WorldWideScience

Sample records for oftentimes adversarial parties

  1. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Directory of Open Access Journals (Sweden)

    Tess M S Neal

    Full Text Available This survey of 206 forensic psychologists tested the "filtering" effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the "allegiance effect" in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process.

  2. Are Forensic Experts Already Biased before Adversarial Legal Parties Hire Them?

    Science.gov (United States)

    2016-01-01

    This survey of 206 forensic psychologists tested the “filtering” effects of preexisting expert attitudes in adversarial proceedings. Results confirmed the hypothesis that evaluator attitudes toward capital punishment influence willingness to accept capital case referrals from particular adversarial parties. Stronger death penalty opposition was associated with higher willingness to conduct evaluations for the defense and higher likelihood of rejecting referrals from all sources. Conversely, stronger support was associated with higher willingness to be involved in capital cases generally, regardless of referral source. The findings raise the specter of skewed evaluator involvement in capital evaluations, where evaluators willing to do capital casework may have stronger capital punishment support than evaluators who opt out, and evaluators with strong opposition may work selectively for the defense. The results may provide a partial explanation for the “allegiance effect” in adversarial legal settings such that preexisting attitudes may contribute to partisan participation through a self-selection process. PMID:27124416

  3. Server-Aided Two-Party Computation with Simultaneous Corruption

    DEFF Research Database (Denmark)

    Cascudo Pueyo, Ignacio; Damgård, Ivan Bjerre; Ranellucci, Samuel

    We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal composab......We consider secure two-party computation in the client-server model where there are two adversaries that operate separately but simultaneously, each of them corrupting one of the parties and a restricted subset of servers that they interact with. We model security via the local universal...

  4. Actively Secure Two-Party Evaluation of Any Quantum Operation

    DEFF Research Database (Denmark)

    Dupuis, Frédéric; Nielsen, Jesper Buus; Salvail, Louis

    2012-01-01

    We provide the first two-party protocol allowing Alice and Bob to evaluate privately even against active adversaries any completely positive, trace-preserving map , given as a quantum circuit, upon their joint quantum input state . Our protocol leaks no more to any active adversary than an ideal ...... functionality for provided Alice and Bob have the cryptographic resources for active secure two-party classical computation. Our protocol is constructed from the protocol for the same task secure against specious adversaries presented in [4]....

  5. Device-independence for two-party cryptography and position verification

    DEFF Research Database (Denmark)

    Ribeiro, Jeremy; Thinh, Le Phuc; Kaniewski, Jedrzej

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position......-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which...... security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we give device-independent security proofs of two-party cryptography and Position Verification for memoryless devices under different physical constraints on the adversary...

  6. Adaptive versus Non-Adaptive Security of Multi-Party Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2004-01-01

    Security analysis of multi-party cryptographic protocols distinguishes between two types of adversarial settings: In the non-adaptive setting the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and nonadaptive security, according to two definitions and in several models of computation....

  7. 12 CFR 263.102 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 3 2010-01-01 2010-01-01 false Prevailing party. 263.102 Section 263.102 Banks and Banking FEDERAL RESERVE SYSTEM (CONTINUED) BOARD OF GOVERNORS OF THE FEDERAL RESERVE SYSTEM RULES... Prevailing party. Only an eligible applicant that prevailed on the merits of an adversary proceeding may...

  8. Multi-party Quantum Computation

    OpenAIRE

    Smith, Adam

    2001-01-01

    We investigate definitions of and protocols for multi-party quantum computing in the scenario where the secret data are quantum systems. We work in the quantum information-theoretic model, where no assumptions are made on the computational power of the adversary. For the slightly weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to establish that any multi-party quantu...

  9. 12 CFR 308.173 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 4 2010-01-01 2010-01-01 false Prevailing party. 308.173 Section 308.173 Banks....173 Prevailing party. (a) General rule. An eligible applicant who, following an adversary adjudication has gained victory on the merits in the proceeding is a “prevailing party”. An eligible applicant may...

  10. Generative Adversarial Trainer: Defense to Adversarial Perturbations with GAN

    OpenAIRE

    Lee, Hyeungill; Han, Sungyeob; Lee, Jungwoo

    2017-01-01

    We propose a novel technique to make neural network robust to adversarial examples using a generative adversarial network. We alternately train both classifier and generator networks. The generator network generates an adversarial perturbation that can easily fool the classifier network by using a gradient of each image. Simultaneously, the classifier network is trained to classify correctly both original and adversarial images generated by the generator. These procedures help the classifier ...

  11. Leakage Resilient Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Hazay, Carmit; Patra, Arpita

    2012-01-01

    we initiate the study of {\\em secure two-party computation in the presence of leakage}, where on top of corrupting one of the parties the adversary obtains leakage from the content of the secret memory of the honest party. Our study involves the following contributions: \\BE \\item {\\em Security...... and returns its result. Almost independently of secure computation, the area of {\\em leakage resilient cryptography} has recently been evolving intensively, studying the question of designing cryptographic primitives that remain secure even when some information about the secret key is leaked. In this paper...

  12. LEGO for Two-Party Secure Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Orlandi, Claudio

    2009-01-01

    This paper continues the recent line of work of making Yao’s garbled circuit approach to two-party computation secure against an active adversary. We propose a new cut-and-choose based approach called LEGO (Large Efficient Garbled-circuit Optimization): It is specifically aimed at large circuits...

  13. Featurized Bidirectional GAN: Adversarial Defense via Adversarially Learned Semantic Inference

    OpenAIRE

    Bao, Ruying; Liang, Sihang; Wang, Qingcan

    2018-01-01

    Deep neural networks have been demonstrated to be vulnerable to adversarial attacks, where small perturbations are intentionally added to the original inputs to fool the classifier. In this paper, we propose a defense method, Featurized Bidirectional Generative Adversarial Networks (FBGAN), to capture the semantic features of the input and filter the non-semantic perturbation. FBGAN is pre-trained on the clean dataset in an unsupervised manner, adversarially learning a bidirectional mapping b...

  14. Practical m-k-Anonymization for Collaborative Data Publishing without Trusted Third Party

    Directory of Open Access Journals (Sweden)

    Jingyu Hua

    2017-01-01

    Full Text Available In collaborative data publishing (CDP, an m-adversary attack refers to a scenario where up to m malicious data providers collude to infer data records contributed by other providers. Existing solutions either rely on a trusted third party (TTP or introduce expensive computation and communication overheads. In this paper, we present a practical distributed k-anonymization scheme, m-k-anonymization, designed to defend against m-adversary attacks without relying on any TTPs. We then prove its security in the semihonest adversary model and demonstrate how an extension of the scheme can also be proven secure in a stronger adversary model. We also evaluate its efficiency using a commonly used dataset.

  15. Modeling intelligent adversaries for terrorism risk assessment: some necessary conditions for adversary models.

    Science.gov (United States)

    Guikema, Seth

    2012-07-01

    Intelligent adversary modeling has become increasingly important for risk analysis, and a number of different approaches have been proposed for incorporating intelligent adversaries in risk analysis models. However, these approaches are based on a range of often-implicit assumptions about the desirable properties of intelligent adversary models. This "Perspective" paper aims to further risk analysis for situations involving intelligent adversaries by fostering a discussion of the desirable properties for these models. A set of four basic necessary conditions for intelligent adversary models is proposed and discussed. These are: (1) behavioral accuracy to the degree possible, (2) computational tractability to support decision making, (3) explicit consideration of uncertainty, and (4) ability to gain confidence in the model. It is hoped that these suggested necessary conditions foster discussion about the goals and assumptions underlying intelligent adversary modeling in risk analysis. © 2011 Society for Risk Analysis.

  16. Quantum capacity under adversarial quantum noise: arbitrarily varying quantum channels

    OpenAIRE

    Ahlswede, Rudolf; Bjelakovic, Igor; Boche, Holger; Noetzel, Janis

    2010-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes...

  17. Device independence for two-party cryptography and position verification with memoryless devices

    Science.gov (United States)

    Ribeiro, Jérémy; Thinh, Le Phuc; Kaniewski, Jedrzej; Helsen, Jonas; Wehner, Stephanie

    2018-06-01

    Quantum communication has demonstrated its usefulness for quantum cryptography far beyond quantum key distribution. One domain is two-party cryptography, whose goal is to allow two parties who may not trust each other to solve joint tasks. Another interesting application is position-based cryptography whose goal is to use the geographical location of an entity as its only identifying credential. Unfortunately, security of these protocols is not possible against an all powerful adversary. However, if we impose some realistic physical constraints on the adversary, there exist protocols for which security can be proven, but these so far relied on the knowledge of the quantum operations performed during the protocols. In this work we improve the device-independent security proofs of Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004] for two-party cryptography (with memoryless devices) and we add a security proof for device-independent position verification (also memoryless devices) under different physical constraints on the adversary. We assess the quality of the devices by observing a Bell violation, and, as for Kaniewski and Wehner [New J. Phys. 18, 055004 (2016), 10.1088/1367-2630/18/5/055004], security can be attained for any violation of the Clauser-Holt-Shimony-Horne inequality.

  18. Adversarial reasoning: challenges and approaches

    Science.gov (United States)

    Kott, Alexander; Ownby, Michael

    2005-05-01

    This paper defines adversarial reasoning as computational approaches to inferring and anticipating an enemy's perceptions, intents and actions. It argues that adversarial reasoning transcends the boundaries of game theory and must also leverage such disciplines as cognitive modeling, control theory, AI planning and others. To illustrate the challenges of applying adversarial reasoning to real-world problems, the paper explores the lessons learned in the CADET -- a battle planning system that focuses on brigade-level ground operations and involves adversarial reasoning. From this example of current capabilities, the paper proceeds to describe RAID -- a DARPA program that aims to build capabilities in adversarial reasoning, and how such capabilities would address practical requirements in Defense and other application areas.

  19. Adversary characterization for security system evaluation

    International Nuclear Information System (INIS)

    Suber, L.A. Jr.

    1976-04-01

    Evaluation of security systems effectiveness requires a definition of adversary capabilities, but an objective basis for such a definition has been lacking. A system of adversary attributes is proposed in which any desired adversary may be synthesized by selection of the appropriate level of capability from each attribute or category. In use, the synthesized adversaries will be pitted against a security system in an evaluation model, thus allowing comparison of other adversary or security system configurations

  20. Flipped-Adversarial AutoEncoders

    OpenAIRE

    Zhang, Jiyi; Dang, Hung; Lee, Hwee Kuan; Chang, Ee-Chien

    2018-01-01

    We propose a flipped-Adversarial AutoEncoder (FAAE) that simultaneously trains a generative model G that maps an arbitrary latent code distribution to a data distribution and an encoder E that embodies an "inverse mapping" that encodes a data sample into a latent code vector. Unlike previous hybrid approaches that leverage adversarial training criterion in constructing autoencoders, FAAE minimizes re-encoding errors in the latent space and exploits adversarial criterion in the data space. Exp...

  1. Extended KCI attack against two-party key establishment protocols

    NARCIS (Netherlands)

    Tang, Qiang; Chen, Liqun

    2011-01-01

    We introduce an extended Key Compromise Impersonation (KCI) attack against two-party key establishment protocols, where an adversary has access to both long-term and ephemeral secrets of a victim. Such an attack poses serious threats to both key authentication and key confirmation properties of a

  2. Generic adversary characteristics: summary report

    International Nuclear Information System (INIS)

    Stewart, J.B. Jr.; Davidson, J.J.; Jones, H.B.; Fulwiler, C.H.; Mullen, S.A.

