information system availability, we proposed a modified set of determinants. The model is parameterized by using probability elicitation process with the participation of experts from the financial sector of Bosnia and Herzegovina. The model validation was performed using Monte Carlo simulation.

  15. An identity management monitoring system | Imouokhome | Scientia ...

    African Journals Online (AJOL)

    Username, Password, Remember me, or Register ... An identification system, which employs the use of fingerprint biometric that conducts a ... Key Words: Biometrics, Pattern-matching Identification, Verification, Authentication, Fingerprints ...

  16. A hand held photo identity verification system for mobile applications

    International Nuclear Information System (INIS)

    Kumar, Ranajit; Upreti, Anil; Mahaptra, U.; Bhattacharya, S.; Srivastava, G.P.

    2009-01-01

    A handheld portable system has been developed for mobile personnel identity verification. The system consists of a contact less RF smart card reader integrated to a Simputer through serial link. The simputer verifies the card data, with the data base and aids the security operator in identifying the persons by providing the facial image of the verified person along with other personal details like name, designation, division etc. All transactions are recorded in the Simputer with time and date for future record. This system finds extensive applications in mobile identity verification in nuclear or other industries. (author)

  17. The Belief Systems of University Supervisors in an Elementary Student-Teaching Program.

    Science.gov (United States)

    Zeichner, Kenneth M.; Tabachnick, B. Robert

    1982-01-01

    A study was conducted to determine the range of supervisory belief systems that existed among nine university supervisors of elementary education student teachers. In interviews, three distinct belief systems emerged: (1) technical/instrumental; (2) personal growth centered; and (3) critical. (FG)

  18. Identical synchronization of coupled Rossler systems

    DEFF Research Database (Denmark)

    Yanchuk, S.; Maistrenko, Y.; Mosekilde, Erik

    1999-01-01

    Analyzing the transverse stability of low periodic orbits embedded in the synchronized chaotic state for a system of two coupled Rössler oscillators, we obtain the conditions for synchronization and determine the coupling parameters for which riddled basins of attraction may arise. It is shown how...

  19. Comparison between different synchronization methods of identical chaotic systems

    Energy Technology Data Exchange (ETDEWEB)

    Haeri, Mohammad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)]. E-mail: haeri@sina.sharif.edu; Khademian, Behzad [Advanced Control System Laboratory, Electrical Engineering Department, Sharif University of Technology, Azadi Avenue, P.O. Box 11365-9363 Tehran (Iran, Islamic Republic of)

    2006-08-15

    This paper studies and compares three nonadaptive (bidirectional, unidirectional, and sliding mode) and two adaptive (active control and backstepping) synchronization methods on the synchronizing of four pairs of identical chaotic systems (Chua's circuit, Roessler system, Lorenz system, and Lue system). Results from computer simulations are presented in order to illustrate the effectiveness of the methods and to compare them based on different criteria.

  20. ENERGY AWARE NETWORK: BAYESIAN BELIEF NETWORKS BASED DECISION MANAGEMENT SYSTEM

    Directory of Open Access Journals (Sweden)

    Santosh Kumar Chaudhari

    2011-06-01

    Full Text Available A Network Management System (NMS plays a very important role in managing an ever-evolving telecommunication network. Generally an NMS monitors & maintains the health of network elements. The growing size of the network warrants extra functionalities from the NMS. An NMS provides all kinds of information about networks which can be used for other purposes apart from monitoring & maintaining networks like improving QoS & saving energy in the network. In this paper, we add another dimension to NMS services, namely, making an NMS energy aware. We propose a Decision Management System (DMS framework which uses a machine learning technique called Bayesian Belief Networks (BBN, to make the NMS energy aware. The DMS is capable of analysing and making control decisions based on network traffic. We factor in the cost of rerouting and power saving per port. Simulations are performed on standard network topologies, namely, ARPANet and IndiaNet. It is found that ~2.5-6.5% power can be saved.

  1. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  2. Normative Values in Teachers' Conceptions of Teaching and Learning in Higher Education: A Belief System Approach

    Science.gov (United States)

    Schwieler, Elias; Ekecrantz, Stefan

    2011-01-01

    The effects of teachers' normative values and emotive reactions on teaching in higher education have received relatively little research attention. The focus is often on descriptive beliefs such as conceptions of teaching and their inter-relations with practice. In this study, which is illustrated by a heuristic model, a belief system approach is…

  3. Salient Beliefs in Majoring in Management Information Systems: An Elicitation Study

    Science.gov (United States)

    Chipidza, Wallace; Green, Gina; Riemenschneider, Cindy

    2016-01-01

    Research utilizing the Theory of Planned Behavior to understand behavior should first elicit beliefs about the phenomenon from the target population. In order to understand the reasons why students choose to major or not major in Management Information Systems (MIS), we elicited beliefs from 136 students attending university in the United States…

  4. Changing Minds by Reasoning About Belief Revision: A Challenge for Cognitive Systems

    Science.gov (United States)

    2013-12-01

    this case, his dialog moves could include highlighting unintended relationships suggested by the logo (e.g., that a competitor’s logo is an octopus , a...others, a cognitive system must, at a minimum, be able to entertain beliefs about their beliefs. Any movement at all toward more sophisticated scenarios

  5. Transition to Postgraduate Study: Postgraduate Ecological Systems and Identity

    Science.gov (United States)

    Tobbell, Jane; O'Donnell, Victoria L.

    2013-01-01

    This paper explores and examines the distal and proximal systems which construct social science postgraduate study in the UK and analyses the emergent identities of postgraduate students as they negotiate the multiple and interacting practices in their transition to study. The data represent part of a one-year research project, funded by the…

  6. Estimating dependability of programmable systems using bayesian belief nets

    International Nuclear Information System (INIS)

    Gran, Bjoern Axel; Dahll, Gustav

    2000-05-01

    The research programme at the Halden Project on software safety assessment is augmented through a joint project with Kongsberg Defence and Aerospace AS and Det Norske Veritas. The objective of this project is to investigate the possibility to combine the Bayesian Belief Net (BBN) methodology with a software safety standard. The report discusses software safety standards in general, with respect to how they can be used to measure software safety. The possibility to transfer the requirements of a software safety standard into a BBN is also investigated. The aim is to utilise the BBN methodology and associated tools, by transferring the software safety measurement into a probabilistic quantity. In this way software can be included in a total probabilistic safety analysis. This project was performed by applying the method for an evaluation of a real, safety related programmable system which was developed according to the avionic standard DO-178B. The test case, the standard, and the BBN methodology are shortly described. This is followed by a description of the construction of the BBN used in this project. This includes the topology of the BBN, the elicitation of probabilities and the making of observations. Based on this a variety of computations are made using the SERENE methodology and the HUGIN tool. Observations and conclusions are made on the basis of the findings from this process. This report should be considered as a progress report in a more long-term activity on the use of BBNs as support for safety assessment of programmable systems. (Author). 23 refs., 9 figs., tabs

  7. The Structuring Principle: Political Socialization and Belief Systems

    Science.gov (United States)

    Searing, Donald D.; And Others

    1973-01-01

    Assesses the significance of data on childhood political learning to political theory by testing the structuring principle,'' considered one of the central assumptions of political socialization research. This principle asserts that basic orientations acquired during childhood structure the later learning of specific issue beliefs.'' The…

  8. Intimate Partner Violence and Belief Systems in Liberia

    Science.gov (United States)

    Allen, Mary; Devitt, Catherine

    2012-01-01

    Intimate partner violence is endemic in parts of the African continent. A small scale survey (n = 229) was conducted in 2009 in Northern Liberia, West Africa, to determine the prevalence and nature of intimate partner violence, and the cultural beliefs and gender norms that underpin respondent experiences and views towards intimate partner…

  9. The Meeting with Guanyin, the Goddess of Mercy: A Case Study of Syncretism in the Hmong System of Beliefs

    Directory of Open Access Journals (Sweden)

    Kao-Ly Yang

    2007-01-01

    Full Text Available The purpose of this case study is to shed light on the identity of the spirit of fertility called Lady Kaying –Niam Nkauj Kab Yeeb—, its religious origin and the general processes of borrowing her fromother cultures within the Hmong culture. Hmong popular beliefs pertaining to Kaying reveal that Kaying is in fact the Chinese Goddess of Mercy Guanyin. She was imported from MahayanaBuddhism by the Hmong people of China who had retained her roles of the “Bestower of Children", the “Guardian Angel” or the "Conductor of the Dead Children". An analysis of the process of borrowing of the Chinese deity into the Hmong pantheon shows that Lady Kaying overlaps with an ancient spirit, the “Ancestor Spirit of Fertility” or Niam Poj Dab Pog. This case study demonstrates that the processes of borrowing are selective, integrative and comprehensive: some traits or fragments were taken from Buddhism and incorporated into the Hmong beliefs through a superimposing of a Hmong pre-existing system of beliefs.

  10. Synchronization of chaos in non-identical parametrically excited systems

    International Nuclear Information System (INIS)

    Idowu, B.A.; Vincent, U.E.; Njah, A.N.

    2009-01-01

    In this paper, we investigate the synchronization of chaotic systems consisting of non-identical parametrically excited oscillators. The active control technique is employed to design control functions based on Lyapunov stability theory and Routh-Hurwitz criteria so as to achieve global chaos synchronization between a parametrically excited gyroscope and each of the parametrically excited pendulum and Duffing oscillator. Numerical simulations are implemented to verify the results.

  11. Securing the Global Airspace System Via Identity-Based Security

    Science.gov (United States)

    Ivancic, William D.

    2015-01-01

    Current telecommunications systems have very good security architectures that include authentication and authorization as well as accounting. These three features enable an edge system to obtain access into a radio communication network, request specific Quality-of-Service (QoS) requirements and ensure proper billing for service. Furthermore, the links are secure. Widely used telecommunication technologies are Long Term Evolution (LTE) and Worldwide Interoperability for Microwave Access (WiMAX) This paper provides a system-level view of network-centric operations for the global airspace system and the problems and issues with deploying new technologies into the system. The paper then focuses on applying the basic security architectures of commercial telecommunication systems and deployment of federated Authentication, Authorization and Accounting systems to provide a scalable, evolvable reliable and maintainable solution to enable a globally deployable identity-based secure airspace system.

  12. Dynamics of nonholonomic systems from variational principles embedded variation identity

    International Nuclear Information System (INIS)

    Guo Yongxin; Liu Shixing; Liu Chang; Chang Peng

    2009-01-01

    Nondeterminacy of dynamics, i.e., the nonholonomic or the vakonomic, fundamental variational principles, e.g., the Lagrange-d'Alembert or Hamiltonian, and variational operators, etc., of nonholonomic mechanical systems can be attributed to the non-uniqueness of ways how to realize nonholonomic constraints. Making use of a variation identity of nonholonomic constraints embedded into the Hamilton's principle with the method of Lagrange undetermined multipliers, three kinds of dynamics for the nonholonomic systems including the vakonomic and nonholonomic ones and a new one are obtained if the variation is respectively reduced to three conditional variations: vakonomic variation, Hoelder's variation and Suslov's variation, defined by the identity. Therefore, different dynamics of nonholonomic systems can be derived from an integral variational principle, utilizing one way of embedding constraints into the principle, with different variations. It is verified that the similar embedding of the identity into the Lagrange-d'Alembert principle gives rise to the nonholonomic dynamics but fails to give the vakonomic one unless the constraints are integrable.

  13. Dynamics of nonholonomic systems from variational principles embedded variation identity

    Energy Technology Data Exchange (ETDEWEB)

    Guo Yongxin, E-mail: yxguo@lnu.edu.c [College of Physics, Liaoning University, Shenyang 110036 (China); Liu Shixing [College of Physics, Liaoning University, Shenyang 110036 (China); Liu Chang; Chang Peng [Department of Applied Mechanics, Beijing Institute of Technology, Beijing 100081 (China)

    2009-10-19

    Nondeterminacy of dynamics, i.e., the nonholonomic or the vakonomic, fundamental variational principles, e.g., the Lagrange-d'Alembert or Hamiltonian, and variational operators, etc., of nonholonomic mechanical systems can be attributed to the non-uniqueness of ways how to realize nonholonomic constraints. Making use of a variation identity of nonholonomic constraints embedded into the Hamilton's principle with the method of Lagrange undetermined multipliers, three kinds of dynamics for the nonholonomic systems including the vakonomic and nonholonomic ones and a new one are obtained if the variation is respectively reduced to three conditional variations: vakonomic variation, Hoelder's variation and Suslov's variation, defined by the identity. Therefore, different dynamics of nonholonomic systems can be derived from an integral variational principle, utilizing one way of embedding constraints into the principle, with different variations. It is verified that the similar embedding of the identity into the Lagrange-d'Alembert principle gives rise to the nonholonomic dynamics but fails to give the vakonomic one unless the constraints are integrable.

  14. A Belief Rule-Based (BRB) Decision Support System for Assessing Clinical Asthma Suspicion

    DEFF Research Database (Denmark)

    Hossain, Mohammad Shahadat; Hossain, Emran; Khalid, Md. Saifuddin

    2014-01-01

    conditions of uncertainty. The Belief Rule-Based Inference Methodology Using the Evidential Reasoning (RIMER) approach was adopted to develop this expert system; which is named the Belief Rule-Based Expert System (BRBES). The system can handle various types of uncertainty in knowledge representation...... and inference procedures. The knowledge base of this system was constructed by using real patient data and expert opinion. Practical case studies were used to validate the system. The system-generated results are more effective and reliable in terms of accuracy than the results generated by a manual system....

  15. Religiosity as identity: toward an understanding of religion from a social identity perspective.

    Science.gov (United States)

    Ysseldyk, Renate; Matheson, Kimberly; Anisman, Hymie

    2010-02-01

    As a social identity anchored in a system of guiding beliefs and symbols, religion ought to serve a uniquely powerful function in shaping psychological and social processes. Religious identification offers a distinctive "sacred" worldview and "eternal" group membership, unmatched by identification with other social groups. Thus, religiosity might be explained, at least partially, by the marked cognitive and emotional value that religious group membership provides. The uniqueness of a positive social group, grounded in a belief system that offers epistemological and ontological certainty, lends religious identity a twofold advantage for the promotion of well-being. However, that uniqueness may have equally negative impacts when religious identity itself is threatened through intergroup conflict. Such consequences are illustrated by an examination of identities ranging from religious fundamentalism to atheism. Consideration of religion's dual function as a social identity and a belief system may facilitate greater understanding of the variability in its importance across individuals and groups.

  16. Examining Technology, Structure and Identity During an Enterprise System Implementation

    Energy Technology Data Exchange (ETDEWEB)

    Alvarez, Rosio

    2008-11-12

    This paper presents a longitudinal study of an Enterprise System (ES) implementation by critically examining the discursive context in which an ES implementation unfolds. The findings show that users strongly supported the ES in the earlier stage of implementation when the technology was an imaginary phenomenon. However, in later stages, when the technology is in use, user support was not consistent. In this phase the ES produces loss of control and an inability to function as an arbiter of fairness (in allocating resources associated with the system) thereby directly challenging existing professional identities and roles. These outcomes, in turn, generate acts of resistance on the part of workers. Users reach inside the technology and reshape it by devising creative workarounds that produce a sense of reskilling to counter the deskilling produced by the loss of control and power. The analysis also shows that an ES is a complex social phenomenon that is intricately linked to and complicit in shaping organizational structure and identity. In particular this study shows how technology, structure, and identity are in a mutually constitutive relationship.

  17. Identity's identities

    DEFF Research Database (Denmark)

    Jensen, Kim Ebensgaard

    -specialized language in which it also serves a number of functions – some of which are quite fundamental to society as such. In other words, the lexeme identity is a polysemic word and has multiple, well, identities. Given that it appears to have a number of functions in a variety of registers, including terminologies...... in Academic English and more everyday-based English, identity as a lexeme is definitely worth having a look at. This paper presents a lexicological study of identity in which some of its senses are identified and their behaviors in actual discourse are observed. Drawing on data from the 2011 section...... of the Corpus of Contemporary American English, a behavioral profile of the distributional characteristics of identity is set up. Behavioral profiling is a lexicographical method developed by the corpus linguist Stefan Th. Gries which, by applying semantic ID tagging and statistical analysis, provides a fine...

  18. Exploring the belief systems of domestic abuse victims using Smallest Space Analysis (SSA)

    OpenAIRE

    Spruin, E.; Alleyne, E.; Baker, R.; Papadaki, I.; Franz, A.

    2017-01-01

    Purpose: Support service provisions for domestic abuse victims has typically focused on the immediate risk and etiological factors associated with abuse. Consequently, there is limited research exploring more persistent and pervasive factors involved in this cycle of abuse, such as subjective experiences and beliefs held by victims of domestic abuse. The current study is a preliminary exploration of the individual experience of domestic abuse including the belief systems of participants. Incr...

  19. Exploration of Scholars’ Attributions of Instructional Barriers in the Context of Pedagogical-Epistemological Belief Systems

    Directory of Open Access Journals (Sweden)

    Yılmaz SOYSAL

    2017-08-01

    Full Text Available In this study, two academics’ who have been employed in a private university teaching barriers and accompanied attributional reasoning were examined in the context of their belief systems with regards to learning, teaching and knowledge. This study was conducted with a basic qualitative perspective. By means of qualitative data gathering and analysis, it was aimed at estimating how the relation between teaching barriers and attributional reasoning was influenced by pedagogical-epistemological belief systems of scholars. Qualitative data was collected through two different semi-structured interview protocols and gathered data was analyzed with an inductive and interpretivist manner. The scholars’ beliefs systems’ divergences (teacher-centered vs. learner-centered allowed to explore the presumable relation of barrier-attribution in the context of pedagogical-epistemological belief systems. It was found out that the scholar who has adopted the more learner-centered modes of teaching favors more internally-oriented, controllable and non-stable attributional styles in illustrating her barrier-attribution relation. In contrast, it was also detected that the scholar who has held more teacher-centered teaching beliefs is liable to make attributions to overly external, non-controllable and stable factors in illuminating her barrier-attribution relation. Major outcomes of the study are evaluated by means of psychological (i.e., attribution theory and instructional (pedagogical-epistemological beliefs lenses and suggestions are offered in the context of higher education.

  20. System identication of a linearized hysteretic system using covariance driven stochastic subspace identication

    DEFF Research Database (Denmark)

    Bajric, Anela

    A single mass Bouc-Wen oscillator with linear static restoring force contribution is approximated by an equivalent linear system. The aim of the linearized model is to emulate the correct force-displacement response of the Bouc-Wenmodel with characteristic hysteretic behaviour. The linearized mod...

  1. Analysis of Privacy-Enhancing Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    Privacy has become a major issue for policy makers. This has been impelled by the rapid development of technologies that facilitate collection, distribution, storage, and manipulation of personal information. Business organizations are finding new ways of leveraging the value derived from consumer...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regulatory...... and technological aspects of privacy and technology adoption are also discussed....

  2. An Education for Peace Model That Centres on Belief Systems: The Theory behind The Model

    Science.gov (United States)

    Willis, Alison

    2017-01-01

    The education for peace model (EFPM) presented in this paper was developed within a theoretical framework of complexity science and critical theory and was derived from a review of an empirical research project conducted in a conflict affected environment. The model positions belief systems at the centre and is socioecologically systemic in design…

  3. Cohort Differences in the Structure and Outcomes of an African American Belief System.

    Science.gov (United States)

    Allen, Richard L.; Bagozzi, Richard P.

    2001-01-01

    Examined the structure of African American belief systems (racial attitudes and self-esteem) and its relationship to wellbeing, other group attachments, and system orientations across different age and generation groups. Interview data from three age-groupings of adults demonstrated substantial similarity across age cohorts in understanding of…

  4. Belief system, meaningfulness, and psychopathology associated with suicidality among Chinese college students: a cross-sectional survey.

    Science.gov (United States)

    Zhao, Jiubo; Yang, Xueling; Xiao, Rong; Zhang, Xiaoyuan; Aguilera, Diane; Zhao, Jingbo

    2012-08-17

    Research suggests that Chinese religious believers are more likely to commit suicide than those identifying as non-religious among rural young adults, contrary to findings in Western countries. However, one cannot conclude that religiosity is associated with elevated suicide risk without examining the effect of political and religious beliefs in a generally atheist country like China where political belief plays a dominant role in the belief system of young adults. The present study investigated the effects of political and religious belief on suicidality with meaningfulness and psychopathology as potential mediators in a large representative sample of Chinese college students. A cross-sectional survey was conducted among 1390 first-year college students randomly sampled from 10 colleges and universities in mainland China. A total of 1168 respondents (84.0%) provided complete data on all variables. Lifetime prevalence of suicidal ideation, plan, and attempt were 45.1%, 6.8%, and 1.9% respectively, with one-year suicidal ideation showing at 19.3%. Female gender was associated with elevated risk of suicidality. Political belief but not religious belief was associated with decreased suicide risk. A significant interactive effect of political belief and religious belief was found, indicating that for political believers, being religious was associated with decreased suicide risk; for non-political believers, being religious was associated with increased suicide risk. Multi-group structural equation modeling showed that meaningfulness completely mediated and psychopathology partially mediated the effect of belief system on suicidality. Gender differences were found in pathways of political belief by religious beliefs to suicidality and political belief to psychopathology. The coefficients were significant for males but not for females. In less religious societies, political belief may serve as a means of integration as does religious affiliation in religious societies

  5. Belief system, meaningfulness, and psychopathology associated with suicidality among Chinese college students: a cross-sectional survey

    Directory of Open Access Journals (Sweden)

    Zhao Jiubo

    2012-08-01

    Full Text Available Abstract Background Research suggests that Chinese religious believers are more likely to commit suicide than those identifying as non-religious among rural young adults, contrary to findings in Western countries. However, one cannot conclude that religiosity is associated with elevated suicide risk without examining the effect of political and religious beliefs in a generally atheist country like China where political belief plays a dominant role in the belief system of young adults. The present study investigated the effects of political and religious belief on suicidality with meaningfulness and psychopathology as potential mediators in a large representative sample of Chinese college students. Methods A cross-sectional survey was conducted among 1390 first-year college students randomly sampled from 10 colleges and universities in mainland China. Results A total of 1168 respondents (84.0% provided complete data on all variables. Lifetime prevalence of suicidal ideation, plan, and attempt were 45.1%, 6.8%, and 1.9% respectively, with one-year suicidal ideation showing at 19.3%. Female gender was associated with elevated risk of suicidality. Political belief but not religious belief was associated with decreased suicide risk. A significant interactive effect of political belief and religious belief was found, indicating that for political believers, being religious was associated with decreased suicide risk; for non-political believers, being religious was associated with increased suicide risk. Multi-group structural equation modeling showed that meaningfulness completely mediated and psychopathology partially mediated the effect of belief system on suicidality. Gender differences were found in pathways of political belief by religious beliefs to suicidality and political belief to psychopathology. The coefficients were significant for males but not for females. Conclusions In less religious societies, political belief may serve as a means of

  6. Belief in School Meritocracy as a System-justifying Tool for Low Status Students

    Directory of Open Access Journals (Sweden)

    Virginie eWiederkehr

    2015-07-01

    Full Text Available The belief that, in school, success only depends on will and hard work is widespread in Western societies despite evidence showing that several factors other than merit explain school success, including group belonging (e.g., social class, gender. In the present paper, we argue that because merit is the only track for low status students to reach upward mobility, Belief in School Meritocracy (BSM is a particularly useful system-justifying tool to help them perceive their place in society as being deserved. Consequently, for low status students (but not high status students, this belief should be related to more general system-justifying beliefs (Study 1. Moreover, low status students should be particularly prone to endorsing this belief when their place within a system on which they strongly depend to acquire status is challenged (Study 2. In Study 1, high status (boys and high SES were compared to low status (girls and low SES high school students. Results indicated that BSM was related to system-justifying beliefs only for low SES students and for girls, but not for high SES students or for boys. In Study 2, university students were exposed (or not to information about an important selection process that occurs at the university, depending on the condition. Their subjective status was assessed. Although such a confrontation reduced BSM for high subjective SES students, it tended to enhance it for low subjective SES students. Results are discussed in terms of system-justification motives and the palliative function meritocratic ideology may play for low status students.

  7. Belief in school meritocracy as a system-justifying tool for low status students.

    Science.gov (United States)

    Wiederkehr, Virginie; Bonnot, Virginie; Krauth-Gruber, Silvia; Darnon, Céline

    2015-01-01

    The belief that, in school, success only depends on will and hard work is widespread in Western societies despite evidence showing that several factors other than merit explain school success, including group belonging (e.g., social class, gender). In the present paper, we argue that because merit is the only track for low status students to reach upward mobility, Belief in School Meritocracy (BSM) is a particularly useful system-justifying tool to help them perceive their place in society as being deserved. Consequently, for low status students (but not high status students), this belief should be related to more general system-justifying beliefs (Study 1). Moreover, low status students should be particularly prone to endorsing this belief when their place within a system on which they strongly depend to acquire status is challenged (Study 2). In Study 1, high status (boys and high SES) were compared to low status (girls and low SES) high school students. Results indicated that BSM was related to system-justifying beliefs only for low SES students and for girls, but not for high SES students or for boys. In Study 2, university students were exposed (or not) to information about an important selection process that occurs at the university, depending on the condition. Their subjective status was assessed. Although such a confrontation reduced BSM for high subjective SES students, it tended to enhance it for low subjective SES students. Results are discussed in terms of system justification motives and the palliative function meritocratic ideology may play for low status students.

  8. Parametric Ward-Takahashi identity in disordered systems and the integral identity associated with the Calogero-Sutherland model

    International Nuclear Information System (INIS)

    Taniguchi, N.

    1997-01-01

    By utilizing the symmetric property known as the Ward-Takahashi identity in disordered systems, we explore the novel symmetry relations which hold in one-dimensional systems with inverse square interaction (the Calogero-Sutherland model). The identities emerge totally from the algebraic structure of the model. They show that the dynamical correlators are connected with one another, involving the higher-order integrals of motion. We obtain the result for the coupling strengths λ=1/2, 1, and 2, and conjecture that a similar relation may hold for arbitrary rational λ. copyright 1997 The American Physical Society

  9. Engaging students in the study of physics: an investigation of physics teachers’ belief systems about teaching and learning physics

    OpenAIRE

    Belo, Neeltje Annigje Hendrika

    2013-01-01

    This doctoral thesis comprises two questionnaire studies and two small-scale interview studies on the content and structure of physics teachers’ belief systems. The studies focused on teachers’ beliefs about the goals and pedagogy of teaching and learning physics, and the nature of science. The samples consisted of physics teachers working at secondary schools in the Netherlands (students aged 12-18). The questionnaire studies showed that, on average, teachers’ belief systems about teaching a...

  10. Medical Identity

    DEFF Research Database (Denmark)

    Musaeus, Peter

    2015-01-01

    Purpose: To examine philosophical stances underpinning medical identity and assess the conceptual relationship between physician, medical practice and culture. Argument: Medical identity is about the ideals and moral positions that physicians take when justifying themselves. Medical identity...... hedonistic versus sentimentalist approaches to medical identity. The sociocultural philosophical analysis of medical identity can shed light on what it means conceptually for a physician to harbor beliefs associated with him/her being taken to be an autonomous professional. It is important because it touches...... on the meaning of being a compassionate, good and skilled physician, making its relevance to person-centered medicine self-evident. Conclusion: Medical identity should be analyzed with reference to literature, philosophy and medical practice in order for the physician to exercise a reflective position...

  11. Intensive Care Nurses’ Belief Systems Regarding the Health Economics: A Focused Ethnography

    Science.gov (United States)

    Heydari, Abbas; Vafaee-Najar, Ali; Bakhshi, Mahmoud

    2016-01-01

    Background: Health care beliefs can have an effect on the efficiency and effectiveness of nursing practices. Nevertheless, how belief systems impact on the economic performance of intensive care unit (ICU) nurses is not known. This study aimed to explore the ICU nurses’ beliefs and their effect on nurse’s: practices and behavior patterns regarding the health economics. Methods: In this study, a focused ethnography method was used. Twenty-four informants from ICU nurses and other professional individuals were purposively selected and interviewed. As well, 400 hours of ethnographic observations were used for data collection. Data analysis was performed using the methods described by Miles and Huberman (1994). Findings: Eight beliefs were found that gave meaning to ICU nurse’s practices regarding the health economics. 1. The registration of medications and supplies disrupt the nursing care; 2. Monitoring and auditing improve consumption; 3. There is a fear of possible shortage in the future; 4. Supply and replacement of equipment is difficult; 5. Higher prices lead to more accurate consumption; 6. The quality of care precedes the costs; 7. Clinical Guidelines are abundant but useful; and 8. Patient economy has priority over hospital economy. Maintaining the quality of patient care with least attention to hospital costs was the main focus of the beliefs formed up in the ICU regarding the health economics. Conclusions: ICU nurses’ belief systems have significantly shaped in relation to providing a high-quality care. Although high quality of care can lead to a rise in the effectiveness of nursing care, cost control perspective should also be considered in planning for improve the quality of care. Therefore, it is necessary to involve the ICU nurses in decision-making about unit cost management. They must become familiar with the principles of heath care economics and productivity by applying an effective cost management program. It may be optimal to implement the

  12. Intensive Care Nurses' Belief Systems Regarding the Health Economics: A Focused Ethnography.

    Science.gov (United States)

    Heydari, Abbas; Vafaee-Najar, Ali; Bakhshi, Mahmoud

    2016-09-01

    Health care beliefs can have an effect on the efficiency and effectiveness of nursing practices. Nevertheless, how belief systems impact on the economic performance of intensive care unit (ICU) nurses is not known. This study aimed to explore the ICU nurses' beliefs and their effect on nurse's practices and behavior patterns regarding the health economics. In this study, a focused ethnography method was used. Twenty-four informants from ICU nurses and other professional individuals were purposively selected and interviewed. As well, 400 hours of ethnographic observations were used for data collection. Data analysis was performed using the methods described by Miles and Huberman (1994). Eight beliefs were found that gave meaning to ICU nurse's practices regarding the health economics. 1. The registration of medications and supplies disrupt the nursing care; 2.Monitoring and auditing improve consumption; 3.There is a fear of possible shortage in the future; 4.Supply and replacement of equipment is difficult; 5.Higher prices lead to more accurate consumption; 6.The quality of care precedes the costs; 7. Clinical Guidelines are abundant but useful; and 8.Patient economy has priority over hospital economy. Maintaining the quality of patient care with least attention to hospital costs was the main focus of the beliefs formed up in the ICU regarding the health economics. ICU nurses' belief systems have significantly shaped in relation to providing a high-quality care. Although high quality of care can lead to a rise in the effectiveness of nursing care, cost control perspective should also be considered in planning for improve the quality of care. Therefore, it is necessary to involve the ICU nurses in decision-making about unit cost management. They must become familiar with the principles of heath care economics and productivity by applying an effective cost management program. It may be optimal to implement the reforms in various aspects, such as the hospital

  13. A Belief Rule Based Expert System to Assess Mental Disorder under Uncertainty

    DEFF Research Database (Denmark)

    Hossain, Mohammad Shahadat; Afif Monrat, Ahmed; Hasan, Mamun

    2016-01-01

    to ignorance, incompleteness, and randomness. So, a belief rule-based expert system (BRBES) has been designed and developed with the capability of handling the uncertainties mentioned. Evidential reasoning works as the inference engine and the belief rule base as the knowledge representation schema......Mental disorder is a change of mental or behavioral pattern that causes sufferings and impairs the ability to function in ordinary life. In psychopathology, the assessment methods of mental disorder contain various types of uncertainties associated with signs and symptoms. This study identifies...

  14. Effects of traditional religious belief system of the Igbo group on the ...

    African Journals Online (AJOL)

    The objective of this study is to verify the effects of religious belief system on the effectiveness of leprosy control programmes in Anambra and Ebonyi states of Southeast Nigeria. The complementary objective is to ascertain the dominant mode of disposition to leprosy among residents of the two states and to account for the ...

  15. Belief-rule-based expert systems for evaluation of e-government

    DEFF Research Database (Denmark)

    Hossain, Mohammad Shahadat; Zander, Pär-Ola Mikael; Kamal, Md Sarwar

    2015-01-01

    , known as the Belief Rule Based Expert System (BRBES) and implemented in the local e-government of Bangladesh. The results have been compared with a recently developed method of evaluating e-government, and it is demonstrated that the results of the BRBES are more accurate and reliable. The BRBES can...

  16. Engaging students in the study of physics : an investigation of physics teachers’ belief systems about teaching and learning physics

    NARCIS (Netherlands)

    Belo, Neeltje Annigje Hendrika

    2013-01-01

    This doctoral thesis comprises two questionnaire studies and two small-scale interview studies on the content and structure of physics teachers’ belief systems. The studies focused on teachers’ beliefs about the goals and pedagogy of teaching and learning physics, and the nature of science. The

  17. A Belief Rule-Based Expert System to Assess Bronchiolitis Suspicion from Signs and Symptoms Under Uncertainty

    DEFF Research Database (Denmark)

    Karim, Rezuan; Hossain, Mohammad Shahadat; Khalid, Md. Saifuddin

    2017-01-01

    developed generic belief rule-based inference methodology by using evidential reasoning (RIMER) acts as the inference engine of this BRBES while belief rule base as the knowledge representation schema. The knowledge base of the system is constructed by using real patient data and expert opinion from...

  18. On the synchronization of identical and non-identical 4-D chaotic systems using arrow form matrix

    International Nuclear Information System (INIS)

    Hammami, S.; Ben Saad, K.; Benrejeb, M.

    2009-01-01

    Using the Borne and Gentina practical criterion associated with the Benrejeb canonical arrow form matrix, to derive the stability property of dynamic complex systems, a new strategy of control is formulated for chaos synchronization of two identical Lorenz Stenflo systems and two new four-dimensional chaotic systems, namely the Qi chaotic systems. The designed controller ensures that the state variables of both controlled chaotic slave Lorenz Stenflo and Qi systems globally synchronizes with the state variables of the master systems, respectively. It is also shown that Qi system globally synchronizes with Lorenz Stenflo system under the afforded generalized strategy of control. Numerical simulations are carried out to assess the performance of the proposed contributions in the important field of chaotic synchronization.

  19. A belief network approach for development of a nuclear power plant diagnosis system

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, I K; Kim, J T; Lee, D Y; Jung, C H; Kim, J Y; Lee, J S; Ham, C S [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1999-12-31

    Belief network (or Bayesian network) based on Bayes` rule in probabilistic theory can be applied to the reasoning of diagnostic system. This paper describes the basic theory of concept and feasibility of using the network for diagnosis of nuclear power plants. An example shows that the probabilities of root causes of a failure are calculated from the measured or believed evidences. 6 refs., 3 figs. (Author)

  20. A belief network approach for development of a nuclear power plant diagnosis system

    Energy Technology Data Exchange (ETDEWEB)

    Hwang, I. K.; Kim, J. T.; Lee, D. Y.; Jung, C. H.; Kim, J. Y.; Lee, J. S.; Ham, C. S. [Korea Atomic Energy Research Institute, Taejon (Korea, Republic of)

    1998-12-31

    Belief network (or Bayesian network) based on Bayes` rule in probabilistic theory can be applied to the reasoning of diagnostic system. This paper describes the basic theory of concept and feasibility of using the network for diagnosis of nuclear power plants. An example shows that the probabilities of root causes of a failure are calculated from the measured or believed evidences. 6 refs., 3 figs. (Author)

  1. The quadratic-form identity for constructing the Hamiltonian structure of integrable systems

    International Nuclear Information System (INIS)

    Guo Fukui; Zhang Yufeng

    2005-01-01

    A usual loop algebra, not necessarily the matrix form of the loop algebra A-tilde n-1 , is also made use of for constructing linear isospectral problems, whose compatibility conditions exhibit a zero-curvature equation from which integrable systems are derived. In order to look for the Hamiltonian structure of such integrable systems, a quadratic-form identity is created in the present paper whose special case is just the trace identity; that is, when taking the loop algebra A-tilde 1 , the quadratic-form identity presented in this paper is completely consistent with the trace identity

  2. A Case for Implementation of Citizen Centric National Identity Management Systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.

    of trust in transacting parties. Policy makers are therefore trying to implement identity policies to prevent identity abuses, promote the seamless flow of business transactions, and provide citizens the ability to exercise informational self-determination. Previously, the design of identity management...... and exposure, and a high level of literacy. But in developing countries infrastructural challenges, low literacy level, and physical verification of credentials hamper the effective use of identity management systems. This PhD study adapts the DeLone and McLean model of information systems success to the case...

  3. THE CODE OF THE STREET AND INMATE VIOLENCE: INVESTIGATING THE SALIENCE OF IMPORTED BELIEF SYSTEMS*

    Science.gov (United States)

    MEARS, DANIEL P.; STEWART, ERIC A.; SIENNICK, SONJA E.; SIMONS, RONALD L.

    2013-01-01

    Scholars have long argued that inmate behaviors stem in part from cultural belief systems that they “import” with them into incarcerative settings. Even so, few empirical assessments have tested this argument directly. Drawing on theoretical accounts of one such set of beliefs—the code of the street—and on importation theory, we hypothesize that individuals who adhere more strongly to the street code will be more likely, once incarcerated, to engage in violent behavior and that this effect will be amplified by such incarceration experiences as disciplinary sanctions and gang involvement, as well as the lack of educational programming, religious programming, and family support. We test these hypotheses using unique data that include measures of the street code belief system and incarceration experiences. The results support the argument that the code of the street belief system affects inmate violence and that the effect is more pronounced among inmates who lack family support, experience disciplinary sanctions, and are gang involved. Implications of these findings are discussed. PMID:24068837

  4. Identity Management Mismatch Challenges in the Danish Municipality Administration System

    DEFF Research Database (Denmark)

    Andersen, Mads Schaarup; Christensen, Henrik Bærbak

    2010-01-01

    Integrating a COTS product in a company’s product portfolio is appealing from a business perspective but highly challenging from the perspective of the software architecture. In this paper we outline research challenges regarding authorization in the identity management part of the Danish...

  5. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey

    OpenAIRE

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospi...

  6. Science Faculty Belief Systems in a Professional Development Program: Inquiry in College Laboratories

    Science.gov (United States)

    Hutchins, Kristen L.; Friedrichsen, Patricia J.

    2012-12-01

    The purpose of this study was to investigate how science faculty members' belief systems about inquiry-based teaching changed through their experience in a professional development program. The program was designed to support early career science faculty in learning about inquiry and incorporating an inquiry-based approach to teaching laboratories. Data sources for this qualitative study included three semi-structured interviews, observations during the program and during faculty members' implementation in their courses, and a researcher's journal. In the first phase of data analysis, we created profiles for each of the four participants. Next, we developed assertions, and tested for confirming and disconfirming evidence across the profiles. The assertions indicated that, through the professional development program, participants' knowledge and beliefs about inquiry-based teaching shifted, placing more value on student-directed learning and classroom inquiry. Participants who were internally motivated to participate and held incoming positive attitudes toward the mini-journal inquiry-based approach were more likely to incorporate the approach in their future practice. Students' responses played a critical role in participants' belief systems and their decision to continue using the inquiry-based format. The findings from this study have implications for professional development design.

  7. Identity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    textabstractAs individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference between success and failure.

  8. Ward identity for non-equilibrium Fermi systems

    Czech Academy of Sciences Publication Activity Database

    Velický, B.; Kalvová, Anděla; Špička, Václav

    2008-01-01

    Roč. 77, č. 4 (2008), 041201/1-041201/4 ISSN 1098-0121 R&D Projects: GA ČR GC202/07/J051 Institutional research plan: CEZ:AV0Z10100520; CEZ:AV0Z10100521 Keywords : non-equilibrium * Green’s functions * quantum transport equations * Ward identity Subject RIV: BE - Theoretical Physics Impact factor: 3.322, year: 2008

  9. Pharmaceutical industry gifts to physicians: patient beliefs and trust in physicians and the health care system.

    Science.gov (United States)

    Grande, David; Shea, Judy A; Armstrong, Katrina

    2012-03-01

    Pharmaceutical industry gifts to physicians are common and influence physician behavior. Little is known about patient beliefs about the prevalence of these gifts and how these beliefs may influence trust in physicians and the health care system. To measure patient perceptions about the prevalence of industry gifts and their relationship to trust in doctors and the health care system. Cross sectional random digit dial telephone survey. African-American and White adults in 40 large metropolitan areas. Respondents' beliefs about whether their physician and physicians in general receive industry gifts, physician trust, and health care system distrust. Overall, 55% of respondents believe their physician receives gifts, and 34% believe almost all doctors receive gifts. Respondents of higher socioeconomic status (income, education) and younger age were more likely to believe their physician receives gifts. In multivariate analyses, those that believe their personal physician receives gifts were more likely to report low physician trust (OR 2.26, 95% CI 1.56-3.30) and high health care system distrust (OR 2.03, 95% CI 1.49-2.77). Similarly, those that believe almost all doctors accept gifts were more likely to report low physician trust (OR 1.69, 95% CI 1.25-2.29) and high health care system distrust (OR 2.57, 95% CI 1.82-3.62). Patients perceive physician-industry gift relationships as common. Patients that believe gift relationships exist report lower levels of physician trust and higher rates of health care system distrust. Greater efforts to limit industry-physician gifts could have positive effects beyond reducing influences on physician behavior.

  10. Conceptualizing Teacher Identity as a Complex Dynamic System: The Inner Dynamics of Transformations during a Practicum

    Science.gov (United States)

    Henry, Alastair

    2016-01-01

    Currently, the inner dynamics of teacher identity transformations remain a "black box." Conceptualizing preservice teacher identity as a complex dynamic system, and the notion of "being someone who teaches" in dialogical terms as involving shifts between different teacher voices, the study investigates the dynamical processes…

  11. A FPGA-based identity authority method in quantum key distribution system

    International Nuclear Information System (INIS)

    Cui Ke; Luo Chunli; Zhang Hongfei; Lin Shengzhao; Jin Ge; Wang Jian

    2012-01-01

    In this article, an identity authority method realized in hardware is developed which is used in quantum key distribution (QKD) systems. This method is based on LFSR-Teoplitz hashing matrix. Its benefits relay on its easy implementation in hardware and high secure coefficient. It can gain very high security by means of splitting part of the final key generated from QKD systems as the seed where it is required in the identity authority method. We propose an specific flow of the identity authority method according to the problems and features of the hardware. The proposed method can satisfy many kinds of QKD systems. (authors)

  12. Some exact identities connecting one- and two-particle Green's functions in spin-orbit coupling systems

    International Nuclear Information System (INIS)

    Yang Huatong

    2007-01-01

    Some exact identities connecting one- and two-particle Green's functions in the presence of spin-orbit coupling have been derived. These identities are similar to the Ward identity in usual quantum transport theory of electrons. A satisfying approximate calculation of the spin transport in spin-orbit coupling system should also preserve these identities, just as the Ward identities should be remained in the usual electronic transport theory

  13. Evaluation and implementation of QR Code Identity Tag system for Healthcare in Turkey.

    Science.gov (United States)

    Uzun, Vassilya; Bilgin, Sami

    2016-01-01

    For this study, we designed a QR Code Identity Tag system to integrate into the Turkish healthcare system. This system provides QR code-based medical identification alerts and an in-hospital patient identification system. Every member of the medical system is assigned a unique QR Code Tag; to facilitate medical identification alerts, the QR Code Identity Tag can be worn as a bracelet or necklace or carried as an ID card. Patients must always possess the QR Code Identity bracelets within hospital grounds. These QR code bracelets link to the QR Code Identity website, where detailed information is stored; a smartphone or standalone QR code scanner can be used to scan the code. The design of this system allows authorized personnel (e.g., paramedics, firefighters, or police) to access more detailed patient information than the average smartphone user: emergency service professionals are authorized to access patient medical histories to improve the accuracy of medical treatment. In Istanbul, we tested the self-designed system with 174 participants. To analyze the QR Code Identity Tag system's usability, the participants completed the System Usability Scale questionnaire after using the system.