    1978-07-01

    The adversaries studied were found to be complex, often unpredictable, and dynamic. The adversary typically goes through a complex decision-making process between the time a potential target is identified and the moment the decision to act is made. This study analyzes the adversary characteristics, and the following conclusions are made: one of the least likely methods of attack is an overt armed assault. Terrorists and psychotics depend upon a high degree of personal dedication. No single generic adversary group or individual exhibits strength in every characteristic. Physical danger appears to have some deterrent effect on all adversaries except the psychotics. Organized and professional criminals often try to recruit insiders. Disoriented persons, white-collar criminals, and disgruntled employees tend to operate as insiders. Professional criminals, many terrorist groups, some extremist protest groups, and certain disoriented persons plan carefully before initiating a criminal mission. Organized crime and miscellaneous criminal adversaries rely on deception and ruse to bypass security. After the decision to commit a crime, the resources deployed by terrorists or organized criminals will be a function of their perception of the operational requirements of the crime. The nature of ''threat'' is dynamic; adversary behavior and capability appear to be related to prevailing political, economic, and social conditions

  3. Adversarial Allegiance: The Devil is in the Evidence Details, Not Just on the Witness Stand

    Science.gov (United States)

    McAuliff, Bradley D.; Arter, Jeana L.

    2016-01-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5 year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on pro-defense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Unlike prosecution-retained experts who shifted their focus from pro-defense aspects of the case in the high suggestibility interview to pro-prosecution aspects in the low suggestibility interview, defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts due to negativity bias and positive testing strategies associated with confirmation bias. PMID:27243362

  4. Adversarial allegiance: The devil is in the evidence details, not just on the witness stand.

    Science.gov (United States)

    McAuliff, Bradley D; Arter, Jeana L

    2016-10-01

    This study examined the potential influence of adversarial allegiance on expert testimony in a simulated child sexual abuse case. A national sample of 100 witness suggestibility experts reviewed a police interview of an alleged 5-year-old female victim. Retaining party (prosecution, defense) and interview suggestibility (low, high) varied across experts. Experts were very willing to testify, but more so for the prosecution than the defense when interview suggestibility was low and vice versa when interview suggestibility was high. Experts' anticipated testimony focused more on prodefense aspects of the police interview and child's memory overall (negativity bias), but favored retaining party only when interview suggestibility was low. Prosecution-retained experts shifted their focus from prodefense aspects of the case in the high suggestibility interview to proprosecution aspects in the low suggestibility interview; defense experts did not. Blind raters' perceptions of expert focus mirrored those findings. Despite an initial bias toward retaining party, experts' evaluations of child victim accuracy and police interview quality were lower in the high versus low interview suggestibility condition only. Our data suggest that adversarial allegiance exists, that it can (but not always) influence how experts process evidence, and that it may be more likely in cases involving evidence that is not blatantly flawed. Defense experts may evaluate this type of evidence more negatively than prosecution experts because of negativity bias and positive testing strategies associated with confirmation bias. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  5. Adversarial risk analysis

    CERN Document Server

    Banks, David L; Rios Insua, David

    2015-01-01

    Flexible Models to Analyze Opponent Behavior A relatively new area of research, adversarial risk analysis (ARA) informs decision making when there are intelligent opponents and uncertain outcomes. Adversarial Risk Analysis develops methods for allocating defensive or offensive resources against intelligent adversaries. Many examples throughout illustrate the application of the ARA approach to a variety of games and strategic situations. The book shows decision makers how to build Bayesian models for the strategic calculation of their opponents, enabling decision makers to maximize their expected utility or minimize their expected loss. This new approach to risk analysis asserts that analysts should use Bayesian thinking to describe their beliefs about an opponent's goals, resources, optimism, and type of strategic calculation, such as minimax and level-k thinking. Within that framework, analysts then solve the problem from the perspective of the opponent while placing subjective probability distributions on a...

  6. Device-independent two-party cryptography secure against sequential attacks

    DEFF Research Database (Denmark)

    Kaniewski, Jedrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy......-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block...... known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse...

  7. Deep learning, audio adversaries, and music content analysis

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    We present the concept of adversarial audio in the context of deep neural networks (DNNs) for music content analysis. An adversary is an algorithm that makes minor perturbations to an input that cause major repercussions to the system response. In particular, we design an adversary for a DNN...... that takes as input short-time spectral magnitudes of recorded music and outputs a high-level music descriptor. We demonstrate how this adversary can make the DNN behave in any way with only extremely minor changes to the music recording signal. We show that the adversary cannot be neutralised by a simple...... filtering of the input. Finally, we discuss adversaries in the broader context of the evaluation of music content analysis systems....

  8. Two-Round Password-Only Authenticated Key Exchange in the Three-Party Setting

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2015-01-01

    Full Text Available We present the first provably-secure three-party password-only authenticated key exchange (PAKE protocol that can run in only two communication rounds. Our protocol is generic in the sense that it can be constructed from any two-party PAKE protocol. The protocol is proven secure in a variant of the widely-accepted model of Bellare, Pointcheval and Rogaway (2000 without any idealized assumptions on the cryptographic primitives used. We also investigate the security of the two-round, three-party PAKE protocol of Wang, Hu and Li (2010 and demonstrate that this protocol cannot achieve implicit key authentication in the presence of an active adversary.

  9. Adversarial Feature Selection Against Evasion Attacks.

    Science.gov (United States)

    Zhang, Fei; Chan, Patrick P K; Biggio, Battista; Yeung, Daniel S; Roli, Fabio

    2016-03-01

    Pattern recognition and machine learning techniques have been increasingly adopted in adversarial settings such as spam, intrusion, and malware detection, although their security against well-crafted attacks that aim to evade detection by manipulating data at test time has not yet been thoroughly assessed. While previous work has been mainly focused on devising adversary-aware classification algorithms to counter evasion attempts, only few authors have considered the impact of using reduced feature sets on classifier security against the same attacks. An interesting, preliminary result is that classifier security to evasion may be even worsened by the application of feature selection. In this paper, we provide a more detailed investigation of this aspect, shedding some light on the security properties of feature selection against evasion attacks. Inspired by previous work on adversary-aware classifiers, we propose a novel adversary-aware feature selection model that can improve classifier security against evasion attacks, by incorporating specific assumptions on the adversary's data manipulation strategy. We focus on an efficient, wrapper-based implementation of our approach, and experimentally validate its soundness on different application examples, including spam and malware detection.

  10. A New Approach to Practical Active-Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio

    2012-01-01

    We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao’s garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce...... a number of novel techniques for relating the outputs and inputs of OTs in a larger construction....

  11. Using plural modeling for predicting decisions made by adaptive adversaries

    International Nuclear Information System (INIS)

    Buede, Dennis M.; Mahoney, Suzanne; Ezell, Barry; Lathrop, John

    2012-01-01

    Incorporating an appropriate representation of the likelihood of terrorist decision outcomes into risk assessments associated with weapons of mass destruction attacks has been a significant problem for countries around the world. Developing these likelihoods gets at the heart of the most difficult predictive problems: human decision making, adaptive adversaries, and adversaries about which very little is known. A plural modeling approach is proposed that incorporates estimates of all critical uncertainties: who is the adversary and what skills and resources are available to him, what information is known to the adversary and what perceptions of the important facts are held by this group or individual, what does the adversary know about the countermeasure actions taken by the government in question, what are the adversary's objectives and the priorities of those objectives, what would trigger the adversary to start an attack and what kind of success does the adversary desire, how realistic is the adversary in estimating the success of an attack, how does the adversary make a decision and what type of model best predicts this decision-making process. A computational framework is defined to aggregate the predictions from a suite of models, based on this broad array of uncertainties. A validation approach is described that deals with a significant scarcity of data.

  12. An analytic approach to cyber adversarial dynamics

    Science.gov (United States)

    Sweeney, Patrick; Cybenko, George

    2012-06-01

    To date, cyber security investment by both the government and commercial sectors has been largely driven by the myopic best response of players to the actions of their adversaries and their perception of the adversarial environment. However, current work in applying traditional game theory to cyber operations typically assumes that games exist with prescribed moves, strategies, and payos. This paper presents an analytic approach to characterizing the more realistic cyber adversarial metagame that we believe is being played. Examples show that understanding the dynamic metagame provides opportunities to exploit an adversary's anticipated attack strategy. A dynamic version of a graph-based attack-defend game is introduced, and a simulation shows how an optimal strategy can be selected for success in the dynamic environment.

  13. Using Machine Learning in Adversarial Environments.

    Energy Technology Data Exchange (ETDEWEB)

    Davis, Warren Leon [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States)

    2016-02-01

    Intrusion/anomaly detection systems are among the first lines of cyber defense. Commonly, they either use signatures or machine learning (ML) to identify threats, but fail to account for sophisticated attackers trying to circumvent them. We propose to embed machine learning within a game theoretic framework that performs adversarial modeling, develops methods for optimizing operational response based on ML, and integrates the resulting optimization codebase into the existing ML infrastructure developed by the Hybrid LDRD. Our approach addresses three key shortcomings of ML in adversarial settings: 1) resulting classifiers are typically deterministic and, therefore, easy to reverse engineer; 2) ML approaches only address the prediction problem, but do not prescribe how one should operationalize predictions, nor account for operational costs and constraints; and 3) ML approaches do not model attackers’ response and can be circumvented by sophisticated adversaries. The principal novelty of our approach is to construct an optimization framework that blends ML, operational considerations, and a model predicting attackers reaction, with the goal of computing optimal moving target defense. One important challenge is to construct a realistic model of an adversary that is tractable, yet realistic. We aim to advance the science of attacker modeling by considering game-theoretic methods, and by engaging experimental subjects with red teaming experience in trying to actively circumvent an intrusion detection system, and learning a predictive model of such circumvention activities. In addition, we will generate metrics to test that a particular model of an adversary is consistent with available data.

  14. Context-Aware Generative Adversarial Privacy

    Directory of Open Access Journals (Sweden)

    Chong Huang

    2017-12-01

    Full Text Available Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP. GAP leverages recent advancements in generative adversarial networks (GANs to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals’ private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP’s performance, we investigate two simple (yet canonical statistical dataset models: (a the binary data model; and (b the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  15. Context-Aware Generative Adversarial Privacy

    Science.gov (United States)

    Huang, Chong; Kairouz, Peter; Chen, Xiao; Sankar, Lalitha; Rajagopal, Ram

    2017-12-01

    Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often lead to a significant reduction in utility. On the other hand, context-aware privacy solutions, such as information theoretic privacy, achieve an improved privacy-utility tradeoff, but assume that the data holder has access to dataset statistics. We circumvent these limitations by introducing a novel context-aware privacy framework called generative adversarial privacy (GAP). GAP leverages recent advancements in generative adversarial networks (GANs) to allow the data holder to learn privatization schemes from the dataset itself. Under GAP, learning the privacy mechanism is formulated as a constrained minimax game between two players: a privatizer that sanitizes the dataset in a way that limits the risk of inference attacks on the individuals' private variables, and an adversary that tries to infer the private variables from the sanitized dataset. To evaluate GAP's performance, we investigate two simple (yet canonical) statistical dataset models: (a) the binary data model, and (b) the binary Gaussian mixture model. For both models, we derive game-theoretically optimal minimax privacy mechanisms, and show that the privacy mechanisms learned from data (in a generative adversarial fashion) match the theoretically optimal ones. This demonstrates that our framework can be easily applied in practice, even in the absence of dataset statistics.

  16. Computational Modeling of Cultural Dimensions in Adversary Organizations

    Science.gov (United States)

    2010-01-01

    theatre of operations. 50 51 Chapter 5 Adversary Modeling Applications 5.1 Modeling Uncertainty in Adversary Behavior: Attacks in...Underestimate the Strength of Coalition Power 1 1 (= True) 1 1 1 -- Coalition Deploys Forces to Indonesia 1 1 2 1 2 -- Thai can Conduct Unilateral NEO 1 1

  17. Security force-adversary engagement simulation

    International Nuclear Information System (INIS)

    Bennett, H.A.