  14. The incorporation of the funds of knowledge and identity in a Normal School of Texcoco, Mexico: The beliefs of the teachers-in-training

    Directory of Open Access Journals (Sweden)

    David Subero Tomás

    2017-05-01

    Full Text Available General consensus has been reached about the localized and distributed nature of nowadays’ education, together with the need to establish educational links between the social and cultural context of the students, and the school. Following these premises, the aim of the present paper is to promote the initial beliefs of teachers in training about the family and the schools throughout three focus group sessions. The participants were 16 teachers-in-training, both men and women. The teachers expressed there is a lack of congruency between formal and informal educational contexts, and the students’ sociocultural background, which justifies the engagement in the “funds of knowledge and identity”, in order to modify the teachers’ beliefs. The conclusions presented in this study are part of the first cycle of a research based on the design developed for the initial training of teachers in “Escuelas Normales”, Mexico.

  15. Distributed Cooperative Control of Nonlinear and Non-identical Multi-agent Systems

    DEFF Research Database (Denmark)

    Bidram, Ali; Lewis, Frank; Davoudi, Ali

    2013-01-01

    This paper exploits input-output feedback linearization technique to implement distributed cooperative control of multi-agent systems with nonlinear and non-identical dynamics. Feedback linearization transforms the synchronization problem for a nonlinear and heterogeneous multi-agent system...... for electric power microgrids. The effectiveness of the proposed control is verified by simulating a microgrid test system....

  16. Federated Identity Management

    OpenAIRE

    Chadwick, David W.

    2009-01-01

    Abstract. This paper addresses the topic of federated identity management. It discusses in detail the following topics: what is digital identity, what is identity management, what is federated identity management, Kim Camerons 7 Laws of Identity, how can we protect the users privacy in a federated environment, levels of assurance, some past and present federated identity management systems, and some current research in FIM.

  17. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    Directory of Open Access Journals (Sweden)

    ANEES ABU SNEINEH

    2017-05-01

    Full Text Available Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking system. An intelligent automotive parking system is effectively implemented by integrating image processing technologies and an Arduino controller. Results show that intelligent parking is successfully implemented based on car ID image capture to meet the need for managing and organizing car parking systems.

  18. PALESTINE AUTOMOTIVE LICENSE IDENTITY RECOGNITION FOR INTELLIGENT PARKING SYSTEM

    OpenAIRE

    ANEES ABU SNEINEH; WAEL A. SALAH

    2017-01-01

    Providing employees with protection and security is one of the key concerns of any organization. This goal can be implemented mainly by managing and protecting employees’ cars in the parking area. Therefore, a parking area must be managed and organized with smart technologies and tools that can be applied and integrated in an intelligent parking system. This paper presents the tools based on image recognition technology that can be used to effectively control various parts of a parking sys...

  19. Building trusted national identity management systems: Presenting the privacy concern-trust (PCT) model

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    This paper discusses the effect of trust and information privacy concerns on citizens’ attitude towards national identity management systems. We introduce the privacyconcerns- trust model, which shows the role of trust in mediating and moderating citizens’ attitude towards identity management...... systems. We adopted a qualitative research approach in our analysis of data that was gathered through a series of interviews and a stakeholder workshop in Ghana. Our findings indicate that, beyond the threshold level of trust, societal information privacy concern is low; hence, trust is high, thereby...

  20. Coupled transverse and torsional vibrations in a mechanical system with two identical beams

    Science.gov (United States)

    Vlase, S.; Marin, M.; Scutaru, M. L.; Munteanu, R.

    2017-06-01

    The paper aims to study a plane system with bars, with certain symmetries. Such problems can be encountered frequently in industry and civil engineering. Considerations related to the economy of the design process, constructive simplicity, cost and logistics make the use of identical parts a frequent procedure. The paper aims to determine the properties of the eigenvalues and eigenmodes for transverse and torsional vibrations of a mechanical system where two of the three component bars are identical. The determination of these properties allows the calculus effort and the computation time and thus increases the accuracy of the results in such matters.

  1. Secure stand alone positive personnel identity verification system (SSA-PPIV)

    International Nuclear Information System (INIS)

    Merillat, P.D.

    1979-03-01

    The properties of a secure stand-alone positive personnel identity verification system are detailed. The system is designed to operate without the aid of a central computing facility and the verification function is performed in the absence of security personnel. Security is primarily achieved by means of data encryption on a magnetic stripe badge. Several operational configurations are discussed. Advantages and disadvantages of this system compared to a central computer driven system are detailed

  2. Addressing Value and Belief Systems on Climate Literacy in the Southeastern United States

    Science.gov (United States)

    McNeal, K. S.

    2012-12-01

    The southeast (SEUS; AL, AR, GA, FL, KY, LA, NC, SC, TN, E. TX) faces the greatest impacts as a result of climate change of any region in the U.S. which presents considerable and costly adaptation challenges. Paradoxically, people in the SEUS hold attitudes and perceptions that are more dismissive of climate change than those of any other region. An additional mismatch exists between the manner in which climate science is generally communicated and the underlying core values and beliefs held by a large segment of people in the SEUS. As a result, people frequently misinterpret and/or distrust information sources, inhibiting efforts to productively discuss and consider climate change and related impacts on human and environmental systems, and possible solutions and outcomes. The Climate Literacy Partnership in the Southeast (CLiPSE) project includes an extensive network of partners throughout the SEUS from faith, agriculture, culturally diverse, leisure, and K-20 educator communities that aim to address this educational need through a shared vision. CLiPSE has conducted a Climate Stewardship Survey (CSS) to determine the knowledge and perceptions of individuals in and beyond the CLiPSE network. The descriptive results of the CSS indicate that religion, predominantly Protestantism, plays a minor role in climate knowledge and perceptions. Likewise, political affiliation plays a minimal role in climate knowledge and perceptions between religions. However, when Protestants were broken out by political affiliation, statistically significant differences (t(30)=2.44, p=0.02) in knowledge related to the causes of climate change exist. Those Protestants affiliated with the Democratic Party (n=206) tended to maintain a statistically significant stronger knowledge of the causes of global climate change than their Republican counterparts. When SEUS educator (n=277) group was only considered, similar trends were evidenced, indicating that strongly held beliefs potentially

  3. Electronic nicotine delivery system (electronic cigarette) awareness, use, reactions and beliefs: a systematic review.

    Science.gov (United States)

    Pepper, Jessica K; Brewer, Noel T

    2014-09-01

    We sought to systematically review the literature on electronic nicotine delivery systems (ENDS, also called electronic cigarettes) awareness, use, reactions and beliefs. We searched five databases for articles published between 2006 and 1 July 2013 that contained variations of the phrases 'electronic cigarette', 'e-cigarette' and 'electronic nicotine delivery'. Of the 244 abstracts identified, we excluded articles not published in English, articles unrelated to ENDS, dissertation abstracts and articles without original data on prespecified outcomes. Two reviewers coded each article for ENDS awareness, use, reactions and beliefs. 49 studies met inclusion criteria. ENDS awareness increased from 16% to 58% from 2009 to 2011, and use increased from 1% to 6%. The majority of users were current or former smokers. Many users found ENDS satisfying, and some engaged in dual use of ENDS and other tobacco. No longitudinal studies examined whether ENDS serve as 'gateways' to future tobacco use. Common reasons for using ENDS were quitting smoking and using a product that is healthier than cigarettes. Self-reported survey data and prospective trials suggest that ENDS might help cigarette smokers quit, but no randomised controlled trials with probability samples compared ENDS with other cessation tools. Some individuals used ENDS to avoid smoking restrictions. ENDS use is expanding rapidly despite experts' concerns about safety, dual use and possible 'gateway' effects. More research is needed on effective public health messages, perceived health risks, validity of self-reports of smoking cessation and the use of different kinds of ENDS. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  4. Electronic nicotine delivery system (electronic cigarette) awareness, use, reactions and beliefs: a systematic review

    Science.gov (United States)

    Pepper, Jessica K; Brewer, Noel T

    2015-01-01

    Objective We sought to systematically review the literature on electronic nicotine delivery systems (ENDS, also called electronic cigarettes) awareness, use, reactions and beliefs. Data sources We searched five databases for articles published between 2006 and 1 July 2013 that contained variations of the phrases ‘electronic cigarette’, ‘e-cigarette’ and ‘electronic nicotine delivery’. Study selection Of the 244 abstracts identified, we excluded articles not published in English, articles unrelated to ENDS, dissertation abstracts and articles without original data on prespecified outcomes. Data extraction Two reviewers coded each article for ENDS awareness, use, reactions and beliefs. Data synthesis 49 studies met inclusion criteria. ENDS awareness increased from 16% to 58% from 2009 to 2011, and use increased from 1% to 6%. The majority of users were current or former smokers. Many users found ENDS satisfying, and some engaged in dual use of ENDS and other tobacco. No longitudinal studies examined whether ENDS serve as ‘gateways’ to future tobacco use. Common reasons for using ENDS were quitting smoking and using a product that is healthier than cigarettes. Self-reported survey data and prospective trials suggest that ENDS might help cigarette smokers quit, but no randomised controlled trials with probability samples compared ENDS with other cessation tools. Some individuals used ENDS to avoid smoking restrictions. Conclusions ENDS use is expanding rapidly despite experts’ concerns about safety, dual use and possible ‘gateway’ effects. More research is needed on effective public health messages, perceived health risks, validity of self-reports of smoking cessation and the use of different kinds of ENDS. PMID:24259045

  5. Hypothesis Management Framework: a exible design pattern for belief networks in decision support systems

    NARCIS (Netherlands)

    Gosliga, S.P. van; Voorde, I. van de

    2008-01-01

    This article discusses a design pattern for building belief networks for application domains in which causal models are hard to construct. In this approach we pursue a modular belief network structure that is easily extended by the users themselves, while remaining reliable for decision support. The

  6. The Impact of a Technology Coordinator's Belief System upon Using Technology to Create a Community's History

    Science.gov (United States)

    Waring, Scott M.

    2010-01-01

    As it has been shown that teachers of social studies content are less likely than teachers of other content areas to utilize technology in their classroom, this study focuses on one instructional technology coordinators' beliefs towards technology, instruction, and students and how these beliefs impacted how technology was utilized during a…

  7. Reliability assessment of complex mechatronic systems using a modified nonparametric belief propagation algorithm

    International Nuclear Information System (INIS)

    Zhong, X.; Ichchou, M.; Saidi, A.

    2010-01-01

    Various parametric skewed distributions are widely used to model the time-to-failure (TTF) in the reliability analysis of mechatronic systems, where many items are unobservable due to the high cost of testing. Estimating the parameters of those distributions becomes a challenge. Previous research has failed to consider this problem due to the difficulty of dependency modeling. Recently the methodology of Bayesian networks (BNs) has greatly contributed to the reliability analysis of complex systems. In this paper, the problem of system reliability assessment (SRA) is formulated as a BN considering the parameter uncertainty. As the quantitative specification of BN, a normal distribution representing the stochastic nature of TTF distribution is learned to capture the interactions between the basic items and their output items. The approximation inference of our continuous BN model is performed by a modified version of nonparametric belief propagation (NBP) which can avoid using a junction tree that is inefficient for the mechatronic case because of the large treewidth. After reasoning, we obtain the marginal posterior density of each TTF model parameter. Other information from diverse sources and expert priors can be easily incorporated in this SRA model to achieve more accurate results. Simulation in simple and complex cases of mechatronic systems demonstrates that the posterior of the parameter network fits the data well and the uncertainty passes effectively through our BN based SRA model by using the modified NBP.

  8. Canonical symmetry of a constrained Hamiltonian system and canonical Ward identity

    International Nuclear Information System (INIS)

    Li, Zi-ping

    1995-01-01

    An algorithm for the construction of the generators of the gauge transformation of a constrained Hamiltonian system is given. The relationships among the coefficients connecting the first constraints in the generator are made clear. Starting from the phase space generating function of the Green function, the Ward identity in canonical formalism is deduced. We point out that the quantum equations of motion in canonical form for a system with singular Lagrangian differ from the classical ones whether Dirac's conjecture holds true or not. Applications of the present formulation to the Abelian and non-Abelian gauge theories are given. The expressions for PCAC and generalized PCAC of the AVV vertex are derived exactly from another point of view. A new form of the Ward identity for gauge-ghost proper vertices is obtained which differs from the usual Ward-Takahashi identity arising from the BRS invariance

  9. The effects of driver identity on driving safety in a retrospective feedback system.

    Science.gov (United States)

    Zhao, Guozhen; Wu, Changxu

    2012-03-01

    Retrospective feedback that provides detailed information on a driver's performance in critical driving situations at the end of a trip enhances his/her driving behaviors and safe driving habits. Although this has been demonstrated by a previous study, retrospective feedback can be further improved and applied to non-critical driving situations, which is needed for transportation safety. To propose a new retrospective feedback system that uses driver identity (i.e., a driver's name) and to experimentally study its effects on measures of driving performance and safety in a driving simulator. We conducted a behavioral experimental study with 30 participants. "Feedback type" was a between-subject variable with three conditions: no feedback (control group), feedback without driver identity, and feedback with driver identity. We measured multiple aspects of participants' driving behavior. To control for potential confounds, factors that were significantly correlated with driving behavior (e.g., age and driving experience) were all entered as covariates into a multivariate analysis of variance. To examine the effects of speeding on collision severity in driving simulation studies, we also developed a new index - momentum of potential collision - with a set of equations. Subjects who used a feedback system with driver identity had the fewest speeding violations and central-line crossings, spent the least amount of time speeding and crossing the central line, had the lowest speeding and central-line crossing magnitude, ran the fewest red lights, and had the smallest momentum of potential collision compared to the groups with feedback without driver identity and without feedback (control group). The new retrospective feedback system with driver identity has the potential to enhance a person's driving safety (e.g., speeding, central-line crossing, momentum of potential collision), which is an indication of the valence of one's name in a feedback system design. Copyright

  10. Suppressed Belief

    Directory of Open Access Journals (Sweden)

    Komarine Romdenh-Romluc

    2009-12-01

    Full Text Available Moran’s revised conception of conscious belief requires us to reconceptualise suppressed belief. The work of Merleau-Ponty offers a way to do this. His account of motor-skills allows us to understand suppressed beliefs as pre-reflective ways of dealing with the world.

  11. A network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption

    Science.gov (United States)

    Zhu, Lijuan; Liu, Jingao

    2013-07-01

    This paper describes a network identity authentication protocol of bank account system based on fingerprint identification and mixed encryption. This protocol can provide every bank user a safe and effective way to manage his own bank account, and also can effectively prevent the hacker attacks and bank clerk crime, so that it is absolute to guarantee the legitimate rights and interests of bank users.

  12. Description of identical particles via gauged matrix models: a generalization of the Calogero-Sutherland system

    International Nuclear Information System (INIS)

    Park, Jeong-Hyuck

    2003-01-01

    We elaborate the idea that the matrix models equipped with the gauge symmetry provide a natural framework to describe identical particles. After demonstrating the general prescription, we study an exactly solvable harmonic oscillator type gauged matrix model. The model gives a generalization of the Calogero-Sutherland system where the strength of the inverse square potential is not fixed but dynamical bounded by below

  13. Quadratic integrals of motion for identical particle systems in quantum case

    International Nuclear Information System (INIS)

    Brije, I.; Gonera, S.; Kosinski, P.; Maslanka, P.; Giller, S.

    2005-01-01

    One studied quantum dynamic systems of identical particles allowing for additional integral of motion being quadratic in pulses. It was found that there was an appropriate way to ensure order that enabled to convert the classical integrals of motion into their quantum analogues. One analyzed relation of the mentioned integrals with splitting of the variables in the Schroedinger equation [ru

  14. Security extension for the Canetti-Krawczyk model in identity-based systems

    Institute of Scientific and Technical Information of China (English)

    LI Xinghua; MA Jianfeng; SangJae Moon

    2005-01-01

    The Canetti-Krawczyk (CK) model is a formalism for the analysis of keyexchange protocols, which can guarantee many security properties for the protocols proved secure by this model. But we find this model lacks the ability to guarantee key generation center (KGC) forward secrecy, which is an important security property for key-agreement protocols based on Identity. The essential reason leading to this weakness is that it does not fully consider the attacker's capabilities. In this paper, the CK model is accordingly extended with a new additional attacker's capability of the KGC corruption in Identity-based systems, which enables it to support KGC forward secrecy.

  15. Choosing fatherhood: how teens in the justice system embrace or reject a father identity.

    Science.gov (United States)

    Shade, Kate; Kools, Susan; Pinderhughes, Howard; Weiss, Sandra J

    2012-01-01

    The purpose of this qualitative study was to further the understanding of father identity and role development among adolescents involved in the justice system. Youth who were expecting a child or parenting an infant and who were incarcerated, arrested, or had admitted to criminal behavior participated in interviews and observations in a juvenile detention center and in the community. Data analysis revealed 4 patterns of fathering intentions: (a) embracing fatherhood, (b) being barred from fatherhood, (c) being ambivalent about fatherhood, or (d) rejecting fatherhood. Community health nurses can use this information to assess father identity status and address factors that interfere with father engagement. Copyright © Taylor & Francis Group, LLC

  16. Contrasting differences in identity and agency between narrative and autopoietic systems

    Directory of Open Access Journals (Sweden)

    Nico Buitendag

    2013-07-01

    Full Text Available The article aims at contrasting the autopoietic understanding of an individual and her or his actions as described by Niklas Luhmann with Paul Ricoeur’s notion of narrative identity, focusing on people as legal subjects. The article assumes that when legal subjects necessitate ethical engagement and evaluation, the law could cease to deal with problems in a mere legalistic fashion but is allowed the freedom to appeal to norms of justice external to itself as in other natural law theories. Through narrative identity the deeds of role players are to be understood in greater complexity than what a self-referential legal system is comfortable in dealing with.

  17. A framework for implementation of user-centric identity management systems

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2010-01-01

    Users increasingly become part of electronic transactions, which take place instantaneously without direct user involvement. This leads to the risk of data manipulation, identity theft and privacy violation, and it has become a major concern for individuals and businesses around the world. Gov......-ernments in many countries are implementing identity man-agement systems (IdMS) to curtail these incidences and to offer citizens the power to exercise informational self-determination. Using concepts from technology adoption and fit-viability theo-ries as well as the laws of identity, this paper analyzes...... the crite-ria for successful implementation and defines a framework for a citizen-centric national IdMS. Results from a survey con-ducted in Ghana are also included....

  18. The role of idiotypic interactions in the adaptive immune system: a belief-propagation approach

    Science.gov (United States)

    Bartolucci, Silvia; Mozeika, Alexander; Annibale, Alessia

    2016-08-01

    In this work we use belief-propagation techniques to study the equilibrium behaviour of a minimal model for the immune system comprising interacting T and B clones. We investigate the effect of the so-called idiotypic interactions among complementary B clones on the system’s activation. Our results show that B-B interactions increase the system’s resilience to noise, making clonal activation more stable, while increasing the cross-talk between different clones. We derive analytically the noise level at which a B clone gets activated, in the absence of cross-talk, and find that this increases with the strength of idiotypic interactions and with the number of T cells sending signals to the B clones. We also derive, analytically and numerically, via population dynamics, the critical line where clonal cross-talk arises. Our approach allows us to derive the B clone size distribution, which can be experimentally measured and gives important information about the adaptive immune system response to antigens and vaccination.

  19. Idendity and identity conflict in the workplace

    NARCIS (Netherlands)

    K.E. Horton (Kate); P.S. Bayerl (Saskia); G. Belschak-Jacobs (Gabriele)

    2014-01-01

    markdownabstract__Abstract__ As individuals, we define ourselves according to various characteristics that include our values and beliefs. This gives us our identity. As organisations become increasingly complex, understanding the concept of identity conflict may mean the difference

  20. You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites.

    Science.gov (United States)

    Leung, Angel N M; Wong, Natalie; Farver, JoAnn M

    2018-01-01

    The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders' perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims) × 2 condition (offend vs. defend) experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old) were randomly assigned into one of two conditions. Results showed that participants' involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments) was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become "upstanders" in educational programs to combat cyberbullying.

  1. You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites

    Science.gov (United States)

    Leung, Angel N. M.; Wong, Natalie; Farver, JoAnn M.

    2018-01-01

    The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders’ perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims) × 2 condition (offend vs. defend) experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old) were randomly assigned into one of two conditions. Results showed that participants’ involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments) was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become “upstanders” in educational programs to combat cyberbullying. PMID:29740362

  2. You Are What You Read: The Belief Systems of Cyber-Bystanders on Social Networking Sites

    Directory of Open Access Journals (Sweden)

    Angel N. M. Leung

    2018-04-01

    Full Text Available The present study tested how exposure to two types of responses to a hypothetical simulated Facebook setting influenced cyber-bystanders’ perceived control and normative beliefs using a 4 cyberbully-victim group (pure cyberbullies, non-involved, pure cyberbullied victims, and cyberbullied-victims × 2 condition (offend vs. defend experimental design. 203 Hong Kong Chinese secondary school and university students (132 females, 71 males; 12 to 28; M = 16.70; SD = 3.03 years old were randomly assigned into one of two conditions. Results showed that participants’ involvement in cyberbullying significantly related to their control beliefs about bully and victim assisting behaviors, while exposure to the two different conditions (offend vs. defend comments was related to both their control and normative beliefs. In general, the defend condition promoted higher control beliefs to help the victims and promoted higher normative beliefs to help the victims. Regardless of their past involvement in cyberbullying and exposure to offend vs. defend conditions, both cyber-bullies and cyber-victims were more inclined to demonstrate normative beliefs to help victims than to assist bullies. These results have implications for examining environmental influences in predicting bystander behaviors in cyberbullying contexts, and for creating a positive environment to motivate adolescents to become “upstanders” in educational programs to combat cyberbullying.

  3. Identical and Nonidentical Synchronization of Hyperchaotic Systems by Active Backstepping Method

    Directory of Open Access Journals (Sweden)

    A. Abooee

    2012-09-01

    Full Text Available This paper focuses on the tracking and synchronization problems of hyperchaotic systems based on active backstepping method. The method consists of a recursive approach that interlaces the choice of a Lyapunov function with the design of feedback control. First, a nonlinear recursive active backstepping control vector is designed to track any desired trajectory in hyperchaotic Wang system. Furthermore, this method is applied to achieve hyperchaos synchronization of two identical hyperchaotic Wang systems. Also, it is used to implement global asymptotic synchronization between hyperchaotic Wang system and hyperchaotic Rössler system. Numerical simulations have been employed to verify the effectiveness of the three designed active backstepping control vectors.

  4. Bayesian Belief Networks for predicting drinking water distribution system pipe breaks

    International Nuclear Information System (INIS)

    Francis, Royce A.; Guikema, Seth D.; Henneman, Lucas

    2014-01-01

    In this paper, we use Bayesian Belief Networks (BBNs) to construct a knowledge model for pipe breaks in a water zone. To the authors’ knowledge, this is the first attempt to model drinking water distribution system pipe breaks using BBNs. Development of expert systems such as BBNs for analyzing drinking water distribution system data is not only important for pipe break prediction, but is also a first step in preventing water loss and water quality deterioration through the application of machine learning techniques to facilitate data-based distribution system monitoring and asset management. Due to the difficulties in collecting, preparing, and managing drinking water distribution system data, most pipe break models can be classified as “statistical–physical” or “hypothesis-generating.” We develop the BBN with the hope of contributing to the “hypothesis-generating” class of models, while demonstrating the possibility that BBNs might also be used as “statistical–physical” models. Our model is learned from pipe breaks and covariate data from a mid-Atlantic United States (U.S.) drinking water distribution system network. BBN models are learned using a constraint-based method, a score-based method, and a hybrid method. Model evaluation is based on log-likelihood scoring. Sensitivity analysis using mutual information criterion is also reported. While our results indicate general agreement with prior results reported in pipe break modeling studies, they also suggest that it may be difficult to select among model alternatives. This model uncertainty may mean that more research is needed for understanding whether additional pipe break risk factors beyond age, break history, pipe material, and pipe diameter might be important for asset management planning. - Highlights: • We show Bayesian Networks for predictive and diagnostic management of water distribution systems. • Our model may enable system operators and managers to prioritize system

  5. A Hispanic mother's beliefs about stuttering aetiology: A systemic functional linguistic analysis.

    Science.gov (United States)

    Medina, Angela M

    2018-06-01

    The aim of this study was to identify the linguistic resources a Hispanic mother used to convey her beliefs about the aetiology of her adult son's stuttering. A qualitative research paradigm was adopted for data collection and analysis. An Ecuadorian mother and her adult son who stutters recorded a conversation in Spanish about the son's stuttering. Tools derived from systemic functional linguistic (SFL) theory were used to analyse conversation transcripts and to describe the word choices and sentence structures the mother used to talk about her son's stuttering. The mother deflected community-assigned blame for causing her son's stuttering by configuring her 'strong' temperament as a separate, uncontrollable entity. She structured the pervasiveness of stigma, lack of resources and misinformation within the community as causes for her inability to identify and seek help for her son's stuttering, which also served as a means for deflecting blame. SFL-based analyses were appropriate tools for the investigation of how a Hispanic mother construes her views, attitudes and experiences relative to her son's stuttering. Clinical implications of findings regarding parent education and the utility of SFL-based tools in the speech-language therapy setting are discussed.

  6. Positive identity entry control system with geographically distributed portals and enrollment stations

    International Nuclear Information System (INIS)

    McIntire, J.M.

    1985-01-01

    A positive identity entry control system using distributed processing to allow reliable geographically separated portals and enrollment stations has been installed and is fully operational at a large area DOE site. Identity verification requires a credential, a memorized number and measurement of a physical characteristic of the user. Additionally, all portal activity is monitored by guards. The portal system is dual redundant such that no single point failure will shut down operations. Each portal site maintains its own subset of the master data base so off-site failure of the central data base manager or its communication links will not significantly affect local portal activity. The system is suitable for installations with large populations requiring access control at several remote sites scattered over a large area

  7. A User-Centric System for Verified Identities on the Bitcoin Blockchain

    OpenAIRE

    Augot, Daniel; Chabanne, Hervé; Chenevier, Thomas; George, William; Lamber, Laurent

    2017-01-01

    International audience; We present an identity management scheme built into the Bitcoin blockchain, allowing for identities that are as indelible as the blockchain itself. Moreover, we take advantage of Bitcoin's decentralized nature to facilitate a shared control between users and identity providers, allowing users to directly manage their own identities, fluidly coordinating identities from different providers, even as identity providers can revoke identities and impose controls.

  8. Light-front Ward-Takahashi identity for two-fermion systems

    International Nuclear Information System (INIS)

    Marinho, J. A. O.; Frederico, T.; Pace, E.; Salme, G.; Sauer, P. U.

    2008-01-01

    We propose a three-dimensional electromagnetic current operator within light-front dynamics that satisfies a light-front Ward-Takahashi identity for two-fermion systems. The light-front current operator is obtained by a quasipotential reduction of the four-dimensional current operator and acts on the light-front valence component of bound or scattering states. A relation between the light-front valence wave function and the four-dimensional Bethe-Salpeter amplitude both for bound or scattering states is also derived, such that the matrix elements of the four-dimensional current operator can be fully recovered from the corresponding light-front ones. The light-front current operator can be perturbatively calculated through a quasipotential expansion, and the divergence of the proposed current satisfies a Ward-Takahashi identity at any given order of the expansion. In the quasipotential expansion the instantaneous terms of the fermion propagator are accounted for by the effective interaction and two-body currents. We exemplify our theoretical construction in the Yukawa model in the ladder approximation, investigating in detail the current operator at the lowest nontrivial order of the quasipotential expansion of the Bethe-Salpeter equation. The explicit realization of the light-front form of the Ward-Takahashi identity is verified. We also show the relevance of instantaneous terms and of the pair contribution to the two-body current and the Ward-Takahashi identity

  9. Exploring Japanese university English teachers' professional identity

    CERN Document Server

    Nagatomo, Diane Hawley

    2012-01-01

    This book examines the professional identities of Japanese university English teachers. It focuses on how relatively new teachers develop their professional identities, how gender impacts the professional identities of female professors, and how teaching practices and beliefs reflect personal and professional identity.

  10. Teacher Identity Work in Mathematics Teacher Education

    Science.gov (United States)

    Neumayer-Depiper, Jill

    2013-01-01

    Becoming a teacher is not developing an identity, but is developing identity as a continuous process of constructing and deconstructing understandings within the complexities of social practice, beliefs, experiences, and social norms. I take up this stance on identity as articulated in Judith Butler's (1999) work with gender identity and…

  11. Fighting the Whole System: Dissociative Identity Disorder, Labeling Theory, and Iatrogenic Doubting.

    Science.gov (United States)

    Floris, Jessica; McPherson, Susan

    2015-01-01

    This research examines how individuals diagnosed with dissociative identity disorder construe their experiences of being labeled with a contested diagnosis. Semistructured interviews were conducted in the United Kingdom with 5 women and 2 men diagnosed with dissociative identity disorder. A framework analysis was conducted. The analysis identified 2 overarching themes: diagnosis cross-examined and navigating care systems. The diagnosis appeared to be continually assessed by participants for its fit with symptoms, and the doubt among professionals seemed to be unhelpfully reflected in participants' attempts to understand and come to terms with their experiences. The findings are considered in light of labeling theory, the iatrogenic effects of professional doubt, and current debates concerning the reliability and validity of psychiatric diagnostic systems that have been reinvigorated by the publication of the Diagnostic and Statistical Manual of Mental Disorders, Fifth Edition.

  12. Identity, identity politics, and neoliberalism

    Directory of Open Access Journals (Sweden)

    Wrenn Mary

    2014-01-01

    Full Text Available With the intensification of neoliberalism, it is useful to examine how some individuals might cope with the irrationality of the system. Neoliberalism cloaks the execution of the corporate agenda behind rhetorical manipulation that advocates for limited government. The corollary absence of government involvement on behalf of the citizenry writ large disarms the means of social redress for the individual. Democracy funded and fueled by corporate power thereby disenfranchises the individual, provoking some to search for empowerment through identity politics. The argument set forth suggests that individuals construct, reinforce, or escalate allegiance to identities as a coping mechanism, some of which manifest in violent identity politics.

  13. Canonical symmetry in a system with singular Lagrangian and ward identities

    International Nuclear Information System (INIS)

    Li Ziping

    1994-01-01

    An algorithm to construct the generator of gauge transformation for a constrained Hamiltonian system is given. The relationships among the coefficients connecting with first-class constraints in the generator is cleared. Based on the phase space generating function, the corresponding Ward identities in canonical formalism is deduced. The preliminary applications of above results to a model in field theory which is functionally equivalent to the mixed Chern-Simons Lagrangian is discussed in detail

  14. Distinctive identity claims in federal systems: Judicial policing of subnational variance

    DEFF Research Database (Denmark)

    Abat Ninet, Antoni; Gardner, James A.

    2016-01-01

    nationally imposed limits on their power typically have at their disposal many tools with which to press against formal boundaries. Federal systems, moreover, frequently display a surprising degree of tolerance for subnational obstruction, disobedience, and other behaviors intended to expand subnational...... authority and influence, even over national objection. This tolerance, however, has limits. In this article, we examine a set of rulings by national constitutional courts invalidating formalized claims by subnational units to a distinctive subnational identity. The emphatically negative reactions...

  15. Attitudes, beliefs, and practices regarding electronic nicotine delivery systems in patients scheduled for elective surgery.

    Science.gov (United States)

    Kadimpati, Sandeep; Nolan, Margaret; Warner, David O

    2015-01-01

    Smokers are at increased risk of postoperative complications. Electronic nicotine delivery systems (ENDS; or electronic cigarettes) could be a useful tool to reduce harm in the perioperative period. This pilot study examined the attitudes, beliefs, and practices of smokers scheduled for elective surgery regarding ENDS. This was a cross-sectional survey of current cigarette smokers who were evaluated in a preoperative clinic before elective surgery at Mayo Clinic. Measures included demographic characteristics, smoking history, 2 indices assessing the perception of how smoking affected health risks, ENDS use history, and 3 indices assessing interest in, perceived benefits of, and barriers to using ENDS in the perioperative period. Of the 112 smokers who completed the survey, 62 (55%) had tried ENDS and 24 (21%) reported current use. The most commonly stated reason for using ENDS was to quit smoking. Approximately 2 in 3 participants would be willing to use ENDS to help them reduce or eliminate perioperative cigarette use, and similar proportions perceived health benefits of doing so. Of the factors studied, only attempted to quit within the last year was significantly associated with increased interest in the perioperative use of ENDS (P=.03). Compared with participants who had tried ENDS (n=62), those who had never tried ENDS (n=50) had a significantly increased interest in the perioperative use of ENDS. A substantial proportion of patients scheduled for elective surgery had tried ENDS and would consider using ENDS to reduce perioperative use of cigarettes. Copyright © 2015 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.

  16. Conscious Belief

    Directory of Open Access Journals (Sweden)

    David Pitt

    2016-04-01

    Full Text Available Tim Crane maintains that beliefs cannot be conscious because they persist in the absence of consciousness. Conscious judgments can share their contents with beliefs, and their occurrence can be evidence for what one believes; but they cannot be beliefs, because they don’t persist. I challenge Crane’s premise that belief attributions to the temporarily unconscious are literally true. To say of an unconscious agent that she believes that p is like saying that she sings well. To say she sings well is to say that when she sings, her singing is good. To say that she believes that p is (roughly to say that when she consciously considers the content that p she consciously affirms (believes it. I also argue that the phenomenal view of intentional content Crane appears to endorse prima facie commits him to the view, at least controversial, perhaps incoherent, that there is unconscious phenomenology (the intentional contents of unconscious beliefs.

  17. Switched generalized function projective synchronization of two identical/different hyperchaotic systems with uncertain parameters

    International Nuclear Information System (INIS)

    Li Hongmin; Li Chunlai

    2012-01-01

    In this paper, we investigate two switched synchronization schemes, namely partial and complete switched generalized function projective synchronization, by using the adaptive control method. Partial switched synchronization of chaotic systems means that the state variables of the drive system synchronize with partial different state variables of the response system, whereas complete switched synchronization of chaotic systems means that all the state variables of the drive system synchronize with complete different state variables of the response system. Because the switched synchronization scheme exists in many combinations, it is a promising type of synchronization as it provides greater security in secure communications. Based on the Lyapunov stability theory, the adaptive control laws and the parameter update laws are derived to make the states of two identical/different hyperchaotic systems asymptotically synchronized up to a desired scaling function. Finally, numerical simulations are performed to verify and illustrate the analytical results.

  18. Personal and Interpersonal Value System, Self-Perception and Identity of Spanish Nurses: A Cross-Sectional Study

    Science.gov (United States)

    Losa Iglesias, Marta Elena; de Bengoa Vallejo, Ricardo Becerro

    2011-01-01

    The aim of this research is to identify the predominant values system among a sample of Spanish nurses, to identify how values are tied to professional nursing identity and determine differences in values and identity between socio-demographic variables as a gender, citizenship and/or nursing service. Cross-sectional study was performed with a…

  19. Intelligent wear mode identification system for marine diesel engines based on multi-level belief rule base methodology

    Science.gov (United States)

    Yan, Xinping; Xu, Xiaojian; Sheng, Chenxing; Yuan, Chengqing; Li, Zhixiong

    2018-01-01

    Wear faults are among the chief causes of main-engine damage, significantly influencing the secure and economical operation of ships. It is difficult for engineers to utilize multi-source information to identify wear modes, so an intelligent wear mode identification model needs to be developed to assist engineers in diagnosing wear faults in diesel engines. For this purpose, a multi-level belief rule base (BBRB) system is proposed in this paper. The BBRB system consists of two-level belief rule bases, and the 2D and 3D characteristics of wear particles are used as antecedent attributes on each level. Quantitative and qualitative wear information with uncertainties can be processed simultaneously by the BBRB system. In order to enhance the efficiency of the BBRB, the silhouette value is adopted to determine referential points and the fuzzy c-means clustering algorithm is used to transform input wear information into belief degrees. In addition, the initial parameters of the BBRB system are constructed on the basis of expert-domain knowledge and then optimized by the genetic algorithm to ensure the robustness of the system. To verify the validity of the BBRB system, experimental data acquired from real-world diesel engines are analyzed. Five-fold cross-validation is conducted on the experimental data and the BBRB is compared with the other four models in the cross-validation. In addition, a verification dataset containing different wear particles is used to highlight the effectiveness of the BBRB system in wear mode identification. The verification results demonstrate that the proposed BBRB is effective and efficient for wear mode identification with better performance and stability than competing systems.

  20. Culture and Belief Systems: A Christian Experience in the 21st Century

    African Journals Online (AJOL)

    Culture, which is manifested in symbols, heroes, rituals, values and practices, refers to the cumulative deposit of knowledge, experience, beliefs, values, attitudes, meanings, hierarchies, religions, concepts of time, roles, spatial relations, concepts of the universe and material objects and possessions acquired by a group of ...

  1. Systems of Goals, Attitudes, and Self-Related Beliefs in Second-Language-Learning Motivation

    Science.gov (United States)

    Kormos, Judit; Kiddle, Thom; Csizer, Kata

    2011-01-01

    In the present study, we surveyed the English language-learning motivations of 518 secondary school students, university students, and young adult learners in the capital of Chile, Santiago. We applied multi-group structural-equation modeling to analyze how language-learning goals, attitudes, self-related beliefs, and parental encouragement…

  2. Beliefs in Context: Understanding Language Policy Implementation at a Systems Level

    Science.gov (United States)

    Hopkins, Megan

    2016-01-01

    Drawing on institutional theory, this study describes how cognitive, normative, and regulative mechanisms shape bilingual teachers' language policy implementation in both English-only and bilingual contexts. Aligned with prior educational language policy research, findings indicate the important role that teachers' beliefs play in the policy…

  3. Sexual orientation and gender identity: review of concepts, controversies and their relation to psychopathology classification systems.

    Science.gov (United States)

    Moleiro, Carla; Pinto, Nuno

    2015-01-01

    Numerous controversies and debates have taken place throughout the history of psychopathology (and its main classification systems) with regards to sexual orientation and gender identity. These are still reflected on present reformulations of gender dysphoria in both the Diagnostic and Statistical Manual and the International Classification of Diseases, and in more or less subtle micro-aggressions experienced by lesbian, gay, bisexual and trans patients in mental health care. The present paper critically reviews this history and current controversies. It reveals that this deeply complex field contributes (i) to the reflection on the very concept of mental illness; (ii) to the focus on subjective distress and person-centered experience of psychopathology; and (iii) to the recognition of stigma and discrimination as significant intervening variables. Finally, it argues that sexual orientation and gender identity have been viewed, in the history of the field of psychopathology, between two poles: gender transgression and gender variance/fluidity.

  4. Sexual Orientation and Gender Identity: Review of concepts, controversies and their relation to psychopathology classification systems

    Directory of Open Access Journals (Sweden)

    Carla eMoleiro

    2015-10-01

    Full Text Available Numerous controversies and debates have taken place throughout the history of psychopathology (and its main classification systems with regards to sexual orientation and gender identity. These are still reflected on present reformulations of gender dysphoria in both DSM and ICD, and in more or less subtle micro-aggressions experienced by lesbian, gay, bisexual and trans patients in mental health care. The present paper critically reviews this history and current controversies. It reveals that this deeply complex field contributes (i to the reflection on the very concept of mental illness; (ii to the focus on subjective distress and person-centered experience of psychopathology; and (iii to the recognition of stigma and discrimination as significant intervening variables. Finally, it argues that sexual orientation and gender identity have been viewed, in the history of the field of psychopathology, between two poles: gender transgression and gender variance/fluidity.

  5. Holistic Privacy-Preserving Identity Management System for the Internet of Things

    Directory of Open Access Journals (Sweden)

    Jorge Bernal Bernabe

    2017-01-01

    Full Text Available Security and privacy concerns are becoming an important barrier for large scale adoption and deployment of the Internet of Things. To address this issue, the identity management system defined herein provides a novel holistic and privacy-preserving solution aiming to cope with heterogeneous scenarios that requires both traditional online access control and authentication, along with claim-based approach for M2M (machine to machine interactions required in IoT. It combines a cryptographic approach for claim-based authentication using the Idemix anonymous credential system, together with classic IdM mechanisms by relying on the FIWARE IdM (Keyrock. This symbiosis endows the IdM system with advanced features such as privacy-preserving, minimal disclosure, zero-knowledge proofs, unlikability, confidentiality, pseudonymity, strong authentication, user consent, and offline M2M transactions. The IdM system has been specially tailored for the Internet of Things bearing in mind the management of both users’ and smart objects’ identity. Moreover, the IdM system has been successfully implemented, deployed, and tested in the scope of SocIoTal European research project.

  6. RELIABILITY ASSESSMENT OF ENTROPY METHOD FOR SYSTEM CONSISTED OF IDENTICAL EXPONENTIAL UNITS

    Institute of Scientific and Technical Information of China (English)

    Sun Youchao; Shi Jun

    2004-01-01

    The reliability assessment of unit-system near two levels is the most important content in the reliability multi-level synthesis of complex systems. Introducing the information theory into system reliability assessment, using the addible characteristic of information quantity and the principle of equivalence of information quantity, an entropy method of data information conversion is presented for the system consisted of identical exponential units. The basic conversion formulae of entropy method of unit test data are derived based on the principle of information quantity equivalence. The general models of entropy method synthesis assessment for system reliability approximate lower limits are established according to the fundamental principle of the unit reliability assessment. The applications of the entropy method are discussed by way of practical examples. Compared with the traditional methods, the entropy method is found to be valid and practicable and the assessment results are very satisfactory.

  7. DEVELOPMENT OF A COMPUTER SYSTEM FOR IDENTITY AUTHENTICATION USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    Timur Kartbayev

    2017-03-01

    Full Text Available The aim of the study is to increase the effectiveness of automated face recognition to authenticate identity, considering features of change of the face parameters over time. The improvement of the recognition accuracy, as well as consideration of the features of temporal changes in a human face can be based on the methodology of artificial neural networks. Hybrid neural networks, combining the advantages of classical neural networks and fuzzy logic systems, allow using the network learnability along with the explanation of the findings. The structural scheme of intelligent system for identification based on artificial neural networks is proposed in this work. It realizes the principles of digital information processing and identity recognition taking into account the forecast of key characteristics’ changes over time (e.g., due to aging. The structural scheme has a three-tier architecture and implements preliminary processing, recognition and identification of images obtained as a result of monitoring. On the basis of expert knowledge, the fuzzy base of products is designed. It allows assessing possible changes in key characteristics, used to authenticate identity based on the image. To take this possibility into consideration, a neuro-fuzzy network of ANFIS type was used, which implements the algorithm of Tagaki-Sugeno. The conducted experiments showed high efficiency of the developed neural network and a low value of learning errors, which allows recommending this approach for practical implementation. Application of the developed system of fuzzy production rules that allow predicting changes in individuals over time, will improve the recognition accuracy, reduce the number of authentication failures and improve the efficiency of information processing and decision-making in applications, such as authentication of bank customers, users of mobile applications, or in video monitoring systems of sensitive sites.

  8. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    Science.gov (United States)

    Tromans, James Matthew; Harris, Mitchell; Stringer, Simon Maitland

    2011-01-01

    Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE) respond primarily to facial identity, while cells within the superior temporal sulcus (STS) respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC) of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs), with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  9. A computational model of the development of separate representations of facial identity and expression in the primate visual system.

    Directory of Open Access Journals (Sweden)

    James Matthew Tromans

    Full Text Available Experimental studies have provided evidence that the visual processing areas of the primate brain represent facial identity and facial expression within different subpopulations of neurons. For example, in non-human primates there is evidence that cells within the inferior temporal gyrus (TE respond primarily to facial identity, while cells within the superior temporal sulcus (STS respond to facial expression. More recently, it has been found that the orbitofrontal cortex (OFC of non-human primates contains some cells that respond exclusively to changes in facial identity, while other cells respond exclusively to facial expression. How might the primate visual system develop physically separate representations of facial identity and expression given that the visual system is always exposed to simultaneous combinations of facial identity and expression during learning? In this paper, a biologically plausible neural network model, VisNet, of the ventral visual pathway is trained on a set of carefully-designed cartoon faces with different identities and expressions. The VisNet model architecture is composed of a hierarchical series of four Self-Organising Maps (SOMs, with associative learning in the feedforward synaptic connections between successive layers. During learning, the network develops separate clusters of cells that respond exclusively to either facial identity or facial expression. We interpret the performance of the network in terms of the learning properties of SOMs, which are able to exploit the statistical indendependence between facial identity and expression.

  10. Identification of Staphylococcus species with the API STAPH-IDENT system.

    Science.gov (United States)

    Kloos, W E; Wolfshohl, J F

    1982-01-01

    The API STAPH-IDENT system was compared with conventional methods for the identification of 14 Staphylococcus species. Conventional methods included the Kloos and Schleifer simplified scheme and DNA-DNA hybridization. The API STAPH-IDENT strip utilizes a battery of 10 miniaturized biochemical tests, including alkaline phosphatase, urease, beta-glucosidase, beta-glucuronidase, and beta-galactosidase activity, aerobic acid formation from D-(+)-mannose, D-mannitol, D-(+)-trehalose, and salicin, and utilization of arginine. Reactions of cultures were determined after 5 h of incubation at 35 degrees C. Results indicated a high degree of congruence (greater than 90%) between the expedient API system and conventional methods for most species. The addition of a test for novobiocin susceptibility to the API system increased the accuracy of identification of S. saprophyticus, S. cohnii, and S. hominis, significantly. Several strains of S. hominis, S. haemolyticus, and S. warneri which were difficult to separate with the Kloos and Schleifer simplified scheme were accurately resolved by the API system. PMID:6752190

  11. Multicultural identity processes.

    Science.gov (United States)

    Hong, Ying-Yi; Zhan, Siran; Morris, Michael W; Benet-Martínez, Verónica

    2016-04-01

    The study of multicultural identity has gained prominence in recent decades and will be even more urgent as the mobility of individuals and social groups becomes the 'new normal'. This paper reviews the state-of-the-art theoretical advancements and empirical discoveries of multicultural identity processes at the intrapersonal, interpersonal, and collective (e.g., organizational, societal) levels. First, biculturalism has more benefits for individuals' psychological and sociocultural adjustment than monoculturalism. Bicultural individuals' racial essentialist beliefs and Bicultural Identity Integration affect cultural frame switching, racial categorization, and creativity. Second, identity denial and identity-based discrimination by other people or groups threaten multicultural individuals' psychological health and performance. Third, multiculturalism and interculturalism policies are associated with different conceptions of and attitudes toward diversity, and have distinct outcomes for multicultural individuals and societies. Copyright © 2015 Elsevier Ltd. All rights reserved.

  12. A dynamic identity based authentication scheme using chaotic maps for telecare medicine information systems.

    Science.gov (United States)

    Wang, Zhiheng; Huo, Zhanqiang; Shi, Wenbo

    2015-01-01

    With rapid development of computer technology and wide use of mobile devices, the telecare medicine information system has become universal in the field of medical care. To protect patients' privacy and medial data's security, many authentication schemes for the telecare medicine information system have been proposed. Due to its better performance, chaotic maps have been used in the design of authentication schemes for the telecare medicine information system. However, most of them cannot provide user's anonymity. Recently, Lin proposed a dynamic identity based authentication scheme using chaotic maps for the telecare medicine information system and claimed that their scheme was secure against existential active attacks. In this paper, we will demonstrate that their scheme cannot provide user anonymity and is vulnerable to the impersonation attack. Further, we propose an improved scheme to fix security flaws in Lin's scheme and demonstrate the proposed scheme could withstand various attacks.

  13. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    Science.gov (United States)

    Schiepek, Günter K; Stöger-Schmidinger, Barbara; Aichhorn, Wolfgang; Schöller, Helmut; Aas, Benjamin

    2016-01-01

    Objective: The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management) including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD) and dissociative identity disorder. Methods: A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client's dynamics of cognitions, emotions, and behavior. The components (variables) of this idiographic system model (ISM) were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS), to capture the client's individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results: For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion: By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and behavioral network and

  14. Systemic Case Formulation, Individualized Process Monitoring, and State Dynamics in a Case of Dissociative Identity Disorder.

    Directory of Open Access Journals (Sweden)

    Guenter Karl Schiepek

    2016-10-01

    Full Text Available Objective. The aim of this case report is to demonstrate the feasibility of a systemic procedure (synergetic process management including modeling of the idiographic psychological system and continuous high-frequency monitoring of change dynamics in a case of dissociative identity disorder. The psychotherapy was realized in a day treatment center with a female client diagnosed with borderline personality disorder (BPD and dissociative identity disorder. Methods. A three hour long co-creative session at the beginning of the treatment period allowed for modeling the systemic network of the client’s dynamics of cognitions, emotions, and behavior. The components (variables of this idiographic system model (ISM were used to create items for an individualized process questionnaire for the client. The questionnaire was administered daily through an internet-based monitoring tool (Synergetic Navigation System, SNS, to capture the client’s individual change process continuously throughout the therapy and after-care period. The resulting time series were reflected by therapist and client in therapeutic feedback sessions. Results. For the client it was important to see how the personality states dominating her daily life were represented by her idiographic system model and how the transitions between each state could be explained and understood by the activating and inhibiting relations between the cognitive-emotional components of that system. Continuous monitoring of her cognitions, emotions, and behavior via SNS allowed for identification of important triggers, dynamic patterns, and psychological mechanisms behind seemingly erratic state fluctuations. These insights enabled a change in management of the dynamics and an intensified trauma-focused therapy. Conclusion. By making use of the systemic case formulation technique and subsequent daily online monitoring, client and therapist continuously refer to detailed visualizations of the mental and

  15. Towards Scalability for Federated Identity Systems for Cloud-Based Environments

    Directory of Open Access Journals (Sweden)

    André Albino Pereira

    2015-12-01

    Full Text Available As multi-tenant authorization and federated identity management systems for cloud computing matures, the provisioning of services using this paradigm allows maximum efficiency on business that requires access control. However, regarding scalability support, mainly horizontal, some characteristics of those approaches based on central authentication protocols are problematic. The objective of this work is to address these issues by providing an adapted sticky-session mechanism for a Shibboleth architecture using JASIG CAS. This alternative, compared with the recommended distributed memory approach, shown improved efficiency and less overall infrastructure complexity, as well as demanding less 58% of computational resources and improving throughput (requests per second by 11%.

  16. The influence of the pre-scientific and scientific belief system of both counsellor and client on the success of the narrative process

    Directory of Open Access Journals (Sweden)

    W. Luyt

    2006-07-01

    Full Text Available The aim of this article is to investigate to what extent the belief system of both counsellor and client plays a role in counselling. It is generally accepted that beliefs play a central role in the life of all people. This article applies this notion, as described by, among others, Wright, Watson and Bell (1986, to the field of pastoral care and more specifically to the narrative approach within it. The narrative approach is an important instrument that helps people to understand how their life stories have been shaped by their beliefs about themselves. Throughout the article the researcher attempts to indicate how the counsellor, client and counselling process are influenced by their respective scientific and pre-scientific roots and development, as well as by their system of belief in general.

  17. On creating macroscopically identical granular systems with different numbers of particles

    Science.gov (United States)

    van der Meer, Devaraj; Rivas, Nicolas

    2015-11-01

    One of the fundamental differences between granular and molecular hydrodynamics is the enormous difference in the total number of constituents. The small number of particles implies that the role of fluctuations in granular dynamics is of paramount importance. To obtain more insight in these fluctuations, we investigate to what extent it is possible to create identical granular hydrodynamic states with different number of particles. A definition is given of macroscopically equivalent systems, and the dependency of the conservation equations on the particle size is studied. We show that, in certain cases, and by appropriately scaling the microscopic variables, we are able to compare systems with significantly different number of particles that present the same macroscopic phenomenology. We apply these scalings in simulations of a vertically vibrated system, namely the density inverted granular Leidenfrost state and its transition to a buoyancy-driven convective state.

  18. Seniority in quantum many-body systems. I. Identical particles in a single shell

    Energy Technology Data Exchange (ETDEWEB)

    Van Isacker, P., E-mail: isacker@ganil.fr [Grand Accélérateur National d’Ions Lourds, CEA/DSM–CNRS/IN2P3, BP 55027, F-14076 Caen Cedex 5 (France); Heinze, S. [Institut für Kernphysik der Universität zu Köln, 50937 Köln (Germany)

    2014-10-15

    A discussion of the seniority quantum number in many-body systems is presented. The analysis is carried out for bosons and fermions simultaneously but is restricted to identical particles occupying a single shell. The emphasis of the paper is on the possibility of partial conservation of seniority which turns out to be a peculiar property of spin-9/2 fermions but prevalent in systems of interacting bosons of any spin. Partial conservation of seniority is at the basis of the existence of seniority isomers, frequently observed in semi-magic nuclei, and also gives rise to peculiar selection rules in one-nucleon transfer reactions. - Highlights: • Unified derivation of conditions for the total and partial conservation of seniority. • General analysis of the partial conservation of seniority in boson systems. • Why partial conservation of seniority is crucial for seniority isomers in nuclei. • The effect of partial conservation of seniority on one-nucleon transfer intensities.

  19. Seniority in quantum many-body systems. I. Identical particles in a single shell

    International Nuclear Information System (INIS)

    Van Isacker, P.; Heinze, S.

    2014-01-01

    A discussion of the seniority quantum number in many-body systems is presented. The analysis is carried out for bosons and fermions simultaneously but is restricted to identical particles occupying a single shell. The emphasis of the paper is on the possibility of partial conservation of seniority which turns out to be a peculiar property of spin-9/2 fermions but prevalent in systems of interacting bosons of any spin. Partial conservation of seniority is at the basis of the existence of seniority isomers, frequently observed in semi-magic nuclei, and also gives rise to peculiar selection rules in one-nucleon transfer reactions. - Highlights: • Unified derivation of conditions for the total and partial conservation of seniority. • General analysis of the partial conservation of seniority in boson systems. • Why partial conservation of seniority is crucial for seniority isomers in nuclei. • The effect of partial conservation of seniority on one-nucleon transfer intensities

  20. Supernatural beliefs, natural kinds, and conceptual structure.

    Science.gov (United States)

    Walker, S J

    1992-11-01

    This article presents cross-cultural evidence in support of the notion that adults' natural kind concepts are theory based but may be informed by knowledge/belief systems other than the biological. Three groups of subjects from western Nigeria--rural, urban, and elite--participated in the study. Subjects heard stories describing alterations of appearance; that is, one natural kind was made to resemble another in both ritual and nonritual contexts. Subjects then were required to judge the identity of the altered item and to give an explanation for the category judgment. It was predicted that subjects would make more nonpreservation-of-identity category judgments supported by supernatural explanations in the ritual contexts and that subjects' use of supernatural explanations would reflect the extent of their engagement with the supernatural. The first prediction was borne out; the second prediction was only partially supported. Discussion of the results emphasizes the importance of exploring the role of sociocultural factors in conceptual structure.

  1. Toward a general theory of conical intersections in systems of identical nuclei

    Science.gov (United States)

    Keating, Sean P.; Mead, C. Alden

    1987-02-01

    It has been shown previously that the Herzberg-Longuet-Higgins sign change produced in Born-Oppenheimer electronic wave functions when the nuclei traverse a closed path around a conical intersection has implications for the symmetry of wave functions under permutations of identical nuclei. For systems of three or four identical nuclei, there are special features present which have facilitated the detailed analysis. The present paper reports progress toward a general theory for systems of n nuclei. For n=3 or 4, the two key functions which locate conical intersections and define compensating phase factors can conveniently be defined so as to transform under permutations according to a two-dimensional irreducible representation of the permutation group. Since such representations do not exist for n>4, we have chosen to develop a formalism in terms of lab-fixed electronic basis functions, and we show how to define the two key functions in principle. The functions so defined both turn out to be totally symmetric under permutations. We show how they can be used to define compensating phase factors so that all modified electronic wave functions are either totally symmetric or totally antisymmetric under permutations. A detailed analysis is made to cyclic permutations in the neighborhood of Dnh symmetry, which can be extended by continuity arguments to more general configurations, and criteria are obtained for sign changes. There is a qualitative discussion of the treatment of more general permutations.

  2. [Gender identity, a factor of inequality forgotten by Spanish health information systems].

    Science.gov (United States)

    Gil-Borrelli, Christian; Velasco, César; Martí-Pastor, Marc; Latasa, Pello

    The Spanish Health Information System (HIS) collects health information. Trans people have poorer health status. This paper aimed to assess the adequacy of the HIS to collect the health data on trans individuals. The HIS sources available in the Statistical Portal of the National Health System were reviewed. The sources containing population health data were selected. The variables "sex" and "gender identity" were searched. Nineteen sources were identified. In all of them the variable "sex" was found, whereas "gender identify" did not appear in any of the 19. In two sources, the variable "sex" allowed values of "transsexual". The SIS contains little information regarding gender identity. This leads to the invisibility of trans people in Spanish health statistics. Obtaining this information would allow for a better understanding of the barriers to health care access, and the health needs of one of the most discriminated groups in our society. Copyright © 2017 SESPAS. Publicado por Elsevier España, S.L.U. All rights reserved.

  3. Using a generalised identity reference model with archetypes to support interoperability of demographics information in electronic health record systems.

    Science.gov (United States)

    Xu Chen; Berry, Damon; Stephens, Gaye

    2015-01-01

    Computerised identity management is in general encountered as a low-level mechanism that enables users in a particular system or region to securely access resources. In the Electronic Health Record (EHR), the identifying information of both the healthcare professionals who access the EHR and the patients whose EHR is accessed, are subject to change. Demographics services have been developed to manage federated patient and healthcare professional identities and to support challenging healthcare-specific use cases in the presence of diverse and sometimes conflicting demographic identities. Demographics services are not the only use for identities in healthcare. Nevertheless, contemporary EHR specifications limit the types of entities that can be the actor or subject of a record to health professionals and patients, thus limiting the use of two level models in other healthcare information systems. Demographics are ubiquitous in healthcare, so for a general identity model to be usable, it should be capable of managing demographic information. In this paper, we introduce a generalised identity reference model (GIRM) based on key characteristics of five surveyed demographic models. We evaluate the GIRM by using it to express the EN13606 demographics model in an extensible way at the metadata level and show how two-level modelling can support the exchange of instances of demographic identities. This use of the GIRM to express demographics information shows its application for standards-compliant two-level modelling alongside heterogeneous demographics models. We advocate this approach to facilitate the interoperability of identities between two-level model-based EHR systems and show the validity and the extensibility of using GIRM for the expression of other health-related identities.

  4. A Secure Dynamic Identity and Chaotic Maps Based User Authentication and Key Agreement Scheme for e-Healthcare Systems.

    Science.gov (United States)

    Li, Chun-Ta; Lee, Cheng-Chi; Weng, Chi-Yao; Chen, Song-Jhih

    2016-11-01

    Secure user authentication schemes in many e-Healthcare applications try to prevent unauthorized users from intruding the e-Healthcare systems and a remote user and a medical server can establish session keys for securing the subsequent communications. However, many schemes does not mask the users' identity information while constructing a login session between two or more parties, even though personal privacy of users is a significant topic for e-Healthcare systems. In order to preserve personal privacy of users, dynamic identity based authentication schemes are hiding user's real identity during the process of network communications and only the medical server knows login user's identity. In addition, most of the existing dynamic identity based authentication schemes ignore the inputs verification during login condition and this flaw may subject to inefficiency in the case of incorrect inputs in the login phase. Regarding the use of secure authentication mechanisms for e-Healthcare systems, this paper presents a new dynamic identity and chaotic maps based authentication scheme and a secure data protection approach is employed in every session to prevent illegal intrusions. The proposed scheme can not only quickly detect incorrect inputs during the phases of login and password change but also can invalidate the future use of a lost/stolen smart card. Compared the functionality and efficiency with other authentication schemes recently, the proposed scheme satisfies desirable security attributes and maintains acceptable efficiency in terms of the computational overheads for e-Healthcare systems.

  5. Mobile Identity Management

    NARCIS (Netherlands)

    Hoepman, J.J.

    2011-01-01

    Identity management consists of the processes and all underlying technologies for the creation, management, and usage of digital identities. Business rely on identity management systems to simplify the management of access rights to their systems and services for both their employees and their

  6. Impact of Cropping Systems, Soil Inoculum, and Plant Species Identity on Soil Bacterial Community Structure.

    Science.gov (United States)

    Ishaq, Suzanne L; Johnson, Stephen P; Miller, Zach J; Lehnhoff, Erik A; Olivo, Sarah; Yeoman, Carl J; Menalled, Fabian D

    2017-02-01

    Farming practices affect the soil microbial community, which in turn impacts crop growth and crop-weed interactions. This study assessed the modification of soil bacterial community structure by organic or conventional cropping systems, weed species identity [Amaranthus retroflexus L. (redroot pigweed) or Avena fatua L. (wild oat)], and living or sterilized inoculum. Soil from eight paired USDA-certified organic and conventional farms in north-central Montana was used as living or autoclave-sterilized inoculant into steam-pasteurized potting soil, planted with Am. retroflexus or Av. fatua and grown for two consecutive 8-week periods to condition soil nutrients and biota. Subsequently, the V3-V4 regions of the microbial 16S rRNA gene were sequenced by Illumina MiSeq. Treatments clustered significantly, with living or sterilized inoculum being the strongest delineating factor, followed by organic or conventional cropping system, then individual farm. Living inoculum-treated soil had greater species richness and was more diverse than sterile inoculum-treated soil (observed OTUs, Chao, inverse Simpson, Shannon, P soil contained more Chloroflexi and Acidobacteria, while the sterile inoculum soil had more Bacteroidetes, Firmicutes, Gemmatimonadetes, and Verrucomicrobia. Organically farmed inoculum-treated soil had greater species richness, more diversity (observed OTUs, Chao, Shannon, P soil. Cyanobacteria were higher in pots growing Am. retroflexus, regardless of inoculum type, for three of the four organic farms. Results highlight the potential of cropping systems and species identity to modify soil bacterial communities, subsequently modifying plant growth and crop-weed competition.

  7. Belief change

    CSIR Research Space (South Africa)

    Booth, R

    2012-07-01

    Full Text Available In this paper the authors present a brief overview of belief change, a research area concerned with the question of how a rational agent ought to change its mind in the face of new, possibly conflicting, information. The authors limit themselves...

  8. The MNESIS model: Memory systems and processes, identity and future thinking.

    Science.gov (United States)

    Eustache, Francis; Viard, Armelle; Desgranges, Béatrice

    2016-07-01

    The Memory NEo-Structural Inter-Systemic model (MNESIS; Eustache and Desgranges, Neuropsychology Review, 2008) is a macromodel based on neuropsychological data which presents an interactive construction of memory systems and processes. Largely inspired by Tulving's SPI model, MNESIS puts the emphasis on the existence of different memory systems in humans and their reciprocal relations, adding new aspects, such as the episodic buffer proposed by Baddeley. The more integrative comprehension of brain dynamics offered by neuroimaging has contributed to rethinking the existence of memory systems. In the present article, we will argue that understanding the concept of memory by dividing it into systems at the functional level is still valid, but needs to be considered in the light of brain imaging. Here, we reinstate the importance of this division in different memory systems and illustrate, with neuroimaging findings, the links that operate between memory systems in response to task demands that constrain the brain dynamics. During a cognitive task, these memory systems interact transiently to rapidly assemble representations and mobilize functions to propose a flexible and adaptative response. We will concentrate on two memory systems, episodic and semantic memory, and their links with autobiographical memory. More precisely, we will focus on interactions between episodic and semantic memory systems in support of 1) self-identity in healthy aging and in brain pathologies and 2) the concept of the prospective brain during future projection. In conclusion, this MNESIS global framework may help to get a general representation of human memory and its brain implementation with its specific components which are in constant interaction during cognitive processes. Copyright © 2016 Elsevier Ltd. All rights reserved.

  9. Contributions from sociology of science to mathematics education in Brazil: logic as a system of beliefs

    Science.gov (United States)

    de Andrade, Thales Haddad Novaes; Vilela, Denise Silva

    2013-09-01

    In Brazil, mathematics education was associated with Jean Piaget's theory. Scholars in the field of education appropriated Piaget's work in different ways, but usually emphasized logical aspects of thought, which probably lead to an expansion of mathematics education influenced by psychology. This study attempts to extend the range of interlocutions and pose a dialogue between the field of mathematics education in Brazil and the sociology of science proposed by David Bloor. The main point of Bloor's theory is that logical-mathematical knowledge is far from being true and universal and is socially conditioned. In particular we will be discussing the first principle of the strong program, which deals with conditions that generate beliefs promoted by education policies in Brazil, such as the MEC/USAID treaties. In this case the "naturalization of logic" was stimulated by a widespread diffusion of both Piaget studies and the Modern Mathematics Movement.

  10. Emotion and decision-making: affect-driven belief systems in anxiety and depression.

    Science.gov (United States)

    Paulus, Martin P; Yu, Angela J

    2012-09-01

    Emotion processing and decision-making are integral aspects of daily life. However, our understanding of the interaction between these constructs is limited. In this review, we summarize theoretical approaches that link emotion and decision-making, and focus on research with anxious or depressed individuals to show how emotions can interfere with decision-making. We integrate the emotional framework based on valence and arousal with a Bayesian approach to decision-making in terms of probability and value processing. We discuss how studies of individuals with emotional dysfunctions provide evidence that alterations of decision-making can be viewed in terms of altered probability and value computation. We argue that the probabilistic representation of belief states in the context of partially observable Markov decision processes provides a useful approach to examine alterations in probability and value representation in individuals with anxiety and depression, and outline the broader implications of this approach. Copyright © 2012. Published by Elsevier Ltd.

  11. Emotion and decision-making: affect-driven belief systems in anxiety and depression

    Science.gov (United States)

    Paulus, Martin P.; Yu, Angela J.

    2012-01-01

    Emotion processing and decision-making are integral aspects of daily life. However, our understanding of the interaction between these constructs is limited. In this review, we summarize theoretical approaches to the link between emotion and decision-making, and focus on research with anxious or depressed individuals that reveals how emotions can interfere with decision-making. We integrate the emotional framework based on valence and arousal with a Bayesian approach to decision-making in terms of probability and value processing. We then discuss how studies of individuals with emotional dysfunctions provide evidence that alterations of decision-making can be viewed in terms of altered probability and value computation. We argue that the probabilistic representation of belief states in the context of partially observable Markov decision processes provides a useful approach to examine alterations in probability and value representation in individuals with anxiety and depression and outline the broader implications of this approach. PMID:22898207

  12. The role of the Pauli principle in three-cluster systems composed of identical clusters

    International Nuclear Information System (INIS)

    Lashko, Yu.A.; Filippov, G.F.

    2009-01-01

    Within the microscopic model based on the algebraic version of the resonating group method the role of the Pauli principle in the formation of continuum wave function of nuclear systems composed of three identical s-clusters has been investigated. Emphasis is placed upon the study of the exchange effects contained in the genuine three-cluster norm kernel. Three-fermion, three-boson, three-dineutron (3d ' ) and 3α systems are considered in detail. Simple analytical method of constructing the norm kernel for 3α system is suggested. The Pauli-allowed basis functions for the 3α and 3d ' systems are given in an explicit form and asymptotic behavior of these functions is established. Complete classification of the eigenfunctions and the eigenvalues of the 12 C norm kernel by the 8 Be=α+α eigenvalues has been given for the first time. Spectrum of the 12 C norm kernel is compared to that of the 5 H system.

  13. Environment and Urban Tourism: AN Emergent System in Rhetorical Place Identity Definitions

    Science.gov (United States)

    Mura, Marina

    Within the systemic framework of Environmental Psychology (Bechtel and Churchman, 2002) and following Urry (2002) and Pearce's approaches (2005), the aim of this research is to investigate within the context of urban tourism which world views emerge from a Discourse Analysis (Edwards, Potter, 1993). of the speech of native and non-native Sardinian residents. It addresses the issue of how social-physical diversity might be preserved (the problem of tourism sustainability, Di Castri, Balaji, 2002). In this regard, forty in-depth narrative interviews of inhabitants with short- and long-term residential experience in Cagliari (Italy) were conducted and examined (Discourse Analysis). It was found that the native and non-native's rhetorical devices expressed similar representations of urban places, but in diverse relationship to social and place identity. Their environmental transitions were based on the tourist gaze, or the functional view and heritage pride. This displays some basic central dimensions of sustainable tourism.

  14. Do attitudes toward societal structure predict beliefs about free will and achievement? Evidence from the Indian caste system.

    Science.gov (United States)

    Srinivasan, Mahesh; Dunham, Yarrow; Hicks, Catherine M; Barner, David

    2016-01-01

    Intuitive theories about the malleability of intellectual ability affect our motivation and achievement in life. But how are such theories shaped by the culture in which an individual is raised? We addressed this question by exploring how Indian children's and adults' attitudes toward the Hindu caste system--and its deterministic worldview--are related to differences in their intuitive theories. Strikingly, we found that, beginning at least in middle school and continuing into adulthood, individuals who placed more importance on caste were more likely to adopt deterministic intuitive theories. We also found a developmental change in the scope of this relationship, such that in children, caste attitudes were linked only to abstract beliefs about personal freedom, but that by adulthood, caste attitudes were also linked to beliefs about the potential achievement of members of different castes, personal intellectual ability, and personality attributes. These results are the first to directly relate the societal structure in which a person is raised to the specific intuitive theories they adopt. © 2015 John Wiley & Sons Ltd.

  15. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Directory of Open Access Journals (Sweden)

    Alexandra Rivero-García

    2017-03-01

    Full Text Available A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  16. Patients' Data Management System Protected by Identity-Based Authentication and Key Exchange.

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-03-31

    A secure and distributed framework for the management of patients' information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients' data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed.

  17. Patients’ Data Management System Protected by Identity-Based Authentication and Key Exchange

    Science.gov (United States)

    Rivero-García, Alexandra; Santos-González, Iván; Hernández-Goya, Candelaria; Caballero-Gil, Pino; Yung, Moti

    2017-01-01

    A secure and distributed framework for the management of patients’ information in emergency and hospitalization services is proposed here in order to seek improvements in efficiency and security in this important area. In particular, confidentiality protection, mutual authentication, and automatic identification of patients are provided. The proposed system is based on two types of devices: Near Field Communication (NFC) wristbands assigned to patients, and mobile devices assigned to medical staff. Two other main elements of the system are an intermediate server to manage the involved data, and a second server with a private key generator to define the information required to protect communications. An identity-based authentication and key exchange scheme is essential to provide confidential communication and mutual authentication between the medical staff and the private key generator through an intermediate server. The identification of patients is carried out through a keyed-hash message authentication code. Thanks to the combination of the aforementioned tools, a secure alternative mobile health (mHealth) scheme for managing patients’ data is defined for emergency and hospitalization services. Different parts of the proposed system have been implemented, including mobile application, intermediate server, private key generator and communication channels. Apart from that, several simulations have been performed, and, compared with the current system, significant improvements in efficiency have been observed. PMID:28362328

  18. Belief, hope and faith.

    Science.gov (United States)

    Figueiredo, Luis Claudio

    2004-12-01

    A case of hysteria is presented in order to create a frame of reference for the author's approach to the concepts of hope, belief and faith. A difference between hope as a 'sad passion' (which is here called regressive hope) and hope as a principle of mental functioning is established. The concept of hope will at first always be based on beliefs--either beliefs organised in the paranoid-schizoid position (called here fragmented and delusional beliefs)--or those organised from the depressive position (complex systems of beliefs, which end up being dogmatic); the latter typically occur in neurotics. It is suggested here that there is another possibility for hope, which is based on faith. The meaning of faith is considered here externally to the religious sense. The solid establishment of hope as a principle--based on faith--can be viewed as responsible for the opening up of creative potentials and as one of the main aims of analysis. Such an aim, however requires the establishment of a deep relationship, both in theory and in clinical practice, between the Kleinian question of the depressive position and the Freudian question of the Oedipus complex.

  19. Resolution of identity approximation for the Coulomb term in molecular and periodic systems

    Science.gov (United States)

    Burow, Asbjörn M.; Sierka, Marek; Mohamed, Fawzi

    2009-12-01

    A new formulation of resolution of identity approximation for the Coulomb term is presented, which uses atom-centered basis and auxiliary basis functions and treats molecular and periodic systems of any dimensionality on an equal footing. It relies on the decomposition of an auxiliary charge density into charged and chargeless components. Applying the Coulomb metric under periodic boundary conditions constrains the explicit form of the charged part. The chargeless component is determined variationally and converged Coulomb lattice sums needed for its determination are obtained using chargeless linear combinations of auxiliary basis functions. The lattice sums are partitioned in near- and far-field portions which are treated through an analytical integration scheme employing two- and three-center electron repulsion integrals and multipole expansions, respectively, operating exclusively in real space. Our preliminary implementation within the TURBOMOLE program package demonstrates consistent accuracy of the method across molecular and periodic systems. Using common auxiliary basis sets the errors of the approximation are small, in average about 20 μhartree per atom, for both molecular and periodic systems.

  20. Biodiversity Conservation through Traditional Beliefs System: A Case Study from Kumaon Himalayas, India

    Directory of Open Access Journals (Sweden)

    Harsh SINGH

    2012-03-01

    Full Text Available The present study was carried out in Malay Nath sacred grove of Kumaon Himalaya, India, in appreciation of its role in biodiversity conservation. The whole grove is dedicated to the local deity “Malay Nath”, and showing semi-temperate type vegetation of the region. Rituals and cultural beliefs of the local peoples of Kumaon are plays significant role in conserving biodiversity. The study aimed at the documentation and inventory of the sacred grove, its phytodiversity, threats and conservation in the Indian Himalayan of Kumaon region, and to this, systematic field surveys were conducted during 2007-2010 covering all four seasons viz., summer, rainy, winter and spring. A total of 64 species in 58 genera under 47 families were identified, of which 35 species are flowering plants and 29 species are non-flowering plants. The dominant family was Parmeliaceae of lichen which recorded the maximum 6 species. 35 plant species under 32 genera and 23 families are used as an ethno-medicinal and the information about the ethno-medicinal plants was gathered from knowledgeable elderly local peoples of the area. Hedychium spicatum, Bergenia ciliata, Origanum vulgare, Berberis asiatica, etc. are highly exploited species and need to be conserved.

  1. Quantum entanglement for systems of identical bosons: II. Spin squeezing and other entanglement tests

    International Nuclear Information System (INIS)

    Dalton, B J; Goold, J; Garraway, B M; Reid, M D

    2017-01-01

    These two accompanying papers are concerned with entanglement for systems of identical massive bosons and the relationship to spin squeezing and other quantum correlation effects. The main focus is on two mode entanglement, but multi-mode entanglement is also considered. The bosons may be atoms or molecules as in cold quantum gases. The previous paper I dealt with the general features of quantum entanglement and its specific definition in the case of systems of identical bosons. Entanglement is a property shared between two (or more) quantum sub-systems. In defining entanglement for systems of identical massive particles, it was concluded that the single particle states or modes are the most appropriate choice for sub-systems that are distinguishable, that the general quantum states must comply both with the symmetrization principle and the super-selection rules (SSR) that forbid quantum superpositions of states with differing total particle number (global SSR compliance). Further, it was concluded that (in the separable states) quantum superpositions of sub-system states with differing sub-system particle number (local SSR compliance) also do not occur. The present paper II determines possible tests for entanglement based on the treatment of entanglement set out in paper I. Several inequalities involving variances and mean values of operators have been previously proposed as tests for entanglement between two sub-systems. These inequalities generally involve mode annihilation and creation operators and include the inequalities that define spin squeezing. In this paper, spin squeezing criteria for two mode systems are examined, and spin squeezing is also considered for principle spin operator components where the covariance matrix is diagonal. The proof, which is based on our SSR compliant approach shows that the presence of spin squeezing in any one of the spin components requires entanglement of the relevant pair of modes. A simple Bloch vector test for

  2. Quantum entanglement for systems of identical bosons: II. Spin squeezing and other entanglement tests

    Science.gov (United States)

    Dalton, B. J.; Goold, J.; Garraway, B. M.; Reid, M. D.

    2017-02-01

    These two accompanying papers are concerned with entanglement for systems of identical massive bosons and the relationship to spin squeezing and other quantum correlation effects. The main focus is on two mode entanglement, but multi-mode entanglement is also considered. The bosons may be atoms or molecules as in cold quantum gases. The previous paper I dealt with the general features of quantum entanglement and its specific definition in the case of systems of identical bosons. Entanglement is a property shared between two (or more) quantum sub-systems. In defining entanglement for systems of identical massive particles, it was concluded that the single particle states or modes are the most appropriate choice for sub-systems that are distinguishable, that the general quantum states must comply both with the symmetrization principle and the super-selection rules (SSR) that forbid quantum superpositions of states with differing total particle number (global SSR compliance). Further, it was concluded that (in the separable states) quantum superpositions of sub-system states with differing sub-system particle number (local SSR compliance) also do not occur. The present paper II determines possible tests for entanglement based on the treatment of entanglement set out in paper I. Several inequalities involving variances and mean values of operators have been previously proposed as tests for entanglement between two sub-systems. These inequalities generally involve mode annihilation and creation operators and include the inequalities that define spin squeezing. In this paper, spin squeezing criteria for two mode systems are examined, and spin squeezing is also considered for principle spin operator components where the covariance matrix is diagonal. The proof, which is based on our SSR compliant approach shows that the presence of spin squeezing in any one of the spin components requires entanglement of the relevant pair of modes. A simple Bloch vector test for

  3. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations.

    Science.gov (United States)

    Iwry, Jonathan; Yaden, David B; Newberg, Andrew B

    2017-01-01

    As noninvasive brain stimulation (NIBS) technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive "enhancement." We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  4. Noninvasive Brain Stimulation and Personal Identity: Ethical Considerations

    Directory of Open Access Journals (Sweden)

    Jonathan Iwry

    2017-06-01

    Full Text Available As noninvasive brain stimulation (NIBS technology advances, these methods may become increasingly capable of influencing complex networks of mental functioning. We suggest that these might include cognitive and affective processes underlying personality and belief systems, which would raise important questions concerning personal identity and autonomy. We give particular attention to the relationship between personal identity and belief, emphasizing the importance of respecting users' personal values. We posit that research participants and patients should be encouraged to take an active approach to considering the personal implications of altering their own cognition, particularly in cases of neurocognitive “enhancement.” We suggest that efforts to encourage careful consideration through the informed consent process would contribute usefully to studies and treatments that use NIBS.

  5. Social Cognition and Democracy: The Relationship Between System Justification, Just World Beliefs, Authoritarianism, Need for Closure, and Need for Cognition in Hungary

    Directory of Open Access Journals (Sweden)

    László Kelemen

    2014-09-01

    Full Text Available This research was aimed at examining just-world beliefs, system justification, authoritarianism, and cognitive style in a nationally representative sample (N = 1000 in Hungary, and at relating these phenomena to various demographic and political variables to find out whether the findings in Hungary would differ from its Western counterparts. According to system justification theory, there is a psychological motive to defend and justify the status quo. This theory has been tested several times in North American and Western European samples. The core finding of our study was that Hungarian people, unlike people in Western democracies, did not justify the existing establishment. There was strong pessimism with regard to the idea that the system serves the interests of the people. Members of disadvantaged groups (people with low economic income and/or far right political preference strongly rejected the system. System justification beliefs were moderately related to just world beliefs, and there was a significant relationship between some aspects of need for closure (need for order, discomfort with ambiguity, and closed-mindedness and authoritarian beliefs. Need for cognition was only related to one aspect of need for closure: closed-mindedness. The voters of right-wing parties did not display higher levels of authoritarianism than the voters of the left social-democrat party. The role of demographic and political variables, limitations, and possible developments of this research are discussed.

  6. Social norms and cultural services - community belief system and use of wildlife products in the Northern periphery of the Korup National Park, South-West Cameroon

    Directory of Open Access Journals (Sweden)

    Ngoufo R

    2014-06-01

    Full Text Available In many traditional societies, beliefs and taboos influence human behaviour towards the natural environment. Such beliefs and taboos are informal institutions where norms rather than official laws determine land use and nature protection in general and wildlife in particular. The present study on beliefs and taboos of the people of the northern periphery of the Korup National Park is an attempt to reveal how norms influence their relation to the environment. A total of 195 households were sampled through a household survey conducted in four villages. The results revealed that before the application of “modern” approaches for wildlife protection and management, the people relied on norms to establish a relationship with wildlife and nature. The enactment of the 1994 legislation on forest, wildlife and fisheries resulted in stiff resistance as it contradicts traditional norms. It was found that 57.4 % of the respondents still perceive wildlife as a resource that can never get extinct. Traditional norms had a differentiated impact especially on game protection. The study recommends that a wildlife benefiting code of beliefs and taboos is developed to provide a basis for establishing a synergy between park management laws and traditional belief/taboo systems that drive the management of wildlife.

  7. Examining College Students' Social Environment, Normative Beliefs, and Attitudes in Subsequent Initiation of Electronic Nicotine Delivery Systems.

    Science.gov (United States)

    Agarwal, Deepti; Loukas, Alexandra; Perry, Cheryl L

    2017-11-01

    Although use of Electronic Nicotine Delivery Systems (ENDS) is increasingly prevalent among young adults, little is known about predictors of ENDS initiation among this population. We examined the roles of the social environment (i.e., peer ENDS use and household ENDS use), normative beliefs (i.e., social acceptability of ENDS use), and attitudes (i.e., inclination to date someone who uses ENDS) in prospectively predicting initiation of ENDS over a 1-year period among 18- to 29-year-old college students. Participants were 2,110 (18- to 29-year-old) students ( M = 20.27, SD = 2.17) from 24 colleges in Texas who participated in a three-wave online survey, with 6 months between each wave. All participants reported never using ENDS at baseline. A multivariable, multilevel logistic regression model, accounting for clustering of students within colleges, was used to assess if students' social environment, normative beliefs, and attitudes predicted subsequent initiation of ENDS up to 1 year later, adjusting for various sociodemographic factors and number of other tobacco products used. In all, 329 college students (16%) initiated ENDS within 1 year. Results from the logistic regression indicated that college students who were younger (18-24 years old), ever used other tobacco products, indicated a more dense peer network of ENDS users, and had a higher inclination to date someone who uses ENDS had higher odds of initiating ENDS than their peers. Preventing ENDS initiation should be included in college health promotion programs, which should highlight the roles of students' social environment and attitudes regarding ENDS use.

  8. Belief change

    CSIR Research Space (South Africa)

    Booth, R

    2011-08-01

    Full Text Available in the presence of Vacuity. 3.2 Partial meet theory contraction The preceding construction works equally well when B is taken to be a theory K. But in this case, since the input to contraction is a theory, we should expect the output to be a theory too... that is analogous to that of a belief set K in theory change. Intuitively, E is the ?current? set of expectations of the agent, and the plausible consequences of a sentence ? are those sentences ? for which ? |?? holds. The set of expectations E is not explicitly...