    1975-01-01

    A dynamic simulation of a security force-adversary engagement has been developed to obtain a better understanding of the complexities involved in security systems. Factors affecting engagement outcomes were identified and interrelated to represent an ambush of an escorted nuclear fuel truck convoy by an adversary group. Other forms of engagement such as assault and skirmish also can be simulated through suitable parameter changes. The dynamic model can provide a relative evaluation of changes in security force levels, equipment, training, and tactics. Continued application and subsequent refinements of the model are expected to augment the understanding of component interaction within a guard-based security system

  18. David against Goliath: Coping with Adversarial Customers

    DEFF Research Database (Denmark)

    Alajoutsijärvi, Kimmo; Tikkanen, Henrikki; Skaates, Maria Anne

    2001-01-01

    future-oriented relationships with any of them. From the perspective of the SME, this kind of customer behaviour could even be described as harmful, since it often impedes the SME manager's long-term development of his or her business. This makes the balancing of adversarial customer relationships...... an aspect crucial to the long-term survival and success of the particular SME. In this article, we propose a three-fold approach through which SME managers could balance their relationships with this type of customer. Firstly, we review theoretical discussions about business relationships and adversariness......SME managers in many industries face the situation that they have to deal with a few important, large customer organisations that behave in an adversarial manner. These customers pit alternative suppliers against each other in order to achieve the lowest possible price, showing no intent to build...

  19. StackGAN++: Realistic Image Synthesis with Stacked Generative Adversarial Networks

    OpenAIRE

    Zhang, Han; Xu, Tao; Li, Hongsheng; Zhang, Shaoting; Wang, Xiaogang; Huang, Xiaolei; Metaxas, Dimitris

    2017-01-01

    Although Generative Adversarial Networks (GANs) have shown remarkable success in various tasks, they still face challenges in generating high quality images. In this paper, we propose Stacked Generative Adversarial Networks (StackGAN) aiming at generating high-resolution photo-realistic images. First, we propose a two-stage generative adversarial network architecture, StackGAN-v1, for text-to-image synthesis. The Stage-I GAN sketches the primitive shape and colors of the object based on given...

  20. Recognizing and Imitating Programmer Style: Adversaries in Program Authorship Attribution

    Directory of Open Access Journals (Sweden)

    Simko Lucy

    2018-01-01

    Full Text Available Source code attribution classifiers have recently become powerful. We consider the possibility that an adversary could craft code with the intention of causing a misclassification, i.e., creating a forgery of another author’s programming style in order to hide the forger’s own identity or blame the other author. We find that it is possible for a non-expert adversary to defeat such a system. In order to inform the design of adversarially resistant source code attribution classifiers, we conduct two studies with C/C++ programmers to explore the potential tactics and capabilities both of such adversaries and, conversely, of human analysts doing source code authorship attribution. Through the quantitative and qualitative analysis of these studies, we (1 evaluate a state-of-the-art machine classifier against forgeries, (2 evaluate programmers as human analysts/forgery detectors, and (3 compile a set of modifications made to create forgeries. Based on our analyses, we then suggest features that future source code attribution systems might incorporate in order to be adversarially resistant.

  1. Generative Adversarial Networks for Noise Reduction in Low-Dose CT.

    Science.gov (United States)

    Wolterink, Jelmer M; Leiner, Tim; Viergever, Max A; Isgum, Ivana

    2017-12-01

    Noise is inherent to low-dose CT acquisition. We propose to train a convolutional neural network (CNN) jointly with an adversarial CNN to estimate routine-dose CT images from low-dose CT images and hence reduce noise. A generator CNN was trained to transform low-dose CT images into routine-dose CT images using voxelwise loss minimization. An adversarial discriminator CNN was simultaneously trained to distinguish the output of the generator from routine-dose CT images. The performance of this discriminator was used as an adversarial loss for the generator. Experiments were performed using CT images of an anthropomorphic phantom containing calcium inserts, as well as patient non-contrast-enhanced cardiac CT images. The phantom and patients were scanned at 20% and 100% routine clinical dose. Three training strategies were compared: the first used only voxelwise loss, the second combined voxelwise loss and adversarial loss, and the third used only adversarial loss. The results showed that training with only voxelwise loss resulted in the highest peak signal-to-noise ratio with respect to reference routine-dose images. However, CNNs trained with adversarial loss captured image statistics of routine-dose images better. Noise reduction improved quantification of low-density calcified inserts in phantom CT images and allowed coronary calcium scoring in low-dose patient CT images with high noise levels. Testing took less than 10 s per CT volume. CNN-based low-dose CT noise reduction in the image domain is feasible. Training with an adversarial network improves the CNNs ability to generate images with an appearance similar to that of reference routine-dose CT images.

  2. Learning Adversary Modeling from Games

    National Research Council Canada - National Science Library

    Avellino, Paul

    2007-01-01

    .... In the computer age, highly accurate models and simulations of the enemy can be created. However, including the effects of motivations, capabilities, and weaknesses of adversaries in current wars is still extremely difficult...

  3. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2014-01-01

    for important variations of the secure pattern matching problem that are significantly more efficient than the current state of art solutions: First, we deal with secure pattern matching with wildcards. In this variant the pattern may contain wildcards that match both 0 and 1. Our protocol requires O......We propose a protocol for the problem of secure two-party pattern matching, where Alice holds a text t∈{0,1}∗ of length n, while Bob has a pattern p∈{0,1}∗ of length m. The goal is for Bob to (only) learn where his pattern occurs in Alice’s text, while Alice learns nothing. Private pattern matching...... is an important problem that has many applications in the area of DNA search, computational biology and more. Our construction guarantees full simulation in the presence of malicious, polynomial-time adversaries (assuming the hardness of DDH assumption) and exhibits computation and communication costs of O...

  4. Adversarial Advantage Actor-Critic Model for Task-Completion Dialogue Policy Learning

    OpenAIRE

    Peng, Baolin; Li, Xiujun; Gao, Jianfeng; Liu, Jingjing; Chen, Yun-Nung; Wong, Kam-Fai

    2017-01-01

    This paper presents a new method --- adversarial advantage actor-critic (Adversarial A2C), which significantly improves the efficiency of dialogue policy learning in task-completion dialogue systems. Inspired by generative adversarial networks (GAN), we train a discriminator to differentiate responses/actions generated by dialogue agents from responses/actions by experts. Then, we incorporate the discriminator as another critic into the advantage actor-critic (A2C) framework, to encourage the...

  5. Learning consensus in adversarial environments

    Science.gov (United States)

    Vamvoudakis, Kyriakos G.; García Carrillo, Luis R.; Hespanha, João. P.

    2013-05-01

    This work presents a game theory-based consensus problem for leaderless multi-agent systems in the presence of adversarial inputs that are introducing disturbance to the dynamics. Given the presence of enemy components and the possibility of malicious cyber attacks compromising the security of networked teams, a position agreement must be reached by the networked mobile team based on environmental changes. The problem is addressed under a distributed decision making framework that is robust to possible cyber attacks, which has an advantage over centralized decision making in the sense that a decision maker is not required to access information from all the other decision makers. The proposed framework derives three tuning laws for every agent; one associated with the cost, one associated with the controller, and one with the adversarial input.

  6. Device-independent two-party cryptography secure against sequential attacks

    International Nuclear Information System (INIS)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-01-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser–Horne–Shimony–Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation. (paper)

  7. Device-independent two-party cryptography secure against sequential attacks

    Science.gov (United States)

    Kaniewski, Jędrzej; Wehner, Stephanie

    2016-05-01

    The goal of two-party cryptography is to enable two parties, Alice and Bob, to solve common tasks without the need for mutual trust. Examples of such tasks are private access to a database, and secure identification. Quantum communication enables security for all of these problems in the noisy-storage model by sending more signals than the adversary can store in a certain time frame. Here, we initiate the study of device-independent (DI) protocols for two-party cryptography in the noisy-storage model. Specifically, we present a relatively easy to implement protocol for a cryptographic building block known as weak string erasure and prove its security even if the devices used in the protocol are prepared by the dishonest party. DI two-party cryptography is made challenging by the fact that Alice and Bob do not trust each other, which requires new techniques to establish security. We fully analyse the case of memoryless devices (for which sequential attacks are optimal) and the case of sequential attacks for arbitrary devices. The key ingredient of the proof, which might be of independent interest, is an explicit (and tight) relation between the violation of the Clauser-Horne-Shimony-Holt inequality observed by Alice and Bob and uncertainty generated by Alice against Bob who is forced to measure his system before finding out Alice’s setting (guessing with postmeasurement information). In particular, we show that security is possible for arbitrarily small violation.

  8. A New Approach to Practical Active-Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Nielsen, Jesper Buus; Nordholt, Peter Sebastian; Orlandi, Claudio

    2011-01-01

    We propose a new approach to practical two-party computation secure against an active adversary. All prior practical protocols were based on Yao's garbled circuits. We use an OT-based approach and get efficiency via OT extension in the random oracle model. To get a practical protocol we introduce...... a number of novel techniques for relating the outputs and inputs of OTs in a larger construction. We also report on an implementation of this approach, that shows that our protocol is more efficient than any previous one: For big enough circuits, we can evaluate more than 20000 Boolean gates per second...

  9. Decorrelated Jet Substructure Tagging using Adversarial Neural Networks

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    We describe a strategy for constructing a neural network jet substructure tagger which powerfully discriminates boosted decay signals while remaining largely uncorrelated with the jet mass. This reduces the impact of systematic uncertainties in background modeling while enhancing signal purity, resulting in improved discovery significance relative to existing taggers. The network is trained using an adversarial strategy, resulting in a tagger that learns to balance classification accuracy with decorrelation. As a benchmark scenario, we consider the case where large-radius jets originating from a boosted Z' decay are discriminated from a background of nonresonant quark and gluon jets. We show that in the presence of systematic uncertainties on the background rate, our adversarially-trained, decorrelated tagger considerably outperforms a conventionally trained neural network, despite having a slightly worse signal-background separation power. We generalize the adversarial training technique to include a paramet...

  10. Resilient Distributed Estimation Through Adversary Detection

    Science.gov (United States)

    Chen, Yuan; Kar, Soummya; Moura, Jose M. F.

    2018-05-01

    This paper studies resilient multi-agent distributed estimation of an unknown vector parameter when a subset of the agents is adversarial. We present and analyze a Flag Raising Distributed Estimator ($\\mathcal{FRDE}$) that allows the agents under attack to perform accurate parameter estimation and detect the adversarial agents. The $\\mathcal{FRDE}$ algorithm is a consensus+innovations estimator in which agents combine estimates of neighboring agents (consensus) with local sensing information (innovations). We establish that, under $\\mathcal{FRDE}$, either the uncompromised agents' estimates are almost surely consistent or the uncompromised agents detect compromised agents if and only if the network of uncompromised agents is connected and globally observable. Numerical examples illustrate the performance of $\\mathcal{FRDE}$.

  11. Arguing with Adversaries: Aikido, Rhetoric, and the Art of Peace

    Science.gov (United States)

    Kroll, Barry M.