  9. Mapping the Identity of a Viewed Hand in the Motor System: Evidence from Stimulus-Response Compatibility

    Science.gov (United States)

    Vainio, Lari; Mustonen, Terhi

    2011-01-01

    Brain-imaging research has shown that a viewed acting hand is mapped to the observer's hand representation that corresponds with the identity of the hand. In contrast, behavioral research has suggested that rather than representing a seen hand in relation to one's own manual system, it is represented in relation to the midline of an imaginary…

  10. Separating Fact from Fiction: An Empirical Examination of Six Myths About Dissociative Identity Disorder.

    Science.gov (United States)

    Brand, Bethany L; Sar, Vedat; Stavropoulos, Pam; Krüger, Christa; Korzekwa, Marilyn; Martínez-Taboas, Alfonso; Middleton, Warwick

    2016-01-01

    Dissociative identity disorder (DID) is a complex, posttraumatic, developmental disorder for which we now, after four decades of research, have an authoritative research base, but a number of misconceptualizations and myths about the disorder remain, compromising both patient care and research. This article examines the empirical literature pertaining to recurrently expressed beliefs regarding DID: (1) belief that DID is a fad, (2) belief that DID is primarily diagnosed in North America by DID experts who overdiagnose the disorder, (3) belief that DID is rare, (4) belief that DID is an iatrogenic, rather than trauma-based, disorder, (5) belief that DID is the same entity as borderline personality disorder, and (6) belief that DID treatment is harmful to patients. The absence of research to substantiate these beliefs, as well as the existence of a body of research that refutes them, confirms their mythical status. Clinicians who accept these myths as facts are unlikely to carefully assess for dissociation. Accurate diagnoses are critical for appropriate treatment planning. If DID is not targeted in treatment, it does not appear to resolve. The myths we have highlighted may also impede research about DID. The cost of ignorance about DID is high not only for individual patients but for the whole support system in which they reside. Empirically derived knowledge about DID has replaced outdated myths. Vigorous dissemination of the knowledge base about this complex disorder is warranted.

  11. Preferred names, preferred pronouns, and gender identity in the electronic medical record and laboratory information system: Is pathology ready?

    Directory of Open Access Journals (Sweden)

    Katherine L Imborek

    2017-01-01

    Full Text Available Background: Electronic medical records (EMRs and laboratory information systems (LISs commonly utilize patient identifiers such as legal name, sex, medical record number, and date of birth. There have been recommendations from some EMR working groups (e.g., the World Professional Association for Transgender Health to include preferred name, pronoun preference, assigned sex at birth, and gender identity in the EMR. These practices are currently uncommon in the United States. There has been little published on the potential impact of these changes on pathology and LISs. Methods: We review the available literature and guidelines on the use of preferred name and gender identity on pathology, including data on changes in laboratory testing following gender transition treatments. We also describe pathology and clinical laboratory challenges in the implementation of preferred name at our institution. Results: Preferred name, pronoun preference, and gender identity have the most immediate impact on the areas of pathology with direct patient contact such as phlebotomy and transfusion medicine, both in terms of interaction with patients and policies for patient identification. Gender identity affects the regulation and policies within transfusion medicine including blood donor risk assessment and eligibility. There are limited studies on the impact of gender transition treatments on laboratory tests, but multiple studies have demonstrated complex changes in chemistry and hematology tests. A broader challenge is that, even as EMRs add functionality, pathology computer systems (e.g., LIS, middleware, reference laboratory, and outreach interfaces may not have functionality to store or display preferred name and gender identity. Conclusions: Implementation of preferred name, pronoun preference, and gender identity presents multiple challenges and opportunities for pathology.

  12. Hard Identity and Soft Identity

    Directory of Open Access Journals (Sweden)

    Hassan Rachik

    2006-04-01

    Full Text Available Often collective identities are classified depending on their contents and rarely depending on their forms. Differentiation between soft identity and hard identity is applied to diverse collective identities: religious, political, national, tribal ones, etc. This classification is made following the principal dimensions of collective identities: type of classification (univocal and exclusive or relative and contextual, the absence or presence of conflictsof loyalty, selective or totalitarian, objective or subjective conception, among others. The different characteristics analysed contribute to outlining an increasingly frequent type of identity: the authoritarian identity.

  13. A microfluidic platform for generating large-scale nearly identical human microphysiological system arrays

    Science.gov (United States)

    Hsu, Yu-Hsiang; Moya, Monica L.; Hughes, Christopher C.W.; Georgea, Steven C.; Lee, Abraham P.

    2013-01-01

    This paper reports a polydimethylsiloxane microfluidic model system that can develop an array of nearly identical human microtissues with interconnected vascular networks. The microfluidic system design is based on an analogy with an electric circuit, applying resistive circuit concepts to design pressure dividers in serially-connected microtissue chambers. A long microchannel (550, 620 and 775 mm) creates a resistive circuit with a large hydraulic resistance. Two media reservoirs with a large cross-sectional area and of different heights are connected to the entrance and exit of the long microchannel to serve as a pressure source, and create a near constant pressure drop along the long microchannel. Microtissue chambers (0.12 μl) serve as a two-terminal resistive component with an input impedance > 50-fold larger than the long microchannel. Connecting each microtissue chamber to two different positions along the long microchannel creates a series of pressure dividers. Each microtissue chamber enables a controlled pressure drop of a segment of the microchannel without altering the hydrodynamic behaviour of the microchannel. The result is a controlled and predictable microphysiological environment within the microchamber. Interstitial flow, a mechanical cue for stimulating vasculogenesis, was verified by finite element simulation and experiments. The simplicity of this design enabled the development of multiple microtissue arrays (5, 12, and 30 microtissues) by co-culturing endothelial cells, stromal cells, and fibrin within the microchambers over two and three week periods. This methodology enables the culturing of a large array of microtissues with interconnected vascular networks for biological studies and applications such as drug development. PMID:23723013

  14. Information and Heterogeneous Beliefs

    DEFF Research Database (Denmark)

    Christensen, Peter Ove; Qin, Zhenjiang

    2014-01-01

    In an incomplete market with heterogeneous prior beliefs, we show public information can have a substantial impact on the ex ante cost of capital, trading volume, and investor welfare. The Pareto effcient public information system is the system enjoying the maximum ex ante cost of capital...... and the maximum expected abnormal trading volume. Imperfect public information increases the gains-to-trade based on heterogeneously updated posterior beliefs. In an exchange economy, this leads to higher growth in the investors' certainty equivalents and, thus, a higher equilibrium interest rate, whereas the ex...... ante risk premium is unaffected by the informativeness of the public information system. Similar results are obtained in a production economy, but the impact on the ex ante cost of capital is dampened compared to the exchange economy due to welfare improving reductions in real investments to smooth...

  15. A Study on Quantitative Assessment of Design Specification of Reactor Protection System Software Using Bayesian Belief Networks

    International Nuclear Information System (INIS)

    Eom, H. S.; Kang, H. G.; Chang, S. C.; Park, G. Y.; Kwon, K. C.

    2007-02-01

    This report propose a method that can produce quantitative reliability of safety-critical software for PSA by making use of Bayesian Belief Networks (BBN). BBN has generally been used to model the uncertain system in many research fields. The proposed method was constructed by utilizing BBN that can combine the qualitative and the quantitative evidence relevant to the reliability of safety-critical software, and then can infer a conclusion in a formal and a quantitative way. A case study was also carried out with the proposed method to assess the quality of software design specification of safety-critical software that will be embedded in reactor protection system. The V and V results of the software were used as inputs for the BBN model. The calculation results of the BBN model showed that its conclusion is mostly equivalent to those of the V and V expert for a given input data set. The method and the results of the case study will be utilized in PSA of NPP. The method also can support the V and V expert's decision making process in controlling further V and V activities

  16. Beliefs and expectations of rural hospital practitioners towards a developing trauma system: A qualitative case study.

    Science.gov (United States)

    Adams, Ryan D F; Cole, Elaine; Brundage, Susan I; Morrison, Zoe; Jansen, Jan O

    2018-03-22

    An understanding of stakeholders' views is key to the successful development and operation of a rural trauma system. Scotland, which has large remote and rural areas, is currently implementing a national trauma system. The aim of this study was to identify key barriers and enablers to the development of an effective trauma system from the perspective of rural healthcare professionals. This is a qualitative study, which was conducted in rural general hospitals (RGH) in Scotland, from April to June 2017. We used an opportunistic sampling strategy to include hospital providers of rural trauma care across the region. Semi-structured interviews were conducted, recorded, and transcribed. Thematic analysis was used to identify and group participant perspectives on key barriers and enablers to the development of the new trauma system. We conducted 15 interviews with 18 participants in six RGHs. Study participants described barriers and enablers across three themes: 1) quality of care, 2) interfaces within the system and 3) interfaces with the wider healthcare system. For quality of care, enablers included confidence in basic trauma management, whilst a perceived lack of change from current management was seen as a barrier. The theme of interfaces within the system identified good interaction with other services and a single point of contact for referral as enablers. Perceived barriers included challenges in referring to tertiary care. The final theme of interfaces with the wider healthcare system included an improved transport system, increased audit resource and coordinated clinical training as enablers. Perceived barriers included a rural staffing crisis and problematic patient transfer to further care. This study provides insight into rural professionals' perceptions regarding the implementation of a trauma system in rural Scotland. Barriers included practical issues, such as retrieval, transfer and referral processes. Importantly, there is a degree of uncertainty

  17. For Better or Worse? System-Justifying Beliefs in Sixth-Grade Predict Trajectories of Self-Esteem and Behavior Across Early Adolescence.

    Science.gov (United States)

    Godfrey, Erin B; Santos, Carlos E; Burson, Esther

    2017-06-19

    Scholars call for more attention to how marginalization influences the development of low-income and racial/ethnic minority youth and emphasize the importance of youth's subjective perceptions of contexts. This study examines how beliefs about the fairness of the American system (system justification) in sixth grade influence trajectories of self-esteem and behavior among 257 early adolescents (average age 11.4) from a diverse, low-income, middle school in an urban southwestern city. System justification was associated with higher self-esteem, less delinquent behavior, and better classroom behavior in sixth grade but worse trajectories of these outcomes from sixth to eighth grade. These findings provide novel evidence that system-justifying beliefs undermine the well-being of marginalized youth and that early adolescence is a critical developmental period for this process. © 2017 The Authors. Child Development © 2017 Society for Research in Child Development, Inc.

  18. Segmented Spiral Waves and Anti-phase Synchronization in a Model System with Two Identical Time-Delayed Coupled Layers

    International Nuclear Information System (INIS)

    Yuan Guoyong; Yang Shiping; Wang Guangrui; Chen Shigang

    2008-01-01

    In this paper, we consider a model system with two identical time-delayed coupled layers. Synchronization and anti-phase synchronization are exhibited in the reactive system without diffusion term. New segmented spiral waves, which are constituted by many thin trips, are found in each layer of two identical time-delayed coupled layers, and are different from the segmented spiral waves in a water-in-oil aerosol sodium bis(2-ethylhexyl) sulfosuccinate (AOT) micro-emulsion (ME) (BZ-AOT system), which consists of many small segments. 'Anti-phase spiral wave synchronization' can be realized between the first layer and the second one. For different excitable parameters, we also give the minimum values of the coupling strength to generate segmented spiral waves and the tip orbits of spiral waves in the whole bilayer.

  19. Leadership identities

    DEFF Research Database (Denmark)

    Holmgreen, Lise-Lotte

    2018-01-01

    Questioning the assumption that identities can be controlled through a shared organisational culture, the article explores the inculcation of a discourse of diversity into leadership identities in a Danish bank and building society. Thus, it intends to demonstrate that, on the one hand, discourse...... plays a significant role in identity construction and, on the other, that leaders’ constructions may have many sources of inspiration within and outside the organisation, emphasising that identity construction is a complex process in which organisational efforts to promote a common leadership identity...... to construct their leadership identities. While the respondents present comparable identities to the interviewer, the analysis reveals that the they draw on different discourses and employ a number of different discursive means to present this identity. This, the article argues, may be the result of a number...

  20. Mixmaster: fact and belief

    International Nuclear Information System (INIS)

    Heinzle, J Mark; Uggla, Claes

    2009-01-01

    We consider the dynamics towards the initial singularity of Bianchi type IX vacuum and orthogonal perfect fluid models with a linear equation of state. Surprisingly few facts are known about the 'Mixmaster' dynamics of these models, while at the same time most of the commonly held beliefs are rather vague. In this paper, we use Mixmaster facts as a base to build an infrastructure that makes it possible to sharpen the main Mixmaster beliefs. We formulate explicit conjectures concerning (i) the past asymptotic states of type IX solutions and (ii) the relevance of the Mixmaster/Kasner map for generic past asymptotic dynamics. The evidence for the conjectures is based on a study of the stochastic properties of this map in conjunction with dynamical systems techniques. We use a dynamical systems formulation, since this approach has so far been the only successful path to obtain theorems, but we also make comparisons with the 'metric' and Hamiltonian 'billiard' approaches.

  1. On the fundamentals of identity

    NARCIS (Netherlands)

    van der Gaag, Mandy

    Various new perspectives on identity have been introduced or have increased in popularity over the past two decades. These include identity as dynamic system (Kunnen & Bosma, 2001), a narrative approach to identity (McAdams, 2001), multi-dimensional models of identity formation (Luyckx et al., 2006;

  2. Ternutator identities

    International Nuclear Information System (INIS)

    Devchand, Chandrashekar; Fairlie, David; Nuyts, Jean; Weingart, Gregor

    2009-01-01

    The ternary commutator or ternutator, defined as the alternating sum of the product of three operators, has recently drawn much attention as an interesting structure generalizing the commutator. The ternutator satisfies cubic identities analogous to the quadratic Jacobi identity for the commutator. We present various forms of these identities and discuss the possibility of using them to define ternary algebras.

  3. Modelling the effects of a CBRN defence system using a Bayesian Belief Model

    NARCIS (Netherlands)

    Phillipson, F.; Bastings, I.C.L.; Vink, N.

    2015-01-01

    In this paper a Bayes model to quantify the effects of a passive CBRN defence system is presented. The model gives insight in the way of the mutual influence of all the elements of passive CBRN defence, by the use of detailed scenario analysis, sensitivity analysis and root cause analysis. This can

  4. Unlimited Gender: The Discursive Construction of the Travesti Identity Through the Manipulation of the Grammatical Gender System

    Directory of Open Access Journals (Sweden)

    Rodrigo Borba

    2008-05-01

    Full Text Available This study investigates Southern Brazilian traveestis’ manipulation of the Portuguese grammatical gender system. During field work, it was verified that feminine forms are the preferred choice in the group. However, ideological and bodily tensions that surround travestis seem to force them to make use of masculine forms in specific discursive contexts. Travestis use masculine forms 1 to produce narratives about the time before their body modifications took place; 2 to report speech produced by others when talking about transvestites; 3 to talk about themselves within their family relationships; and 4 to distinguish themselves from ‘other’ travestis they do not identify with. Thus, the study shows how Southern Brazilian travestis use the Brazilian Portuguese grammatical gender system as a resource to manipulate their identities and the identities of the community they belong to.

  5. Affective Beliefs Influence the Experience of Eating Meat

    OpenAIRE

    Anderson, Eric C.; Barrett, Lisa Feldman

    2016-01-01

    People believe they experience the world objectively, but research continually demonstrates that beliefs influence perception. Emerging research indicates that beliefs influence the experience of eating. In three studies, we test whether beliefs about how animals are raised can influence the experience of eating meat. Samples of meat were paired with descriptions of animals raised on factory farms or raised on humane farms. Importantly, the meat samples in both conditions were identical. Howe...

  6. Belief Elicitation in Experiments

    DEFF Research Database (Denmark)

    Blanco, Mariana; Engelmann, Dirk; Koch, Alexander

    Belief elicitation in economics experiments usually relies on paying subjects according to the accuracy of stated beliefs in addition to payments for other decisions. Such incentives, however, allow risk-averse subjects to hedge with their stated beliefs against adverse outcomes of other decisions......-belief elicitation treatment using a financial investment frame, where hedging arguably would be most natural....

  7. Efficient Atomic One-Qubit Phase Gate Realized by a Cavity QED and Identical Atoms System

    International Nuclear Information System (INIS)

    He Yong; Jiang Nianquan

    2010-01-01

    We present a scheme to implement a one-qubit phase gate with a two-level atom crossing an optical cavity in which some identical atoms are trapped. One can conveniently acquire an arbitrary phase shift of the gate by properly choosing the number of atoms trapped in the cavity and the velocity of the atom crossing the cavity. The present scheme provides a very simple and efficient way for implementing one-qubit phase gate. (general)

  8. On correlation comparison of identical pions in different systems of reference

    International Nuclear Information System (INIS)

    Podgoretskij, M.I.

    1983-01-01

    It is shown that a comparison of correlations of identical pions in reference frames moving with different velocities along the reaction axis enables one to select the frame for which there is a kinematical symmetry in the multiple generation process. The indicated possibility is due to the fact that in the considered symmetrical frame the space-time parameters R and tau are extremal. An experimental selection of the ''symmetrical frame'' may be useful in the choice between competing models of multiple generation

  9. Exploring medical identity theft.

    Science.gov (United States)

    Mancilla, Desla; Moczygemba, Jackie

    2009-09-16

    The crime of medical identity theft is a growing concern in healthcare institutions. A mixed-method study design including a two-stage electronic survey, telephone survey follow-up, and on-site observations was used to evaluate current practices in admitting and registration departments to reduce the occurrence of medical identity theft. Survey participants were chief compliance officers in acute healthcare organizations and members of the Health Care Compliance Association. Study results indicate variance in whether or how patient identity is confirmed in healthcare settings. The findings of this study suggest that information systems need to be designed for more efficient identity management. Admitting and registration staff must be trained, and compliance with medical identity theft policies and procedures must be monitored. Finally, biometric identity management solutions should be considered for stronger patient identification verification.

  10. Experiencing with Identity

    DEFF Research Database (Denmark)

    Pors, Justine Grønbæk

    2012-01-01

    This article studies how a political organization begins to experiment with its identity. By use of an empirical case of the Danish Ministry of Education, I examine how a political organization supplements its identity of a legislating power with identities of a supervisor, beacon and facilitator...... of evaluation in public schools. Out of a paralysis emerge new innovative strategies of governing, aimed at the schools’ self-governing capacity. The identity of the political system thus emerges as oscillations between different roles of a legislating power and a supervising coach. The case study suggests...... that a society of experimentalism is emerging. Thus, the relevant object of study is no longer organizational identity, but the experiments with different identities that modern organizations are performing....

  11. Identity paradoxes

    Directory of Open Access Journals (Sweden)

    Đurić Jelena

    2010-01-01

    Full Text Available The article considers paradoxical nature of identity that emerges from: 1 the very concept of identity whose abstract generality unites various and even opposite features; 2 the processual nature of reality that is easier to express in the poetical metaphors or abstract principles than in unambiguous conceptual networks; 3 the oppose relationship between being and knowledge, mind and matter, subject and object, self and personality. Entangled in the labyrinth which evade efforts to be conceptually defined, the modern thinking of identity moves towards abandoning the idea of “self” on behalf of the “ego” and towards the misapprehension of identity as being identical. This corresponds to the “time of the lost spirit” stretched between the simultaneous need to find an identity and to give it up.

  12. Evolution of Religious Beliefs

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    Humans may be distinguished from all other animals in having beliefs about the causal interaction of physical objects. Causal beliefs are a developmental primitive in human children; animals, by contrast, have very few causal beliefs. The origin of human causal beliefs comes from the evolutionary advantage it gave in relation to complex tool making and use. Causal beliefs gave rise religion and mystical thinking as our ancestors wanted to know the causes of events that affected their lives.

  13. Identity Management

    Data.gov (United States)

    Social Security Administration — Provides information for identity management services on the creation, modification and eventual deletion of accounts and entitlements based on user relationships on...

  14. Identity Assemblages

    DEFF Research Database (Denmark)

    Horn, Line Helverskov

    The study aims at exploring how identity is enacted within the context of a two-year programme in Service, Hospitality, and Tourism Management (SHTM). This research thus investigates how students and educators go about their daily lives in different educational contexts both on and off campus...... as a contribution to the body of literature of ANT-based studies. Second, it contributes to existing identity theories by exemplifying a socio-material approach to identity issues. Third, the study enables reflections upon how educational institutions as fundamentally identity-producing organisations acknowledge...

  15. Civil Identity

    DEFF Research Database (Denmark)

    Petersen, Lars Axel

    In this paper I will go through a catalogue of examples of contexts in which the term civil identity is currently used, ranging from the formal and technical process of linking a set of administrative and other events to an individual biological person by means of identity cards, fingerprints, iris...... of Israel to Luce Irigaray's Feminist agenda of elaborating gender specific civil identities. My intention is to investigate whether these different employments of 'civil identity' point towards a common, and fairly well defined object field asking questions of contemporary relevance to the philosophy...

  16. Corporate Brand Identity in SMEs

    DEFF Research Database (Denmark)

    Mäläskä, Minna; Jones, Richard Ian

    Purpose: To study the emergence of corporate brand identity in SMEs and to develop a typology of brand identity drivers that reflects a co-creative approach to the emergence of brand identity. Design / Methodology / Approach : Existing approaches to brand identity are summarised. A narrative...... studies. The research is important since it suggests an iterative and co-creative approach to brand identity. A typology of brand identity formation for SMEs is presented: entrepreneur driven, market driven, stakeholder driven. Practical implications: The three paths to creating a strong brand identity...... challenge existing notions that brand identity is based solely on the values of the entrepreneur. This typology suggests that SMEs should be open to creating an identity that draws from their stakeholder eco-system. Originality / value: this research challenges the existing assumption that brand identity...

  17. Influencing factors in the health promoting behaviors of Urinary system based on health belief model in pregnant women in Bushehr 2013-14

    Directory of Open Access Journals (Sweden)

    Farzaneh Noroozi

    2015-07-01

    Full Text Available Background: Urinary tract infection is the second most common complication of pregnancy that will follow with maternal and fetal complications. The aim of this study was to identify factors affecting the urinary system health promoting behaviors in pregnant women based on the health belief model. Materials and methods: The present study is a descriptive - analytic study was performed on 250 pregnant women referred to health centers of Bushehr. The tools for collecting information was a multi sectional questionnaire consisting of demographic information, measurement of urinary system health behavior, knowledge and health belief model constructs, which its validity and reliability were ensured previously. Data analysis was performed with SPSS version 20 by using correlation coefficient and linear regression tests. Results: The mean age of subjects 27/4±4/4 years.The relationship between demographic variables and health behavior wasn’t found. The most people (179 equivalents to 71/6% had medium level of knowledge about urinary tract infection, and only 44 women (17.6% had appropriate awareness. Mean score of preventive behaviors was significant difference between different levels of knowledge (p =0/026, self efficacy (p=0/000 and perceived barriers (p=0/002. In multivariate ANOVA, only the self efficacy had strong positive relationship with the preventing behaviors of urinary tract infection (p=0/000. Conclusion: Based on these results, the necessity of education based on health belief model with an emphasis on increasing the efficacy is necessary.

  18. Implementation of an RBF neural network on embedded systems: real-time face tracking and identity verification.

    Science.gov (United States)

    Yang, Fan; Paindavoine, M

    2003-01-01

    This paper describes a real time vision system that allows us to localize faces in video sequences and verify their identity. These processes are image processing techniques based on the radial basis function (RBF) neural network approach. The robustness of this system has been evaluated quantitatively on eight video sequences. We have adapted our model for an application of face recognition using the Olivetti Research Laboratory (ORL), Cambridge, UK, database so as to compare the performance against other systems. We also describe three hardware implementations of our model on embedded systems based on the field programmable gate array (FPGA), zero instruction set computer (ZISC) chips, and digital signal processor (DSP) TMS320C62, respectively. We analyze the algorithm complexity and present results of hardware implementations in terms of the resources used and processing speed. The success rates of face tracking and identity verification are 92% (FPGA), 85% (ZISC), and 98.2% (DSP), respectively. For the three embedded systems, the processing speeds for images size of 288 /spl times/ 352 are 14 images/s, 25 images/s, and 4.8 images/s, respectively.

  19. The Effect of Content Representation Design Principles on Users' Intuitive Beliefs and Use of E-Learning Systems

    Science.gov (United States)

    Al-Samarraie, Hosam; Selim, Hassan; Zaqout, Fahed

    2016-01-01

    A model is proposed to assess the effect of different content representation design principles on learners' intuitive beliefs about using e-learning. We hypothesized that the impact of the representation of course contents is mediated by the design principles of alignment, quantity, clarity, simplicity, and affordance, which influence the…

  20. Flower Iridescence Increases Object Detection in the Insect Visual System without Compromising Object Identity.

    Science.gov (United States)

    Whitney, Heather M; Reed, Alison; Rands, Sean A; Chittka, Lars; Glover, Beverley J

    2016-03-21

    Iridescence is a form of structural coloration, produced by a range of structures, in which hue is dependent on viewing angle [1-4]. One of these structures, the diffraction grating, is found both in animals (for example, beetles [2]) and in plants (on the petals of some animal pollinated flowers [5]). The behavioral impacts of floral iridescence and its potential ecological significance are unknown [6-9]. Animal-pollinated flowers are described as "sensory billboards" [10], with many floral features contributing to a conspicuous display that filters prospective pollinators. Yet floral iridescence is more subtle to the human eye than that of many animal displays because the floral diffraction grating is not perfectly regular [5-9]. This presents a puzzle: if the function of petals is to attract pollinators, then flowers might be expected to optimize iridescence to increase showiness. On the other hand, pollinators memorize floral colors as consistent advertisements of reward quality, and iridescence might corrupt flower color identity. Here we tested the trade-off between flower detectability and recognition, requiring bumblebees (Bombus terrestris) to identify artificial flowers that varied in pigmentation and degree of iridescence. We find that iridescence does increase target detectability but that "perfect" iridescence (produced by an artificial diffraction grating) corrupts target identity and bees make many mistakes. However, "imperfect" floral iridescence does not lead to mistaken target identity, while still benefitting flower detectability. We hypothesize that similar trade-offs might be found in the many naturally "imperfect" iridescence-producing structures found in animal-animal, as well as other plant-animal, interactions. Copyright © 2016 The Authors. Published by Elsevier Ltd.. All rights reserved.

  1. Assimilating South African medical students trained in Cuba into the South African medical education system: reflections from an identity perspective

    Directory of Open Access Journals (Sweden)

    B. M. Donda

    2016-10-01

    Full Text Available Abstract Background In terms of the Nelson Mandela Fidel Castro Medical Collaboration programme, an agreement between the governments of South Africa and Cuba, cohorts of South African students receive their initial five years medical training at a Cuban university before returning to South Africa for a six to twelve months orientation before integration into the local final year class. It is common for these students to experience academic difficulty on their return. Frequently this is viewed merely as a matter of a knowledge deficit. Discussion We argue that the problem arises from a fundamental divergence in the outcomes of the Cuban and South African medical curricula, each of which is designed with a particular healthcare system in mind. Using the discrepancy theory of identity proposed by Higgins in 1987, we discuss the challenges experienced by the returning Nelson Mandela Fidel Castro Medical Collaboration students in terms of a potential crisis of identity and suggest interventions which may prove valuable in promoting academic success and successful integration. Conclusions Though providing additional training to address the gap in skills and knowledge in returning students is an important part of their successful reintegration, this could be insufficient on its own and must be complemented by a range of measures designed to ameliorate the discrepancies in identity which arise from the transition from one educational model to another.

  2. Assimilating South African medical students trained in Cuba into the South African medical education system: reflections from an identity perspective.

    Science.gov (United States)

    Donda, B M; Hift, R J; Singaram, V S

    2016-10-24

    In terms of the Nelson Mandela Fidel Castro Medical Collaboration programme, an agreement between the governments of South Africa and Cuba, cohorts of South African students receive their initial five years medical training at a Cuban university before returning to South Africa for a six to twelve months orientation before integration into the local final year class. It is common for these students to experience academic difficulty on their return. Frequently this is viewed merely as a matter of a knowledge deficit. We argue that the problem arises from a fundamental divergence in the outcomes of the Cuban and South African medical curricula, each of which is designed with a particular healthcare system in mind. Using the discrepancy theory of identity proposed by Higgins in 1987, we discuss the challenges experienced by the returning Nelson Mandela Fidel Castro Medical Collaboration students in terms of a potential crisis of identity and suggest interventions which may prove valuable in promoting academic success and successful integration. Though providing additional training to address the gap in skills and knowledge in returning students is an important part of their successful reintegration, this could be insufficient on its own and must be complemented by a range of measures designed to ameliorate the discrepancies in identity which arise from the transition from one educational model to another.

  3. Nursing's orphans: how the system of nursing education in Australia is undermining professional identity.

    Science.gov (United States)

    Madsen, Wendy; McAllister, Margaret; Godden, Judith; Greenhill, Jennene; Reed, Rachel

    2009-01-01

    This paper draws on the results of a national study of approaches to teaching nursing's history in Australia. We argue that the neglect of history learning within undergraduate nursing and midwifery education is undermining the development in students of a strong professional nursing identity. The data in our study shows that instead of proud, informed professionals, we are at risk of producing a generation of professional orphans -- unaware of who they are and where they've come from, unaware of reasons underlying cultural practices within the profession, lacking in vision for the future, insecure about their capacity to contribute to future directions, and not feeling part of something bigger and more enduring.

  4. Bridging Identities

    Science.gov (United States)

    Deaux, Kay; Burke, Peter

    2010-01-01

    Sociology and psychology are no strangers in the theoretical world of self and identity. Early works by William James (1890), a psychologist, and George Herbert Mead (1934), a sociologist, are often taken as a starting point by investigators in both fields. In more recent years, with the development of a number of identity theories in both fields,…

  5. Brand Identity.

    Science.gov (United States)

    Lawlor, John

    1998-01-01

    Instead of differentiating themselves by building "brand identities," colleges and universities often focus on competing with price. As a result, fewer and fewer institutions base their identities on value, the combination of quality and price. Methods of building two concepts to influence customers' brand image and brand loyalty are…

  6. Ritual Identity

    NARCIS (Netherlands)

    van der Beek, Suzanne

    2017-01-01

    Rituals are often used as opportunities for self-reflection and identity construction. The Camino to Santiago de Compostela, which has become a singularly popular pilgrimage since the late 1980s, is an example of a ritual that is explicitly used to gain a deeper understanding of one’s identity

  7. Organizational Identity

    DEFF Research Database (Denmark)

    Hatch, Mary Jo; Schultz, Majken

    This text presents the classic works on organizational identity alongside more current thinking on the issues. Ranging from theoretical contributions to empirical studies, the readings in this volume address the key issues of organizational identity, and show how these issues have developed through...

  8. Challenging Identities

    DEFF Research Database (Denmark)

    Identity is a keyword in a number of academic fields as well as in public debate and in politics. During the last decades, references to identity have proliferated, yet there is no simple definition available that corresponds to the use of the notion in all contexts. The significance of the notion...

  9. Self-identity as a construct

    DEFF Research Database (Denmark)

    Sudzina, Frantisek

    Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior that is consis......Self-identity is a private assessment of one’s beliefs and values. The self is an active agent in the decision process that drives people to act in accordance with the behavior that they see appropriate for themselves. According to Triandis, one’s self-definition motivates behavior...... that is consistent with that definition. Self-identity has been shown to influence the acceptance and use of technology. Prior research has shown that self-identity includes the factors of innovativeness, tech savviness, and opinion leadership. The aim of the research is to test the self-identity construct...

  10. Biometrics, e-identity, and the balance between security and privacy: case study of the passenger name record (PNR) system.

    Science.gov (United States)

    Nouskalis, G

    2011-03-01

    The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces) can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR) system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of "war" against the so-called unlawful combatants of the "enemy". Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, "ECHR"). According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  11. Biometrics, e-Identity, and the Balance between Security and Privacy: Case Study of the Passenger Name Record (PNR System

    Directory of Open Access Journals (Sweden)

    G. Nouskalis

    2011-01-01

    Full Text Available The implementation of biometrics entails either the establishment of an identity or tracing a person's identity. Biometric passport data (e.g., irises, fingers, faces can be used in order to verify a passenger's identity. The proposed Passenger Name Record (PNR system contains all the information necessary to enable reservations to be processed and controlled by the booking and participating air carriers for each journey booked by or on behalf of any person. PNR data are related to travel movements, usually flights, and include passport data, name, address, telephone numbers, travel agent, credit card number, history of changes in the flight schedule, seat preferences, and other information. In the aftermath of the September 11 attacks, a new emergency political-law status of society was established: the continuous state of “war” against the so-called unlawful combatants of the “enemy”. Officially, the enemy is the terrorists, but the victims of the privacy invasions caused by the above new form of data processing are the civilians. The data processing based on biometrics is covered both by Directive 95/46 EC and Article 8 of the Convention on the Protection of Human Rights and Fundamental Freedoms (now the European Convention on Human Rights, “ECHR”. According to Article 2, Paragraph a of the above Directive, personal data shall mean any information relating to an identified or identifiable natural person; an identifiable person is one who can be identified, directly or indirectly, in particular by reference to an identification number or to one or more factors specific to his/her physical, physiological, mental, economic, cultural, or social identity.

  12. Fashioning Identity

    DEFF Research Database (Denmark)

    Mackinney-Valentin, Maria

    We dress to communicate who we are, or who we would like others to think we are, telling seductive fashion narratives through our adornment. Yet, today, fashion has been democratized through high-low collaborations, social media and real-time fashion mediation, complicating the basic dynamic...... of identity displays, and creating tension between personal statements and social performances. Fashioning Identity explores how this tension is performed through fashion production and consumption,by examining a diverse series of case studies - from ninety-year old fashion icons to the paradoxical rebellion...... by readdressing Fred Davis' seminal concept of 'identity ambivalence' in Fashion, Culture and Identity (1992), Mackinney-Valentin argues that we are in an epoch of 'status ambivalence', in which fashioning one's own identity has become increasingly complicated....

  13. Are essentialist beliefs associated with prejudice?

    Science.gov (United States)

    Haslam, Nick; Rothschild, Louis; Ernst, Donald

    2002-03-01

    Gordon Allport (1954) proposed that belief in group essences is one aspect of the prejudiced personality, alongside a rigid, dichotomous and ambiguity-intolerant cognitive style. We examined whether essentialist beliefs-beliefs that a social category has a fixed, inherent, identity-defining nature-are indeed associated in this fashion with prejudice towards black people, women and gay men. Allport's claim, which is mirrored by many contemporary social theorists, received partial support but had to be qualified in important respects. Essence-related beliefs were associated strongly with anti-gay attitudes but only weakly with sexism and racism, and they did not reflect a cognitive style that was consistent across stigmatized categories. When associations with prejudice were obtained, only a few specific beliefs were involved, and some anti-essentialist beliefs were associated with anti-gay attitudes. Nevertheless, the powerful association that essence-related beliefs had with anti-gay attitudes was independent of established prejudice-related traits, indicating that they have a significant role to play in the psychology of prejudice.

  14. Disturbance observer-based adaptive sliding mode hybrid projective synchronisation of identical fractional-order financial systems

    Science.gov (United States)

    Khan, Ayub; Tyagi, Arti

    2018-05-01

    In this paper, we have studied the hybrid projective synchronisation for incommensurate, integer and commensurate fractional-order financial systems with unknown disturbance. To tackle the problem of unknown bounded disturbance, fractional-order disturbance observer is designed to approximate the unknown disturbance. Further, we have introduced simple sliding mode surface and designed adaptive sliding mode controllers incorporating with the designed fractional-order disturbance observer to achieve a bounded hybrid projective synchronisation between two identical fractional-order financial model with different initial conditions. It is shown that the slave system with disturbance can be synchronised with the projection of the master system generated through state transformation. Simulation results are presented to ensure the validity and effectiveness of the proposed sliding mode control scheme in the presence of external bounded unknown disturbance. Also, synchronisation error for commensurate, integer and incommensurate fractional-order financial systems is studied in numerical simulation.

  15. Discourse versus practice: are traditional practices and beliefs in pregnancy and childbirth included or excluded in the Ecuadorian health care system?

    Science.gov (United States)

    Gallegos, Carlos Andres; Waters, William F; Kuhlmann, Anne Sebert

    2017-03-01

    Traditional beliefs, knowledge and practices are formally integrated into the Ecuadorian health system. We sought to understand whether they are integrated in practice. Qualitative data were collected in two rural parishes in the central highlands of Ecuador through four focus group discussions (30 participants), eight key informant interviews, three participatory exercises (24 participants), structured observations of health facilities and analysis of official documents. We found different levels of integration, coexistence, tolerance, and intolerance of traditional health beliefs and practices in health facilities. One parish has undergone dramatic social and cultural transformation, and the role of traditional birth attendants is limited. In the other parish, traditional indigenous norms and values persist, and traditional birth attendants are sought during pregnancy and childbirth. The degree to which traditional birth attendants, indigenous women and their families are included or excluded from public health services depends largely on decisions taken by local health professionals. Formal policies in Ecuador stipulate that health care should be intercultural, but the role of traditional birth attendants is not necessarily incorporated in practice. The integration of culturally-informed beliefs and practices is critical for providing appropriate health services to members of vulnerable populations. © The Author 2016. Published by Oxford University Press on behalf of Royal Society of Tropical Medicine and Hygiene. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Between Mediation and Mediatisation: Identity Dynamics at Play in Online Self-Publishing [Self-Broadcasting] Systems

    Directory of Open Access Journals (Sweden)

    Anabelle KLEIN

    2010-01-01

    Full Text Available Based on research conducted in Belgium for ten years on the identity dynamics within online self-publishing, self-broadcasting systems, this paper examines the extent to which the ongoing age of self-publishing follows a twofold logic of Self-Mediation and Self-Mediatization. After proposing a specific definition of the latter two concepts, the concept of “extimacy” will be implemented to shed light on the dynamics of Self-Mediation and Self-Mediatisation.

  17. 'It's like taking poison to kill poison but I have to get better': a qualitative study of beliefs about medicines in Rheumatoid arthritis and Systemic lupus erythematosus patients of South Asian origin.

    Science.gov (United States)

    Kumar, K; Gordon, C; Barry, R; Shaw, K; Horne, R; Raza, K

    2011-07-01

    To investigate factors that influence beliefs about medicines in patients of South Asian origin with rheumatoid arthritis (RA) and systemic lupus erythematosus (SLE). Qualitative methodology was used to explore the health beliefs of South Asian patients and in particular the factors that influenced their beliefs about medicines and disease modifying anti-rheumatic drugs (DMARDs). Thirty two patients with RA and SLE took part in focus group discussions. Patients who chose to participate in focus groups conducted in English were compared with those who chose to participate groups conducted in Punjabi or Urdu. Three main themes emerged to explain patients beliefs about medicines: (1) Beliefs about the necessity of DMARDs; (2) Concerns about DMARDs and other prescribed medicines including: (a) long-term side-effects; (b) the apparent lack of efficacy of some therapies; (c) concerns about changing from one drug to another and the large numbers of different medicines being taken; (3) Contextual factors which informed the patient's view on the necessity for particular medicines and concerns about them including: (a) beliefs about the causes of disease and the influence of religious beliefs on this; (b) barriers to communication with health care professionals about the medications being prescribed in clinic. In addition, our data revealed that these beliefs about DMARDs had important consequences for patient behaviour, including the use of traditional dietary and other non-pharmacological approaches. There were differences in views expressed between those who chose to speak in English and those who did not. This study has identified themes that explain previous findings of negative beliefs about medicines in patients of South Asian origin. Beliefs about the causes of disease had an important impact on the way some patients viewed medicines for RA and SLE. This will have implications for educational programmes designed to promote patient involvement in disease management.

  18. THE CONSTRUCTION AND CONTESTATION OF ISLAMIC IDENTITY OF THE BAJO PEOPLE IN WAKATOBI ISLANDS, SOUTH EAST SULAWESI, INDONESIA

    Directory of Open Access Journals (Sweden)

    Benny Baskara

    2014-02-01

    Full Text Available On the one one hand, the Bajo people are well-known as ‘the sea people’ who have their own indigenous belief systembelief in the Lord of the Sea. On the other hand, they also acknowledge themselves as Muslims. Thus, the religious identity of the Bajo people reflects a unique combination of Islamic teachings and their indigenous beliefs. This unique combination is not only expressed in their religious life, in their rituals and worship practices, but also in the values found in their customary practices (adat as a guiding system for their life. This paper examines the construction and contestation of the religious identity of the Bajo people, especially how they construct their identities in relation to their natural, social, and religious environments. The contestation of the Bajo religious identity covers three aspects: the contestation of the Islam of ‘the sea people’ against the Islam of ‘the land people’, the contenstation of the ‘official’ Islam against the ‘traditional’ Islam, and the challenges of modernity, especially the commodification of the Bajo religious expressions. This contestation, in turn, reconstructs their religious identity into a more adaptive one.

  19. Identity Management

    CERN Document Server

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with its implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user’s privacy when completed traceability is enforced and some examples on how identity management has been implemented at CERN

  20. Identity management

    Energy Technology Data Exchange (ETDEWEB)

    Pace, A [CERN, Geneva (Switzerland)

    2008-07-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN.

  1. Identity management

    International Nuclear Information System (INIS)

    Pace, A

    2008-01-01

    This paper introduces identity management concepts and discusses various issues associated with their implementation. It will try to highlight technical, legal, and social aspects that must been foreseen when defining the numerous processes that an identity management infrastructure must support. Grid interoperability as well as cross platform interoperability is addressed on the technical aspect, followed by a short discussion on social consequences on user's privacy when completed traceability is enforced. The paper will finally give some examples on how identity management has been implemented at CERN

  2. Electronic identity

    CERN Document Server

    de Andrade, Norberto Nuno Gomes; Argles, David

    2014-01-01

    With the increasing availability of electronic services, security and a reliable means by which identity is verified is essential.Written by Norberto Andrade the first chapter of this book provides an overview of the main legal and regulatory aspects regarding electronic identity in Europe and assesses the importance of electronic identity for administration (public), business (private) and, above all, citizens. It also highlights the role of eID as a key enabler of the economy.In the second chapter Lisha Chen-Wilson, David Argles, Michele Schiano di Zenise and Gary Wills discuss the user-cent

  3. Bayesian Belief Networks (BBN) and Expert Systems for supporting model based sensor fault detection analysis of smart building systems

    NARCIS (Netherlands)

    Schagen, J.D.; Taal, A.; Itard, L.C.M.; Heiselberg, Per Kvols

    2016-01-01

    The Hague University in Delft uses an advanced climate control system. All sensors and actuators are monitored and deviations from the sensor data are reported daily. The building manager will have to combine the information from the sensor data in order to draw the right conclusions. In this paper,

  4. The Origins of Belief Representation: Monkeys Fail to Automatically Represent Others’ Beliefs

    Science.gov (United States)

    Martin, Alia; Santos, Laurie R.

    2014-01-01

    Young infants’ successful performance on false belief tasks has led several researchers to argue that there may be a core knowledge system for representing the beliefs of other agents, emerging early in human development and constraining automatic belief processing into adulthood. One way to investigate this purported core belief representation system is to examine whether non-human primates share such a system. Although non-human primates have historically performed poorly on false belief tasks that require executive function capacities, little work has explored how primates perform on more automatic measures of belief processing. To get at this issue, we modified Kovács et al. (2010)’s test of automatic belief representation to examine whether one non-human primate species—the rhesus macaque (Macaca mulatta)—is automatically influenced by another agent’s beliefs when tracking an object’s location. Monkeys saw an event in which a human agent watched an apple move back and forth between two boxes and an outcome in which one box was revealed to be empty. By occluding segments of the apple’s movement from either the monkey or the agent, we manipulated both the monkeys’ belief (true or false) and agent’s belief (true or false) about the final location of the apple. We found that monkeys looked longer at events that violated their own beliefs than at events that were consistent with their beliefs. In contrast to human infants, however, monkeys’ expectations were not influenced by another agent’s beliefs, suggesting that belief representation may be an aspect of core knowledge unique to humans. PMID:24374209

  5. Availability of K-out-of-N:G systems with non-identical components subject to repair priorities

    International Nuclear Information System (INIS)

    Khatab, A.; Nahas, N.; Nourelfath, M.

    2009-01-01

    In this paper, a K-out-of-N:G system with N categories of components is studied. Each component category is characterized by its own failure and repair rates. There are R repair facilities, and repair priorities are specified between the N non-identical components. An algorithm for automatic construction of the system state transition diagram is presented. The stationary availability of each component and that of the system are evaluated by using a multi-dimensional Markov model. We show how this model can be represented as a network of stochastic automata with state-dependent transitions that can be implemented via generalized tensor (or Kronecker) algebra. For the efficiency assessment, an analog Monte Carlo simulation model is developed. Experiments are then conducted and simulation results are compared to those obtained by the proposed approach

  6. Spacing Identity

    DEFF Research Database (Denmark)

    Stang Våland, Marianne; Georg, Susse

    2018-01-01

    In this paper, we analyze how architectural design, and the spatial and material changes this involves, contributes to the continuous shaping of identities in an organization. Based upon a case study of organizational and architectural change in a municipal administration at a time of major public...... sector reforms, we examine how design interventions were used to (re)form work and professional relationships. The paper examines how engagements with spatial arrangements and material artifacts affected people’s sense of both occupational and organizational identity. Taking a relational approach...... to sociomateriality, the paper contributes to the further theorizing of space in organization studies by proposing the concept of spacing identity to capture the fluidity of identity performance....

  7. Teacher participation in facilitating beliefs and values in life ...

    African Journals Online (AJOL)

    Teacher participation in facilitating beliefs and values in life orientation programmes: ... strategies of belief and value orientations in a multicultural education system. ... and religious backgrounds of learners represented in participating schools.

  8. Oltenia’s identity – A systemic approach of a tourism destination’s universe

    Directory of Open Access Journals (Sweden)

    Aurelia-Felicia STĂNCIOIU

    2013-07-01

    Full Text Available The multitude of tourism products, “constructed” with a basis containing the resources of a tourism destination, on the one hand, and from the anticipation of the tourists’ needs and desires, on the other hand, is “hosted” in a complex space, which transcends the spatial and temporal coordinates. Therefore, it is necessary that the marketing specialists know and subsequenty use the components of the “destination’s universe” in the laborious process of constructing tourism products with specific, authentic elements, constituting points of contact between the targeted consumer segments and the nature and culture of the destination itself. The purpose of this paper is to identify, within a quantitative research, those specific elements of the region which can “collaborate” on developing every structured tourism product, comprising both tangible and intangible elements, functional and symbolic, which can be offered to as many market segments as possible, through planned activities of destination marketing, yet entirely complying with its identity.

  9. Using Bayesian belief networks in adaptive management.

    Science.gov (United States)

    J.B. Nyberg; B.G. Marcot; R. Sulyma

    2006-01-01

    Bayesian belief and decision networks are relatively new modeling methods that are especially well suited to adaptive-management applications, but they appear not to have been widely used in adaptive management to date. Bayesian belief networks (BBNs) can serve many purposes for practioners of adaptive management, from illustrating system relations conceptually to...

  10. Strategic Belief Management

    DEFF Research Database (Denmark)

    Foss, Nicolai Juul

    While (managerial) beliefs are central to many aspects of strategic organization, interactive beliefs are almost entirely neglected, save for some game theory treatments. In an increasingly connected and networked economy, firms confront coordination problems that arise because of network effects....... The capability to manage beliefs will increasingly be a strategic one, a key source of wealth creation, and a key research area for strategic organization scholars.......While (managerial) beliefs are central to many aspects of strategic organization, interactive beliefs are almost entirely neglected, save for some game theory treatments. In an increasingly connected and networked economy, firms confront coordination problems that arise because of network effects...

  11. [Belief system regarding Cannabis, its use and consequences: Users versus non-users in colombian university students].

    Science.gov (United States)

    Galván, Gonzalo; Sánchez-Carballo, Álvaro; Gómez-Morales, Ileana; Humánez-Julio, Oscar; Guerrero-Martelo, Manuel; Vásquez De la Hoz, Francisco

    2016-11-01

    Descriptive and comparative study of cross-sectional that had as objective to evaluate and compare the beliefs about cannabis, its use and potential consequences between two groups of Colombian university students, matched by gender and age. The frst group consisted of ordinary consumers of cannabis (n=35) the second group consisted of students that have never tried cannabis (n=35). The results showed that the group of consumers presents a moderate risk of abuse and only the 20% fulflled dependence criteria. Furthermore, the non-consumers group was mostly agree about that the marijuana use: damages the memory, deteriorates the cognitive functions, creates dependency, can affect the neurons and mental health. Also, it can lead to legal problems, it is a harmful drug for the health, it affects the academic performance, it creates problems with the family, friends, couple and the like, it reduces the driving ability, and, that the marijuana that is sold in the street is always pure. The consumer group, instead, agreed that smoking tobacco affects the lungs more than smoking marijuana. Marijuana has a positive in?uence on the brain, it increases the creativity, and it is less damaging than alcohol and tobacco. Smart people smoke marijuana and it has medicinal effects. In conclusion, according to the kind of beliefs that they have about this drug, the cannabis consumers would have a decreased perception of risk in relation to the potential risk that the consumption brings from two points of view: a. They minimize the real risks of consuming and, b. They attribute some benefts and virtues to the cannabis. The kind of beliefs that the consumer have are maybe in?uenced, at least, in part, for experiences of family and other consumers and, furthermore, the reinforcement of the same consume.

  12. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    Directory of Open Access Journals (Sweden)

    Baofeng Wang

    Full Text Available Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  13. Multi-vehicle detection with identity awareness using cascade Adaboost and Adaptive Kalman filter for driver assistant system.

    Science.gov (United States)

    Wang, Baofeng; Qi, Zhiquan; Chen, Sizhong; Liu, Zhaodu; Ma, Guocheng

    2017-01-01

    Vision-based vehicle detection is an important issue for advanced driver assistance systems. In this paper, we presented an improved multi-vehicle detection and tracking method using cascade Adaboost and Adaptive Kalman filter(AKF) with target identity awareness. A cascade Adaboost classifier using Haar-like features was built for vehicle detection, followed by a more comprehensive verification process which could refine the vehicle hypothesis in terms of both location and dimension. In vehicle tracking, each vehicle was tracked with independent identity by an Adaptive Kalman filter in collaboration with a data association approach. The AKF adaptively adjusted the measurement and process noise covariance through on-line stochastic modelling to compensate the dynamics changes. The data association correctly assigned different detections with tracks using global nearest neighbour(GNN) algorithm while considering the local validation. During tracking, a temporal context based track management was proposed to decide whether to initiate, maintain or terminate the tracks of different objects, thus suppressing the sparse false alarms and compensating the temporary detection failures. Finally, the proposed method was tested on various challenging real roads, and the experimental results showed that the vehicle detection performance was greatly improved with higher accuracy and robustness.

  14. Adaptive Backstepping Controller Design for the Anti-Synchronization of Identical WINDMI Chaotic Systems with Unknown Parameters and its SPICE Implementation

    Directory of Open Access Journals (Sweden)

    S. Vaidyanathan

    2014-11-01

    Full Text Available This paper derives new results for the adaptive backstepping controller design for the anti-synchronization of identical WINDMI systems (Wind-Magnetosphere-Ionosphere models with unknown parameters and also details the SPICE implementation of the proposed adaptive backstepping controller. In the anti-synchronization of chaotic systems, the sum of the outputs of master and slave systems is made to converge asymptotically to zero with time. The adaptive controller design for the anti-synchronization of identical WINDMI systems with unknown parameters has been established by applying Lyapunov stability theory. MATLAB simulations have been shown for the illustration of the adaptive anti-synchronizing backstepping controller for identical WINDMI chaotic systems. Finally, the proposed controller has been implemented using SPICE and circuit simulation results have been detailed.

  15. Witchcraft Beliefs and Witch Hunts

    NARCIS (Netherlands)

    Koning, N.B.J.

    2013-01-01

    This paper proposes an interdisciplinary explanation of the cross-cultural similarities and evolutionary patterns of witchcraft beliefs. It argues that human social dilemmas have led to the evolution of a fear system that is sensitive to signs of deceit and envy. This was adapted in the evolutionary

  16. Implicit and explicit drinker identities interactively predict in-the-moment alcohol placebo consumption

    Directory of Open Access Journals (Sweden)

    Daniel Frings

    2016-06-01

    Conclusion: These results suggest that explicit identities may be associated more with those beliefs about drinking that one is aware of than behavioral intention. In addition, explicit identities may not predict behavioral enactment well. Implicit identity shows effects on actual behavior and not behavioral intention. Together this highlights the differential influence of reflective (explicit and impulsive (implicit identity in-the-moment behavior.

  17. Risk identication of tailorable context-aware systems: a case study and lessons learned

    NARCIS (Netherlands)

    Zarifi Eslami, Mohammed; Sapkota, Brahmananda; Zarghami, Alireza; Vriezekolk, E.; van Sinderen, Marten J.; Wieringa, Roelf J.; Wieringa, P.A.

    In this paper, we discuss possible risks posed by the application of tailorable context-aware systems in real-life practices. We use a tailorable context-aware system in the homecare domain as a case study to identify and analyse such risks. Next, we discuss which of these risks can be generalized

  18. DASH - Youth Risk Behavior Surveillance System (YRBSS): High School - Excluding Sexual Identity

    Data.gov (United States)

    U.S. Department of Health & Human Services — 1991-2015. High School Dataset. The Youth Risk Behavior Surveillance System (YRBSS) monitors six categories of priority health behaviors among youth and young...

  19. Identity Activities

    Science.gov (United States)

    2016-08-03

    in reaction to their environment. They reflect an individual’s internal or external, conscious or subconscious , overt or covert, voluntary or...identity activities under a range of legal authorities, policy constraints, transnational threats, regional concerns and biases , and most likely...Biography. A baseline and descriptive analytic product that supports the development of the behavioral influences analysis ( BIA ) individual behavioral

  20. [Identity theft

    CERN Multimedia

    Wolinksy, H

    2003-01-01

    "A new survey by the Federal Trade Commission indicates that over the last five years one in four American households has been hit by identity theft, which can result in thieves tapping their victims' credit cards or bank accounts" (1 page).

  1. Designer's Identity

    DEFF Research Database (Denmark)

    Kunrath, Kamila; Cash, Philip; Li-Ying, Jason

    2016-01-01

    A designer’s professional identity (DPI) develops through both education and professional experience, building on core personality traits and innate skills. In this paper a systematic literature review and a secondary narrative review were developed in order to map personal attributes and design...

  2. Challenging Identities

    DEFF Research Database (Denmark)

    depends on the conceptual or ideological constellation in which it takes part. This volume on one hand demonstrates the role of notions of identity in a variety of European contexts, and on the other hand highlights how there may be reasons to challenge the use of the term and corresponding social...

  3. Spectroscopy of systems of two identical atoms: effects of quantum interference

    International Nuclear Information System (INIS)

    Makarov, A.A.; Yudson, V.I.

    2017-01-01

    Several effects of quantum interference in spectroscopy of a system of two atoms are discussed. (i) In the system of spatially separated atoms in a one-dimensional (1D) geometry (a single-mode waveguide or photon crystal), a (meta)stable excited entangled state can be formed, its decay being very sensitive to the distance between the atoms and to perturbations which cause a difference between their resonance frequencies. (ii) In a system of closely located atoms in 3D space, the extreme sensitivity of absorption and fluorescence spectra to the direction of the applied magnetic field is demonstrated. These theoretical predictions can be useful for the quantum information processing and ultrasensitive measurements.

  4. Corporate Ethical Identity Perbankan Syariah di Indonesia

    Directory of Open Access Journals (Sweden)

    Budi Sukardi Taufiq Wijaya

    2013-11-01

    Full Text Available This article describes the extent of Islamic Banking in Indonesia in function as an agent of development through ethical identity disclosure in annual reports of Islamic Banking. The importance ethical identity of the company as a part of the personality in the achievement of business objectives, has the purpose to describe the manifestations and uniqueness in order to operate well and success in the market, able to provide recognition and distinction between banks, as an important aspect of the bank’s market competitiveness of sustainable, which includes an understanding of the ethical and social culture of the bank. Islamic banking as a financial institution which different with conventional banks, have a view applies fundamental concepts of property rights and contracts that govern behavior, ethical, moral and social economy, both individuals, institutions, communities and countries. Fundamental perspective above, will be able to belief in religion (Islam, as well as support for Islamic Banks to be integral and system economic of Islam will be applicable in all times and in particular contribute for national economy, as well as being an alternative system for the development of the world economy.

  5. The Interaction of Control Systems and Stakeholder Networks in Shaping the Identities of Self-managed Teams

    DEFF Research Database (Denmark)

    Annosi, Maria Carmela; Foss, Nicolai Juul; Brunetta, Federica

    2017-01-01

    -based firms. We argue that managerial and stakeholder interventions shape the self-construction of team identity as well as the team’s commitment to specific work objectives. We also suggest that team identity becomes isomorphic to organizational identity because of pressures related to: (1) the presence...... of a dense network of managers and stakeholders, which orients teams towards a focus on certain aspects of the higher-order identity; (2) the use of team routines and regular feedback loops, which force alignment with the organizational identity; and (3) the use of coordinating roles aimed at promoting......, ratifying and reinforcing the convergence of identity within the team. We analyse multiple cases from a major multinational corporation in the telecommunications industry, which we examine through the lens of a multi-level model of controls involving the micro, meso and macro organizational levels. We...

  6. O sistema de crenças do aprendiz brasileiro de inglês: fatores que influenciam na construção de crenças Belief systems of Brazilians learning English: factors that influence in the building of beliefs

    Directory of Open Access Journals (Sweden)

    Fábio Madeira

    2008-06-01

    Full Text Available As crenças sobre aprendizagem de línguas têm sido tópico de interesse entre autores em pesquisadores na área de ensino de línguas. Este trabalho traz uma discussão sobre os fatores que atuam na formação das crenças de alunos e professores de Língua Inglesa. Inicialmente, comento sobre o interesse pela investigação do sistema de crenças do aprendiz de inglês como língua estrangeira. Mostro a influência que as crenças que compõem o imaginário dos professores e aprendizes exercem na maneira como abordam o processo de ensino/aprendizagem. Passo então para a discussão dos principais fatores responsáveis pela formação das crenças, entre os quais alguns estão intimamente relacionados ao contexto brasileiro de ensino/aprendizagem da língua inglesa.Language learning beliefs has been a frequently discussed topic of Applied Linguistics in the area of language learning and teaching. This paper discusses the beliefs learners and teachers of English as a second language hold about the learning/teaching process. I will start the discussion exposing the reason why more and more researchers are interested in investigating the beliefs system of those involved in the task of learning the English language to show the influence that the beliefs that compose this system have in the way they approach the process of learning a new language. I will next present and discuss some of the main factors that act in the construction of students and teachers´ beliefs and some of the beliefs they hold, not all of which beneficial for the good performance in that process.

  7. Modelling Systems of Classical/Quantum Identical Particles by Focusing on Algorithms

    Science.gov (United States)

    Guastella, Ivan; Fazio, Claudio; Sperandeo-Mineo, Rosa Maria

    2012-01-01

    A procedure modelling ideal classical and quantum gases is discussed. The proposed approach is mainly based on the idea that modelling and algorithm analysis can provide a deeper understanding of particularly complex physical systems. Appropriate representations and physical models able to mimic possible pseudo-mechanisms of functioning and having…

  8. Intention and Normative Belief

    OpenAIRE

    Chislenko, Eugene

    2016-01-01

    I defend the view that we act “under the guise of the good.” More specifically, I argue that an intention to do something is a belief that one ought to do it. I show how conflicts in intention and belief, as well as more complex impairments in these states, account for the central problem cases: akrasia in belief and intention, apparently unintelligible choices, and lack of motivation or accidie.

  9. Conditional Belief Types

    Science.gov (United States)

    2016-04-19

    Rationality of a player is determined by comparing her actual expected payoff to her expected payoff when her strategy is changed , while her beliefs —and...reduced strategies, and it is possible that under such conditions, beliefs about other players’ reduced strategies change as well. Thus, independence...assumptions, whether they concern observability of moves or subjective beliefs of any other kind, can be all accommodated by changing the informational

  10. RITUALISTIC TERMS IN THE ALEVI BELIEF SYSTEM ALEVİ İNANÇ SİSTEMİNDEKİ RİTÜELİK ÖZEL TERİMLER

    Directory of Open Access Journals (Sweden)

    Mehmet ERSAL

    2011-01-01

    Full Text Available The Alevi belief system is one of the important richnesses within Turkish language and culture. Spread over a far and wide geography, the community has also shaped many rituals and belief practices with its own dynamics. Thus, a world of numerous ritualistic terms is brought in Turkish language and culture. Due to the secrecy of the belief system, it has not been possible to ascertain the majority of the ritualistic terms by means of visual methods. In recent years, the overgeneralisation of the terms which have been ascertained seems to be a common mistake as well. However, a term sometimes has manifold meanings even in the same village. For this reason, false meanings might be attributed to a ritualistic term mentioned in a writing or poem. In this article the ritual of muhasip cemi, which is accepted as the secret prayer of the Alevi belief system, will be explained with materials collected from nine cities. The study will also be supported by visual elements that will be presented in an order similar to that of a ritual. Different terminological names attributed to the same belief practice will be given within the explanations as well. Alevi inanç sistemi, Türk dili ve kültürünün önemli zenginliklerindendir. Geniş bir coğrafyaya yayılan inanç zümresi birçok ritüel ve inanç pratiğini de kendi dinamikleri ile şekillendirmiştir. Bu sayede zengin bir ritüelik terim dünyası da Türk diline ve kültürüne kazandırılmıştır. Alevi inanç sistemine dair ritüelik terimlerin büyük bir çoğunluğu özellikle de inanç sisteminden kaynaklanan gizlilik sebebiyle görsel unsurlarla tespit edilememiştir. Son yıllarda tespit edilen terimleri de Aleviliğin geneline şümullandırma gibi bir hataya düşülmektedir. Oysaki bir köy içerisinde bile aynı terim farklı anlamlandırmalarla kullanılmaktadır. Bu sebeple bir yazma veya bir şiirde geçen ritüelik bir terime yanlış anlamlar yüklenebilmektedir. Bu makalede

  11. Identity transformation

    DEFF Research Database (Denmark)

    Neergaard, Helle; Robinson, Sarah; Jones, Sally

    , as well as the resources they have when they come to the classroom. It also incorporates perspectives from (ii) transformational learning and explores the concept of (iii) nudging from a pedagogical viewpoint, proposing it as an important tool in entrepreneurship education. The study incorporates......This paper develops the concept of ‘pedagogical nudging’ and examines four interventions in an entrepreneurship classroom and the potential it has for student identity transformation. Pedagogical nudging is positioned as a tool, which in the hands of a reflective, professional......) assists students in straddling the divide between identities, the emotions and tensions this elicits, and (iv) transform student understanding. We extend nudging theory into a new territory. Pedagogical nudging techniques may be able to unlock doors and bring our students beyond the unacknowledged...

  12. The Threat of Sexism in a STEM Educational Setting: The Moderating Impacts of Ethnicity and Legitimacy Beliefs on Test Performance

    Science.gov (United States)

    O'Brien, Laurie T.; Garcia, Donna M.; Adams, Glenn; Villalobos, J. Guillermo; Hammer, Elliott; Gilbert, Patricia

    2015-01-01

    Social identity threat has negative consequences for women in science, technology, engineering, and mathematics (STEM) fields. The present study examined whether legitimacy beliefs--beliefs that status differences between men and women in STEM fields are fair--put women at risk for experiencing social identity threat and poorer performance on a…

  13. Survivorship and discourses of identity.

    Science.gov (United States)

    Little, Miles; Paul, Kim; Jordens, Christopher F C; Sayers, Emma-Jane

    2002-01-01

    Personal identity is self-evidently important to us all. Identity is a philosophically complex subject, but there is some agreement that memory, embodiment and continuity are essential components. The sense of memory includes 'future memory', the kind of memory we would like to construct for ourselves as our lives proceed. While the sense of personal identity is internal to the individual, a sense of that person's identity exists in the minds of others. Extreme experiences threaten the element of continuity, because they may bring bodily changes as well as cognitive changes that challenge central values. Restoring or preserving continuity is a major task for survivors. The ways in which people experience discontinuity because of cancer illness, and the ways in which they manage this experience emerges from the narratives of the survivors of cancer and in the narratives of health care workers who look after them. People manage discontinuity by reference to stable 'anchor points' in their beliefs and values; by re-constructing versions of their pre-experience identities, drawing on past memory and finding ways to preserve a continuity between past memory, present experience and constructions of the future; by using the experience to develop established facets of identity; and by imbuing the experience with meaning and recognising the enlarged identity made possible by survival. Those who cannot achieve a sense of continuity may feel alienated from themselves, their friends and family. All these methods of management may be used by one person to negotiate the post-experience identity in its different social interactions. The experience of the survivor can be further understood by recognising the challenge posed by extreme experience to the sense of continuity of both embodied self and memory. A satisfactory discourse of survival has yet to enter the public domain. This lack adds to the burdens of survivors, including those who have survived cancer. Copyright 2002 John

  14. What makes students commit : experiences and identity development

    NARCIS (Netherlands)

    van der Gaag, Mandy; Kunnen, Saskia; Pijl, Yvette

    Developing a sense of identity is an important task for adolescents (Erikson, 1968) and emerging adults (Arnett, 2001). Identity consist of ‘commitments’, strongly held beliefs or values (Marcia, 1966), in several domains of life (Bosma, 1992; Goossens, 2001). The domain of education and future

  15. Becoming a Mathematics Teacher: The Role of Professional Identity

    Science.gov (United States)

    Akkoç, Hatice; Yesildere-Imre, Sibel

    2017-01-01

    Teachers' pedagogical practice and choices for their actions could not only be explained by their knowledge, beliefs or attitudes (Rodgers & Scott, 2008). Identity also has a crucial role in learning to teach. The aim of this study is to investigate contextual nature of preservice mathematics teachers' professional identities. For this aim, a…

  16. Birth order dependent growth cone segregation determines synaptic layer identity in the Drosophila visual system.

    Science.gov (United States)

    Kulkarni, Abhishek; Ertekin, Deniz; Lee, Chi-Hon; Hummel, Thomas

    2016-03-17

    The precise recognition of appropriate synaptic partner neurons is a critical step during neural circuit assembly. However, little is known about the developmental context in which recognition specificity is important to establish synaptic contacts. We show that in the Drosophila visual system, sequential segregation of photoreceptor afferents, reflecting their birth order, lead to differential positioning of their growth cones in the early target region. By combining loss- and gain-of-function analyses we demonstrate that relative differences in the expression of the transcription factor Sequoia regulate R cell growth cone segregation. This initial growth cone positioning is consolidated via cell-adhesion molecule Capricious in R8 axons. Further, we show that the initial growth cone positioning determines synaptic layer selection through proximity-based axon-target interactions. Taken together, we demonstrate that birth order dependent pre-patterning of afferent growth cones is an essential pre-requisite for the identification of synaptic partner neurons during visual map formation in Drosophila.

  17. What Happens When a Teacher's Science Belief Structure Is in Disequilibrium? Entangled Nature of Beliefs and Practice

    Science.gov (United States)

    Martin, Anita; Park, Soonhye; Hand, Brian

    2017-08-01

    This qualitative case study examined the process of change in an experienced elementary teacher's belief structure during implementation of an inquiry-based science program. Difficulties generally associated with ascertaining beliefs were minimized by using Leatham's (Journal of Mathematics Teacher Education, 9, 91-102 (2006) Sensible System Framework, enabling researchers to obtain rich descriptions of the teacher's belief structure by focusing on words (professed beliefs), intentions (intended beliefs), and actions (enacted beliefs). Models were constructed of the teacher's belief structure before and after implementation of the Science Writing Heuristic (SWH) approach (Hand et al. International Journal of Science Education, 26(2), 131-149, 2004), an inquiry-based approach to teaching science. Key beliefs for this teacher were related to how students learn, goals for teaching science, focus of instruction, and roles of teacher and student. Ultimately, the teacher shifted her professed, intended, and enacted beliefs resulting in a shift from a teacher-centered to a student-centered classroom. Findings support Thagard's Coherence Theory of Justification (2002), positing that change in one belief creates a state of disequilibrium that must be alleviated by changing/realigning other beliefs in order to re-establish coherence in the overall belief structure. This research focus is distinct from the general trend in teacher beliefs research in important ways. Most significant is that this study was not focused on the traditional two lists—those beliefs that were consistent with practice and those that were inconsistent with practice—but instead focused on the entwined nature of beliefs and practice and have shown that a teacher's practice can be viewed as their enacted beliefs, an integral part of the teacher's overall belief structure.

  18. Learning to Teach and Professional Identity: Images of Personal and Professional Recognition (Aprender a enseñar e identidad profesional: imágenes de reconocimiento personal y profesional)

    Science.gov (United States)

    Fajardo Castañeda, J. Alberto

    2014-01-01

    This study aims to investigate how pre-service teachers construct their professional identities from the interplay between participation in a teacher community and their systems of knowledge and beliefs. A group of six Colombian pre-service teachers in the final stage of their five-year teacher education programme were the research participants.…

  19. Constructivism, Factoring, and Beliefs.

    Science.gov (United States)

    Rauff, James V.

    1994-01-01

    Discusses errors made by remedial intermediate algebra students in factoring polynomials in light of student definitions of factoring. Found certain beliefs about factoring to logically imply many of the errors made. Suggests that belief-based teaching can be successful in teaching factoring. (16 references) (Author/MKR)

  20. Ratings of Essentialism for Eight Religious Identities.

    Science.gov (United States)

    Toosi, Negin R; Ambady, Nalini

    2011-01-01

    As a social identity, religion is unique because it contains a spectrum of choice. In some religious communities, individuals are considered members by virtue of having parents of that background, and religion, culture, and ethnicity are closely intertwined. Other faith communities actively invite people of other backgrounds to join, expecting individuals to choose the religion that best fits their personal beliefs. These various methods of identification influence beliefs about the essentialist nature of religious identity. Essentialism is when social groups are considered to have deep, immutable, and inherent defining properties. In this study, college students (N=55) provided ratings of essentialism for eight religious identities: Atheist, Buddhist, Catholic, Hindu, Jewish, Muslim, Protestant, and Spiritual-but-not-religious. Significant differences in essentialism were found between the target groups. Results and implications for intergroup relations are discussed.

  1. Scandinavian belief in fate

    Directory of Open Access Journals (Sweden)

    Åke Ström

    1967-02-01

    Full Text Available In point of principle, Christianity does not give room for any belief in fate. Astrology, horoscopes, divination, etc., are strictly rejected. Belief in fate never disappeared in Christian countries, nor did it in Scandinavia in Christian times. Especially in folklore we can find it at any period: People believed in an implacable fate. All folklore is filled up with this belief in destiny. Nobody can escape his fate. The future lies in the hands of fate, and the time to come takes its form according to inscrutable laws. The pre-Christian period in Scandinavia, dominated by pagan Norse religion, and the secularized epoch of the 20th century, however, show more distinctive and more widespread beliefs in fate than does the Christian period. The present paper makes a comparison between these forms of belief.

  2. Mediating Identity

    DEFF Research Database (Denmark)

    Kjærgaard, Annemette Leonhardt; Morsing, Mette; Ravasi, Davide

    2011-01-01

    This paper reports a longitudinal field study on the effects of positive media coverage on the reconstruction of organizational identity. The study highlights how intense positive coverage – to the point of turning an organization into a ‘celebrity’– influences both the way members understand...... their organization (sensemaking effect) and the gratification they derive from its positive representation (self-enhancement effect). Our findings suggest that positive media representations foster members' alignment around an emergent new understanding of what their organization is. Over time, however, celebrity...

  3. Unravelling identities

    OpenAIRE

    2007-01-01

    Abstract The decision to go to war by the government of the day is assumed to be a decision taken on behalf of all citizens of the nation, conceived as a collective united by a harmony of interests. Yet in the case of the Iraq War, there is clearly no unified voice of support from the British people. There is division between the state and its citizens, and the latter also reflect the multilayered identities of an increasingly multicultural society. How do individuals displaying mu...

  4. Intention to adopt clinical decision support systems in a developing country: effect of Physician’s perceived professional autonomy, involvement and belief: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    Sambasivan Murali

    2012-12-01

    Full Text Available Abstract Background Computer-based clinical decision support systems (CDSS are regarded as a key element to enhance decision-making in a healthcare environment to improve the quality of medical care delivery. The concern of having new CDSS unused is still one of the biggest issues in developing countries for the developers and implementers of clinical IT systems. The main objectives of this study are to determine whether (1 the physician’s perceived professional autonomy, (2 involvement in the decision to implement CDSS and (3 the belief that CDSS will improve job performance increase the intention to adopt CDSS. Four hypotheses were formulated and tested. Methods A questionnaire-based survey conducted between July 2010 and December 2010. The study was conducted in seven public and five private hospitals in Kuala Lumpur, Malaysia. Before contacting the hospitals, necessary permission was obtained from the Ministry of Health, Malaysia and the questionnaire was vetted by the ethics committee of the ministry. Physicians working in 12 hospitals from 10 different specialties participated in the study. The sampling method used was stratified random sampling and the physicians were stratified based on the specialty. A total of 450 physicians were selected using a random number generator. Each of these physicians was given a questionnaire and out of 450 questionnaires, 335 (response rate – 74% were returned and 309 (69% were deemed usable. Results The hypotheses were tested using Structural Equation Modeling (SEM. Salient results are: (1 Physicians’ perceived threat to professional autonomy lowers the intention to use CDSS (p Conclusion The proposed model with the three main constructs (physician’s professional characteristic, involvement and belief explains 47% of the variance in the intention to use CDSS. This is significantly higher than the models addressed so far. The results will have a major impact in implementing CDSS in developing

  5. Executive functions in morality, religion, and paranormal beliefs.

    Science.gov (United States)

    Wain, Omar; Spinella, Marcello

    2007-01-01

    Moral, religious, and paranormal beliefs share some degree of overlap and play important roles in guiding peoples' behavior. Although partly cultural phenomena, they also have neurobiological components based on functional neuroimaging studies and research in clinical populations. Because all three show relationships to prefrontal system functioning, the current study examined whether they related to executive functions as measured by the Executive Function Inventory in a community sample. As in previous research, religious beliefs related positively to both moral attitudes and paranormal beliefs. Moral attitudes, however, did not relate to paranormal beliefs. Paranormal beliefs related inversely to impulse control and organization, whereas small positive correlations occurred between traditional religious beliefs, impulse control, and empathy. Moral attitudes, on the other hand, showed consistent positive correlations with all executive functions measured, independent of demographic influences. These findings concordantly support that prefrontal systems play a role in morality, religion, and paranormal beliefs.

  6. Action Identity in Style Simulation Systems: Do Players Consider Machine-Generated Music As of Their Own Style?

    Science.gov (United States)

    Khatchatourov, Armen; Pachet, François; Rowe, Victoria

    2016-01-01

    The generation of musical material in a given style has been the subject of many studies with the increased sophistication of artificial intelligence models of musical style. In this paper we address a question of primary importance for artificial intelligence and music psychology: can such systems generate music that users indeed consider as corresponding to their own style? We address this question through an experiment involving both performance and recognition tasks with musically naïve school-age children. We asked 56 children to perform a free-form improvisation from which two kinds of music excerpt were created. One was a mere recording of original performances. The other was created by a software program designed to simulate the participants' style, based on their original performances. Two hours after the performance task, the children completed the recognition task in two conditions, one with the original excerpts and one with machine-generated music. Results indicate that the success rate is practically equivalent in two conditions: children tended to make correct attribution of the excerpts to themselves or to others, whether the music was human-produced or machine-generated (mean accuracy = 0.75 and = 0.71, respectively). We discuss this equivalence in accuracy for machine-generated and human produced music in the light of the literature on memory effects and action identity which addresses the recognition of one's own production.

  7. Action Identity in Style Simulation Systems: Do Players Consider Machine-Generated Music As of Their Own Style?

    Science.gov (United States)

    Khatchatourov, Armen; Pachet, François; Rowe, Victoria

    2016-01-01

    The generation of musical material in a given style has been the subject of many studies with the increased sophistication of artificial intelligence models of musical style. In this paper we address a question of primary importance for artificial intelligence and music psychology: can such systems generate music that users indeed consider as corresponding to their own style? We address this question through an experiment involving both performance and recognition tasks with musically naïve school-age children. We asked 56 children to perform a free-form improvisation from which two kinds of music excerpt were created. One was a mere recording of original performances. The other was created by a software program designed to simulate the participants' style, based on their original performances. Two hours after the performance task, the children completed the recognition task in two conditions, one with the original excerpts and one with machine-generated music. Results indicate that the success rate is practically equivalent in two conditions: children tended to make correct attribution of the excerpts to themselves or to others, whether the music was human-produced or machine-generated (mean accuracy = 0.75 and = 0.71, respectively). We discuss this equivalence in accuracy for machine-generated and human produced music in the light of the literature on memory effects and action identity which addresses the recognition of one's own production. PMID:27199788

  8. A strategy for reducing CO_2 emissions from buildings with the Kaya identity – A Swiss energy system analysis and a case study

    International Nuclear Information System (INIS)

    Mavromatidis, Georgios; Orehounig, Kristina; Richner, Peter; Carmeliet, Jan

    2016-01-01

    Within the general context of Greenhouse Gas (GHG) emissions reduction, decomposition analysis allows the quantification of the contribution of different factors to changes in emissions as well as the assessment of the effectiveness of policy and technology measures. The Kaya identity has been widely used for that purpose in order to disaggregate carbon emissions into various driving forces. In this paper, it is applied for the analysis of emissions resulting from energy use at three different scales. First, a decomposition analysis of the carbon emissions for the complete Swiss energy system is presented using the future projections from the Swiss Energy Strategy 2050. The Kaya identity is then applied to the Swiss building sector after it is adapted with factors that are more relatable to building parameters, such as floor area instead of Gross Domestic Product (GDP). Finally, the last level of analysis is a small scale community energy system for a unique Swiss village that aims to significantly reduce its emissions. An energy strategy is developed and its effectiveness is assessed with the adapted Kaya identity and benchmarked against the Swiss average values. The presented method demonstrates how the performance of buildings under various retrofitting scenarios can be benchmarked against future emission targets. - Highlights: • The Kaya identity is used to perform multi-scale emission decomposition analysis. • The original Kaya identity is updated with building-related parameters. • The main drivers of emissions reduction of the Swiss building stock are determined. • An energy strategy to transform the building stock of a Swiss village is developed. • The performance of efficiency measures are benchmarked using the Kaya identity.

  9. A Cross-Cultural Study of Teachers' Beliefs and Strategies on Classroom Behavior Management in Urban American and Korean School Systems

    Science.gov (United States)

    Shin, Sunwoo; Koh, Myung-Sook

    2007-01-01

    The purpose of this study is to investigate teachers' beliefs on classroom behavior management strategies for students in urban public high schools between teachers in the United States and the Republic of Korea. This study incorporates data collected from teacher self-reported survey questionnaire, which is the Attitudes and Beliefs on Classroom…

  10. A Comparative Study of Elementary Teachers' Beliefs and Strategies on Classroom and Behavior Management in the USA and Korean School Systems

    Science.gov (United States)

    Koh, Myung-sook; Shin, Sunwoo

    2014-01-01

    The purpose of this cross-cultural study is to investigate elementary teachers' beliefs and inter-cultural perspectives in classroom management (instructional environment and behavior management) for students in public schools of the U.S. and Korea. The results supported that the two groups of teachers showed similar beliefs in instructional…

  11. Supplemental Material, PWQ42_2_747845_Choma_and_Prusaczyk - The Effects of System Justifying Beliefs on Skin-Tone Surveillance, Skin-Color Dissatisfaction, and Skin-Bleaching Behavior

    OpenAIRE

    Choma, Becky L.; Prusaczyk, Elvira

    2018-01-01

    Supplemental Material, PWQ42_2_747845_Choma_and_Prusaczyk for The Effects of System Justifying Beliefs on Skin-Tone Surveillance, Skin-Color Dissatisfaction, and Skin-Bleaching Behavior by Becky L. Choma, and Elvira Prusaczyk in Psychology of Women Quarterly

  12. Quantum corrections to ward identities of chronological AVV- and AAA-current correlators for nondegenerate many-fermion systems in the four-dimensional world

    International Nuclear Information System (INIS)

    Kucheryavij, V.Yi.

    1994-01-01

    The explicit form of nontrivial quantum corrections to Ward identities for AVV- and AAA-current correlators in the four-dimensional world for nondegenerate many-fermion systems of general type is obtained. The characteristics of all nontrivial quantum corrections for nondegenerate two-flavour fermion systems are classified and described. In particular, the well-known results follow from ours for the trivial quantum corrections (anomalies) in the case of the degenerate spectrum of fermion masses

  13. Identity Theft - The National Guard

    Science.gov (United States)

    Legislative Liaison Small Business Programs Social Media State Websites Videos Featured Videos On Every Front identity theft you discover someone is still fraudulently using your Social Security Number, you can Features Blended Retirement System Diversity Features by Year Identity Theft Posture Statement State

  14. Generalized Cherednik-Macdonald identities

    NARCIS (Netherlands)

    Stokman, J.V.

    2008-01-01

    We derive generalizations of the Cherednik-Macdonald constant term identities associated to root systems which depend, besides on the usual Multiplicity function, symmetrically on two additional parameters omega +/-. They are natural analogues of the Cherednik-Macdonald constant term q-identities in

  15. Mentalizing Deficits Constrain Belief in a Personal God

    Science.gov (United States)

    Norenzayan, Ara; Gervais, Will M.; Trzesniewski, Kali H.

    2012-01-01

    Religious believers intuitively conceptualize deities as intentional agents with mental states who anticipate and respond to human beliefs, desires and concerns. It follows that mentalizing deficits, associated with the autistic spectrum and also commonly found in men more than in women, may undermine this intuitive support and reduce belief in a personal God. Autistic adolescents expressed less belief in God than did matched neuro-typical controls (Study 1). In a Canadian student sample (Study 2), and two American national samples that controlled for demographic characteristics and other correlates of autism and religiosity (Study 3 and 4), the autism spectrum predicted reduced belief in God, and mentalizing mediated this relationship. Systemizing (Studies 2 and 3) and two personality dimensions related to religious belief, Conscientiousness and Agreeableness (Study 3), failed as mediators. Mentalizing also explained the robust and well-known, but theoretically debated, gender gap in religious belief wherein men show reduced religious belief (Studies 2–4). PMID:22666332

  16. Beliefs about God and mental health among American adults.

    Science.gov (United States)

    Silton, Nava R; Flannelly, Kevin J; Galek, Kathleen; Ellison, Christopher G

    2014-10-01

    This study examines the association between beliefs about God and psychiatric symptoms in the context of Evolutionary Threat Assessment System Theory, using data from the 2010 Baylor Religion Survey of US Adults (N = 1,426). Three beliefs about God were tested separately in ordinary least squares regression models to predict five classes of psychiatric symptoms: general anxiety, social anxiety, paranoia, obsession, and compulsion. Belief in a punitive God was positively associated with four psychiatric symptoms, while belief in a benevolent God was negatively associated with four psychiatric symptoms, controlling for demographic characteristics, religiousness, and strength of belief in God. Belief in a deistic God and one's overall belief in God were not significantly related to any psychiatric symptoms.

  17. Acculturation and Religion in Schools: The Views of Young People from Minority Belief Backgrounds

    Science.gov (United States)

    Niens, Ulrike; Mawhinney, Alison; Richardson, Norman; Chiba, Yuko

    2013-01-01

    This paper aims to explore the relationship between religious identity, acculturation strategies and perceptions of acculturation orientation in the school context amongst young people from minority belief backgrounds. Based on a qualitative study including interviews with 26 young people from religious minority belief backgrounds in Northern…

  18. Balancing Multicultural Competence with Social Justice: Feminist Beliefs and Optimal Psychological Functioning

    Science.gov (United States)

    Yoder, Janice D.; Snell, Andrea F.; Tobias, Ann

    2012-01-01

    To identify a multivariate configuration of feminist beliefs best associated with optimal psychological functioning, 215 mostly White college women completed an online survey measuring their feminist beliefs (Feminist Perspectives Scale, Attitudes toward Feminism and the Women's Movement, sense of common fate, and Feminist Identity Composite) and…

  19. The cultural beliefs of the Vhavenda on the causes and transmission ...

    African Journals Online (AJOL)

    Cultural and ethnic identity and folk beliefs play a decisive role in perceptions, attitudes and practices regarding health care and illness. Such beliefs and practices of a community may have an influence on the causes and transmission of diseases, including sexually transmitted diseases. The purpose of the study on which ...

  20. Identical and shifted identical bands

    International Nuclear Information System (INIS)

    Dodder, R.S; Jones, E.F.; Hamilton, J.H.

    1997-01-01

    Spontaneous fission of 252 Cm was studied with 72 large Compton suppressed Ge detectors in Gamma sphere. New isotopes 160 Sm and 162 Gd were identified. Through X-ray-γ and γ-γ-γ) coincidence measurements, level energies were established to spins 14 + to 20 + in 152 , 154 156 60 Nd 92 94 96 , 156 , 158 , 160 62 Sm 94 , 96 , 98 , and 160 , 162 64 Gd 96 , 98 . These nuclei exhibit a remarkable variety of identical bands and bands where the energies and moments of inertia are shifted by the same constant amount for every spin state from 2 + to 12 + for various combinations of nuclei differing by 2n, 4n, 2p, 4p, and α

  1. Identity Crisis in Cormac McCarthy's "All the Pretty Horses"

    Science.gov (United States)

    Gebreen, Hayder A. K.