    2008-01-01

    The Japanese martial art of aikido affords a framework for understanding argument as harmonization rather than confrontation. Two movements, circling away ("tenkan") and entering in ("irimi"), suggest tactics for arguing with adversaries. The ethical imperative of aikido involves protecting one's adversary from harm, using the least force…

  12. Monte-Carlo approach to the generation of adversary paths

    International Nuclear Information System (INIS)

    1977-01-01

    This paper considers the definition of a threat as the sequence of events that might lead to adversary success. A nuclear facility is characterized as a weighted, labeled, directed graph, with critical adversary paths. A discrete-event, Monte-Carlo simulation model is used to estimate the probability of the critical paths. The model was tested for hypothetical facilities, with promising results

  13. Creative Persuasion: A Study on Adversarial Behaviors and Strategies in Phishing Attacks.

    Science.gov (United States)

    Rajivan, Prashanth; Gonzalez, Cleotilde

    2018-01-01

    Success of phishing attacks depend on effective exploitation of human weaknesses. This research explores a largely ignored, but crucial aspect of phishing: the adversarial behavior. We aim at understanding human behaviors and strategies that adversaries use, and how these may determine the end-user response to phishing emails. We accomplish this through a novel experiment paradigm involving two phases. In the adversarial phase, 105 participants played the role of a phishing adversary who were incentivized to produce multiple phishing emails that would evade detection and persuade end-users to respond. In the end-user phase, 340 participants performed an email management task, where they examined and classified phishing emails generated by participants in phase-one along with benign emails. Participants in the adversary role, self-reported the strategies they employed in each email they created, and responded to a test of individual creativity. Data from both phases of the study was combined and analyzed, to measure the effect of adversarial behaviors on end-user response to phishing emails. We found that participants who persistently used specific attack strategies (e.g., sending notifications, use of authoritative tone, or expressing shared interest) in all their attempts were overall more successful, compared to others who explored different strategies in each attempt. We also found that strategies largely determined whether an end-user was more likely to respond to an email immediately, or delete it. Individual creativity was not a reliable predictor of adversarial performance, but it was a predictor of an adversary's ability to evade detection. In summary, the phishing example provided initially, the strategies used, and the participants' persistence with some of the strategies led to higher performance in persuading end-users to respond to phishing emails. These insights may be used to inform tools and training procedures to detect phishing strategies in

  14. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    In this paper we construct taxonomies of cyber adversaries and methods of attack, drawing from a survey of the literature in the area of cyber crime. We begin by addressing the scope of cyber crime, noting its prevalence and effects on the US economy. We then survey the literature on cyber adversaries, presenting a taxonomy of the different types of adversaries and their corresponding methods, motivations, maliciousness, and skill levels. Subsequently we survey the literature on cyber attacks, giving a taxonomy of the different classes of attacks, subtypes, and threat descriptions. The goal of this paper is to inform future studies of cyber security on the shape and characteristics of the risk space and its associated adversaries.

  15. Towards Stable Adversarial Feature Learning for LiDAR based Loop Closure Detection

    OpenAIRE

    Xu, Lingyun; Yin, Peng; Luo, Haibo; Liu, Yunhui; Han, Jianda

    2017-01-01

    Stable feature extraction is the key for the Loop closure detection (LCD) task in the simultaneously localization and mapping (SLAM) framework. In our paper, the feature extraction is operated by using a generative adversarial networks (GANs) based unsupervised learning. GANs are powerful generative models, however, GANs based adversarial learning suffers from training instability. We find that the data-code joint distribution in the adversarial learning is a more complex manifold than in the...

  16. MTGAN: Speaker Verification through Multitasking Triplet Generative Adversarial Networks

    OpenAIRE

    Ding, Wenhao; He, Liang

    2018-01-01

    In this paper, we propose an enhanced triplet method that improves the encoding process of embeddings by jointly utilizing generative adversarial mechanism and multitasking optimization. We extend our triplet encoder with Generative Adversarial Networks (GANs) and softmax loss function. GAN is introduced for increasing the generality and diversity of samples, while softmax is for reinforcing features about speakers. For simplification, we term our method Multitasking Triplet Generative Advers...

  17. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems

    Directory of Open Access Journals (Sweden)

    Xiaofei He

    2018-02-01

    Full Text Available Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT (smart cities, smart grid, smart transportation, etc. and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy, our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against

  18. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems.

    Science.gov (United States)

    He, Xiaofei; Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-02-24

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries

  19. Deep Learning and Music Adversaries

    DEFF Research Database (Denmark)

    Kereliuk, Corey Mose; Sturm, Bob L.; Larsen, Jan

    2015-01-01

    the minimal perturbation of the input image such that the system misclassifies it with high confidence. We adapt this approach to construct and deploy an adversary of deep learning systems applied to music content analysis. In our case, however, the system inputs are magnitude spectral frames, which require...

  20. Modelling adversary actions against a nuclear material accounting system

    International Nuclear Information System (INIS)

    Lim, J.J.; Huebel, J.G.

    1979-01-01

    A typical nuclear material accounting system employing double-entry bookkeeping is described. A logic diagram is used to model the interactions of the accounting system and the adversary when he attempts to thwart it. Boolean equations are derived from the logic diagram; solution of these equations yields the accounts and records through which the adversary may disguise a SSNM theft and the collusion requirements needed to accomplish this feat. Some technical highlights of the logic diagram are also discussed

  1. Towards an Iterated Game Model with Multiple Adversaries in Smart-World Systems †

    Science.gov (United States)

    Yang, Xinyu; Yu, Wei; Lin, Jie; Yang, Qingyu

    2018-01-01

    Diverse and varied cyber-attacks challenge the operation of the smart-world system that is supported by Internet-of-Things (IoT) (smart cities, smart grid, smart transportation, etc.) and must be carefully and thoughtfully addressed before widespread adoption of the smart-world system can be fully realized. Although a number of research efforts have been devoted to defending against these threats, a majority of existing schemes focus on the development of a specific defensive strategy to deal with specific, often singular threats. In this paper, we address the issue of coalitional attacks, which can be launched by multiple adversaries cooperatively against the smart-world system such as smart cities. Particularly, we propose a game-theory based model to capture the interaction among multiple adversaries, and quantify the capacity of the defender based on the extended Iterated Public Goods Game (IPGG) model. In the formalized game model, in each round of the attack, a participant can either cooperate by participating in the coalitional attack, or defect by standing aside. In our work, we consider the generic defensive strategy that has a probability to detect the coalitional attack. When the coalitional attack is detected, all participating adversaries are penalized. The expected payoff of each participant is derived through the equalizer strategy that provides participants with competitive benefits. The multiple adversaries with the collusive strategy are also considered. Via a combination of theoretical analysis and experimentation, our results show that no matter which strategies the adversaries choose (random strategy, win-stay-lose-shift strategy, or even the adaptive equalizer strategy), our formalized game model is capable of enabling the defender to greatly reduce the maximum value of the expected average payoff to the adversaries via provisioning sufficient defensive resources, which is reflected by setting a proper penalty factor against the adversaries

  2. C-RNN-GAN: Continuous recurrent neural networks with adversarial training

    OpenAIRE

    Mogren, Olof

    2016-01-01

    Generative adversarial networks have been proposed as a way of efficiently training deep generative neural networks. We propose a generative adversarial model that works on continuous sequential data, and apply it by training it on a collection of classical music. We conclude that it generates music that sounds better and better as the model is trained, report statistics on generated music, and let the reader judge the quality by downloading the generated songs.

  3. On the Security of a Simple Three-Party Key Exchange Protocol without Server’s Public Keys

    Directory of Open Access Journals (Sweden)

    Junghyun Nam

    2014-01-01

    Full Text Available Authenticated key exchange protocols are of fundamental importance in securing communications and are now extensively deployed for use in various real-world network applications. In this work, we reveal major previously unpublished security vulnerabilities in the password-based authenticated three-party key exchange protocol according to Lee and Hwang (2010: (1 the Lee-Hwang protocol is susceptible to a man-in-the-middle attack and thus fails to achieve implicit key authentication; (2 the protocol cannot protect clients’ passwords against an offline dictionary attack; and (3 the indistinguishability-based security of the protocol can be easily broken even in the presence of a passive adversary. We also propose an improved password-based authenticated three-party key exchange protocol that addresses the security vulnerabilities identified in the Lee-Hwang protocol.

  4. End-to-End Adversarial Retinal Image Synthesis.

    Science.gov (United States)

    Costa, Pedro; Galdran, Adrian; Meyer, Maria Ines; Niemeijer, Meindert; Abramoff, Michael; Mendonca, Ana Maria; Campilho, Aurelio

    2018-03-01

    In medical image analysis applications, the availability of the large amounts of annotated data is becoming increasingly critical. However, annotated medical data is often scarce and costly to obtain. In this paper, we address the problem of synthesizing retinal color images by applying recent techniques based on adversarial learning. In this setting, a generative model is trained to maximize a loss function provided by a second model attempting to classify its output into real or synthetic. In particular, we propose to implement an adversarial autoencoder for the task of retinal vessel network synthesis. We use the generated vessel trees as an intermediate stage for the generation of color retinal images, which is accomplished with a generative adversarial network. Both models require the optimization of almost everywhere differentiable loss functions, which allows us to train them jointly. The resulting model offers an end-to-end retinal image synthesis system capable of generating as many retinal images as the user requires, with their corresponding vessel networks, by sampling from a simple probability distribution that we impose to the associated latent space. We show that the learned latent space contains a well-defined semantic structure, implying that we can perform calculations in the space of retinal images, e.g., smoothly interpolating new data points between two retinal images. Visual and quantitative results demonstrate that the synthesized images are substantially different from those in the training set, while being also anatomically consistent and displaying a reasonable visual quality.

  5. GANViz: A Visual Analytics Approach to Understand the Adversarial Game.

    Science.gov (United States)

    Wang, Junpeng; Gou, Liang; Yang, Hao; Shen, Han-Wei

    2018-06-01

    Generative models bear promising implications to learn data representations in an unsupervised fashion with deep learning. Generative Adversarial Nets (GAN) is one of the most popular frameworks in this arena. Despite the promising results from different types of GANs, in-depth understanding on the adversarial training process of the models remains a challenge to domain experts. The complexity and the potential long-time training process of the models make it hard to evaluate, interpret, and optimize them. In this work, guided by practical needs from domain experts, we design and develop a visual analytics system, GANViz, aiming to help experts understand the adversarial process of GANs in-depth. Specifically, GANViz evaluates the model performance of two subnetworks of GANs, provides evidence and interpretations of the models' performance, and empowers comparative analysis with the evidence. Through our case studies with two real-world datasets, we demonstrate that GANViz can provide useful insight into helping domain experts understand, interpret, evaluate, and potentially improve GAN models.

  6. Scientific method, adversarial system, and technology assessment

    Science.gov (United States)

    Mayo, L. H.

    1975-01-01

    A basic framework is provided for the consideration of the purposes and techniques of scientific method and adversarial systems. Similarities and differences in these two techniques of inquiry are considered with reference to their relevance in the performance of assessments.

  7. Gender Identity and Adversarial Sexual Beliefs as Predictors of Attitudes toward Sexual Harassment.

    Science.gov (United States)

    Murrell, Audrey J.; Dietz-Uhler, Beth L.

    1993-01-01

    Examines impact of gender identity and adversarial sexual beliefs as predictors of attitudes toward sexual harassment for 52 female and 55 male college students. Adversarial beliefs and experience with sexual harassment predict less tolerant attitudes toward harassment for males, whereas strong gender group identity and experience with harassment…

  8. Cascading Generative Adversarial Networks for Targeted

    KAUST Repository

    Hamdi, Abdullah

    2018-01-01

    Abundance of labelled data played a crucial role in the recent developments in computer vision, but that faces problems like scalability and transferability to the wild. One alternative approach is to utilize the data without labels, i.e. unsupervised learning, in learning valuable information and put it in use to tackle vision problems. Generative Adversarial Networks (GANs) have gained momentum for their ability to model image distributions in unsupervised manner. They learn to emulate the training set and that enables sampling from that domain and using the knowledge learned for useful applications. Several methods proposed enhancing GANs, including regularizing the loss with some feature matching. We seek to push GANs beyond the data in the training and try to explore unseen territory in the image manifold. We first propose a new regularizer for GAN based on K-Nearest Neighbor (K-NN) selective feature matching to a target set Y in high-level feature space, during the adversarial training of GAN on the base set X, and we call this novel model K-GAN. We show that minimizing the added term follows from cross-entropy minimization between the distributions of GAN and set Y. Then, we introduce a cascaded framework for GANs that try to address the task of imagining a new distribution that combines the base set X and target set Y by cascading sampling GANs with translation GANs, and we dub the cascade of such GANs as the Imaginative Adversarial Network (IAN). Several cascades are trained on a collected dataset Zoo-Faces and generated innovative samples are shown, including from K-GAN cascade. We conduct an objective and subjective evaluation for different IAN setups in the addressed task of generating innovative samples and we show the effect of regularizing GAN on different scores. We conclude with some useful applications for these IANs, like multi-domain manifold traversing.