    2016-01-01

    The issue of identity is one of the main issues that encounters man in each culture. Identity is a set of behaviors, emotions, and thought patterns which are unique to every individual that define him as a member of a certain group. Identity is shaped by race, ethnicity, religious beliefs, language, physical features, childhood experiences, sexual…

  2. Multiculturalism, Medicine, and Health Part III: Health Beliefs

    OpenAIRE

    Masi, Ralph

    1988-01-01

    Supernatural beliefs relate to a Power or powers considered beyond nature. Persons who wish to draw upon the power of supernatural forces often attempt to do so through prayers, ceremonies, or special acknowledgement. While some physicians feel uncomfortable at times with beliefs that differ from their own, the chaplaincy system, in place in most hospitals, is evidence that health-care systems can comfortably accommodate supernatural beliefs. We must make an effort to understand and accommoda...

  3. Explanatory Coherence and Belief Revision in Naive Physics

    Science.gov (United States)

    1988-07-01

    continental drift (Thagard & Nowak, 1988), and debates about why the dinosaurs became extinct . Application of ECHO to the belief revisions in Pat and Hal...rewono of nocuamy Idid 4onoly by bodck number) Students of reasoning have long tried to understand how people revise systems of beliefs. We maintain...Princeton University Students of reasoning have long tried to understand how people revise systems of beliefs (see Wertheimer, 1945, for example). We will

  4. Belief Change in Reasoning Agents

    OpenAIRE

    Jin, Yi

    2007-01-01

    The capability of changing beliefs upon new information in a rational and efficient way is crucial for an intelligent agent. Belief change therefore is one of the central research fields in Artificial Intelligence (AI) for over two decades. In the AI literature, two different kinds of belief change operations have been intensively investigated: belief update, which deal with situations where the new information describes changes of the world; and belief revision, which assumes the world is st...

  5. Voice over Internet Protocol (VoIP) Technology as a Global Learning Tool: Information Systems Success and Control Belief Perspectives

    Science.gov (United States)

    Chen, Charlie C.; Vannoy, Sandra

    2013-01-01

    Voice over Internet Protocol- (VoIP) enabled online learning service providers struggling with high attrition rates and low customer loyalty issues despite VoIP's high degree of system fit for online global learning applications. Effective solutions to this prevalent problem rely on the understanding of system quality, information quality, and…

  6. Mental illness complicated by the santeria belief in spirit possession.

    Science.gov (United States)

    Alonso, L; Jeffrey, W D

    1988-11-01

    Santeria, a religious system that blends African and Catholic beliefs, is practiced by many Cuban Americans. One aspect of this system is the belief in spirit possession. Basic santeria beliefs and rituals, including the fiesta santera (a gathering at which some participants may become possessed), are briefly described, and four cases in which the patients' belief in possession played a role in their mental illness are presented. The belief in possession can complicate the diagnosis and treatment of mental illness, but it should not be considered a culture-bound syndrome. Rather, it may be a nonspecific symptom of a variety of mental illnesses and should be evaluated in the context of the patient's overall belief system and ability to carry out usual activities.

  7. integrated identity and integrated identity and access management

    African Journals Online (AJOL)

    eobe

    Management System (T-IAMS) is a fingerprint biometric database that centrally manages students' identity, course a fingerprint ... registration, library and medical services information. .... based application and a web-based application.

  8. Thinking identity differently: dynamics of identity in self and institutional boundary

    Science.gov (United States)

    Albrecht, Nancy J.; Fortney, Brian S.

    2011-03-01

    In research oriented universities, research and teaching are often viewed as separate. Aydeniz and Hodge present one professor's struggles to synthesize an identity from three different spaces, each with competing values and core beliefs. As Mr. G's story unfolds, and he reflects upon his negotiation between teaching and research responsibilities, we seek to expand the discussion by presenting a caution to identity researchers. The caution pertains to construction of understanding on how identities are created, and the role that individual stories take in how identities are created and enacted. In this forum contribution, we present several questions in the hopes of furthering the discussion on identity research, and our understanding of the conceptualization of institutional boundaries and objectivity, as well as questions on participant involvement in the process of research.

  9. Understanding the role of public belief systems in perceptions of bio-physical, socioeconomic and cultural-spiritual vulnerabilities through the use of an emergent analytical framework

    CSIR Research Space (South Africa)

    Nortje, Karen

    2011-01-01

    Full Text Available and Spiritual Markers ? Belief in ancestors and witchcraft ? Myths and legends ? Cultural practises influence how people use natural resources ? Sacred spaces/animals and plants ? Local Knowledge ? Culturally embedded ? Contrasts and duality ? Between... bio-medicine and traditional healing ? Religious duality ? Younger generations? dis/interest in traditions ? City life vs. village life ? Old vs. new ito education ? Old vs. new ? Hierarchy of access ? Trust/belief in traditional leadership...

  10. Teacher identity construction and plurilingual competence: a longitudinal study about language teaching in multilingual contexts

    Directory of Open Access Journals (Sweden)

    Juli Palou Sangrà

    2015-03-01

    Full Text Available This article is part of a thesis dissertation focused on cognition and belief systems about prior language learning experience, teacher education and classroom practice. This document examines teacher identity construction in relation to plurilingual competence. We want to study a dynamic identity, which is constructed in the here and now. We use the European Council contents for language teaching. The central purpose is analyzing belief systems in relation to the teaching of languages in plurilingual contexts. We focus our analysis on teacher understandings of their new social challenges and how they respond in and to these situations. The interactional data was gathered from five focus groups of ten teachers from different educational stages. Prior to this, we collected recurrent questions which had emerged in reflective narrative and individual interviews. Data was analysed using a qualitative approach. Activity theory is the conceptual framework to identify which tensions appear when we identify not only the theoretical discourse, but also the everyday practical classroom reality. For this reason, we distinguish between dilemmas, conflicts, critical conflicts and double binds. The impact of this proposal can be summarized in relation to the following results: urgent necessity for teacher training, sharing experiences to help developing professional identity and transferring positive experiences in schools.

  11. Conspiracist ideation in Britain and Austria: evidence of a monological belief system and associations between individual psychological differences and real-world and fictitious conspiracy theories.

    Science.gov (United States)

    Swami, Viren; Coles, Rebecca; Stieger, Stefan; Pietschnig, Jakob; Furnham, Adrian; Rehim, Sherry; Voracek, Martin

    2011-08-01

    Despite evidence of widespread belief in conspiracy theories, there remains a dearth of research on the individual difference correlates of conspiracist ideation. In two studies, we sought to overcome this limitation by examining correlations between conspiracist ideation and a range of individual psychological factors. In Study 1, 817 Britons indicated their agreement with conspiracist ideation concerning the July 7, 2005 (7/7), London bombings, and completed a battery of individual difference scales. Results showed that stronger belief in 7/7 conspiracy theories was predicted by stronger belief in other real-world conspiracy theories, greater exposure to conspiracist ideation, higher political cynicism, greater support for democratic principles, more negative attitudes to authority, lower self-esteem, and lower Agreeableness. In Study 2, 281 Austrians indicated their agreement with an entirely fictitious conspiracy theory and completed a battery of individual difference measures not examined in Study 1. Results showed that belief in the entirely fictitious conspiracy theory was significantly associated with stronger belief in other real-world conspiracy theories, stronger paranormal beliefs, and lower crystallized intelligence. These results are discussed in terms of the potential of identifying individual difference constellations among conspiracy theorists. ©2011 The British Psychological Society.

  12. An historic discovery around the corner from school: Ceres, a solar system object with an uncertain identity.

    Science.gov (United States)

    Stira, Salvatore

    2016-04-01

    Ceres is the largest object in the asteroid belt between Mars and Jupiter, and it was discovered on January 1, 1801, by the Italian astronomer Giuseppe Piazzi. The study of Ceres is especially relevant to my students because this celestial body was discovered in Palermo, in the astronomic observatory located in the UNESCO world heritage site "Palazzo dei Normanni", around 500 meters away from the institute where I teach, and because Ceres was considered the patron goddess of Sicily. Moreover, it received scientists and media attention recently because it was explored by the NASA Dawn spacecraft in 2015. The categorization of Ceres has changed more than once and has been the subject of some disagreement. It was originally considered a planet, but was reclassified as an asteroid in the 1850s when many other objects in similar orbits were discovered. Its status changed again in 2006 when it was promoted to dwarf planet, a classification it shares with Pluto and other Kuiper belt objects. The study of this celestial body has a notable educational value, since the uncertain identity of Ceres constitutes an occasion to reflect on the criterions of classification of the natural objects. The history of its discovery allows the students to understand as the scientific method doesn't always consist in the verification of hypothesis through experiments but it sometimes asks for the forecast of facts through mathematical calculations, repeated and methodic observations, the collaboration between scientists of different sectors and nationality. Furthermore, it is a particularly suitable topic for interdisciplinary connections, as regards both scientific and humanistic matters. In order to promote the scientific competences of my first class students, I have developed a learning unit on Ceres, thanks to good cooperation with the Palermo Observatory scientists, particularly active in the astronomic dissemination towards the schools and the citizens. The most meaningful activities

  13. The Impact of High Stakes Accountability Systems and the New Performance Demands on Special Education Teachers' Attitudes, Beliefs and Practice

    Science.gov (United States)

    Zane, Robin Lee

    2012-01-01

    The No Child Left Behind Act of 2001 (NCLB) articulates the goal that all children can learn and are expected to achieve grade level academic proficiency by 2014. Based on theories underlying models of extrinsic motivation, the fundamental assumption and theory of action is that a system of rewards and sanctions will motivate teachers to focus on…

  14. Four-year prospective study of STAPH-IDENT system and conventional method for reference identification of Staphylococcus, Stomatococcus, and Micrococcus spp..

    Science.gov (United States)

    Rhoden, D L; Miller, J M

    1995-01-01

    A 4-year prospective study compared the accuracy of the STAPH-IDENT system (bioMérieux Vitek, Inc., Hazelwood, Mo.) with that of the reference procedure of the Centers for Disease Control and Prevention for the identification of Staphylococcus species, Stomatococcus mucilaginosus, and Micrococcus species. The study compared the results from 1,106 cultures (500 eye cultures, 217 strains submitted for reference identification, and 389 known stock strains) representing 21 species of the family Micrococcaceae. The overall agreement of genus and species identifications was 81.1%. The percent agreement for the five most common clinical isolates was as follows: Staphylococcus epidermidis, 97.1% (517 isolates); Staphylococcus hominis, 82.5% (57 isolates); Staphylococcus aureus, 77.2% (162 isolates); Staphylococcus haemolyticus, 75.8% (61 isolates); and Staphylococcus warneri, 64.1% (39 isolates). The lowest percent agreement was with Staphylococcus cohnii (11.1%; (9 isolates). Of the 217 isolates sent to the Centers for Disease Control and Prevention for identification, 60.4% (131) were correctly identified by the STAPH-IDENT system. Of these, S. epidermidis accounted for 23.9%, S. aureus accounted for 15.6%, S. warneri accounted for 6.9%, Staphylococcus lugdunensis accounted for 6.5%, S. haemolyticus accounted for 5.5%, and S. hominis accounted for 4.1%. The STAPH-IDENT system did not perform adequately when dealing with commonly encountered organisms and is unsuitable for identifying uncommon isolates. PMID:7699074

  15. Identifying values and beliefs in an outcomes-based curriculum ...

    African Journals Online (AJOL)

    There is therefore a need for teachers to be sensitised to the different values embedded in each belief system and all cultureal orientations. The prevalence of values and belief systems in the OBE curricula of C2005 and the NCS will have to be acknowledged, identified, and promoted. South African Journal of Education ...

  16. STORYTELLING AND UNIVERSITY BRANDING IDENTITY

    Directory of Open Access Journals (Sweden)

    ANDREEA MONICA STATE

    2016-08-01

    Full Text Available The present article sets out to clarify the concepts of storytelling and branding, with a focus on university branding and visual identity – the latter being a vital element to a brand’s uniqueness. Storytelling is an important method of brand construction, and it entails a strong power of seduction. Branding is increasingly more about storytelling. Practically, a story is an image made up of facts, feelings and interpretations, which are often told to us solely by the university itself. As such, the brand appears on the market accompanied by its identity. Identity is what we aim to express with help of the brand. Implementing a system of visual identity that would help to harmoniously develop a university brand requires a handbook of visual identity. The present article aims to be a starting point for such a handbook serving the University of Bucharest, which currently does not own such a handbook

  17. Belief Revision in the GOAL Agent Programming Language

    DEFF Research Database (Denmark)

    Spurkeland, Johannes Svante; Jensen, Andreas Schmidt; Villadsen, Jørgen

    2013-01-01

    Agents in a multiagent system may in many cases find themselves in situations where inconsistencies arise. In order to properly deal with these, a good belief revision procedure is required. This paper illustrates the usefulness of such a procedure: a certain belief revision algorithm is consider...... in order to deal with inconsistencies and, particularly, the issue of inconsistencies, and belief revision is examined in relation to the GOAL agent programming language....

  18. Modeling intelligent agent beliefs in a card game scenario

    Science.gov (United States)

    Gołuński, Marcel; Tomanek, Roman; WÄ siewicz, Piotr

    In this paper we explore the problem of intelligent agent beliefs. We model agent beliefs using multimodal logics of belief, KD45(m) system implemented as a directed graph depicting Kripke semantics, precisely. We present a card game engine application which allows multiple agents to connect to a given game session and play the card game. As an example simplified version of popular Saboteur card game is used. Implementation was done in Java language using following libraries and applications: Apache Mina, LWJGL.

  19. Gimme that old time religion: the influence of the healthcare belief system of chiropractic's early leaders on the development of x-ray imaging in the profession.

    Science.gov (United States)

    Young, Kenneth John

    2014-01-01

    Chiropractic technique systems have been historically documented to advocate overutilization of radiography. Various rationales for this have been explored in the literature. However, little consideration has been given to the possibility that the healthcare belief system of prominent early chiropractors may have influenced the use of the diagnostic modality through the years. The original rationale was the visualisation of chiropractic subluxations, defined as bones slightly out of place, pressing on nerves, and ultimately causing disease. This paradigm of radiography has survived in parts of the chiropractic profession, despite lacking evidence of clinical validity. The purpose of this paper is to compare the characteristics of the chiropractic technique systems that have utilised radiography for subluxation detection with the characteristics of religion, and to discover potential historical links that may have facilitated the development of those characteristics. Twenty-three currently or previously existing technique systems requiring radiography for subluxation analysis were found using a search of the internet, books and consultation with experts. Evidence of religiosity from the early founders' writings was compared with textbooks, published papers, and websites of subsequently developed systems. Six criteria denoting religious thinking were developed using definitions from various sources. They are: supernatural concepts, claims of supremacy, rules and rituals, sacred artefacts, sacred stories, and special language. All of these were found to a greater or lesser degree in the publicly available documents of all the subluxation-based chiropractic x-ray systems. The founders and early pioneers of chiropractic did not benefit from the current understanding of science and research, and therefore substituted deductive and inductive reasoning to arrive at conclusions about health and disease in the human body. Some of this thinking and rationalisation

  20. Mechanisms to Overcome Negative Social Identity and Legitimyze the System and the Stigma in the “El Castillo” Community, La Pintana, Chile

    Directory of Open Access Journals (Sweden)

    Héctor Cavieres Higuera

    2016-12-01

    Full Text Available The present research explored the use of negative social identity coping mechanisms by the inhabitants of the El Castillo community in Santiago, Chile. The implications of such mechanisms to the legitimation of the social order are also analyzed. Methodologically this is an exploratory study based in open interviews, which were analyzed from the “social discourse analysis” approach. Findings show the existence of individual and cognitive mechanisms that legitimize the stereotypes of being criminals and drugdealers; also a dichotomous vision is produced regarding the inhabitants of the comunity that is based on the premise of “choice” or their rootlessness with the territory. Keywords: negative social identity, stigma, system justification

  1. Islamic Beliefs and Practices.

    Science.gov (United States)

    Sefein, Naim A.

    1981-01-01

    To help social studies classroom teachers present a realistic picture of the Middle Eastern religion of Islam, this article presents an overview of major beliefs and religious practices of Moslems. Information is presented on religious fundamentals, Islam's relationship to Judaism and Christianity, the development of Islam, the role of women, and…

  2. Feeling Is Believing: Inspiration Encourages Belief in God.

    Science.gov (United States)

    Critcher, Clayton R; Lee, Chan Jean

    2018-05-01

    Even without direct evidence of God's existence, about half of the world's population believes in God. Although previous research has found that people arrive at such beliefs intuitively instead of analytically, relatively little research has aimed to understand what experiences encourage or legitimate theistic belief systems. Using cross-cultural correlational and experimental methods, we investigated whether the experience of inspiration encourages a belief in God. Participants who dispositionally experience more inspiration, were randomly assigned to relive or have an inspirational experience, or reported such experiences to be more inspirational all showed stronger belief in God. These effects were specific to inspiration (instead of adjacent affective experiences) and a belief in God (instead of other empirically unverifiable claims). Being inspired by someone or something (but not inspired to do something) offers a spiritually transcendent experience that elevates belief in God, in part because it makes people feel connected to something beyond themselves.

  3. Teacher Beliefs and Technology Integration

    Science.gov (United States)

    Kim, ChanMin; Kim, Min Kyu; Lee, Chiajung; Spector, J. Michael; DeMeester, Karen

    2013-01-01

    The purpose of this exploratory mixed methods study was to investigate how teacher beliefs were related to technology integration practices. We were interested in how and to what extent teachers' (a) beliefs about the nature of knowledge and learning, (b) beliefs about effective ways of teaching, and (c) technology integration practices were…

  4. Underestimating belief in climate change

    Science.gov (United States)

    Jost, John T.

    2018-03-01

    People are influenced by second-order beliefsbeliefs about the beliefs of others. New research finds that citizens in the US and China systematically underestimate popular support for taking action to curb climate change. Fortunately, they seem willing and able to correct their misperceptions.

  5. Understanding American Identity: An Introduction

    Science.gov (United States)

    2017-12-01

    this leads to is, how can we begin this transformation ? D. HOW TO GET THERE: PATRIOTIC BUILDING BLOCKS 1. Civic Education Many have argued that civic... transformation of the U.S. public education system and writes, “High schools brought young people together into an adolescent world that helped to obscure...Revamped civic education and national service programs can serve to form those cross-cutting ties. 14. SUBJECT TERMS American identity, national identity

  6. Social Networks’ Benefits, Privacy, and Identity Theft: KSA Case Study

    OpenAIRE

    Ahmad A. Al-Daraiseh; Afnan S. Al-Joudi; Hanan B. Al-Gahtani; Maha S. Al-Qahtani

    2014-01-01

    Privacy breaches and Identity Theft cases are increasing at an alarming rate. Social Networking Sites (SN’s) are making it worse. Facebook (FB), Twitter and other SN’s offer attackers a wide and easily accessible platform. Privacy in the Kingdom of Saudi Arabia (KSA) is extremely important due to cultural beliefs besides the other typical reasons. In this research we comprehensively cover Privacy and Identity Theft in SNs from many aspects; such as, methods of stealing, contributing factors, ...

  7. Cross Racial Identity Scale (CRIS) scores and profiles in African American adolescents involved with the juvenile justice system.

    Science.gov (United States)

    Worrell, Frank C; Andretta, James R; Woodland, Malcolm H

    2014-10-01

    In this study, we examined the internal consistency and structural validity of Cross Racial Identity Scale (CRIS) scores in a sample of 477 African American adolescents who had been arrested in a city in the mid-Atlantic. Using cluster analysis, we also identified profiles of CRIS scores and compared adolescents with different profiles on Major Depressive Episode, Manic Episode, Generalized Anxiety Disorder, and Obsessive-Compulsive Disorder scores. Results indicated that CRIS subscale scores were reliable, and the 6-factor structure of the CRIS was supported. Five nigrescence profiles were identified: Miseducation-Pro-Black, Conflicted-Self-Hatred, Multiculturalist, Low Race Salience, and Conflicted-Anti-White. Individuals with Conflicted-Self-Hatred profiles reported significantly and meaningfully higher scores on the 4 syndromes than did their peers, and individuals with the Multiculturalist and Low Race Salience profiles reported the lowest scores. A greater percentage of individuals with Conflicted racial identity profiles had syndrome scores in the clinically significant range. The results of this study demonstrate that some of the nigrescence profiles found in college-age students generalize to adolescents. The implications of the findings for theory, research, and practice are discussed. PsycINFO Database Record (c) 2014 APA, all rights reserved.

  8. Belief Systems and Language Understanding

    Science.gov (United States)

    1975-01-01

    Sedlak (1074), Searle (1060), Gtrawson (196U), and Wittgenstein (1958). [4] (1973), Charniak (1072), ilcCarthy and Hayes (1969), HcDermott (107...in Speech Acts", Philosophical Review 73, ^39-460. Wittgenstein , Ludwig 1958 Philosophical Investigations ( New York: The Macmillan Co.) (Tr

  9. Breast Health Belief Systems Study

    National Research Council Canada - National Science Library

    Williams, Mary

    1998-01-01

    ... (200 at each of 3 sites) who have not received a diagnosis of breast cancer, and (3) quantitatively test the effectiveness of an educational approach that utilizes an existing network of lay workers who are indigenous to the target communities...

  10. Identity after Death

    DEFF Research Database (Denmark)

    Gerstrøm, Anna

    2015-01-01

    Purpose: The purpose of this paper is to explore how legacy organizational identity and death relate to each other and, thereby, contribute to closing the gap in knowledge on organizational identity constructions in times of death. Design/methodology/approach: The paper opted for an exploratory....../value: This paper addresses an apparent gap in the literature on identity and death; exploring identity narratives in a bankrupted bank, the paper considers constructions of legacy organizational identities in times of disruptive death....

  11. Asian American Adolescent Identity

    OpenAIRE

    Ohm, Julie Juhye

    1999-01-01

    The formation of ego identity in Asian American late adolescents attending Virginia Tech was examined within the frameworks of Erikson's psychosocial theory and Berry, Trimble, and Olmedo's model of acculturation. Ego identity was measured using the Achieved sub-scale of the Revised Version of the Extended Objective Measure of Ego Identity Status, an instrument based on the theoretical constructs of Erikson. Ethnic identity was measured using the Multigroup Ethnic Identity Measure and America...

  12. Illness beliefs and psychological outcome in people with Parkinson's disease.

    Science.gov (United States)

    Simpson, Jane; Lekwuwa, Godwin; Crawford, Trevor

    2013-06-01

    Illness beliefs are important predictors of psychological outcome in people with chronic illness and evidence suggests these could also be significant in furthering our understanding of psychological functioning in people with Parkinson's disease. Illness beliefs are specific, dynamic representations of an illness and cover dimensions such as cause, identity, consequences and controllability. Eighty-one people with Parkinson's disease completed a series of questionnaires to provide demographic, clinical and psychosocial data, which were then used to assess the relative impact of illness beliefs on their psychological functioning. Psychological functioning was assessed by measuring levels of depression, anxiety, stress, positive affect and emotional well-being. Hierarchical block regression indicated that illness beliefs were important independent predictors across some but not all outcomes and the results emphasised the importance of testing new predictors against more established predictors of outcome such as physical functioning and self-esteem. The illness beliefs most important in psychological outcome in people with PD were causal beliefs (particularly in psychosocial causes) and illness coherence (the level of understanding of the illness). The therapeutic potential of psychosocial variables was discussed given that these can be modified during therapy and this change can positively influence psychological outcome.

  13. Evolving Beliefs about Teaching and Learning. The View from Hofstra University: A Perspective on Teachers' Beliefs and Their Effects.

    Science.gov (United States)

    O'Loughlin, Michael

    This paper examines the notion of teacher beliefs as complex ideological systems which have a bearing on actions. The focus is on the beliefs that students bring into their formal teacher education program, which are based on their predominantly authoritarian and didactic schooling experience. These students enter teacher education with…

  14. Accurate determination of genetic identity for a single cacao bean, using molecular markers with a nanofluidic system, ensures cocoa authentication.

    Science.gov (United States)

    Fang, Wanping; Meinhardt, Lyndel W; Mischke, Sue; Bellato, Cláudia M; Motilal, Lambert; Zhang, Dapeng

    2014-01-15

    Cacao (Theobroma cacao L.), the source of cocoa, is an economically important tropical crop. One problem with the premium cacao market is contamination with off-types adulterating raw premium material. Accurate determination of the genetic identity of single cacao beans is essential for ensuring cocoa authentication. Using nanofluidic single nucleotide polymorphism (SNP) genotyping with 48 SNP markers, we generated SNP fingerprints for small quantities of DNA extracted from the seed coat of single cacao beans. On the basis of the SNP profiles, we identified an assumed adulterant variety, which was unambiguously distinguished from the authentic beans by multilocus matching. Assignment tests based on both Bayesian clustering analysis and allele frequency clearly separated all 30 authentic samples from the non-authentic samples. Distance-based principle coordinate analysis further supported these results. The nanofluidic SNP protocol, together with forensic statistical tools, is sufficiently robust to establish authentication and to verify gourmet cacao varieties. This method shows significant potential for practical application.

  15. Keeping identity private

    DEFF Research Database (Denmark)

    Adjei, Joseph K.; Olesen, Henning

    2011-01-01

    information. On the other hand, consumers have expressed concerns that their rights and ability to control their personal information are violated. Paradoxically, it appears that users provide personal data freely and willingly, as it has been observed on Facebook and other social networks. This study...... is an attempt to understand the relationship between individuals’ intentions to disclose personal information, their actual personal information disclosure behaviours, and how these can be leveraged to develop privacy-enhancing identity management systems (IDMS) that users can trust. Legal, regu...

  16. Identity Management A Primer

    CERN Document Server

    Sharoni, Ilan; Williamson, Graham; Yip, David

    2009-01-01

    In an age in which the boundaries between the real and the virtual are becoming increasingly blurred, this timely guide teaches both the key issues of identity management as well as appropriate strategies and preventative measures for ensuring personal safety in the virtual world. In a corporate setting, it is essential to identify and control the way in which the organization deals with customers, suppliers, employees, and other users who may interact with the information systems of the company. Providing strategies for overcoming this task in real-world terms as well as questions that assist

  17. Identity and Conflict: Personality, Sociality and Culturality

    Directory of Open Access Journals (Sweden)

    Rik Pinxten

    1997-05-01

    Full Text Available We presented a model which describes the field of questions on identity as a field of dynamics. It is structured by means of particular, temporal configurations of identity through time and space. The theory of dynamic systems provides us with precise models for the representation of forms of identity, or of their evolution towards types of so-called chaos, given certain conditions. The model allows us to work in a comparative perspective, which is a sure advantage in conflict analysis. The complexity of identity phenomena is captured covering individual, group and community dynamics of identity.

  18. Identity Work and Emotions

    DEFF Research Database (Denmark)

    Winkler, Ingo

    2018-01-01

    This paper reviews the empirical literature on identity work and identifies two distinct approaches to incorporating emotion. The majority of empirical studies use emotion to describe the experiences of identity work. In doing so, the authors (a) mention the emotions that people feel in situations...... that trigger identity work, (b) illustrate identity work as an emotional endeavour, and (c) describe the emotional impact of successful and unsuccessful identity work. There is also an emerging literature that examines the mutual constitution of emotions and identity work. These authors address emotional...... labour, affective social identification, emotional attachment and detachment, and humour when studying identity work. This paper suggests that, to understand better the relation between emotions and identity work, future research should examine the role of emotions in problematizing identity...

  19. Ontological confusions but not mentalizing abilities predict religious belief, paranormal belief, and belief in supernatural purpose.

    Science.gov (United States)

    Lindeman, Marjaana; Svedholm-Häkkinen, Annika M; Lipsanen, Jari

    2015-01-01

    The current research tested the hypothesis that the abilities for understanding other people's minds give rise to the cognitive biases that underlie supernatural beliefs. We used structural equation modeling (N=2789) to determine the roles of various mentalizing tendencies, namely self-reported affective and cognitive empathy (i.e., mind reading), actual cognitive and affective empathic abilities, hyper-empathizing, and two cognitive biases (core ontological confusions and promiscuous teleology) in giving rise to supernatural beliefs. Support for a path from mentalizing abilities through cognitive biases to supernatural beliefs was weak. The relationships of mentalizing abilities with supernatural beliefs were also weak, and these relationships were not substantially mediated by cognitive biases. Core ontological confusions emerged as the best predictor, while promiscuous teleology predicted only a small proportion of variance. The results were similar for religious beliefs, paranormal beliefs, and for belief in supernatural purpose. Copyright © 2014 Elsevier B.V. All rights reserved.

  20. Hermeneutics in identity formation: Paul's use of Genesis in ...

    African Journals Online (AJOL)

    Test

    2010-08-06

    Aug 6, 2010 ... culture including religious belief, custom and ritual that provoked .... members of a group, rather than in their individual capacity. ... threefold taxonomy of his research (perceptual accentuation, ... The strong sense of identity in a collectivist or group- ..... invitation for identification whilst the ethical dimension.

  1. Is Personal Identity Evaluative? | Poltera | South African Journal of ...

    African Journals Online (AJOL)

    Martha Nussbaum subscribes to the view that our identity is an evaluative question determined by our common, deeply held beliefs about what is worthwhile in human life. In so doing, she asserts that for an account of ethics to have “philosophical power” it needs to be grounded in an account of human nature that is both ...

  2. The Professional Identity of Mathematics Teachers in Further Education

    Science.gov (United States)

    Dalby, Diane

    2017-01-01

    Professional identities may be viewed as narrative constructions in social situations but personal experiences and beliefs are fundamental influences in their development. Within Further Education colleges in England, mathematics teachers are typically expected to fulfil multiple roles, teaching a wide range of curricula and age groups, and this…

  3. On Fay identity

    International Nuclear Information System (INIS)

    Michev, Iordan P.

    2006-01-01

    In the first part of this paper we consider the transformation of the cubic identities for general Korteweg-de Vries (KdV) tau functions from [Mishev, J. Math. Phys. 40, 2419-2428 (1999)] to the specific identities for trigonometric KdV tau functions. Afterwards, we consider the Fay identity as a functional equation and provide a wide set of solutions of this equation. The main result of this paper is Theorem 3.4, where we generalize the identities from Mishev. An open problem is the transformation of the cubic identities from Mishev to the specific identities for elliptic KdV tau functions

  4. Identities as organizational practices

    DEFF Research Database (Denmark)

    Oshima, Sae; Asmuß, Birte

    Identity has been widely acknowledged as playing a central role in various organizational processes, yet there is still a need to better understand the dynamics and functions of identity work in modern organizations. The present paper is centered within this concern, and examines identity......) reveal the intersubjective, multimodal and embodied nature of identity work; 2) demonstrate identity work as organizational practices, used in order to accomplish specific actions; and 3) pose a question on the view on identity as a layered/leveled phenomenon....

  5. The Supermalt identity

    DEFF Research Database (Denmark)

    Bech-Larsen, Tino; Esbjerg, Lars; Grunert, Klaus G.

    2007-01-01

    on consumers' self-identities. The second part explored the role of food and beverage products in the construction of self-identities. The final part focused on the construction of brand identity for Supermalt. Findings - The article provides information on the self-identities constructed by Afro......-Caribbean informants. The food and beverage consumption of informants reflects their mixed cultural identity. The brand identity Supermalt appears to be malleable, with ample room for consumer co-construction. Perceptions of brand identity differ markedly among informants, who are all able to construct Supermalt......Purpose - The objective of this article is to conduct a case study of the Supermalt brand of malt beer, which has become the preferred beverage of Afro-Caribbean consumers in Brixton on a very limited marketing budget. Design/methodology/approach - The article uses the concepts of personal identity...

  6. Researching Identity and Interculturality

    DEFF Research Database (Denmark)

    Lønsmann, Dorte

    2016-01-01

    Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp.......Review of: Researching Identity and Interculturality / by F. Dervin and K. Risager (eds.). Routledge 2015, 245 pp....

  7. Understanding Identity and Organizations

    DEFF Research Database (Denmark)

    Christensen, Lars Thøger

    2013-01-01

    The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott.......The article reviews the book "Understanding Identity and Organizations," by Kate Kenny, Andrea Whitle, and Hugh Wilmott....

  8. Economic Beliefs and Party Preference

    OpenAIRE

    Michael W.M. Roos; Andreas Orland

    2014-01-01

    This paper reports the results of a questionnaire study used to explore the economic understanding, normative positions along the egalitarian-libertarian spectrum, and the party preferences of a large student sample. The aim of the study is both to find socio-economic determinants of normative and positive beliefs and to explore how beliefs about the economy influence party support. We find that positive beliefs of lay people differ systematically from those of economic experts. Positive beli...

  9. Education Reform as if Student Agency Mattered: Academic Microcultures and Student Identity.

    Science.gov (United States)

    Jackson, D. Bruce

    2003-01-01

    Argues that identity-sensitive education, focused on improving students' attitudes and beliefs about their own learning, is essential for academic success. Describes three models of identity-sensitive education: charismatic teacher, "together we'll make it," and "intellectual hothouse." Identifies common characteristics of…

  10. From the Classroom to the Keyboard: How Seven Teachers Created Their Online Teacher Identities

    Science.gov (United States)

    Richardson, Jennifer C.; Alsup, Janet

    2015-01-01

    Teacher identity is defined as a sense of teacher self that results from a productive combination of key personal and professional subjectivities or beliefs. Much empirical research has been done on the development of teacher identity in the K-12 arena, with a great deal of theoretical and philosophical scholarship about teaching at the college…

  11. Evaluation of an Intervention to Help Students Avoid Unintentional Plagiarism by Improving Their Authorial Identity

    Science.gov (United States)

    Elander, James; Pittam, Gail; Lusher, Joanne; Fox, Pauline; Payne, Nicola

    2010-01-01

    Students with poorly developed authorial identity may be at risk of unintentional plagiarism. An instructional intervention designed specifically to improve authorial identity was delivered to 364 psychology students at three post-1992 universities in London, UK, and evaluated with before-and-after measures of beliefs and attitudes about academic…

  12. Design and Construction of an Entity Resolution System that Supports Entity Identity Information Management and Asserted Resolution

    Science.gov (United States)

    Nelson, Eric Derrand

    2011-01-01

    This work describes the design and construction of an open source, entity resolution system that enables users to assign and maintain persistent identifiers for master data items. Two key features of this system that are not available in current ER systems and that make persistent identification possible are (1) The capture and management of…

  13. Homo economicus belief inhibits trust.

    Directory of Open Access Journals (Sweden)

    Ziqiang Xin

    Full Text Available As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners' benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals' homo economicus belief and inhibit their trust. It seems that people's increasing homo economicus belief may serve as one cause of the worldwide decline of trust.

  14. Homo Economicus Belief Inhibits Trust

    Science.gov (United States)

    Xin, Ziqiang; Liu, Guofang

    2013-01-01

    As a foundational concept in economics, the homo economicus assumption regards humans as rational and self-interested actors. In contrast, trust requires individuals to believe partners’ benevolence and unselfishness. Thus, the homo economicus belief may inhibit trust. The present three experiments demonstrated that the direct exposure to homo economicus belief can weaken trust. And economic situations like profit calculation can also activate individuals’ homo economicus belief and inhibit their trust. It seems that people’s increasing homo economicus belief may serve as one cause of the worldwide decline of trust. PMID:24146907

  15. Feminist identity, body image, and disordered eating

    Science.gov (United States)

    Borowsky, Hannah M.; Eisenberg, Marla E.; Bucchianeri, Michaela M.; Piran, Niva; Neumark-Sztainer, Dianne

    2016-01-01

    Using data from a community-based sample (Project EAT-III), this study (N = 1241; mean age = 25.2) examined the relationship of feminist identity with body image and disordered eating. Feminist-identified women reported significantly higher body satisfaction than non-feminist women and women who did not identify as feminists but held feminist beliefs. However, feminist-identified women did not differ from non-feminist women in disordered eating. Women holding feminist beliefs and non-feminist women did not differ in body satisfaction. Our findings suggest that self-identification as a feminist may promote positive body image in young adult women, but may be insufficient to change behaviors. PMID:26694553

  16. Feminist identity, body image, and disordered eating.

    Science.gov (United States)

    Borowsky, Hannah M; Eisenberg, Marla E; Bucchianeri, Michaela M; Piran, Niva; Neumark-Sztainer, Dianne

    2016-01-01

    Using data from a community-based sample (Project EAT-III), this study (N = 1241; mean age = 25.2) examined the relationship of feminist identity with body image and disordered eating. Feminist-identified women reported significantly higher body satisfaction than non-feminist women and women who did not identify as feminists but held feminist beliefs. However, feminist-identified women did not differ from non-feminist women in disordered eating. Women holding feminist beliefs and non-feminist women did not differ in body satisfaction. Our findings suggest that self-identification as a feminist may promote positive body image in young adult women, but may be insufficient to change behaviors.

  17. Components of Sexual Identity

    Science.gov (United States)

    Shively, Michael G.; DeCecco, John P.

    1977-01-01

    This paper examines the four components of sexual identity: biological sex, gender identity, social sex-role, and sexual orientation. Theories about the development of each component and how they combine and conflict to form the individual's sexual identity are discussed. (Author)

  18. Being Tolerant about Identity?

    NARCIS (Netherlands)

    van Rooij, R.; Gutzmann, D.; Köpping, J.; Meier, C.

    2014-01-01

    Identity and identification are very important concepts in philosophy and logic. They are crucial for the analysis of quantification and for counting. According to some philosophers, many examples that are supposed to show that identity is contingent, in fact show that the notion of identity is

  19. Implicit false-belief processing in the human brain.

    Science.gov (United States)

    Schneider, Dana; Slaughter, Virginia P; Becker, Stefanie I; Dux, Paul E

    2014-11-01

    Eye-movement patterns in 'Sally-Anne' tasks reflect humans' ability to implicitly process the mental states of others, particularly false-beliefs - a key theory of mind (ToM) operation. It has recently been proposed that an efficient ToM system, which operates in the absence of awareness (implicit ToM, iToM), subserves the analysis of belief-like states. This contrasts to consciously available belief processing, performed by the explicit ToM system (eToM). The frontal, temporal and parietal cortices are engaged when humans explicitly 'mentalize' about others' beliefs. However, the neural underpinnings of implicit false-belief processing and the extent to which they draw on networks involved in explicit general-belief processing are unknown. Here, participants watched 'Sally-Anne' movies while fMRI and eye-tracking measures were acquired simultaneously. Participants displayed eye-movements consistent with implicit false-belief processing. After independently localizing the brain areas involved in explicit general-belief processing, only the left anterior superior temporal sulcus and precuneus revealed greater blood-oxygen-level-dependent activity for false- relative to true-belief trials in our iToM paradigm. No such difference was found for the right temporal-parietal junction despite significant activity in this area. These findings fractionate brain regions that are associated with explicit general ToM reasoning and false-belief processing in the absence of awareness. Copyright © 2014 Elsevier Inc. All rights reserved.

  20. Complex dilemmas of identity and practice

    Science.gov (United States)

    Enyedy, Noel; Goldberg, Jennifer; Muir Welsh, Kate

    2006-01-01

    Identity is a complex construct, yet extremely important if we wish to understand the practice of teaching as a profession. In this paper, we examine the ways two middle school teachers talk about their identity and teaching practices and coordinate these self-reports with our own observations of how they implement a new environmental science curriculum. More specifically, we compare the teachers' beliefs about learning, goals for the classroom community and for instruction, and their knowledge of science content, and pedagogy. Furthermore, we discuss teaching dilemmas, which arise for these teachers as their identities and practices intersect and at times conflict. We argue, however, that a focus on practice and outcomes is an important, but limited aspect of what we, as a field, need to consider when attempting to understand the complexities of teaching and learning. Therefore, we continue to expand our understanding of two science classrooms as we examine the teachers' multiple identities in relation to their implementation of a science curriculum. The identity portraits from this study provide a rich and complicated account of the implementation of a science curriculum and illuminate a number of potential obstacles and pitfalls, which may inform the way we as a field reflect on curriculum and professional development.

  1. Synchronization of Two Non-Identical Coupled Exciters in a Non-Resonant Vibrating System of Linear Motion. Part II: Numeric Analysis

    Directory of Open Access Journals (Sweden)

    Chunyu Zhao

    2009-01-01

    Full Text Available The paper focuses on the quantitative analysis of the coupling dynamic characteristics of two non-identical exciters in a non-resonant vibrating system. The load torque of each motor consists of three items, including the torque of sine effect of phase angles, that of coupling sine effect and that of coupling cosine effect. The torque of frequency capture results from the torque of coupling cosine effect, which is equal to the product of the coupling kinetic energy, the coefficient of coupling cosine effect, and the sine of phase difference of two exciters. The motions of the system excited by two exciters in the same direction make phase difference close to π and that in opposite directions makes phase difference close to 0. Numerical results show that synchronous operation is stable when the dimensionless relative moments of inertia of two exciters are greater than zero and four times of their product is greater than the square of their coefficient of coupling cosine effect. The stability of the synchronous operation is only dependent on the structural parameters of the system, such as the mass ratios of two exciters to the vibrating system, and the ratio of the distance between an exciter and the centroid of the system to the equivalent radius of the system about its centroid.

  2. Belief Control Practices and Organizational Performances: A Survey ...

    African Journals Online (AJOL)

    Belief Control Practices and Organizational Performances: A Survey of Sugar Industry in Kenya. ... employees in the company core values and design of strategic control systems to cope with changing internal and external operating business ...

  3. Inclusive education: a case of beliefs competing for implementation

    African Journals Online (AJOL)

    However, this exclusionary agenda positioned the school as inclusive on the grounds ... by Lewin's theory of planned change, the study identified four belief systems which ...... International Journal of Educational Development, 31:50-58.

  4. Identifying values and beliefs in an outcomes-based curriculum

    African Journals Online (AJOL)

    Erna Kinsey

    In an analysis of Curriculum 2005 and the National Curriculum Statement, value and belief systems ... directives for teachers about the identification of values within the ... Parks (Fowler et al., 1992:106) makes a distinction between religion,.

  5. Identity and Professional Networking.

    Science.gov (United States)

    Raj, Medha; Fast, Nathanael J; Fisher, Oliver

    2017-06-01

    Despite evidence that large professional networks afford a host of financial and professional benefits, people vary in how motivated they are to build such networks. To help explain this variance, the present article moves beyond a rational self-interest account to examine the possibility that identity shapes individuals' intentions to network. Study 1 established a positive association between viewing professional networking as identity-congruent and the tendency to prioritize strengthening and expanding one's professional network. Study 2 revealed that manipulating the salience of the self affects networking intentions, but only among those high in networking identity-congruence. Study 3 further established causality by experimentally manipulating identity-congruence to increase networking intentions. Study 4 examined whether identity or self-interest is a better predictor of networking intentions, providing support for the former. These findings indicate that identity influences the networks people develop. Implications for research on the self, identity-based motivation, and professional networking are discussed.