  9. Cascading Generative Adversarial Networks for Targeted

    KAUST Repository

    Hamdi, Abdullah

    2018-04-09

    Abundance of labelled data played a crucial role in the recent developments in computer vision, but that faces problems like scalability and transferability to the wild. One alternative approach is to utilize the data without labels, i.e. unsupervised learning, in learning valuable information and put it in use to tackle vision problems. Generative Adversarial Networks (GANs) have gained momentum for their ability to model image distributions in unsupervised manner. They learn to emulate the training set and that enables sampling from that domain and using the knowledge learned for useful applications. Several methods proposed enhancing GANs, including regularizing the loss with some feature matching. We seek to push GANs beyond the data in the training and try to explore unseen territory in the image manifold. We first propose a new regularizer for GAN based on K-Nearest Neighbor (K-NN) selective feature matching to a target set Y in high-level feature space, during the adversarial training of GAN on the base set X, and we call this novel model K-GAN. We show that minimizing the added term follows from cross-entropy minimization between the distributions of GAN and set Y. Then, we introduce a cascaded framework for GANs that try to address the task of imagining a new distribution that combines the base set X and target set Y by cascading sampling GANs with translation GANs, and we dub the cascade of such GANs as the Imaginative Adversarial Network (IAN). Several cascades are trained on a collected dataset Zoo-Faces and generated innovative samples are shown, including from K-GAN cascade. We conduct an objective and subjective evaluation for different IAN setups in the addressed task of generating innovative samples and we show the effect of regularizing GAN on different scores. We conclude with some useful applications for these IANs, like multi-domain manifold traversing.

  10. Consensus of discrete-time multi-agent systems with adversaries and time delays

    Science.gov (United States)

    Wu, Yiming; He, Xiongxiong; Liu, Shuai; Xie, Lihua

    2014-05-01

    This paper studies the resilient asymptotic consensus problem for discrete-time multi-agent systems in the presence of adversaries and transmission delays. The network is assumed to have ? loyal agents and ? adversarial agents, and each loyal agent in the network has no knowledge of the network topology other than an upper bound on the number of adversarial agents in its neighborhood. For the considered networked system, only locally delayed information is available for each loyal agent, and also the information flow is directed and a control protocol using only local information is designed to guarantee the realization of consensus with respect to communication graph, which satisfies a featured network robustness. Numerical examples are finally given to demonstrate the effectiveness of theoretical results.

  11. Vulnerability assessment: Determining probabilities of neutralization of adversaries

    International Nuclear Information System (INIS)

    Graves, B.R.

    1987-01-01

    The Security Manager charged with the responsibility of designing Safeguards and Security Systems at Department of Energy facilities must take many factors into consideration. There must be a clear understanding, supported by documented guidance, of the level of threat to be addressed; the nature of the facility to be protected, and the funds available to design, implement, and maintain the Safeguards and Security System. Armed with these prerequisites, the Security Manager may then determine the characteristics of the Safeguards measures and security forces necessary to protect the facility. Security forces selection and training programs may then be established based on realistic facility needs. The next step is to attempt to determine the probability of security forces winning in a confrontation with adversaries. To determine the probability of success the Security Manager must consider the characteristics of the facility and surrounding area; the characteristics of the security forces and safeguards system at the facility; the response time and capabilities of the augmentation forces and the characteristics and capabilities of the adversary threat level to be addressed. Obviously, the Safeguards and Security Systems must initially address ''worst case'' scenarios consistent with stated guidelines. Validation of the assessment of the Safeguards and Security Systems must then be determined by simulation testing of the capabilities of the response forces against the capabilities of the adversary

  12. Modeling documents with Generative Adversarial Networks

    OpenAIRE

    Glover, John

    2016-01-01

    This paper describes a method for using Generative Adversarial Networks to learn distributed representations of natural language documents. We propose a model that is based on the recently proposed Energy-Based GAN, but instead uses a Denoising Autoencoder as the discriminator network. Document representations are extracted from the hidden layer of the discriminator and evaluated both quantitatively and qualitatively.

  13. Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering

    KAUST Repository

    Alabdulmohsin, Ibrahim

    2014-01-01

    Many classification algorithms have been successfully deployed in security-sensitive applications including spam filters and intrusion detection systems. Under such adversarial environments, adversaries can generate exploratory attacks against the defender such as evasion and reverse engineering. In this paper, we discuss why reverse engineering attacks can be carried out quite efficiently against fixed classifiers, and investigate the use of randomization as a suitable strategy for mitigating their risk. In particular, we derive a semidefinite programming (SDP) formulation for learning a distribution of classifiers subject to the constraint that any single classifier picked at random from such distribution provides reliable predictions with a high probability. We analyze the tradeoff between variance of the distribution and its predictive accuracy, and establish that one can almost always incorporate randomization with large variance without incurring a loss in accuracy. In other words, the conventional approach of using a fixed classifier in adversarial environments is generally Pareto suboptimal. Finally, we validate such conclusions on both synthetic and real-world classification problems. Copyright 2014 ACM.

  14. Coupled generative adversarial stacked Auto-encoder: CoGASA.

    Science.gov (United States)

    Kiasari, Mohammad Ahangar; Moirangthem, Dennis Singh; Lee, Minho

    2018-04-01

    Coupled Generative Adversarial Network (CoGAN) was recently introduced in order to model a joint distribution of a multi modal dataset. The CoGAN model lacks the capability to handle noisy data as well as it is computationally expensive and inefficient for practical applications such as cross-domain image transformation. In this paper, we propose a new method, named the Coupled Generative Adversarial Stacked Auto-encoder (CoGASA), to directly transfer data from one domain to another domain with robustness to noise in the input data as well to as reduce the computation time. We evaluate the proposed model using MNIST and the Large-scale CelebFaces Attributes (CelebA) datasets, and the results demonstrate a highly competitive performance. Our proposed models can easily transfer images into the target domain with minimal effort. Copyright © 2018 Elsevier Ltd. All rights reserved.

  15. Adversarial risks in social experiments with new technologies

    NARCIS (Netherlands)

    Pieters, Wolter; Dechesne, Francien; van der Poel, Ibo; Asveld, Lotte; Mehos, Donna C.

    2017-01-01

    Studies that approach the deployment of new technologies as social experiments have mostly focused on unintentional effects, notably safety. We argue for the inclusion of adversarial risks or security aspects that are the result of intentional, strategic behavior of actors, who aim at using the

  16. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    NARCIS (Netherlands)

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement

  17. Modeling urbanization patterns with generative adversarial networks

    OpenAIRE

    Albert, Adrian; Strano, Emanuele; Kaur, Jasleen; Gonzalez, Marta

    2018-01-01

    In this study we propose a new method to simulate hyper-realistic urban patterns using Generative Adversarial Networks trained with a global urban land-use inventory. We generated a synthetic urban "universe" that qualitatively reproduces the complex spatial organization observed in global urban patterns, while being able to quantitatively recover certain key high-level urban spatial metrics.

  18. Adversarial risk analysis with incomplete information: a level-k approach.

    Science.gov (United States)

    Rothschild, Casey; McLay, Laura; Guikema, Seth

    2012-07-01

    This article proposes, develops, and illustrates the application of level-k game theory to adversarial risk analysis. Level-k reasoning, which assumes that players play strategically but have bounded rationality, is useful for operationalizing a Bayesian approach to adversarial risk analysis. It can be applied in a broad class of settings, including settings with asynchronous play and partial but incomplete revelation of early moves. Its computational and elicitation requirements are modest. We illustrate the approach with an application to a simple defend-attack model in which the defender's countermeasures are revealed with a probability less than one to the attacker before he decides on how or whether to attack. © 2011 Society for Risk Analysis.

  19. An adversarial queueing model for online server routing

    NARCIS (Netherlands)

    Bonifaci, V.

    2007-01-01

    In an online server routing problem, a vehicle or server moves in a network in order to process incoming requests at the nodes. Online server routing problems have been thoroughly studied using competitive analysis. We propose a new model for online server routing, based on adversarial queueing

  20. Vulnerability of classifiers to evolutionary generated adversarial examples

    Czech Academy of Sciences Publication Activity Database

    Vidnerová, Petra; Neruda, Roman

    submitted 14.1. 2017 (2018) ISSN 0941-0643 R&D Projects: GA ČR GA15-18108S Institutional support: RVO:67985807 Keywords : supervised learning * neural networks * kernel methods * genetic algorithm s * adversarial examples Subject RIV: IN - Informatics, Computer Science Impact factor: 2.505, year: 2016

  1. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    International Nuclear Information System (INIS)

    Heineke, J.M.

    1978-01-01

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed

  2. Quantum Capacity under Adversarial Quantum Noise: Arbitrarily Varying Quantum Channels

    Science.gov (United States)

    Ahlswede, Rudolf; Bjelaković, Igor; Boche, Holger; Nötzel, Janis

    2013-01-01

    We investigate entanglement transmission over an unknown channel in the presence of a third party (called the adversary), which is enabled to choose the channel from a given set of memoryless but non-stationary channels without informing the legitimate sender and receiver about the particular choice that he made. This channel model is called an arbitrarily varying quantum channel (AVQC). We derive a quantum version of Ahlswede's dichotomy for classical arbitrarily varying channels. This includes a regularized formula for the common randomness-assisted capacity for entanglement transmission of an AVQC. Quite surprisingly and in contrast to the classical analog of the problem involving the maximal and average error probability, we find that the capacity for entanglement transmission of an AVQC always equals its strong subspace transmission capacity. These results are accompanied by different notions of symmetrizability (zero-capacity conditions) as well as by conditions for an AVQC to have a capacity described by a single-letter formula. In the final part of the paper the capacity of the erasure-AVQC is computed and some light shed on the connection between AVQCs and zero-error capacities. Additionally, we show by entirely elementary and operational arguments motivated by the theory of AVQCs that the quantum, classical, and entanglement-assisted zero-error capacities of quantum channels are generically zero and are discontinuous at every positivity point.

  3. Adversary modeling: an analysis of criminal activities analogous to potential threats to nuclear safeguard systems

    Energy Technology Data Exchange (ETDEWEB)

    Heineke, J.M.

    1978-12-20

    This study examines and analyzes several classes of incidents in which decision makers are confronted with adversaries. The classes are analogous to adversaries in a material control system in a nuclear facility. Both internal threats (bank frauds and embezzlements) and external threats (aircraft hijackings and hostage-type terrorist events were analyzed. (DLC)

  4. The participative construction of the criminal decision in democratic states ruled by the law: the guaranty of participation of the parties, through confrontation, in the composition of a fair and legitimate decision

    Directory of Open Access Journals (Sweden)

    Flávio da Silva Andrade

    2017-10-01

    Full Text Available This article concerns a topic that is not new, but it remains current:  the participatory construction of the criminal decision in a democratic State ruled by law. Starting from the concepts of Rule of Law, of Guarantism and of Democracy, it seeks to renew the importance of the equal and dialectical participation of the parties, through the adversarial system, for the composition of a fair and legitimate criminal judicial decision. It is argued, from this perspective, that the parties should take the role of protagonists in the procedural scenario, since the decision should be built in a participatory way, i.e., based on the arguments and evidence presented, thus reducing the gaps that favor judicial discretion and decisionism. It is proposed, therefore, that the solution to the concrete case (acceptance or dismissal of the information or indictment, grant or rejection of a criminal precautionary measure, conviction or acquittal should be elaborated with support on the contribution of the litigants, from the contrast of their arguments and of the evidence produced, in adversarial proceedings, in the regular course of the process.