  6. Canonical ward identities in generalized QCD

    International Nuclear Information System (INIS)

    Li Ziping

    1995-01-01

    The canonical Ward identities for a system with singular higher-order Lagrangian are derived and some application to the generalized QCD are given. The new relations of the Ward identities for gauge ghost field proper vertices are obtained which differ from the usual Ward-Takahashi identities arising from BRS invariance. The expressions for PCAC and generalized PCAC of AVV vertices are also obtained

  7. Chaos anti-synchronization of two non-identical chaotic systems with known or fully unknown parameters

    International Nuclear Information System (INIS)

    Al-Sawalha, Ayman

    2009-01-01

    This work is devoted to investigating the anti-synchronization between two novel different chaotic systems. Two different anti-synchronization methods are proposed. Active control is applied when system parameters are known and adaptive control is employed when system parameters are uncertain or unknown. Controllers and update laws of parameters are designed based on Lyapunov stability theory. In both cases, sufficient conditions for the anti-synchronization are obtained analytically. Finally, a numerical simulations is presented to show the effectiveness of the proposed chaos anti-synchronization schemes.

  8. Belief update as social choice

    NARCIS (Netherlands)

    van Benthem, J.; Girard, P.; Roy, O.; Marion, M.

    2011-01-01

    Dynamic epistemic-doxastic logics describe the new knowledge or new beliefs indexBelief of agents after some informational event has happened. Technically, this requires an update rule that turns a doxastic-epistemic modelM(recording the current information state of the agents) and a dynamic ‘event

  9. Free will and paranormal beliefs.

    Science.gov (United States)

    Mogi, Ken

    2014-01-01

    Free will is one of the fundamental aspects of human cognition. In the context of cognitive neuroscience, various experiments on time perception, sensorimotor coordination, and agency suggest the possibility that it is a robust illusion (a feeling independent of actual causal relationship with actions) constructed by neural mechanisms. Humans are known to suffer from various cognitive biases and failures, and the sense of free will might be one of them. Here I report a positive correlation between the belief in free will and paranormal beliefs (UFO, reincarnation, astrology, and psi). Web questionnaires involving 2076 subjects (978 males, 1087 females, and 11 other genders) were conducted, which revealed significant positive correlations between belief in free will (theory and practice) and paranormal beliefs. There was no significant correlation between belief in free will and knowledge in paranormal phenomena. Paranormal belief scores for females were significantly higher than those for males, with corresponding significant (albeit weaker) difference in belief in free will. These results are consistent with the view that free will is an illusion which shares common cognitive elements with paranormal beliefs.

  10. Assessment of Religious Beliefs Form.

    Science.gov (United States)

    Faiver, Christopher M.; O'Brien, Eugene M.

    1993-01-01

    Notes that religion may be source of spiritual strength or source of conflict and guilt. Outlines importance of assessing religious beliefs of clients for treatment purposes and provides format for counselor to use. Says that, because counselors may be unaware of clients' individual perspectives, it is important to evaluate client's belief system…

  11. Playing with knowledge and belief

    NARCIS (Netherlands)

    Fiutek, V.

    2013-01-01

    This thesis contributes to the development of Soft Dynamic Epistemic Logic (Soft DEL). Soft DEL has been introduced to deal with a number of informational phenomena, including belief revision. The work in this thesis extends the scope of Soft DEL to belief contraction, providing as such a framework

  12. Free will and paranormal beliefs

    Science.gov (United States)

    Mogi, Ken

    2014-01-01

    Free will is one of the fundamental aspects of human cognition. In the context of cognitive neuroscience, various experiments on time perception, sensorimotor coordination, and agency suggest the possibility that it is a robust illusion (a feeling independent of actual causal relationship with actions) constructed by neural mechanisms. Humans are known to suffer from various cognitive biases and failures, and the sense of free will might be one of them. Here I report a positive correlation between the belief in free will and paranormal beliefs (UFO, reincarnation, astrology, and psi). Web questionnaires involving 2076 subjects (978 males, 1087 females, and 11 other genders) were conducted, which revealed significant positive correlations between belief in free will (theory and practice) and paranormal beliefs. There was no significant correlation between belief in free will and knowledge in paranormal phenomena. Paranormal belief scores for females were significantly higher than those for males, with corresponding significant (albeit weaker) difference in belief in free will. These results are consistent with the view that free will is an illusion which shares common cognitive elements with paranormal beliefs. PMID:24765084

  13. Comparing strengths of beliefs explicitly

    NARCIS (Netherlands)

    Ghosh, S.; de Jongh, D.

    2013-01-01

    Inspired by a similar use in provability logic, formulas p > B q and p ≥ B q are introduced in the existing logical framework for discussing beliefs to express that the strength of belief in p is greater than (or equal to) that in q. Besides its usefulness in studying the properties of the concept

  14. Free will and paranormal beliefs

    Directory of Open Access Journals (Sweden)

    Ken eMogi

    2014-04-01

    Full Text Available Free will is one of the fundamental aspects of human cognition. In the context of cognitive neuroscience, various experiments on time perception, sensorimotor coordination, and agency suggest the possibility that it is a robust illusion (a feeling independent of actual causal relationship with actions constructed by neural mechanisms. Humans are known to suffer from various cognitive biases and failures, and the sense of free will might be one of them. Here I report a positive correlation between the belief in free will and paranormal beliefs (UFO, reincarnation, astrology, and psi. Web questionnaires involving 2076 subjects (978 males, 1087 females, and 11 other genders were conducted, which revealed significant positive correlations between belief in free will (theory and practice and paranormal beliefs. There was no significant correlation between belief in free will and knowledge in paranormal phenomena. Paranormal belief scores for females were significantly higher than those for males, with corresponding significant (albeit weaker difference in belief in free will. These results are consistent with the view that free will is an illusion which shares common cognitive elements with paranormal beliefs.

  15. Equilibria in social belief removal

    CSIR Research Space (South Africa)

    Booth, R

    2008-09-01

    Full Text Available In studies of multi-agent interaction, especially in game theory, the notion of equilibrium often plays a prominent role. A typical scenario for the belief merging problem is one in which several agents pool their beliefs together to form a...

  16. Politics of climate change belief

    Science.gov (United States)

    2017-01-01

    Donald Trump's actions during the election and his first weeks as US president-elect send a strong message about his belief in climate change, or lack thereof. However, these actions may reflect polarization of climate change beliefs, not climate mitigation behaviour.

  17. Slow collisions between identical atoms in a laser field: Application of the Born and Markov approximations to the system of moving atoms

    International Nuclear Information System (INIS)

    Trippenbach, M.; Gao, B.; Cooper, J.; Burnett, K.

    1992-01-01

    We have derived reduced-density-matrix equations of motion for a pair of two identical atoms moving in the radiation field as the first step in establishing a theory of collisional redistribution of light from neutral-atom traps. We use the Zwanzig projection-operator technique to average over spontaneous field modes and establish the conditions under which Born and Markov approximations can be applied to the system of moving atoms. It follows from these considerations that when these conditions hold, the reduced-density-matrix equation for moving atoms has the same form as that for the stationary case: time dependence is introduced into the decay rates and interaction potentials by making the substitution R=R(t)

  18. Destiny, Miracle Healers and Magical Intervention: Vernacular Beliefs on Involuntary Childlessness in Estonia

    Directory of Open Access Journals (Sweden)

    Reet Hiiemäe

    2017-12-01

    Full Text Available The article focuses on the dynamics of contemporary beliefs related to involuntary childlessness. Firstly, the methodological issues of collecting source material on delicate matters and the advantages of anonymous and narrative presentation modes in certain contexts will be discussed. Secondly, conclusions drawn from the collected material, i.e. the temporary and changeable nature of those beliefs, their relations with the mass media, the social and the individual aspects and the motifs of guilt and supernatural punishment in the context of identity issues will be presented, concluding that such belief-based models of explanation and help-seeking eventually function as a mental self-defence mechanism.

  19. LIGO: The strong belief

    CERN Multimedia

    Antonella Del Rosso

    2016-01-01

    Twenty years of designing, building and testing a number of innovative technologies, with the strong belief that the endeavour would lead to a historic breakthrough. The Bulletin publishes an abstract of the Courier’s interview with Barry Barish, one of the founding fathers of LIGO.   The plots show the signals of gravitational waves detected by the twin LIGO observatories at Livingston, Louisiana, and Hanford, Washington. (Image: Caltech/MIT/LIGO Lab) On 11 February, the Laser Interferometer Gravitational-Wave Observatory (LIGO) and Virgo collaborations published a historic paper in which they showed a gravitational signal emitted by the merger of two black holes. These results come after 20 years of hard work by a large collaboration of scientists operating the two LIGO observatories in the US. Barry Barish, Linde Professor of Physics, Emeritus at the California Institute of Technology and former Director of the Global Design Effort for the Internat...

  20. Against Motivational Efficacy of Beliefs

    Directory of Open Access Journals (Sweden)

    Seungbae Park

    2015-07-01

    Full Text Available Danielle Bromwich (2010 argues that a belief is motivationally efficacious in that, other things being equal, it disposes an agent to answer a question in accordance with that belief. I reply that what we are disposed to do is largely determined by our genes, whereas what we believe is largely determined by stimuli from the environment. We have a standing and default disposition to answer questions honestly, ceteris paribus, even before we are exposed to environmental stimuli. Since this standing and default disposition is innate, and our beliefs have their source in environmental stimuli, our beliefs cannot be the source of the disposition. Moreover, a recent finding in neuroscience suggests that motivation is extrinsic to belief.

  1. Interplay of Language Policy, Ethnic Identity and National Identity in Five Different Linguistic Settings

    Directory of Open Access Journals (Sweden)

    Mehdi Gran Hemat

    2012-11-01

    Full Text Available This study, as a concise and critical literature review, examines related studies that investigated the interplay of the three constructs: ethnic identity, national identity and language policy. To do this, five related research articles were located and their similarities and differences in terms of their findings and methodologies were compared and contrasted. The literature review reveals that the researchers have utilized both quantitative and qualitative methods to obtain data. The findings show that ethnic identity is the contextualization of history, beliefs, customs, spiritual values, etc. of a speech community which practice their culture and values via the medium of language. National identity which emerges in time can be defined as an embodiment of the all common cultural values and social practices of different ethnic groups inside the borders of any country, and this is also manifested through a common language used as the formal and official language of their country. However, identity is a notion that remains rather illusive in its operationalization. Finally, language policy may be representative of a body of law, regulation and authoritative linguistic planned programs which are imposed on societies by governments. Language policies as nation building activities can improve the sense of nationality and reduce ethnic discords, and in the event may also suppress the maintenance or development of ethnic identity.

  2. National and Transnational Identities

    DEFF Research Database (Denmark)

    Jørgensen, Martin Bak

    within the Turkish minority in the three countries with special attention to the influence of transnational social transformation. Social communities and organisations such as trade unions, political parties or religious and cultural association have usually been ascribed the capability to enhance...... relations between individuals and to extend trust, values, identity and social belonging. Whether we focus on the individual and the value of face to face contact or we focus on the role of the organisation as an intervening institution between the state, the political system and the citizen...... in prolongation of the previous development. Conversely do the analyses of the Danish and German case show that models are not static. Denmark followed Sweden shortly after in introducing local voting rights for non-citizens and generally non-citizens enjoy considerable political, social and civic rights...

  3. Quantum entanglement of identical particles

    International Nuclear Information System (INIS)

    Shi Yu

    2003-01-01

    We consider entanglement in a system with a fixed number of identical particles. Since any operation should be symmetrized over all the identical particles and there is the precondition that the spatial wave functions overlap, the meaning of identical-particle entanglement is fundamentally different from that of distinguishable particles. The identical-particle counterpart of the Schmidt basis is shown to be the single-particle basis in which the one-particle reduced density matrix is diagonal. But it does not play a special role in the issue of entanglement, which depends on the single-particle basis chosen. The nonfactorization due to (anti)symmetrization is naturally excluded by using the (anti)symmetrized basis or, equivalently, the particle number representation. The natural degrees of freedom in quantifying the identical-particle entanglement in a chosen single-particle basis are occupation numbers of different single-particle basis states. The entanglement between effectively distinguishable spins is shown to be a special case of the occupation-number entanglement

  4. Gain and offset calibration reduces variation in exposure-dependent SNR among systems with identical digital flat-panel detectors.

    Science.gov (United States)

    Willis, Charles E; Vinogradskiy, Yevgeniy Y; Lofton, Brad K; White, R Allen

    2011-07-01

    The conditions under which vendor performance criteria for digital radiography systems are obtained do not adequately simulate the conditions of actual clinical imaging with respect to radiographic technique factors, scatter production, and scatter control. Therefore, the relationship between performance under ideal conditions and performance in clinical practice remains unclear. Using data from a large complement of systems in clinical use, the authors sought to develop a method to establish expected performance criteria for digital flat-panel radiography systems with respect to signal-to-noise ratio (SNR) versus detector exposure under clinical conditions for thoracic imaging. The authors made radiographic exposures of a patient-equivalent chest phantom at 125 kVp and 180 cm source-to-image distance. The mAs value was modified to produce exposures above and below the mAs delivered by automatic exposure control. Exposures measured free-in-air were corrected to the imaging plane by the inverse square law, by the attenuation factor of the phantom, and by the Bucky factor of the grid for the phantom, geometry, and kilovolt peak. SNR was evaluated as the ratio of the mean to the standard deviation (SD) of a region of interest automatically selected in the center of each unprocessed image. Data were acquired from 18 systems, 14 of which were tested both before and after gain and offset calibration. SNR as a function of detector exposure was interpolated using a double logarithmic function to stratify the data into groups of 0.2, 0.5, 1.0, 2.0, and 5.0 mR exposure (1.8, 4.5, 9.0, 18, and 45 microGy air KERMA) to the detector. The mean SNR at each exposure interval after calibration exhibited linear dependence on the mean SNR before calibration (r2=0.9999). The dependence was greater than unity (m = 1.101 +/- 0.006), and the difference from unity was statistically significant (p grid replacement. The nonconformant behavior of the other system was corrected by replacing

  5. New inquiries related to mestizo identity

    Directory of Open Access Journals (Sweden)

    Patricia Echeverri Posada

    2003-01-01

    Full Text Available Psychoanalysis offers an interpretive framework for the understanding of mestizo identity. The spheres of law and of values serve as the symbolic reference for the construction of this identity. Institutions such as the church, state, and family act as vehicles for transmitting these values, building from them a mestizo imaginary that is re-created in the workplace, beliefs, social opportunities, and in everyday life. The mestizo responds to these social demands that influence his or her social self with values adjusted to his or her reality and re-signified from particular family and cultural histories, which are not exempt from conflict. The Province of Santafé in the second half of the nineteenth century serves as the backdrop to offer reflections on this issue

  6. Cognitive biases explain religious belief, paranormal belief, and belief in life's purpose.

    Science.gov (United States)

    Willard, Aiyana K; Norenzayan, Ara

    2013-11-01

    Cognitive theories of religion have postulated several cognitive biases that predispose human minds towards religious belief. However, to date, these hypotheses have not been tested simultaneously and in relation to each other, using an individual difference approach. We used a path model to assess the extent to which several interacting cognitive tendencies, namely mentalizing, mind body dualism, teleological thinking, and anthropomorphism, as well as cultural exposure to religion, predict belief in God, paranormal beliefs and belief in life's purpose. Our model, based on two independent samples (N=492 and N=920) found that the previously known relationship between mentalizing and belief is mediated by individual differences in dualism, and to a lesser extent by teleological thinking. Anthropomorphism was unrelated to religious belief, but was related to paranormal belief. Cultural exposure to religion (mostly Christianity) was negatively related to anthropomorphism, and was unrelated to any of the other cognitive tendencies. These patterns were robust for both men and women, and across at least two ethnic identifications. The data were most consistent with a path model suggesting that mentalizing comes first, which leads to dualism and teleology, which in turn lead to religious, paranormal, and life's-purpose beliefs. Alternative theoretical models were tested but did not find empirical support. Copyright © 2013 Elsevier B.V. All rights reserved.

  7. Design and Development of an Identity Management System: The Minnesota State College-Southeast Technical Case Study

    Science.gov (United States)

    Elhindi, Mohamed A.

    2010-01-01

    Historically, managing access to information systems (ISs) required direct interaction with a limited number of users. Increasingly, managing access involves handling an increased numbers of internal and external students, faculty, and staff as well as partners such as workforce development centers, the U.S. Department of Education, and the…

  8. Recursive belief manipulation and second-order false-beliefs

    DEFF Research Database (Denmark)

    Braüner, Torben; Blackburn, Patrick Rowan; Polyanskaya, Irina

    2016-01-01

    it indicate that a more fundamental *conceptual change* has taken place? In this paper we extend Braüner's hybrid-logical analysis of first-order false-belief tasks to the second-order case, and argue that our analysis supports a version of the conceptual change position.......The literature on first-order false-belief is extensive, but less is known about the second-order case. The ability to handle second-order false-beliefs correctly seems to mark a cognitively significant step, but what is its status? Is it an example of *complexity only* development, or does...

  9. Collective Dynamics of Belief Evolution under Cognitive Coherence and Social Conformity.

    Science.gov (United States)

    Rodriguez, Nathaniel; Bollen, Johan; Ahn, Yong-Yeol

    2016-01-01

    Human history has been marked by social instability and conflict, often driven by the irreconcilability of opposing sets of beliefs, ideologies, and religious dogmas. The dynamics of belief systems has been studied mainly from two distinct perspectives, namely how cognitive biases lead to individual belief rigidity and how social influence leads to social conformity. Here we propose a unifying framework that connects cognitive and social forces together in order to study the dynamics of societal belief evolution. Each individual is endowed with a network of interacting beliefs that evolves through interaction with other individuals in a social network. The adoption of beliefs is affected by both internal coherence and social conformity. Our framework may offer explanations for how social transitions can arise in otherwise homogeneous populations, how small numbers of zealots with highly coherent beliefs can overturn societal consensus, and how belief rigidity protects fringe groups and cults against invasion from mainstream beliefs, allowing them to persist and even thrive in larger societies. Our results suggest that strong consensus may be insufficient to guarantee social stability, that the cognitive coherence of belief-systems is vital in determining their ability to spread, and that coherent belief-systems may pose a serious problem for resolving social polarization, due to their ability to prevent consensus even under high levels of social exposure. We argue that the inclusion of cognitive factors into a social model could provide a more complete picture of collective human dynamics.

  10. Lenses; systems; sensitive; leadership; models; integral; spiritual; images; evolve; states; stages; consciousness; power; force; determinants; mind; genius; belief systems; evolution; spiritual growth; rationality; attitude

    Directory of Open Access Journals (Sweden)

    Jacobus C. van der Merwe

    2013-07-01

    Full Text Available Lenses on spirituality and being church; the road ahead for the Netherdutch Reformed Church of Africa (NRCA. At this point of time the Netherdutch Reformed Church of Africa (NRCA is facing the seemingly unsolvable dilemma of not being able to handle diversity in a positive manner. By applying three lenses to the current impasse with regards to the church’s struggle with diversity, this article aims at providing an answer to the question of how to proceed. The first lens addresses the challenge to maintain spiritual health and harmony in the midst of differences and tension in the church. The theory behind systems sensitive leadership as lens serves as the guideline to achieve the necessary spiritual health that the church needs in such challenging times. The second lens explores the inner Christian spiritual path in a both developmental and comprehensive way. Drawing on the work of Paul Smith this lens sets forth the developmental framework by which Christians grow inwardly in their understanding of Jesus and his teachings. The third lens is a view on a practice whereby the validity of intellectual positions, statements, or ideologies could be appraised as an innate quality in any subject. This lens opens a unique perspective which provides not only a new understanding of humanity’s journey in the universe, but also serves as a guide to were we and the whole cosmos are on our personal journeys to become who we could be. The vision that is provided by these three lenses has the capacity not only to serve as guidelines, but also to provide the tools to handle the challenges the church has to face on the road a head.

  11. How culture shapes community: bible belief, theological unity, and a sense of belonging in religious congregations.

    Science.gov (United States)

    Stroope, Samuel

    2011-01-01

    Feeling that you belong in a group is an important and powerful need. The ability to foster a sense of belonging can also determine whether groups survive. Organizational features of groups cultivate feelings of belonging, yet prior research fails to investigate the idea that belief systems also play a major role. Using multilevel data, this study finds that church members' traditional beliefs, group-level belief unity, and their interaction associate positively with members' sense of belonging. In fact, belief unity can be thought of as a “sacred canopy” under which the relationship between traditional beliefs and feelings of belonging thrives.

  12. Professional entrepreneurial identity construction

    DEFF Research Database (Denmark)

    Ramsgaard, Michael Breum

    The present study investigates the construction of a professional identity as an entrepreneur in a sample of people with educational background in nutrition and health. The study examines the connection between professional identity construction and entrepreneurial business emergence using...... ‘entrepreneurial preparedness’ as parameter. This research seeks to address the following questions: What significant components or characteristics do entrepreneurs rely on in the early processes of constructing an entrepreneurial identity....

  13. Moral Beliefs and Cognitive Homogeneity

    Directory of Open Access Journals (Sweden)

    Nevia Dolcini

    2018-04-01

    Full Text Available The Emotional Perception Model of moral judgment intends to account for experientialism about morality and moral reasoning. In explaining how moral beliefs are formed and applied in practical reasoning, the model attempts to overcome the mismatch between reason and action/desire: morality isn’t about reason for actions, yet moral beliefs, if caused by desires, may play a motivational role in (moral agency. The account allows for two kinds of moral beliefs: genuine moral beliefs, which enjoy a relation to desire, and motivationally inert moral beliefs acquired in ways other than experience. Such etiology-based dichotomy of concepts, I will argue, leads to the undesirable view of cognition as a non-homogeneous phenomenon. Moreover, the distinction between moral beliefs and moral beliefs would entail a further dichotomy encompassing the domain of moral agency: one and the same action might possibly be either genuine moral, or not moral, if acted by individuals lacking the capacity for moral feelings, such as psychopaths.

  14. Belief attribution despite verbal interference.

    Science.gov (United States)

    Forgeot d'Arc, Baudouin; Ramus, Franck

    2011-05-01

    False-belief (FB) tasks have been widely used to study the ability of individuals to represent the content of their conspecifics' mental states (theory of mind). However, the cognitive processes involved are still poorly understood, and it remains particularly debated whether language and inner speech are necessary for the attribution of beliefs to other agents. We present a completely nonverbal paradigm consisting of silent animated cartoons in five closely related conditions, systematically teasing apart different aspects of scene analysis and allowing the assessment of the attribution of beliefs, goals, and physical causation. In order to test the role of language in belief attribution, we used verbal shadowing as a dual task to inhibit inner speech. Data on 58 healthy adults indicate that verbal interference decreases overall performance, but has no specific effect on belief attribution. Participants remained able to attribute beliefs despite heavy concurrent demands on their verbal abilities. Our results are most consistent with the hypothesis that belief attribution is independent from inner speech.

  15. Personal Identity in Enhancement

    Directory of Open Access Journals (Sweden)

    Jana Podroužková

    2015-09-01

    Full Text Available The aim of this paper is to introduce the concept of human enhancement, its methods and its relation to personal identity. Also several approaches to personal identity will be described. Transhumanism is a special think tank supporting human enhancement through modern technologies and some of its representatives claim, that even great changes to human organisms will not affect their personal identity. I will briefly describe the most important means of human enhancment and consider the problem of personal identity for each of them separately.

  16. Known and Unknown Identity

    DEFF Research Database (Denmark)

    Henze-Pedersen, Sofie

    This qualitative study investigates the relationship between openness and identity among 18 adoptees. Many studies have argued that a high degree of openness is important for the identity formation of adoptees. However, few studies have explored this relationship. Two types of openness...... (biographical knowledge and communicative openness) are used to categorise the empirical material, making it possible to illuminate how different types of openness influence identity. The findings suggest that there is no direct link between a high degree of openness and positive identity formation. Instead...

  17. Identity/Time

    Directory of Open Access Journals (Sweden)

    Nancy J. Knauer

    2013-09-01

    Full Text Available This paper engages the unspoken fourth dimension of intersectionality—time. Using the construction of lesbian, gay, bisexual, and transgender (LGBT identities as an example, it establishes that identity, as it is lived and experienced, is not only multivalent, but also historically contingent. It then raises a number of points regarding the temporal locality of identity—the influence of time on issues of identity and understanding, its implications for legal interventions, social movement building, and paradigms of progressive change. As the title suggests, the paper asks us to consider the frame of identity over time.

  18. A Formal Model of Identity Mixer

    DEFF Research Database (Denmark)

    Camenisch, Jan; Mödersheim, Sebastian Alexander; Sommer, Dieter

    2010-01-01

    Identity Mixer is an anonymous credential system developed at IBM that allows users for instance to prove that they are over 18 years old without revealing their name or birthdate. This privacy-friendly tech- nology is realized using zero-knowledge proofs. We describe a formal model of Identity...

  19. Recognition of social identity in ants

    DEFF Research Database (Denmark)

    Bos, Nick; d'Ettorre, Patrizia

    2012-01-01

    Recognizing the identity of others, from the individual to the group level, is a hallmark of society. Ants, and other social insects, have evolved advanced societies characterized by efficient social recognition systems. Colony identity is mediated by colony specific signature mixtures, a blend...

  20. Corporate Brand Identity Development in SMEs

    DEFF Research Database (Denmark)

    Gyrd-Jones, Richard; Törmälä, Minna

    2016-01-01

    We study the interactive narratives that underpin the emergence of corporate brand identity in new venture SMEs. We apply a process perspective that considers the complex interactions between layers of identities and sense-making in and around the organisation in the stakeholder eco-system. We...

  1. Extreme Overvalued Beliefs: How Violent Extremist Beliefs Become "Normalized".

    Science.gov (United States)

    Rahman, Tahir

    2018-01-12

    Extreme overvalued beliefs (EOB) are rigidly held, non-deusional beliefs that are the motive behind most acts of terrorism and mass shootings. EOBs are differentiated from delusions and obsessions. The concept of an overvalued idea was first described by Wernicke and later applied to terrorism by McHugh. Our group of forensic psychiatrists (Rahman, Resnick, Harry) refined the definition as an aid in the differential diagnosis seen in acts of violence. The form and content of EOBs is discussed as well as group effects, conformity, and obedience to authority. Religious cults such as The People's Temple, Heaven's Gate, Aum Shinrikyo, and Islamic State (ISIS) and conspiracy beliefs such as assassinations, moon-hoax, and vaccine-induced autism beliefs are discussed using this construct. Finally, some concluding thoughts on countering violent extremism, including its online presence is discussed utilizing information learned from online eating disorders and consumer experience.

  2. Dissociation, Paranormal Belief, and Quality of Life in Older People

    Directory of Open Access Journals (Sweden)

    Tungshan Chou

    2015-12-01

    Full Text Available The measurement of religiosity in current health-related literature is mostly based on the traditional Christian belief system. It has been argued that such a measurement approach may misrepresent the true degree of religiosity in Taiwanese people. In this study, religiosity was measured in two ways: self-reported religion type and a qualitatively derived index of religious piety based on principles as suggested by Gries, Su, and Schak to be used in the Taiwanese context. Their effects on dissociation, paranormal belief, and quality of life were juxtaposed for comparison. In addition, the beneficial effect of religious piety was examined in the framework of McClenon’s ritual healing theory. A total of 266 healthy older adults across Taiwan were interviewed by four trained assistants over a 4-month period. Factor scores were used to represent the dissociative tendencies (depersonalization/derealization, forgetfulness, amnesia, and psychological absorption and paranormal belief facets (precognition, psi power, other forms of life, traditional religious belief, superstition, and telepathy. The results showed that older people of high religious piety display better quality of life profiles than their counterparts in the low religious piety group. The effects of self-reported religion type were mainly seen with paranormal beliefs compatible with their religious beliefs, whereas the effects of religious piety were more pronounced in relation to quality of life than dissociation and paranormal belief. The beneficial advantage of dissociation hypothesized by ritual healing theory did not receive empirical support in the nonclinical sample of this study.

  3. Social Identification in Sports Teams: The Role of Personal, Social, and Collective Identity Motives.

    Science.gov (United States)

    Thomas, William E; Brown, Rupert; Easterbrook, Matthew J; Vignoles, Vivian L; Manzi, Claudia; D'Angelo, Chiara; Holt, Jeremy J

    2017-04-01

    Based on motivated identity construction theory (MICT; Vignoles, 2011), we offer an integrative approach examining the combined roles of six identity motives (self-esteem, distinctiveness, belonging, meaning, continuity, and efficacy) instantiated at three different motivational levels (personal, social, and collective identity) as predictors of group identification. These identity processes were investigated among 369 members of 45 sports teams from England and Italy in a longitudinal study over 6 months with four time points. Multilevel change modeling and cross-lagged analyses showed that satisfaction of four personal identity motives (individuals' personal feelings of self-esteem, distinctiveness, meaning, and efficacy derived from team membership), three social identity motives (individuals' feelings that the team identity carries a sense of belonging, meaning, and continuity), and one collective identity motive (a shared belief in group distinctiveness) significantly predicted group identification. Motivational processes underlying group identification are complex, multilayered, and not reducible to personal needs.

  4. Beat-ID: Towards a computationally low-cost single heartbeat biometric identity check system based on electrocardiogram wave morphology

    Science.gov (United States)

    Paiva, Joana S.; Dias, Duarte

    2017-01-01

    In recent years, safer and more reliable biometric methods have been developed. Apart from the need for enhanced security, the media and entertainment sectors have also been applying biometrics in the emerging market of user-adaptable objects/systems to make these systems more user-friendly. However, the complexity of some state-of-the-art biometric systems (e.g., iris recognition) or their high false rejection rate (e.g., fingerprint recognition) is neither compatible with the simple hardware architecture required by reduced-size devices nor the new trend of implementing smart objects within the dynamic market of the Internet of Things (IoT). It was recently shown that an individual can be recognized by extracting features from their electrocardiogram (ECG). However, most current ECG-based biometric algorithms are computationally demanding and/or rely on relatively large (several seconds) ECG samples, which are incompatible with the aforementioned application fields. Here, we present a computationally low-cost method (patent pending), including simple mathematical operations, for identifying a person using only three ECG morphology-based characteristics from a single heartbeat. The algorithm was trained/tested using ECG signals of different duration from the Physionet database on more than 60 different training/test datasets. The proposed method achieved maximal averaged accuracy of 97.450% in distinguishing each subject from a ten-subject set and false acceptance and rejection rates (FAR and FRR) of 5.710±1.900% and 3.440±1.980%, respectively, placing Beat-ID in a very competitive position in terms of the FRR/FAR among state-of-the-art methods. Furthermore, the proposed method can identify a person using an average of 1.020 heartbeats. It therefore has FRR/FAR behavior similar to obtaining a fingerprint, yet it is simpler and requires less expensive hardware. This method targets low-computational/energy-cost scenarios, such as tiny wearable devices (e.g., a

  5. Elective Identities, (Culture, Identization and Integration)

    NARCIS (Netherlands)

    S.J. Magala (Slawomir)

    2002-01-01

    textabstractMost of contemporary individual and social identities (constructed with societal, cultural and technological resources) are radically autonomous, nomadic and virtual - i.e. they are de-traditionalized, open to negotiation and not based on a single interpretation of a tradition.

  6. Watch out, here I grow! : A dynamic systems perspective on the contribution of daily conflicts and emotions to the emergence of identity

    NARCIS (Netherlands)

    Lichtwark-Aschoff, A.

    2008-01-01

    This project deals with the underlying processes and mechanisms of identity and autonomy development in adolescent girls. The basic question of the project is: how do day-to-day experiences, such as conflicts, shape and form the process of identity development? How do emotions, thoughts and

  7. The Relationship among Pre-Service EFL Teachers' Beliefs about Language Learning, Pedagogical Beliefs, and Beliefs about ICT Integration

    Science.gov (United States)

    Inayati, Dian; Emaliana, Ive

    2017-01-01

    This paper elucidates the relationship among pre-service teachers' beliefs about language learning, pedagogical beliefs, and beliefs about ICT Integration through survey methodology. This study employed a quantitative approach, particularly a correlational relationship to investigate the relationships among beliefs about language learning,…

  8. Forces and stress in second order Møller-Plesset perturbation theory for condensed phase systems within the resolution-of-identity Gaussian and plane waves approach

    International Nuclear Information System (INIS)

    Del Ben, Mauro; Hutter, Jürg; VandeVondele, Joost

    2015-01-01

    The forces acting on the atoms as well as the stress tensor are crucial ingredients for calculating the structural and dynamical properties of systems in the condensed phase. Here, these derivatives of the total energy are evaluated for the second-order Møller-Plesset perturbation energy (MP2) in the framework of the resolution of identity Gaussian and plane waves method, in a way that is fully consistent with how the total energy is computed. This consistency is non-trivial, given the different ways employed to compute Coulomb, exchange, and canonical four center integrals, and allows, for example, for energy conserving dynamics in various ensembles. Based on this formalism, a massively parallel algorithm has been developed for finite and extended system. The designed parallel algorithm displays, with respect to the system size, cubic, quartic, and quintic requirements, respectively, for the memory, communication, and computation. All these requirements are reduced with an increasing number of processes, and the measured performance shows excellent parallel scalability and efficiency up to thousands of nodes. Additionally, the computationally more demanding quintic scaling steps can be accelerated by employing graphics processing units (GPU’s) showing, for large systems, a gain of almost a factor two compared to the standard central processing unit-only case. In this way, the evaluation of the derivatives of the RI-MP2 energy can be performed within a few minutes for systems containing hundreds of atoms and thousands of basis functions. With good time to solution, the implementation thus opens the possibility to perform molecular dynamics (MD) simulations in various ensembles (microcanonical ensemble and isobaric-isothermal ensemble) at the MP2 level of theory. Geometry optimization, full cell relaxation, and energy conserving MD simulations have been performed for a variety of molecular crystals including NH 3 , CO 2 , formic acid, and benzene

  9. Forces and stress in second order Møller-Plesset perturbation theory for condensed phase systems within the resolution-of-identity Gaussian and plane waves approach

    Science.gov (United States)

    Del Ben, Mauro; Hutter, Jürg; VandeVondele, Joost

    2015-09-01

    The forces acting on the atoms as well as the stress tensor are crucial ingredients for calculating the structural and dynamical properties of systems in the condensed phase. Here, these derivatives of the total energy are evaluated for the second-order Møller-Plesset perturbation energy (MP2) in the framework of the resolution of identity Gaussian and plane waves method, in a way that is fully consistent with how the total energy is computed. This consistency is non-trivial, given the different ways employed to compute Coulomb, exchange, and canonical four center integrals, and allows, for example, for energy conserving dynamics in various ensembles. Based on this formalism, a massively parallel algorithm has been developed for finite and extended system. The designed parallel algorithm displays, with respect to the system size, cubic, quartic, and quintic requirements, respectively, for the memory, communication, and computation. All these requirements are reduced with an increasing number of processes, and the measured performance shows excellent parallel scalability and efficiency up to thousands of nodes. Additionally, the computationally more demanding quintic scaling steps can be accelerated by employing graphics processing units (GPU's) showing, for large systems, a gain of almost a factor two compared to the standard central processing unit-only case. In this way, the evaluation of the derivatives of the RI-MP2 energy can be performed within a few minutes for systems containing hundreds of atoms and thousands of basis functions. With good time to solution, the implementation thus opens the possibility to perform molecular dynamics (MD) simulations in various ensembles (microcanonical ensemble and isobaric-isothermal ensemble) at the MP2 level of theory. Geometry optimization, full cell relaxation, and energy conserving MD simulations have been performed for a variety of molecular crystals including NH3, CO2, formic acid, and benzene.

  10. (Re)scaling identities

    DEFF Research Database (Denmark)

    Koefoed, Lasse Martin; Simonsen, Kirsten

    2012-01-01

    of Pakistani origin, the study employs theoretical ideas of estrangement, identification and recognition in order to obtain a thorough understanding of the complexity and the contradictory character of their spatial identities and affiliations. A turning point in the double processes of estrangement...... of identity....

  11. Value Conditionality of Identity

    Directory of Open Access Journals (Sweden)

    M M Yusupov

    2013-12-01

    Full Text Available The article considers theoretical approaches to the study of values and identity, and reveals the role of values in the formation of the ethnic, regional and Russian identity on the example of Chechnya and the North Caucasus, with the sociological indicators characterizing value orientations and self-identification.

  12. Self and social identity

    NARCIS (Netherlands)

    Ellemers, N; Spears, R; Doosje, B

    2002-01-01

    In this chapter, we examine the self and identity by considering the different conditions under which these are affected by the groups to which people belong. From a social identity perspective we argue that group commitment, on the one hand, and features of the social context, on the other hand,

  13. Children's Social Identities

    Science.gov (United States)

    Bennett, Mark

    2011-01-01

    This paper provides a brief overview of recent developmental research on themes related to children's social identities. Initially, consideration is given to the capacity for social categorization, following which attention is given to children's developing conceptions of social identities, their identification with social groups, and the…

  14. Corporate identity. Brand designs.

    Science.gov (United States)

    Mathieson, Steve

    2004-02-19

    The past two years have seen a steadily more consistent brand identity for the NHS. Branding will become more important as foundation status and PCT commissioning makes acute hospitals more competitive. This has put pressure on some trusts that have their own strong identities.

  15. Identities-in-action

    DEFF Research Database (Denmark)

    Stentoft, Diana; Valero, Paola

    2009-01-01

    The notion of identity is often used in mathematics education research in an attempt to link individual and social understandings of mathematical learning. In this paper we review existing research making use of the notion of identity, and we point to some of the strengths and weaknesses in the w...

  16. Identity without Membership?

    DEFF Research Database (Denmark)

    Dobusch, Leonhard; Schoeneborn, Dennis

    the formation of organizational identity in more fluid organizational settings. Drawing on an empirical study of the hacker collective Anonymous, we show that organizational identity is formed through public communicative events that are subject to meaning negotiation whether or not actions can be attributed...

  17. Personal Identity in Japan

    Science.gov (United States)

    Sugimura, Kazumi; Mizokami, Shinichi

    2012-01-01

    This chapter explores characteristics of identity formation among Japanese adolescents and young adults living in a cultural context where individualism has been increasingly emphasized even while maintaining collectivism. We argue that, to develop a sense of identity in Japanese culture, adolescents and young adults carefully consider others'…

  18. Paranormal belief and attributional style.

    Science.gov (United States)

    Dudley, R T; Whisnand, E A

    2000-06-01

    52 college students completed Tobacyk's 1988 Revised Paranormal Belief Scale and Peterson, Semmel, von Baeyer, Abramson, Metalsky, and Seligman's 1982 Attributional Style Questionnaire. Analysis showed significantly higher depressive attributional styles among high scorers on paranormal phenomena than low scorers.

  19. Young Adolescents' Beliefs Concerning Menstruation

    Science.gov (United States)

    Clarke, Anne E.; Ruble, Diane N.

    1978-01-01

    A sample of 54 young adolescent girls (both pre- and postmenarcheal) and boys responded to a questionnaire assessing evaluative attitudes toward menstruation, expected symptomatology, perceived effects on moods and activities, and sources of information for these beliefs. (Author/JMB)

  20. Identity as wrapping up

    DEFF Research Database (Denmark)

    Nickelsen, Niels Christian Mossfeldt

    2015-01-01

    The aim of this paper is to provide an understanding of cross-professional collaboration and to develop a notion of professional identity based in practice. The background of the paper is science and technology studies and more precisely actor network theory. The method used: The empirical analysis...... in close relation to the making of a report concerning the cross-professional collaboration. Findings are that “Identity as wrapping up” points to the way in which certain actors, by other actors, are maneuvered into certain pockets in a network. Identity as wrapping up is emphasized as a way...... of participating, which is closely connected to the intention to control the relation towards the other. Thus identity as wrapping up is argued to be a strategy to optimize the situation of one’s own profession. Conclusion: This articulation of identity contributes to the actor network literature as well...

  1. Researcher Identity in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Kobayashi, Sofie; McGinn, Michelle K.

    2015-01-01

    to reinterpretation, and ECRs need to attend to new or reimagined signals in their efforts to develop a researcher identity in this current context. In this article, we present a comprehensive framework for researcher identity in relation to the ways ECRs recognise and respond to divergent signals across spheres...... of activity. We illustrate this framework through eight identity stories drawn from our earlier research projects. Each identity story highlights the congruence (or lack of congruence) between signals across spheres of activity and emphasises the different ways ECRs respond to these signals. The proposed...... comprehensive framework allows for the analysis of researcher identity development through the complex and intertwined activities in which ECRs are involved. We advance this approach as a foundation for a sustained research agenda to understand how ECRs identify and respond to relevant signals, and...

  2. Visual identity and rebranding

    Directory of Open Access Journals (Sweden)

    Katarzyna Wrona

    2015-06-01

    Full Text Available The goal of this article is to highlight the essence of visual identification and rebranding, as well as to discuss elements of corporate identity, which are subject to revitalization in the process of refreshing the image of a brand. In the first part the article the analysis of the term visual identification is conducted. In the analysis special attention is drawn to the role of visual identification in creating a coherent identity of an organization. In the subsequent chapters further components of corporate identity are presented in detail – starting with logotype, through business forms, advertisements, accompanying materials and Internet websites to signs on buildings. Moreover, corporate identity book as a collection of standards and guidelines for application of corporate identity rules is discussed. The deliberations are based on the study of literature. The last chapter presented the transformation of the brand of Institute of Aviation.

  3. Children's beliefs about parental divorce

    OpenAIRE

    Dovydaitienė, Miglė

    2001-01-01

    This article investigates children's beliefs about parental divorce and attitudes toward environment and people. Children's believes about parental divorce is evaluated in a sample 8 through 10-year children whose parents had been separated for about 3 years. Attitudes toward environment and people between children of separated as well as intact families are compared. We also examined the relation of children's beliefs about parental divorce and attitudes toward environment and people. The me...

  4. Bridging Identity Gaps : Supporting Identity Performance in Citizen Service Encounters

    DEFF Research Database (Denmark)

    Borchorst, Nikolaj Gandrup; McPhail, Brenda; Smith, Karen Louise

    2012-01-01

    administrative processes and the quality and swiftness of the service they receive. As we bring to light in this paper, this “fitting in” with rigid bureaucratic procedures and IT systems interestingly requires a substantial collaborative effort between the receiver(s) of the service and a complex constellation...... of surrounding stakeholders and intermediaries. This collaboration and the performing of multiple identities raises challenges for the design of e-government systems aimed at supporting physical and digital citizen service provision, as well as issues regarding privacy, citizenship, and public service quality......This paper explores in situ citizen service encounters in government offices. Drawing upon ethnographically informed fieldwork in Canada and Denmark, we discuss the challenges to supporting citizens in constructing and performing identities in public service settings. Our data suggests...