  5. Adversarial training and dilated convolutions for brain MRI segmentation

    NARCIS (Netherlands)

    Moeskops, P.; Veta, M.; Lafarge, M.W.; Eppenhof, K.A.J.; Pluim, J.P.W.

    2017-01-01

    Convolutional neural networks (CNNs) have been applied to various automatic image segmentation tasks in medical image analysis, including brain MRI segmentation. Generative adversarial networks have recently gained popularity because of their power in generating images that are difficult to

  6. Application of Generative Adversarial Networks (GANs) to jet images

    CERN Multimedia

    CERN. Geneva

    2017-01-01

    https://arxiv.org/abs/1701.05927 We provide a bridge between generative modeling in the Machine Learning community and simulated physical processes in High Energy Particle Physics by applying a novel Generative Adversarial Network (GAN) architecture to the production of jet images -- 2D representations of energy depositions from particles interacting with a calorimeter. We propose a simple architecture, the Location-Aware Generative Adversarial Network, that learns to produce realistic radiation patterns from simulated high energy particle collisions. The pixel intensities of GAN-generated images faithfully span over many orders of magnitude and exhibit the desired low-dimensional physical properties (i.e., jet mass, n-subjettiness, etc.). We shed light on limitations, and provide a novel empirical validation of image quality and validity of GAN-produced simulations of the natural world. This work provides a base for further explorations of GANs for use in faster simulation in High Energy Particle Physics.

  7. Feminized Power and Adversarial Advocacy: Levelling Arguments or Analyzing Them?

    Science.gov (United States)

    Condit, Celeste Michelle

    1989-01-01

    Examines the journalistic analysis of the 1988 Presidential Debates from a feminist perspective in order to identify the revisions needed in the debate process. Provides historical background of feminized power and adversarial advocacy. (MM)

  8. Generative adversarial networks for anomaly detection in images

    OpenAIRE

    Batiste Ros, Guillem

    2018-01-01

    Anomaly detection is used to identify abnormal observations that don t follow a normal pattern. Inthis work, we use the power of Generative Adversarial Networks in sampling from image distributionsto perform anomaly detection with images and to identify local anomalous segments within thisimages. Also, we explore potential application of this method to support pathological analysis ofbiological tissues

  9. Generative Adversarial Networks: An Overview

    Science.gov (United States)

    Creswell, Antonia; White, Tom; Dumoulin, Vincent; Arulkumaran, Kai; Sengupta, Biswa; Bharath, Anil A.

    2018-01-01

    Generative adversarial networks (GANs) provide a way to learn deep representations without extensively annotated training data. They achieve this through deriving backpropagation signals through a competitive process involving a pair of networks. The representations that can be learned by GANs may be used in a variety of applications, including image synthesis, semantic image editing, style transfer, image super-resolution and classification. The aim of this review paper is to provide an overview of GANs for the signal processing community, drawing on familiar analogies and concepts where possible. In addition to identifying different methods for training and constructing GANs, we also point to remaining challenges in their theory and application.

  10. Generative Adversarial Networks for Improving Face Classification

    OpenAIRE

    Natten, Jonas

    2017-01-01

    Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Facial recognition can be applied in a wide variety of cases, including entertainment purposes and biometric security. In this thesis we take a look at improving the results of an existing facial recognition approach by utilizing generative adversarial networks to improve the existing dataset. The training data was taken from the LFW dataset[4] and was preprocessed using OpenCV[2] for...

  11. A5: Automated Analysis of Adversarial Android Applications

    Science.gov (United States)

    2014-06-03

    A5: Automated Analysis of Adversarial Android Applications Timothy Vidas, Jiaqi Tan, Jay Nahata, Chaur Lih Tan, Nicolas Christin...detecting, on the device itself, that an application is malicious is much more complex without elevated privileges . In other words, given the...interface via website. Blasing et al. [7] describe another dynamic analysis system for Android . Their system focuses on classifying input applications as

  12. RETHINKING THE ROLE OF SMALL-GROUP COLLABORATORS AND ADVERSARIES IN THE LONDON KLEINIAN DEVELOPMENT (1914-1968).

    Science.gov (United States)

    Aguayo, Joseph; Regeczkey, Agnes

    2016-07-01

    The authors historically situate the London Kleinian development in terms of the small-group collaborations and adversaries that arose during the course of Melanie Klein's career. Some collaborations later became personally adversarial (e.g., those Klein had with Glover and Schmideberg); other adversarial relationships forever remained that way (with A. Freud); while still other long-term collaborations became theoretically contentious (such as with Winnicott and Heimann). After the Controversial Discussions in 1944, Klein marginalized one group of supporters (Heimann, Winnicott, and Riviere) in favor of another group (Rosenfeld, Segal, and Bion). After Klein's death in 1960, Bion maintained loyalty to Klein's ideas while quietly distancing his work from the London Klein group, immigrating to the United States in 1968. © 2016 The Psychoanalytic Quarterly, Inc.

  13. Online Evolution for Multi-Action Adversarial Games

    OpenAIRE

    Justesen, Niels; Mahlmann, Tobias; Togelius, Julian

    2016-01-01

    We present Online Evolution, a novel method for playing turn-based multi-action adversarial games. Such games, which include most strategy games, have extremely high branching factors due to each turn having multiple actions. In Online Evolution, an evolutionary algorithm is used to evolve the combination of atomic actions that make up a single move, with a state evaluation function used for fitness. We implement Online Evolution for the turn-based multi-action game Hero Academy and compare i...

  14. Comparing Generative Adversarial Network Techniques for Image Creation and Modification

    NARCIS (Netherlands)

    Pieters, Mathijs; Wiering, Marco

    2018-01-01

    Generative adversarial networks (GANs) have demonstrated to be successful at generating realistic real-world images. In this paper we compare various GAN techniques, both supervised and unsupervised. The effects on training stability of different objective functions are compared. We add an encoder

  15. Achieving the physical limits of the bounded-storage model

    International Nuclear Information System (INIS)

    Mandayam, Prabha; Wehner, Stephanie

    2011-01-01

    Secure two-party cryptography is possible if the adversary's quantum storage device suffers imperfections. For example, security can be achieved if the adversary can store strictly less then half of the qubits transmitted during the protocol. This special case is known as the bounded-storage model, and it has long been an open question whether security can still be achieved if the adversary's storage were any larger. Here, we answer this question positively and demonstrate a two-party protocol which is secure as long as the adversary cannot store even a small fraction of the transmitted pulses. We also show that security can be extended to a larger class of noisy quantum memories.

  16. Party Control, Party Competition and Public Service Performance

    OpenAIRE

    Boyne, George Alexander; James, O.; John, P.; Petrovsky, Nicolai

    2012-01-01

    This article assesses party effects on the performance of public services. A policy-seeking model, hypothesizing that left and right party control affects performance, and an instrumental model, where all parties strive to raise performance, are presented. The framework also suggests a mixed model in which party effects are contingent on party competition, with parties raising performance as increasing party competition places their control of government at increasing risk. These models are t...

  17. Evaluation of risk from acts of terrorism :the adversary/defender model using belief and fuzzy sets.

    Energy Technology Data Exchange (ETDEWEB)

    Darby, John L.

    2006-09-01

    Risk from an act of terrorism is a combination of the likelihood of an attack, the likelihood of success of the attack, and the consequences of the attack. The considerable epistemic uncertainty in each of these three factors can be addressed using the belief/plausibility measure of uncertainty from the Dempster/Shafer theory of evidence. The adversary determines the likelihood of the attack. The success of the attack and the consequences of the attack are determined by the security system and mitigation measures put in place by the defender. This report documents a process for evaluating risk of terrorist acts using an adversary/defender model with belief/plausibility as the measure of uncertainty. Also, the adversary model is a linguistic model that applies belief/plausibility to fuzzy sets used in an approximate reasoning rule base.

  18. Computationally Secure Pattern Matching in the Presence of Malicious Adversaries

    DEFF Research Database (Denmark)

    Hazay, Carmit; Toft, Tomas

    2010-01-01

    simulation in the presence of malicious, polynomial-time adversaries (assuming that ElGamal encryption is semantically secure) and exhibits computation and communication costs of O(n + m) in a constant round complexity. In addition to the above, we propose a collection of protocols for variations...

  19. Party member recruitment and the representativeness of party membership

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina

    Party membership figures are in decline. However, parties are still recruiting party members. Are there any differences in the social and political characteristics of old and new party members? If there is a difference, are new party members more or less representative for party voters than old...

  20. Adversarial Reinforcement Learning in a Cyber Security Simulation}

    OpenAIRE

    Elderman, Richard; Pater, Leon; Thie, Albert; Drugan, Madalina; Wiering, Marco

    2017-01-01

    This paper focuses on cyber-security simulations in networks modeled as a Markov game with incomplete information and stochastic elements. The resulting game is an adversarial sequential decision making problem played with two agents, the attacker and defender. The two agents pit one reinforcement learning technique, like neural networks, Monte Carlo learning and Q-learning, against each other and examine their effectiveness against learning opponents. The results showed that Monte Carlo lear...

  1. Cognitive-Emotional Conflict: Adversary Will and Social Resilience

    Science.gov (United States)

    2017-12-21

    effectively with skilled adversaries in the realm of social media . This admit- tedly is a complex problem for any open, democratic society that does not... social media of the targeted populations. Rather than inciting a population to take a particular action, as the leak of the Zimmerman telegram did in...produced by the 24/7 news cycle, amplified and accelerated by social media . National Level Most Americans do not recognize the threats posed by

  2. Cooperative Control of Distributed Autonomous Vehicles in Adversarial Environments

    Science.gov (United States)

    2006-08-14

    COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN ADVERSARIAL ENVIRONMENTS Grant #F49620–01–1–0361 Final Report Jeff Shamma Department of...CONTRACT NUMBER F49620-01-1-0361 5b. GRANT NUMBER 4. TITLE AND SUBTITLE COOPERATIVE CONTROL OF DISTRIBUTED AUTONOMOUS VEHICLES IN...single dominant language or a distribution of languages. A relation to multivehicle systems is understanding how highly autonomous vehicles on extended

  3. GalaxyGAN: Generative Adversarial Networks for recovery of galaxy features

    Science.gov (United States)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Krishnan Santhanam, Gokula

    2017-02-01

    GalaxyGAN uses Generative Adversarial Networks to reliably recover features in images of galaxies. The package uses machine learning to train on higher quality data and learns to recover detailed features such as galaxy morphology by effectively building priors. This method opens up the possibility of recovering more information from existing and future imaging data.

  4. DEVELOPMENT OF POLITICAL PARTIES AND PARTY FUNDING: MODELS AND CHARACTERISTICS

    Directory of Open Access Journals (Sweden)

    Hrvoje MATAKOVIC

    2015-03-01

    Full Text Available The first modern political parties were formed at the end of the 18th century and have, from those times up to now, undergone 4 developing phases; each of the phases is bound to ideal-type political party model: cadre parties, mass parties, catch-all parties and cartel parties. Each of these party models differentiates in various characteristics: party foundation, number of members, and way of leading the election campaigns, but also in ways of financing. This paper describes the above mentioned 4 phases of political parties’ development and 4 phases of parties' finances development; it will be analysed in detail positive and negative sides of each of the models of party financing.

  5. Secure Multi-party Computation Protocol for Defense Applications in Military Operations Using Virtual Cryptography

    Science.gov (United States)

    Pathak, Rohit; Joshi, Satyadhar

    With the advent into the 20th century whole world has been facing the common dilemma of Terrorism. The suicide attacks on US twin towers 11 Sept. 2001, Train bombings in Madrid Spain 11 Mar. 2004, London bombings 7 Jul. 2005 and Mumbai attack 26 Nov. 2008 were some of the most disturbing, destructive and evil acts by terrorists in the last decade which has clearly shown their evil intent that they can go to any extent to accomplish their goals. Many terrorist organizations such as al Quaida, Harakat ul-Mujahidin, Hezbollah, Jaish-e-Mohammed, Lashkar-e-Toiba, etc. are carrying out training camps and terrorist operations which are accompanied with latest technology and high tech arsenal. To counter such terrorism our military is in need of advanced defense technology. One of the major issues of concern is secure communication. It has to be made sure that communication between different military forces is secure so that critical information is not leaked to the adversary. Military forces need secure communication to shield their confidential data from terrorist forces. Leakage of concerned data can prove hazardous, thus preservation and security is of prime importance. There may be a need to perform computations that require data from many military forces, but in some cases the associated forces would not want to reveal their data to other forces. In such situations Secure Multi-party Computations find their application. In this paper, we propose a new highly scalable Secure Multi-party Computation (SMC) protocol and algorithm for Defense applications which can be used to perform computation on encrypted data. Every party encrypts their data in accordance with a particular scheme. This encrypted data is distributed among some created virtual parties. These Virtual parties send their data to the TTP through an Anonymizer layer. TTP performs computation on encrypted data and announces the result. As the data sent was encrypted its actual value can’t be known by TTP

  6. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    International Nuclear Information System (INIS)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems

  7. Methodology for characterizing potential adversaries of Nuclear Material Safeguards Systems

    Energy Technology Data Exchange (ETDEWEB)

    Kirkwood, C.W.; Pollock, S.M.

    1978-11-01

    The results are described of a study by Woodward--Clyde Consultants to assist the University of California Lawrence Livermore Laboratory in the development of methods to analyze and evaluate Nuclear Material Safeguards (NMS) Systems. The study concentrated on developing a methodology to assist experts in describing, in quantitative form, their judgments about the characteristics of potential adversaries of NMS Systems.

  8. Speech-Driven Facial Reenactment Using Conditional Generative Adversarial Networks

    OpenAIRE

    Jalalifar, Seyed Ali; Hasani, Hosein; Aghajan, Hamid

    2018-01-01

    We present a novel approach to generating photo-realistic images of a face with accurate lip sync, given an audio input. By using a recurrent neural network, we achieved mouth landmarks based on audio features. We exploited the power of conditional generative adversarial networks to produce highly-realistic face conditioned on a set of landmarks. These two networks together are capable of producing a sequence of natural faces in sync with an input audio track.

  9. Bring a gun to a gunfight: armed adversaries and violence across nations.

    Science.gov (United States)

    Felson, Richard B; Berg, Mark T; Rogers, Meghan L

    2014-09-01

    We use homicide data and the International Crime Victimization Survey to examine the role of firearms in explaining cross-national variation in violence. We suggest that while gun violence begets gun violence, it inhibits the tendency to engage in violence without guns. We attribute the patterns to adversary effects-i.e., the tendency of offenders to take into account the threat posed by their adversaries. Multi-level analyses of victimization data support the hypothesis that living in countries with high rates of gun violence lowers an individual's risk of an unarmed assault and assaults with less lethal weapons. Analyses of aggregate data show that homicide rates and gun violence rates load on a separate underlying factor than other types of violence. The results suggest that a country's homicide rate reflects, to a large extent, the tendency of its offenders to use firearms. Copyright © 2014 Elsevier Inc. All rights reserved.

  10. Cooperation and punishment in an adversarial game: How defectors pave the way to a peaceful society

    Science.gov (United States)

    Short, M. B.; Brantingham, P. J.; D'Orsogna, M. R.

    2010-12-01

    The evolution of human cooperation has been the subject of much research, especially within the framework of evolutionary public goods games, where several mechanisms have been proposed to account for persistent cooperation. Yet, in addressing this issue, little attention has been given to games of a more adversarial nature, in which defecting players, rather than simply free riding, actively seek to harm others. Here, we develop an adversarial evolutionary game using the specific example of criminal activity, recasting the familiar public goods strategies of punishers, cooperators, and defectors in this light. We then introduce a strategy—the informant—with no clear analog in public goods games and show that individuals employing this strategy are a key to the emergence of systems where cooperation dominates. We also find that a defection-dominated regime may be transitioned to one that is cooperation-dominated by converting an optimal number of players into informants. We discuss these findings, the role of informants, and possible intervention strategies in extreme adversarial societies, such as those marred by wars and insurgencies.

  11. Probabilistic Characterization of Adversary Behavior in Cyber Security

    Energy Technology Data Exchange (ETDEWEB)

    Meyers, C A; Powers, S S; Faissol, D M

    2009-10-08

    The objective of this SMS effort is to provide a probabilistic characterization of adversary behavior in cyber security. This includes both quantitative (data analysis) and qualitative (literature review) components. A set of real LLNL email data was obtained for this study, consisting of several years worth of unfiltered traffic sent to a selection of addresses at ciac.org. The email data was subjected to three interrelated analyses: a textual study of the header data and subject matter, an examination of threats present in message attachments, and a characterization of the maliciousness of embedded URLs.

  12. Semantic policy and adversarial modeling for cyber threat identification and avoidance

    Science.gov (United States)

    DeFrancesco, Anton; McQueary, Bruce

    2009-05-01

    Today's enterprise networks undergo a relentless barrage of attacks from foreign and domestic adversaries. These attacks may be perpetrated with little to no funding, but may wreck incalculable damage upon the enterprises security, network infrastructure, and services. As more services come online, systems that were once in isolation now provide information that may be combined dynamically with information from other systems to create new meaning on the fly. Security issues are compounded by the potential to aggregate individual pieces of information and infer knowledge at a higher classification than any of its constituent parts. To help alleviate these challenges, in this paper we introduce the notion of semantic policy and discuss how it's use is evolving from a robust approach to access control to preempting and combating attacks in the cyber domain, The introduction of semantic policy and adversarial modeling to network security aims to ask 'where is the network most vulnerable', 'how is the network being attacked', and 'why is the network being attacked'. The first aspect of our approach is integration of semantic policy into enterprise security to augment traditional network security with an overall awareness of policy access and violations. This awareness allows the semantic policy to look at the big picture - analyzing trends and identifying critical relations in system wide data access. The second aspect of our approach is to couple adversarial modeling with semantic policy to move beyond reactive security measures and into a proactive identification of system weaknesses and areas of vulnerability. By utilizing Bayesian-based methodologies, the enterprise wide meaning of data and semantic policy is applied to probability and high-level risk identification. This risk identification will help mitigate potential harm to enterprise networks by enabling resources to proactively isolate, lock-down, and secure systems that are most vulnerable.

  13. Managing Quality, Identity and Adversaries in Public Discourse with Machine Learning

    Science.gov (United States)

    Brennan, Michael

    2012-01-01

    Automation can mitigate issues when scaling and managing quality and identity in public discourse on the web. Discourse needs to be curated and filtered. Anonymous speech has to be supported while handling adversaries. Reliance on human curators or analysts does not scale and content can be missed. These scaling and management issues include the…

  14. Circuit parties.

    Science.gov (United States)

    Guzman, R

    2000-03-01

    Circuit parties are extended celebrations, lasting from a day to a week, primarily attended by gay and bisexual men in their thirties and forties. These large-scale dance parties move from city to city and draw thousands of participants. The risks for contracting HIV during these parties include recreational drug use and unsafe sex. Limited data exists on the level of risk at these parties, and participants are skeptical of outside help because of past criticism of these events. Health care and HIV advocates can promote risk-reduction strategies with the cooperation of party planners and can counsel individuals to personally reduce their own risk. To convey the message, HIV prevention workers should emphasize positive and community-centered aspects of the parties, such as taking care of friends and avoiding overdose.

  15. Danish Party Membership

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina

    Political parties have as their main assignment the creation of linkage between citizens and government. They provide one of several channels of participation in modern democracies. Yet, the general trend across the Western world is that party membership figures decline. The purpose of this article...... is to report on the state of Danish party membership; the numbers and participation. The claim of the article is that total membership figures hide evidence of membership renewal and increases, and that mere party membership figures are insufficient when evaluating political parties as channels...... of participation. Instead, membership figures at party level as well as the participation of party members need to be taken into account in order to assess parties as channels of participation. This is supported by the analyses reported here which show that even though membership figures are declining, parties...

  16. Evaluating late detection capability against diverse insider adversaries

    International Nuclear Information System (INIS)

    Sicherman, A.

    1987-01-01

    This paper describes a model for evaluating the late (after-the-fact) detection capability of material control and accountability (MCandA) systems against insider theft or diversion of special nuclear material. Potential insider cover-up strategies to defeat activities providing detection (e.g., inventories) are addressed by the model in a tractable manner. For each potential adversary and detection activity, two probabilities are assessed and used to fit the model. The model then computes the probability of detection for activities occurring periodically over time. The model provides insight into MCandA effectiveness and helps identify areas for safeguards improvement. 4 refs., 4 tabs

  17. Protecting Privacy in Shared Photos via Adversarial Examples Based Stealth

    Directory of Open Access Journals (Sweden)

    Yujia Liu

    2017-01-01

    Full Text Available Online image sharing in social platforms can lead to undesired privacy disclosure. For example, some enterprises may detect these large volumes of uploaded images to do users’ in-depth preference analysis for commercial purposes. And their technology might be today’s most powerful learning model, deep neural network (DNN. To just elude these automatic DNN detectors without affecting visual quality of human eyes, we design and implement a novel Stealth algorithm, which makes the automatic detector blind to the existence of objects in an image, by crafting a kind of adversarial examples. It is just like all objects disappear after wearing an “invisible cloak” from the view of the detector. Then we evaluate the effectiveness of Stealth algorithm through our newly defined measurement, named privacy insurance. The results indicate that our scheme has considerable success rate to guarantee privacy compared with other methods, such as mosaic, blur, and noise. Better still, Stealth algorithm has the smallest impact on image visual quality. Meanwhile, we set a user adjustable parameter called cloak thickness for regulating the perturbation intensity. Furthermore, we find that the processed images have transferability property; that is, the adversarial images generated for one particular DNN will influence the others as well.

  18. Code-Based Cryptography: New Security Solutions Against a Quantum Adversary

    OpenAIRE

    Sendrier , Nicolas; Tillich , Jean-Pierre

    2016-01-01

    International audience; Cryptography is one of the key tools for providing security in our quickly evolving technological society. An adversary with the ability to use a quantum computer would defeat most of the cryptographic solutions that are deployed today to secure our communications. We do not know when quantum computing will become available, but nevertheless, the cryptographic research community must get ready for it now. Code-based cryptography is among the few cryptographic technique...

  19. Generative adversarial network based telecom fraud detection at the receiving bank.

    Science.gov (United States)

    Zheng, Yu-Jun; Zhou, Xiao-Han; Sheng, Wei-Guo; Xue, Yu; Chen, Sheng-Yong

    2018-06-01

    Recently telecom fraud has become a serious problem especially in developing countries such as China. At present, it can be very difficult to coordinate different agencies to prevent fraud completely. In this paper we study how to detect large transfers that are sent from victims deceived by fraudsters at the receiving bank. We propose a new generative adversarial network (GAN) based model to calculate for each large transfer a probability that it is fraudulent, such that the bank can take appropriate measures to prevent potential fraudsters to take the money if the probability exceeds a threshold. The inference model uses a deep denoising autoencoder to effectively learn the complex probabilistic relationship among the input features, and employs adversarial training that establishes a minimax game between a discriminator and a generator to accurately discriminate between positive samples and negative samples in the data distribution. We show that the model outperforms a set of well-known classification methods in experiments, and its applications in two commercial banks have reduced losses of about 10 million RMB in twelve weeks and significantly improved their business reputation. Copyright © 2018 Elsevier Ltd. All rights reserved.