  5. [Parental beliefs on medication and satisfaction with child healthcare].

    Science.gov (United States)

    Fernández-Castillo, Antonio; Vílchez-Lara, María José

    2015-01-01

    The aim of this study is to explore a possible significant relationship between parental beliefs about medication and satisfaction with the medical care their children receive in two different healthcare settings. The study included a total of 1,517 parents whose children were being treated either in pediatric primary care or pediatric emergency centers in eastern Andalusia. Of these, 489 were men and 1,028 women. The research instruments used were the Beliefs about Medicines Questionnaire (BMQ) and the Scale of Satisfaction with Health Care Services. Our results indicate that high levels of negative beliefs about medication were significantly associated with lower levels of parent satisfaction with healthcare received. Satisfaction with pediatric healthcare depends on aspects relating to the healthcare system, but certainly personal psychological and social variables like beliefs and parent’s previous expectations may play an important role too.

  6. Machismo sustains health and illness beliefs of Mexican American men.

    Science.gov (United States)

    Sobralske, Mary

    2006-08-01

    To inform nurse practitioners (NPs) about Mexican American men's health and illness beliefs and the ways in which these are influenced by their masculine identity and how they view themselves as men in their culture. The data sources used were based on a selected review of the literature about Mexican American men's health and illness beliefs and the concept of machismo. Several studies, including the author's study on Mexican American men's healthcare-seeking beliefs and behaviors and experience in providing primary health care to men across cultures, contributed new data. The meaning of manhood in the Mexican American culture is critical in understanding how men perceive health and illness and what they do when they are ill. Machismo enhances men's awareness of their health because they have to be healthy to be good fathers, husbands, brothers, sons, workers, and community members. Pain and disability are motivating factors in finding ways to regain their health. Men's health beliefs across cultures need further investigation by nurse researchers and NPs. How culture influences healthcare delivery to men should be better understood. If NPs are aware of men's views on masculinity, they are better prepared to understand and assist men in becoming more aware of their health status and to seek health care when appropriate.

  7. Identity Crisis in Cormac McCarthy's All the Pretty Horses

    Directory of Open Access Journals (Sweden)

    Hayder A. K. Gebreen

    2016-04-01

    Full Text Available The issue of identity is one of the main issues that encounters man in each culture. Identity is a set of behaviors, emotions, and thought patterns which are unique to every individual that define him as a member of a certain group. Identity is shaped by race, ethnicity, religious beliefs, language, physical features, childhood experiences, sexual  preferences and culture. Moreover, identity is usually recognized during adolescence or early adulthood in which both positive and negative features are essential in the development of individual identity. However, an identity crisis is the failure to establish identity during that age. In addition, an identity crisis is not only concerned with matters such as ethnicity or religion as it is also concerned with inner conflicts, search for identity, west vs. east, old Vs. modern. The diversity of identity in the American culture is expressed in many literary works by contemporary American writers who depict characters' search of their psychological and cultural identity. Among those contemporary writers is Cormac McCarthy (1933- whose All the Pretty Horses (1992 tackles this quest for identity as its basic theme, both psychologically and culturally. This paper is an attempt to investigate both dimensions of the quest in this novel as being one of McCarthy's masterpieces. Keywords: Identity, Identity Crisis, Cultural Criticism, Contemporary American fiction

  8. PRE-SERVICE TEACHERS’ BELIEFS ABOUT TEACHING ENGLISH TO PRIMARY SCHOOL CHILDREN

    Directory of Open Access Journals (Sweden)

    Tripti K. Karekatti

    2012-01-01

    Full Text Available This paper is a part of an ongoing doctoral research on ‘Teacher Talk in ESL Classrooms’. The idea for this was gained through the hypothesis that teachers’ beliefs about English teaching may also mould their talk. The researcher intends here to analyse and comment on teachers’ English teaching beliefs. It is generally accepted that teaching is greatly affected by the belief systems of its practitioners-teachers. Teachers’ beliefs influence their consciousness, teaching attitude, teaching methods and teaching policies, and finally, learners’ development. Horwitz (1987 also states rightly that the formation of teachers’ educational beliefs in language teaching/ learning process will influence, though indirectly, on forming effective teaching methods and will bring about the improvement of learners’ language learning abilities. In Indian context, there is dearth of research evaluating teachers’ beliefs about English teaching. This study explores teachers’ beliefs regarding teaching English to children and tries to explore whether medium of instruction makes any difference in their beliefs. It also intends to determine what similar and different beliefs might be held by in-service teachers from two different mediums. A total of 100 pre-service teachers are the subjects of this study. In order to recognize these teachers’ specific beliefs in a more systematic way, a research instrument, The Questionnaire of Primary School Pre-service English Teachers’ Teaching Beliefs was developed. Almost all of these pre-service teachers expected to have training regarding how to make their talk effective and relevant in classrooms.

  9. Using Co-Occurrence to Evaluate Belief Coherence in a Large Non Clinical Sample

    Science.gov (United States)

    Pechey, Rachel; Halligan, Peter

    2012-01-01

    Much of the recent neuropsychological literature on false beliefs (delusions) has tended to focus on individual or single beliefs, with few studies actually investigating the relationship or co-occurrence between different types of co-existing beliefs. Quine and Ullian proposed the hypothesis that our beliefs form an interconnected web in which the beliefs that make up that system must somehow “cohere” with one another and avoid cognitive dissonance. As such beliefs are unlikely to be encapsulated (i.e., exist in isolation from other beliefs). The aim of this preliminary study was to empirically evaluate the probability of belief co-occurrence as one indicator of coherence in a large sample of subjects involving three different thematic sets of beliefs (delusion-like, paranormal & religious, and societal/cultural). Results showed that the degree of belief co-endorsement between beliefs within thematic groupings was greater than random occurrence, lending support to Quine and Ullian’s coherentist account. Some associations, however, were relatively weak, providing for well-established examples of cognitive dissonance. PMID:23155383

  10. Using co-occurrence to evaluate belief coherence in a large non clinical sample.

    Directory of Open Access Journals (Sweden)

    Rachel Pechey

    Full Text Available Much of the recent neuropsychological literature on false beliefs (delusions has tended to focus on individual or single beliefs, with few studies actually investigating the relationship or co-occurrence between different types of co-existing beliefs. Quine and Ullian proposed the hypothesis that our beliefs form an interconnected web in which the beliefs that make up that system must somehow "cohere" with one another and avoid cognitive dissonance. As such beliefs are unlikely to be encapsulated (i.e., exist in isolation from other beliefs. The aim of this preliminary study was to empirically evaluate the probability of belief co-occurrence as one indicator of coherence in a large sample of subjects involving three different thematic sets of beliefs (delusion-like, paranormal & religious, and societal/cultural. Results showed that the degree of belief co-endorsement between beliefs within thematic groupings was greater than random occurrence, lending support to Quine and Ullian's coherentist account. Some associations, however, were relatively weak, providing for well-established examples of cognitive dissonance.

  11. Attitudes and beliefs as verbal behavior

    OpenAIRE

    Guerin, Bernard

    1994-01-01

    Attitudes and beliefs are analyzed as verbal behavior. It is argued that shaping by a verbal community is an essential part of the formation and maintenance of both attitudes and beliefs, and it is suggested that verbal communities mediate the important shift in control from events in the environment (attitudes and beliefs as tacts) to control by other words (attitudes and beliefs as intraverbals). It appears that both attitudes and beliefs are constantly being socially negotiated through aut...

  12. Exercise identity as a risk factor for exercise dependence.

    Science.gov (United States)

    Murray, Aja L; McKenzie, Karen; Newman, Emily; Brown, Erin

    2013-05-01

    The aim of the study was to explore the relationship between exercise identity and exercise dependence. We hypothesized that stronger exercise identities would be associated with greater odds of experiencing exercise dependence symptoms. Logistic regression was used to assess the extent of association between exercise identity and the risk of experiencing exercise dependence symptoms. Participants (101) were recruited online via sports clubs and social networking sites and were asked to complete online measures of exercise identity and exercise dependence. The overall model fit was a significant improvement on the baseline model, but only the exercise beliefs factor was significantly associated with the odds of dependence symptoms, with higher scores on the belief scale predicting greater odds of experiencing dependence symptoms. Exercise role identity, in contrast, was not significantly associated with odds of experiencing dependence symptoms. Per cent correct classification was 55.9% for asymptomatic and 88.2% for symptomatic individuals and the overall per cent correct classification was 77.5%. The relation between identity and dependence could represent both a fruitful research avenue and a potential therapeutic target for those experiencing dependence symptoms; although our findings only showed a relationship between one of the two factors of the exercise identity measure and dependence. Longitudinal research is required to examine the relationship between identity and dependence in the context of other variables to better understand why some individuals become exercise dependent whereas others do not. What is already known on this subject? Exercise identity has been identified as an important determinant of exercise behaviour and studies within the exercise identity framework have proven elucidative with respect to the psychological processes that may underpin commitment to exercise. It has separately been established that some individuals may become

  13. In vivo identical reversibility of rad-bio-chem lesions in blood, bone marrow, liver, endocrine system and on the whole body

    International Nuclear Information System (INIS)

    Stan, C.

    2009-01-01

    The fundamental scientific researches of a new patented pharmaceutical product STANOSIMAGNE, was initiated, directed and developed since 1995, as interdisciplinary challenge for in vivo decorporation on natural way of radio-toxic uranium (235U) and radionuclides, and the treatment of lesions induced by radiation injury, or heavy metals. The synergic effect - decorporation and reversibility - for in vivo identical reversibility of rad-bio-chem lesions in blood, bone marrow, liver, endocrine system, derma and vital organs verifies and sustains the scientific discovery. The safety and efficiency of clinical administration of the medicine STANOSIMAGNE capsules and ointment is based on the non-clinic (pre-clinic) practical pharmacological research on 635 standard laboratory animals regarding the absence of any kind of toxicity. The pharmacology researches have been carried out, along with medical, pharmaceutical and biochemical didactic specialists, coming from the Laboratories Departments of Pharmacology, Phytochemistry, Biochemistry, Chemistry and Pharmaceutical Technique of the University of Medicine and Pharmacy 'Carol Davila', Bucharest. The treatment of the persons exposed to irradiation or heavy metals contamination, in risk areas, and the continuation of the pilot clinical studies on several cases, that could not be solved by regular medical methods and treatments, are in accordance with the Directive 2001/20/CE, of the Parliament of the European Union, which implement the norms of good practice, in clinical studies.(author)

  14. Synchronization of Two Non-Identical Coupled Exciters in a Non-Resonant Vibrating System of Linear Motion. Part I: Theoretical Analysis

    Directory of Open Access Journals (Sweden)

    Chunyu Zhao

    2009-01-01

    Full Text Available In this paper an analytical approach is proposed to study the feature of frequency capture of two non-identical coupled exciters in a non-resonant vibrating system. The electromagnetic torque of an induction motor in the quasi-steady-state operation is derived. With the introduction of two perturbation small parameters to average angular velocity of two exciters and their phase difference, we deduce the Equation of Frequency Capture by averaging two motion equations of two exciters over their average period. It converts the synchronization problem of two exciters into that of existence and stability of zero solution for the Equation of Frequency Capture. The conditions of implementing frequency capture and that of stabilizing synchronous operation of two motors have been derived. The concept of torque of frequency capture is proposed to physically explain the peculiarity of self-synchronization of the two exciters. An interesting conclusion is reached that the moments of inertia of the two exciters in the Equation of Frequency Capture reduce and there is a coupling moment of inertia between the two exciters. The reduction of moments of inertia and the coupling moment of inertia have an effect on the stability of synchronous operation.

  15. Noether identities at the quantum level

    International Nuclear Information System (INIS)

    Li Ziping

    2002-01-01

    Based on the phase-space generating functional of Green function, the canonical Noether identities under the local transformation at the quantum level have been derived. For the gauge-invariant system, the quantal Noether identities in configuration space have been also deduced. It is pointed out that in certain cases the quantal Noether identities may be converted to quantal conservation laws of the system. This method for obtaining the quantal conservation laws is significantly different from the first Noether theorem at the quantum level. The application to non-Abelian CS theories is studied, the quantal conserved BRS and PBRS charges are obtained, and these two conserved charges are totally different

  16. Idealized cultural beliefs about gender: implications for mental health.

    Science.gov (United States)

    Mahalingam, Ramaswami; Jackson, Benita

    2007-12-01

    In this paper, we examined the relationship between culture-specific ideals (chastity, masculinity, caste beliefs) and self-esteem, shame and depression using an idealized cultural model proposed by Mahalingam (2006, In: Mahalingam R (ed) Cultural psychology of immigrants. Lawrence Erlbaum, Mahwah, NJ, pp 1-14). Participants were from communities with a history of extreme male-biased sex ratios in Tamilnadu, India (N = 785). We hypothesized a dual-process model of self-appraisals suggesting that achieving idealized cultural identities would increase both self-esteem and shame, with the latter leading to depression, even after controlling for key covariates. We tested this using structural equation modeling. The proposed idealized cultural identities model had an excellent fit (CFI = 0.99); the effect of idealized identities on self-esteem, shame and depression differed by gender. Idealized beliefs about gender relate to psychological well-being in gender specific ways in extreme son preference communities. We discuss implications of these findings for future research and community-based interventions.

  17. Linguistic identity matching

    CERN Document Server

    Lisbach, Bertrand

    2013-01-01

    Regulation, risk awareness and technological advances are increasingly drawing identity search functionality into business, security and data management processes, as well as fraud investigations and counter-terrorist measures.Over the years, a number of techniques have been developed for searching identity data, traditionally focusing on logical algorithms. These techniques often failed to take into account the complexities of language and culture that provide the rich variations  seen in names used around the world. A new paradigm has now emerged for understanding the way that identity data

  18. Vocational Identity and Ego Identity Status in Korean Nursing Students

    Directory of Open Access Journals (Sweden)

    Hyun-Young Koo, PhD, RN

    2016-03-01

    Conclusions: These findings show that nursing students in identity achievement status have secure and clear vocational identities. Further longitudinal and qualitative studies are needed to find out if identity formation among nursing students changes with age.

  19. Yoruba customs and beliefs pertaining to twins.

    Science.gov (United States)

    Leroy, Fernand; Olaleye-Oruene, Taiwo; Koeppen-Schomerus, Gesina; Bryan, Elizabeth

    2002-04-01

    The Yoruba are an important ethnic group mainly occupying Southwestern Nigeria. Mainly for genetic reasons, this very large tribe happens to present the highest dizygotic twinning rate in the world (4.4 % of all maternities). The high perinatal mortality rate associated with such pregnancies has contributed to the integration of a special twin belief system within the African traditional religion of this tribe. The latter is based on the concept of a supreme deity called Olodumare or Olorun, assisted by a series of secondary gods (Orisha) while Yoruba religion also involves immortality and reincarnation of the soul based on the animistic cult of ancestors. Twins are therefore given special names and believed to detain special preternatural powers. In keeping with their refined artistic tradition, the Yoruba have produced numerous wooden statuettes called Ibejis that represent the souls of deceased newborn twins and are involved in elaborate rituals. Among Yoruba traditional beliefs and lore some twin-related themes are represented which are also found in other parts of the world. Basic features of the original Yoruba beliefs have found their way into the religious traditions of descendants of African slaves imported in the West Indies and in South America.

  20. Quantum Graphical Models and Belief Propagation

    International Nuclear Information System (INIS)

    Leifer, M.S.; Poulin, D.

    2008-01-01

    Belief Propagation algorithms acting on Graphical Models of classical probability distributions, such as Markov Networks, Factor Graphs and Bayesian Networks, are amongst the most powerful known methods for deriving probabilistic inferences amongst large numbers of random variables. This paper presents a generalization of these concepts and methods to the quantum case, based on the idea that quantum theory can be thought of as a noncommutative, operator-valued, generalization of classical probability theory. Some novel characterizations of quantum conditional independence are derived, and definitions of Quantum n-Bifactor Networks, Markov Networks, Factor Graphs and Bayesian Networks are proposed. The structure of Quantum Markov Networks is investigated and some partial characterization results are obtained, along the lines of the Hammersley-Clifford theorem. A Quantum Belief Propagation algorithm is presented and is shown to converge on 1-Bifactor Networks and Markov Networks when the underlying graph is a tree. The use of Quantum Belief Propagation as a heuristic algorithm in cases where it is not known to converge is discussed. Applications to decoding quantum error correcting codes and to the simulation of many-body quantum systems are described

  1. When Systems Loose their Identity

    DEFF Research Database (Denmark)

    Bansler, Jørgen P.; Havn, Erling C.

    2004-01-01

    This paper reports a longitudinal study of the design and implementation of a Web-based groupware application. We studied the development of three versions of the application, and the preliminary discussions of the forth. We adopt a sensemaking perspective to analyze the dynamics of this process ...... and show that improvisational action and bricolage (make do with the materials at hand) played a vital role in the development process, successfully within a small group of people, but less so when more, distributed people becsensemaking in IS development....

  2. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  3. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  4. Scaling Irrational Beliefs in the General Attitude and Belief Scale

    Directory of Open Access Journals (Sweden)

    Lindsay R. Owings

    2013-04-01

    Full Text Available Accurate measurement of key constructs is essential to the continued development of Rational-Emotive Behavior Therapy (REBT. The General Attitude and Belief Scale (GABS, a contemporary inventory of rational and irrational beliefs based on current REBT theory, is one of the most valid and widely used instruments available, and recent research has continued to improve its psychometric standing. In this study of 544 students, item response theory (IRT methods were used (a to identify the most informative item in each irrational subscale of the GABS, (b to determine the level of irrationality represented by each of those items, and (c to suggest a condensed form of the GABS for further study with clinical populations. Administering only the most psychometrically informative items to clients could result in economies of time and effort. Further research based on the scaling of items could clarify the specific patterns of irrational beliefs associated with particular clinical syndromes.

  5. Personal Identity Online

    DEFF Research Database (Denmark)

    Rodogno, Raffaele

    2012-01-01

    Philosophers concerned with the question of personal identity have typically been asking the so-called re-identification question: what are the conditions under which a person at one point in time is properly re-identified at another point in time? This is a rather technical question. In our...... everyday interactions, however, we do raise a number of personal identity questions that are quite distinct from it. In order to explore the variety of ways in which the Internet may affect personal identity, I propose in this study to broaden the typical philosophical horizon to other more mundane senses...... of the question. In Section 2, I describe a number of possible meanings of personal identity observed in everyday contexts and more philosophical ones. With some caveats, I argue that it is the specific context in which the question arises that disambiguates the meaning of the question. Online contexts are novel...

  6. Researcher Identities in Transition

    DEFF Research Database (Denmark)

    Castelló, Montserrat; Wisker, Gina; Kobayashi, Sofie

    as other emergent ‘signals’, the latent or clear indications from institutions and academic communities regarding career directions and necessary professional skills and attitudes should be identified and interpreted for researchers to adequately develop their new identities. The aim of this paper......Researchers are now embarked upon what we define as a ‘risk career’, rather than, as previously, a relatively more predictable academic career. In this changing context, traditional milestones that enabled early career researchers to build their identities are disappearing. Instead, what we define...... is twofold: a) to present a comprehensive framework of the notion of researcher identity by means of analysing those spheres of activity related to researcher and career development; and b) to relate researcher identities to the experiences of early career researchers with issues concerning signals...

  7. Primary Identity in Literature

    DEFF Research Database (Denmark)

    Graham, Brian Russell

    In our times, literary criticism, as well as larger political and cultural developments, is characterized by identity politics, meaning that our discourses are structured around the notion of different socially identifiable populations in society. In relation to literature, this results in our...... viewing the characters in literature in terms of these political identities. Literature is consequently discussed in relation to political causes. Literary criticism is animated by the same causes, and is viewed as having a direct intervention in society in relation to them. In this paper, I will discuss......, in relation to Frye’s works, the idea that the primary identities of characters in literature were and, to a considerable extent, continue to be those of family-member identities. As such, literature should not be appropriated to a political context too readily. Whereas viewing characters in terms of...

  8. Music, culture and identity

    Directory of Open Access Journals (Sweden)

    Ilir Ramadani

    2017-03-01

    Full Text Available At the time of globalization it is difficult to pretend avoiding music culture and identity from political, cultural and social developments. Thus, it is impossible for the music to be unshakable and to represent national identity by not taking and giving nothing to culture. The dynamics of life and the rapid development of technology make it impossible for the culture to remain unaffected in terms of sharing experiences social experiences. Culture represents our current course, both in terms of politics, also in the social and human aspects. Through the technology it is possible for our children to be equal with children of all other countries, to exchange information and to connect directly with all countries of the world. Musical education is one of the main factors of cultural development and preservation of national identity. Identity consists of everything we posses and reflect. We are those who distinguish from each other and have a common denominator compared to other nations.

  9. WORK AND LEARNER IDENTITY

    DEFF Research Database (Denmark)

    Kondrup, Sissel

    2015-01-01

    The aim of this article is to suggest a theoretical framework than can assess to how people’s engagement in specific historical and social work practices are significant to their development, maintenance or transformation of a learner identity. Such a framework is crucial in order to grasp how...... different groups have distinctive conditions for meeting the obligation of forming a proactive learner identity and engage in lifelong learning prevalent in both national and transnational policies on lifelong learning....

  10. Introduction: Discourses of Identity

    DEFF Research Database (Denmark)

    Madsen, Peter

    2016-01-01

    Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages.......Analysis of usages of ideas of 'identity' in relation to migration in Britain, France, and Germany, as well as in the Serbian anti-muslim war - with a view of demonstrating conceptual context of the usages....

  11. Developing Identity for Lawyers

    OpenAIRE

    Høedt-Rasmussen, Inger

    2014-01-01

    The role of the lawyer is in transition and the formerly predominantly homogeneous profes-sion has become a heterogeneous group of lawyers with diverging perceptions of the lawyer’s identity and of the main characteristics of the profession. The European Union has extended the perception of democracy and the fundamental rights to include more collective rights, social concerns, global responsibility and sustainability. The dissertation’s main question is: How can the identity and competen...

  12. The ecology of religious beliefs

    Science.gov (United States)

    Botero, Carlos A.; Gardner, Beth; Kirby, Kathryn R.; Bulbulia, Joseph; Gavin, Michael C.; Gray, Russell D.

    2014-01-01

    Although ecological forces are known to shape the expression of sociality across a broad range of biological taxa, their role in shaping human behavior is currently disputed. Both comparative and experimental evidence indicate that beliefs in moralizing high gods promote cooperation among humans, a behavioral attribute known to correlate with environmental harshness in nonhuman animals. Here we combine fine-grained bioclimatic data with the latest statistical tools from ecology and the social sciences to evaluate the potential effects of environmental forces, language history, and culture on the global distribution of belief in moralizing high gods (n = 583 societies). After simultaneously accounting for potential nonindependence among societies because of shared ancestry and cultural diffusion, we find that these beliefs are more prevalent among societies that inhabit poorer environments and are more prone to ecological duress. In addition, we find that these beliefs are more likely in politically complex societies that recognize rights to movable property. Overall, our multimodel inference approach predicts the global distribution of beliefs in moralizing high gods with an accuracy of 91%, and estimates the relative importance of different potential mechanisms by which this spatial pattern may have arisen. The emerging picture is neither one of pure cultural transmission nor of simple ecological determinism, but rather a complex mixture of social, cultural, and environmental influences. Our methods and findings provide a blueprint for how the increasing wealth of ecological, linguistic, and historical data can be leveraged to understand the forces that have shaped the behavior of our own species. PMID:25385605

  13. Cultural influences on causal beliefs about depression among Latino immigrants.

    Science.gov (United States)

    Caplan, Susan; Escobar, Javier; Paris, Manuel; Alvidrez, Jennifer; Dixon, Jane K; Desai, Mayur M; Scahill, Lawrence D; Whittemore, Robin

    2013-01-01

    This study describes causal beliefs about depression among Dominican, Colombian, and Ecuadorian immigrants. The authors describe participants' narratives about how particular supernatural or religious beliefs may contribute to or alleviate depression. Latino primary care patients (n = 177) were interviewed with the Beliefs About Causes of Depression Scale, a list of 35 items rated from not at all important to extremely important. Participants had the option of expanding on responses using an informal conversational approach. Underlying themes of these explanatory comments were derived from narrative and content analysis. Major themes that emerged were Psychosocial and Religious and Supernatural causal beliefs. A third theme emerged that represented the integration of these categories in the context of the immigrant experience. This article adds to the understanding of cross-cultural beliefs about depression. Psychosocial stressors related to the immigrant experience and adverse life events were highly endorsed, but the meaning of these stressors was construed in terms of religious and cultural values. To provide culturally appropriate services, nurses should be aware of and discuss the patient's belief systems, illness interpretations, and expectations of treatment.

  14. Examining Game Design Features for Identity Exploration and Change

    Science.gov (United States)

    Foster, Aroutis; Shah, Mamta

    2016-01-01

    This study used the Dynamic Systems Model of Role Identity (DSMRI) to examine the extent to which a game, Land Science, afforded identity change opportunities as exploration of science identities, science content knowledge, science confidence, action possibilities, and interest/valuing in an intentional manner. Analysis of the game and existing…

  15. 21 CFR 21.44 - Verification of identity.

    Science.gov (United States)

    2010-04-01

    ... 21 Food and Drugs 1 2010-04-01 2010-04-01 false Verification of identity. 21.44 Section 21.44 Food... Verification of identity. (a) An individual seeking access to records in a Privacy Act Record System may be... identity. The identification required shall be suitable considering the nature of the records sought. No...

  16. Construção e validação de escala de crenças sobre o sistema treinamento Development and validation of a training system beliefs scale

    Directory of Open Access Journals (Sweden)

    Isa Aparecida de Freitas

    2004-12-01

    Full Text Available Este artigo aborda a construção e validação da escala de crenças sobre o sistema de treinamento. Os itens foram formulados a partir do Modelo MAIS (Borges-Andrade, 1982 aplicado à avaliação de treinamento, das escalas de cinismo organizacional (Tesluk, Farr, Mathieu, & Vance, 1995 e das crenças que as pessoas possuem sobre treinamento descritas na revisão de Rousseau (1997. Crenças são vistas como os aspectos cognitivos relacionados a um objeto (Ajzen & Fishbein, 1980. Foram criados 35 itens, que passaram por processo de validação semântica e estatística no Banco do Brasil. Na validação estatística, realizada com 327 casos, utilizou-se análise de componentes principais e análise fatorial (PAF, rotação oblíqua. Os resultados dessas análises indicaram a existência de três fatores, com índices psicométricos adequados e conteúdos consistentes com o modelo teórico adotado, o que sugere a validade interna do instrumento. Possibilidades de intervenção nas organizações com o uso dessa escala também são discutidas.This paper focuses on the development and validation of a scale for measuring beliefs on the training system. The MAIS Model (Borges-Andrade, 1982 applied to training evaluation, the Organizational Cynicism Scales (Tesluk, Farr, Mathieu, & Vance, 1995 and the beliefs people hold on training, described in Rousseau's (1997 review, have been used as a basis for formulating the scale items. Beliefs are viewed as cognitive aspects related to an object (Ajzen & Fishbein, 1980. Thirty-five items have been formulated and semantically and statistically validated in Banco do Brasil. For statistical validation, 327 cases have been collected and principal components analysis and factor analysis (PAF, oblimin rotation have been used. The results have indicated the existence of three factors, with adequate psychometric indexes. Their content has been found to be consistent with the adopted theoretical model. These results

  17. Constructing Business Models around Identity : Tensions in Architectural Firms

    NARCIS (Netherlands)

    Bos-De Vos, M.; Volker, L.; Chan, Paul W; Neilson, Christopher J.

    2017-01-01

    Architectural firms experience difficulties to establish healthy and sustainable business models as they have to reconcile the often-competing value systems that they are based upon. Organizational members continuously negotiate professional values and beliefs with the firm's commercial goals,

  18. Reconceptualising "Identity Slippage": Additional Language Learning and (L2) Identity Development

    Science.gov (United States)

    Armour, William

    2009-01-01

    This paper reconsiders the theoretical concept of "identity slippage" by considering a detailed exegesis of three model conversations taught to learners of Japanese as an additional language. To inform my analysis of these conversations and how they contribute to identity slippage, I have used the work of the systemic-functional linguist Jay Lemke…

  19. The Identity Crisis. Security, Privacy and Usability Issues in Identity Management

    NARCIS (Netherlands)

    Alpár, G.; Hoepman, J.H.; Siljee, B.I.J.

    2011-01-01

    This paper studies the current "identity crisis" caused by the substantial security, privacy and usability shortcomings encountered in existing systems for identity management. Some of these issues are well known, while others are much less understood. This paper brings them together in a single,

  20. Generalizing a model beyond the inherence heuristic and applying it to beliefs about objective value.

    Science.gov (United States)

    Wood, Graham

    2014-10-01

    The inherence heuristic is characterized as part of an instantiation of a more general model that describes the interaction between undeveloped intuitions, produced by System 1 heuristics, and developed beliefs, constructed by System 2 reasoning. The general model is described and illustrated by examining another instantiation of the process that constructs belief in objective moral value.

  1. Absorption properties of identical atoms

    International Nuclear Information System (INIS)

    Sancho, Pedro

    2013-01-01

    Emission rates and other optical properties of multi-particle systems in collective and entangled states differ from those in product ones. We show the existence of similar effects in the absorption probabilities for (anti)symmetrized states of two identical atoms. The effects strongly depend on the overlapping between the atoms and differ for bosons and fermions. We propose a viable experimental verification of these ideas. -- Highlights: •The absorption rates of a pair of identical atoms in product and (anti)symmetrized states are different. •The modifications of the optical properties are essentially determined by the overlapping between the atoms. •The absorption properties differ, in some cases, for bosons and fermions

  2. Tools for Understanding Identity

    Energy Technology Data Exchange (ETDEWEB)

    Creese, Sadie; Gibson-Robinson, Thomas; Goldsmith, Michael; Hodges, Duncan; Kim, Dee DH; Love, Oriana J.; Nurse, Jason R.; Pike, William A.; Scholtz, Jean

    2013-12-28

    Identity attribution and enrichment is critical to many aspects of law-enforcement and intelligence gathering; this identity typically spans a number of domains in the natural-world such as biographic information (factual information – e.g. names, addresses), biometric information (e.g. fingerprints) and psychological information. In addition to these natural-world projections of identity, identity elements are projected in the cyber-world. Conversely, undesirable elements may use similar techniques to target individuals for spear-phishing attacks (or worse), and potential targets or their organizations may want to determine how to minimize the attack surface exposed. Our research has been exploring the construction of a mathematical model for identity that supports such holistic identities. The model captures the ways in which an identity is constructed through a combination of data elements (e.g. a username on a forum, an address, a telephone number). Some of these elements may allow new characteristics to be inferred, hence enriching the holistic view of the identity. An example use-case would be the inference of real names from usernames, the ‘path’ created by inferring new elements of identity is highlighted in the ‘critical information’ panel. Individual attribution exercises can be understood as paths through a number of elements. Intuitively the entire realizable ‘capability’ can be modeled as a directed graph, where the elements are nodes and the inferences are represented by links connecting one or more antecedents with a conclusion. The model can be operationalized with two levels of tool support described in this paper, the first is a working prototype, the second is expected to reach prototype by July 2013: Understanding the Model The tool allows a user to easily determine, given a particular set of inferences and attributes, which elements or inferences are of most value to an investigator (or an attacker). The tool is also able to take

  3. Aggregation of Information and Beliefs

    DEFF Research Database (Denmark)

    Ottaviani, Marco; Sørensen, Peter Norman

    In a binary prediction market in which risk-neutral traders have heterogeneous prior beliefs and are allowed to invest a limited amount of money, the static rational expectations equilibrium price is demonstrated to underreact to information. This effect is consistent with a favorite-longshot bias......, and is more pronounced when prior beliefs are more heterogeneous. Relaxing the assumptions of risk neutrality and bounded budget, underreaction to information also holds in a more general asset market with heterogeneous priors, provided traders have decreasing absolute risk aversion. In a dynamic asset market...

  4. Belief Bisimulation for Hidden Markov Models Logical Characterisation and Decision Algorithm

    DEFF Research Database (Denmark)

    Jansen, David N.; Nielson, Flemming; Zhang, Lijun

    2012-01-01

    This paper establishes connections between logical equivalences and bisimulation relations for hidden Markov models (HMM). Both standard and belief state bisimulations are considered. We also present decision algorithms for the bisimilarities. For standard bisimilarity, an extension of the usual...... partition refinement algorithm is enough. Belief bisimilarity, being a relation on the continuous space of belief states, cannot be described directly. Instead, we show how to generate a linear equation system in time cubic in the number of states....

  5. Teachers’ Beliefs and Their Belief Change in an Intercultural Context

    DEFF Research Database (Denmark)

    Wang, Li

    of teaching in a new context and in their early years of the teaching careers of CFL teachers in the Danish context. It has been shown that the multifaceted beliefs that CFL teachers hold are based on their personal experience, shaped by context, and mediated by their classroom practices. The educational...

  6. Religion in the face of uncertainty: an uncertainty-identity theory account of religiousness.

    Science.gov (United States)

    Hogg, Michael A; Adelman, Janice R; Blagg, Robert D

    2010-02-01

    The authors characterize religions as social groups and religiosity as the extent to which a person identifies with a religion, subscribes to its ideology or worldview, and conforms to its normative practices. They argue that religions have attributes that make them well suited to reduce feelings of self-uncertainty. According to uncertainty-identity theory, people are motivated to reduce feelings of uncertainty about or reflecting on self; and identification with groups, particularly highly entitative groups, is a very effective way to reduce uncertainty. All groups provide belief systems and normative prescriptions related to everyday life. However, religions also address the nature of existence, invoking sacred entities and associated rituals and ceremonies. They are entitative groups that provide a moral compass and rules for living that pervade a person's life, making them particularly attractive in times of uncertainty. The authors document data supporting their analysis and discuss conditions that transform religiosity into religious zealotry and extremism.

  7. The Process of Identity Work: Negotiating a Work Identity

    NARCIS (Netherlands)

    Crafford, A.; Adams, B.G.; Saayman, T.; Vinkenburg, C.J.; Jansen, P.G.W.; Roodt, G.

    2015-01-01

    Identity work is an important process in negotiating, regulating and maintaining a coherent sense of self-(identity). In this chapter we discuss how identity work is particularly useful in establishing a work identity. The crux of the discussion in this chapter is based on the qualitative phase of

  8. A non-linear dynamical approach to belief revision in cognitive behavioral therapy

    Science.gov (United States)

    Kronemyer, David; Bystritsky, Alexander

    2014-01-01

    Belief revision is the key change mechanism underlying the psychological intervention known as cognitive behavioral therapy (CBT). It both motivates and reinforces new behavior. In this review we analyze and apply a novel approach to this process based on AGM theory of belief revision, named after its proponents, Carlos Alchourrón, Peter Gärdenfors and David Makinson. AGM is a set-theoretical model. We reconceptualize it as describing a non-linear, dynamical system that occurs within a semantic space, which can be represented as a phase plane comprising all of the brain's attentional, cognitive, affective and physiological resources. Triggering events, such as anxiety-producing or depressing situations in the real world, or their imaginal equivalents, mobilize these assets so they converge on an equilibrium point. A preference function then evaluates and integrates evidentiary data associated with individual beliefs, selecting some of them and comprising them into a belief set, which is a metastable state. Belief sets evolve in time from one metastable state to another. In the phase space, this evolution creates a heteroclinic channel. AGM regulates this process and characterizes the outcome at each equilibrium point. Its objective is to define the necessary and sufficient conditions for belief revision by simultaneously minimizing the set of new beliefs that have to be adopted, and the set of old beliefs that have to be discarded or reformulated. Using AGM, belief revision can be modeled using three (and only three) fundamental syntactical operations performed on belief sets, which are expansion; revision; and contraction. Expansion is like adding a new belief without changing any old ones. Revision is like adding a new belief and changing old, inconsistent ones. Contraction is like changing an old belief without adding any new ones. We provide operationalized examples of this process in action. PMID:24860491

  9. The Relationships among Chinese Practicing Teachers' Epistemic Beliefs, Pedagogical Beliefs and Their Beliefs about the Use of ICT

    Science.gov (United States)

    Deng, Feng; Chai, Ching Sing; Tsai, Chin-Chung; Lee, Min-Hsien

    2014-01-01

    This study aimed to investigate the relationships among practicing teachers' epistemic beliefs, pedagogical beliefs and their beliefs about the use of ICT through survey methodology. Participants were 396 high school practicing teachers from mainland China. The path analysis results analyzed via structural equation modelling technique indicated…

  10. Identity Expansion and Transcendence

    Directory of Open Access Journals (Sweden)

    William Sims Bainbridge

    2014-05-01

    Full Text Available Emerging developments in communications and computing technology may transform the nature of human identity, in the process rendering obsolete the traditional philosophical and scientific frameworks for understanding the nature of individuals and groups.  Progress toward an evaluation of this possibility and an appropriate conceptual basis for analyzing it may be derived from two very different but ultimately connected social movements that promote this radical change. One is the governmentally supported exploration of Converging Technologies, based in the unification of nanoscience, biology, information science and cognitive science (NBIC. The other is the Transhumanist movement, which has been criticized as excessively radical yet is primarily conducted as a dignified intellectual discussion within a new school of philosophy about human enhancement.  Together, NBIC and Transhumanism suggest the immense transformative power of today’s technologies, through which individuals may explore multiple identities by means of online avatars, semi-autonomous intelligent agents, and other identity expansions.

  11. Biometrics and Identity Management

    DEFF Research Database (Denmark)

    management. BIOID 2008. The papers are categorized in four classes. These classes represent the 4 working groups of the COST Action 2101. For more information, see http://www.cost2101.org/.   Biometric data quality and multimodal biometric templates, Unsupervised interactive interfaces for multimodal...... security and border control scenarios it is now apparent that the widespread availability of biometrics in everyday life will also spin out an ever increasing number of (private) applications in other domains. Crucial to this vision is the management of the user's identity, which does not only imply...... biometrics, Biometric attacks and countermeasures, Standards and privacy issues for biometrics in identity documents and smart cards. BIOID 2008 is an initiative of the COST Action 2101 on Biometrics for Identity Documents and Smart Cards. It is supported by the EU Framework 7 Programme. Other sponsors...

  12. Identity negotiations in meetings

    DEFF Research Database (Denmark)

    Asmuß, Birte; Oshima, Sae

    of the company, and all members know (and display) that he holds some information that the rest don’t have access to. Our analysis shows that the participants evoke various identities of the manager, sometimes orienting to the structure of the organization, and other times orienting to wider social categories......Meetings are places, where identity negotiation is a central activity and where members’ local practices recurrently inform and are informed by larger categories (Antaki and Widdicombe 1998). Correspondingly, the approach to understanding organization (macro) by way of identity work (micro) has...... company, and in the data recorded over 10 days, the employees frequently complain about the many changes that have taken place. Our focus lies in a unique occasion where one of the managers makes an unusual appearance at the lunchroom. In this situation, he is the only one that is on the business side...

  13. Learning as Negotiating Identities

    DEFF Research Database (Denmark)

    Jørgensen, Kenneth Mølbjerg; Keller, Hanne Dauer

    The paper explores the contribution of Communities of Practice (COP) to Human Resource Development (HRD). Learning as negotiating identities captures the contribution of COP to HRD. In COP the development of practice happens through negotiation of meaning. The learning process also involves modes...... of belonging constitutive of our identities. We suggest that COP makes a significant contribution by linking learning and identification. This means that learning becomes much less instrumental and much more linked to fundamental questions of being. We argue that the COP-framework links learning with the issue...... of time - caught in the notion of trajectories of learning - that integrate past, present and future. Working with the learners' notion of time is significant because it is here that new learning possibilities become visible and meaningful for individuals. Further, we argue that the concept of identity...

  14. Identity Building in Organisations: Proactive Capability Development

    DEFF Research Database (Denmark)

    Rasmussen, Lauge Baungaard

    2002-01-01

    Identity building in organisations is often viewed as legitimacy of value systems of the organisation. Based on empirical studies the task of this article is to argue that such a legitimacy approach risks failing in the longer perspective, if the proactive capability development is neglected....... The participatory scenario method presented in this article is one of the possible methods to enhance identity building based on proactive capability development....

  15. Heterogeneous Beliefs and Climate Catastrophes

    NARCIS (Netherlands)

    Kiseleva, T.

    2016-01-01

    We study how heterogeneous beliefs about the causes and extent of global warming affect local mitigation and adaptation strategies and therefore global climate dynamics. Local policies are determined by expectations of policy makers about future climate. There are three types of expectations: strong

  16. Resilience: It Begins with Beliefs

    Science.gov (United States)

    Truebridge, Sara

    2016-01-01

    Educators' beliefs are powerful, affecting not only their pedagogical practices, but also student efficacy and success. The academic achievement of any particular student may rely greatly on whether the teacher believes that student has the ability to succeed. This article affirms the imperative for administrators and educators to spend time…

  17. Astrology Beliefs among Undergraduate Students

    Science.gov (United States)

    Sugarman, Hannah; Impey, Chris; Buxner, Sanlyn; Antonellis, Jessie

    2011-01-01

    A survey of the science knowledge and attitudes toward science of nearly 10000 undergraduates at a large public university over a 20-year period included several questions addressing student beliefs in astrology and other forms of pseudoscience. The results from our data reveal that a large majority of students (78%) considered astrology "very" or…

  18. Negligent Rape and Reasonable Beliefs

    DEFF Research Database (Denmark)

    Hansen, Pelle Guldborg

    2008-01-01

    practice such defences are often acknowledged if the belief is reasonable by some general standard, even when this standard does not pertain to the rules currently governing the practice of intercourse in Denmark. As a result it has often been argued that the notion of negligent rape should be introduced...

  19. Machiavellian Beliefs and Social Influence.

    Science.gov (United States)

    O'Hair, Dan; Cody, Michael J.

    1987-01-01

    Replicates previous findings of separate Machiavellian belief constructs (Deceit, Flatter, Immorality, and Cynicism). Indicates that different constructs predict selection of compliance-gaining strategies; for example, actors who scored high on Immorality used more referent influence on superiors. Discusses implications of this study concerning a…

  20. The Personal and Professional Selves of Teachers: Stable and Unstable Identities

    OpenAIRE

    Day, C.; Kington, Alison; Stobart, G.; Sammons, P.

    2006-01-01

    In much educational literature it is recognised that the broader social conditions in which teachers live and work, and the personal and professional elements of teachers' lives, experiences, beliefs and practices are integral to one another, and that there are often tensions between these which impact to a greater or lesser extent upon teachers' sense of self or identity. If identity is a key influencing factor on teachers' sense of purpose, self‐efficacy, motivation, commitment, job satisfa...