  20. Translation-aware semantic segmentation via conditional least-square generative adversarial networks

    Science.gov (United States)

    Zhang, Mi; Hu, Xiangyun; Zhao, Like; Pang, Shiyan; Gong, Jinqi; Luo, Min

    2017-10-01

    Semantic segmentation has recently made rapid progress in the field of remote sensing and computer vision. However, many leading approaches cannot simultaneously translate label maps to possible source images with a limited number of training images. The core issue is insufficient adversarial information to interpret the inverse process and proper objective loss function to overcome the vanishing gradient problem. We propose the use of conditional least squares generative adversarial networks (CLS-GAN) to delineate visual objects and solve these problems. We trained the CLS-GAN network for semantic segmentation to discriminate dense prediction information either from training images or generative networks. We show that the optimal objective function of CLS-GAN is a special class of f-divergence and yields a generator that lies on the decision boundary of discriminator that reduces possible vanished gradient. We also demonstrate the effectiveness of the proposed architecture at translating images from label maps in the learning process. Experiments on a limited number of high resolution images, including close-range and remote sensing datasets, indicate that the proposed method leads to the improved semantic segmentation accuracy and can simultaneously generate high quality images from label maps.

  1. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography

    Directory of Open Access Journals (Sweden)

    Murilo Coutinho

    2018-04-01

    Full Text Available Researches in Artificial Intelligence (AI have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC. Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  2. Learning Perfectly Secure Cryptography to Protect Communications with Adversarial Neural Cryptography.

    Science.gov (United States)

    Coutinho, Murilo; de Oliveira Albuquerque, Robson; Borges, Fábio; García Villalba, Luis Javier; Kim, Tai-Hoon

    2018-04-24

    Researches in Artificial Intelligence (AI) have achieved many important breakthroughs, especially in recent years. In some cases, AI learns alone from scratch and performs human tasks faster and better than humans. With the recent advances in AI, it is natural to wonder whether Artificial Neural Networks will be used to successfully create or break cryptographic algorithms. Bibliographic review shows the main approach to this problem have been addressed throughout complex Neural Networks, but without understanding or proving the security of the generated model. This paper presents an analysis of the security of cryptographic algorithms generated by a new technique called Adversarial Neural Cryptography (ANC). Using the proposed network, we show limitations and directions to improve the current approach of ANC. Training the proposed Artificial Neural Network with the improved model of ANC, we show that artificially intelligent agents can learn the unbreakable One-Time Pad (OTP) algorithm, without human knowledge, to communicate securely through an insecure communication channel. This paper shows in which conditions an AI agent can learn a secure encryption scheme. However, it also shows that, without a stronger adversary, it is more likely to obtain an insecure one.

  3. The adversarial system and the best interests of the child in divorce ...

    African Journals Online (AJOL)

    In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be considered underupon divorce. Collaborative Law is suggested as a means to bear in ...

  4. Authentication method for authenticating a first party to a second party

    NARCIS (Netherlands)

    2014-01-01

    An authentication system and method is presented for authenticating a first party to a second party, where an operation is performed on condition that the authentication succeeds. The authentication method verifies whether the first party is authenticated. If the first party is not authenticated,

  5. Source Anonymity in WSNs against Global Adversary Utilizing Low Transmission Rates with Delay Constraints

    Directory of Open Access Journals (Sweden)

    Anas Bushnag

    2016-06-01

    Full Text Available Wireless sensor networks (WSN are deployed for many applications such as tracking and monitoring of endangered species, military applications, etc. which require anonymity of the origin, known as Source Location Privacy (SLP. The aim in SLP is to prevent unauthorized observers from tracing the source of a real event by analyzing the traffic in the network. Previous approaches to SLP such as Fortified Anonymous Communication Protocol (FACP employ transmission of real or fake packets in every time slot, which is inefficient. To overcome this shortcoming, we developed three different techniques presented in this paper. Dummy Uniform Distribution (DUD, Dummy Adaptive Distribution (DAD and Controlled Dummy Adaptive Distribution (CAD were developed to overcome the anonymity problem against a global adversary (which has the capability of analyzing and monitoring the entire network. Most of the current techniques try to prevent the adversary from perceiving the location and time of the real event whereas our proposed techniques confuse the adversary about the existence of the real event by introducing low rate fake messages, which subsequently lead to location and time privacy. Simulation results demonstrate that the proposed techniques provide reasonable delivery ratio, delay, and overhead of a real event's packets while keeping a high level of anonymity. Three different analysis models are conducted to verify the performance of our techniques. A visualization of the simulation data is performed to confirm anonymity. Further, neural network models are developed to ensure that the introduced techniques preserve SLP. Finally, a steganography model based on probability is implemented to prove the anonymity of the techniques.

  6. Identifying quantum phase transitions with adversarial neural networks

    Science.gov (United States)

    Huembeli, Patrick; Dauphin, Alexandre; Wittek, Peter

    2018-04-01

    The identification of phases of matter is a challenging task, especially in quantum mechanics, where the complexity of the ground state appears to grow exponentially with the size of the system. Traditionally, physicists have to identify the relevant order parameters for the classification of the different phases. We here follow a radically different approach: we address this problem with a state-of-the-art deep learning technique, adversarial domain adaptation. We derive the phase diagram of the whole parameter space starting from a fixed and known subspace using unsupervised learning. This method has the advantage that the input of the algorithm can be directly the ground state without any ad hoc feature engineering. Furthermore, the dimension of the parameter space is unrestricted. More specifically, the input data set contains both labeled and unlabeled data instances. The first kind is a system that admits an accurate analytical or numerical solution, and one can recover its phase diagram. The second type is the physical system with an unknown phase diagram. Adversarial domain adaptation uses both types of data to create invariant feature extracting layers in a deep learning architecture. Once these layers are trained, we can attach an unsupervised learner to the network to find phase transitions. We show the success of this technique by applying it on several paradigmatic models: the Ising model with different temperatures, the Bose-Hubbard model, and the Su-Schrieffer-Heeger model with disorder. The method finds unknown transitions successfully and predicts transition points in close agreement with standard methods. This study opens the door to the classification of physical systems where the phase boundaries are complex such as the many-body localization problem or the Bose glass phase.

  7. TRANSITION FROM ADVERSARIAL TO COOPERATIVE STRATEGIC INTERACTION; FINAL

    International Nuclear Information System (INIS)

    G.H. CANAVAN

    2001-01-01

    This note extends the game theoretic analysis of strategic conflicts begun in earlier Seminars on Planetary Emergencies to interactions with and without defenses between two or more adversaries with more realistic target structures. It reviews the essentials of game theory as applied to the analysis of strategic decisions, the application of first and second strike costs as payoffs, and solution optimization, which resolves several inconsistencies seen with earlier metrics. The stability of the current bilateral offensive configuration is shown to be high and insensitive to deep reductions in offensive forces, the deployment of limited defenses, and the exchange of significant offensive forces for defenses. The transition from adversarial to cooperative interaction is represented by the progressive reduction of the parameters representing each side's preference for damaging or deterring the other, which monotonically improves stability. Estimates of strike incentives in bilateral and trilateral configurations are reduced by the inclusion of high value targets in both sides' force allocations, which dominates the details of offensive and defensive forces. The shift to high value targets stabilizes trilateral offensive configurations, a result that differs with that from analyses based on military costs only. When defenses are included, they lead to a balance between a large defended side and small undefended side that resembles the balance between two large sides. Including the large side's preference for defense of high value targets in the analyses reduces its strike incentives and thus the small side's incentive to preempt. However, it also removes the large sides' ability to deter, so the stability of multi-polar configurations continues to be controlled by the least stable dyad, which places constraints on the size of defenses that can be deployed stably that could be more stringent than those from the bilateral balance

  8. Party rules, party resources and the politics of parliamentary democracies

    DEFF Research Database (Denmark)

    Poguntke, Thomas; Scarrow, Susan; Webb, Paul

    2016-01-01

    , then investigate what it tells us about contemporary party organization in these countries, focusing on parties’ resources, structures and internal decision-making. We examine organizational patterns by country and party family, and where possible we make temporal comparisons with older data sets. Our analyses...... suggest a remarkable coexistence of uniformity and diversity. In terms of the major organizational resources on which parties can draw, such as members, staff and finance, the new evidence largely confirms the continuation of trends identified in previous research: that is, declining membership......, but enhanced financial resources and more paid staff. We also find remarkable uniformity regarding the core architecture of party organizations. At the same time, however, we find substantial variation between countries and party families in terms of their internal processes, with particular regard to how...

  9. Campaigning on behalf of the party? Party constraints on candidate campaign personalisation

    DEFF Research Database (Denmark)

    Bøggild, Troels; Pedersen, Helene Helboe

    2017-01-01

    This article analyses what makes political candidates run a party-focused or personalised election campaign. Prior work shows that candidates face incentives from voters and the media to personalise their campaign rhetoric and promises at the expense of party policy. This has raised concerns about...... that party control over the candidate nomination process and campaign financing constrains most political candidates in following electoral incentives for campaign personalisation. Using candidate survey data from the 2009 EP election campaign in 27 countries, we show how candidates from parties in which...... party officials exerted greater control over the nomination process and campaign finances were less likely to engage in personalised campaigning at the expense of the party programme. The findings imply that most parties, as central gatekeepers and resource suppliers, hold important control mechanisms...

  10. Show, Adapt and Tell: Adversarial Training of Cross-domain Image Captioner

    OpenAIRE

    Chen, Tseng-Hung; Liao, Yuan-Hong; Chuang, Ching-Yao; Hsu, Wan-Ting; Fu, Jianlong; Sun, Min

    2017-01-01

    Impressive image captioning results are achieved in domains with plenty of training image and sentence pairs (e.g., MSCOCO). However, transferring to a target domain with significant domain shifts but no paired training data (referred to as cross-domain image captioning) remains largely unexplored. We propose a novel adversarial training procedure to leverage unpaired data in the target domain. Two critic networks are introduced to guide the captioner, namely domain critic and multi-modal cri...

  11. Institute of party leadership system of the party creation of modern Ukraine

    Directory of Open Access Journals (Sweden)

    I. O. Lavrenyuk

    2015-06-01

    Full Text Available This article based on the study of the theory and practice of party­building in Ukraine examines the role of party leader in the political process and the establishment of parties, implementation of the political power, the development of political consciousness and the formation of modern political elite of our country. It is alleged that party leader – a reputable, recognized in its political environment, the person chosen to lead the party and the ability of citizens to consolidate around a common goal, most effectively represent the interests of a particular social group. It is stated that the defining feature of the phenomenon of party leadership is that under conditions of constant political development and irreversibility of democratic transformations in Ukraine part of leaders of political parties in fact is a powerful talent pool for senior government officials, local government agencies and other administrative institutions. The process of creating games as an integral part of the political process is characterized by a certain way, the mechanism of action of consciousness and culture in the public sphere, which deals with political parties. Regularities component of modern political elite of the party elite acts ­ governing the range of persons in the political party headed by its leader that are directly involved in strategic decision­making, policy formulation of this power, as well as its participation in the political process. We study the classification model of national political parties and the institutions of the party leadership. It is proposed to assess the level of correlation of the party leaders and the general dynamics of the civil society in Ukraine. It is stated that at this time a fundamental change in Ukrainian Party elite has not happened yet. However, there is a long evolution of the institute of the party leadership – a rather difficult process of internal and external, objective and subjective, economic

  12. The Adversarial Principle in Prima Facie Judgments of the Legal Thesis Firmed in the Trial of Repetitive Cases

    Directory of Open Access Journals (Sweden)

    Juliana Provedel Cardoso

    2016-10-01

    Full Text Available The present articles objective is to analyse the highly effective adversarial principle from the Constitutional Democratic State of Law and the cooperative process structure. In this sense, an analysis of the repetitive cases model is made with special relevance to the Civil Procedure Codice 2015, put in evidence the preliminary injunction, the repetitive appeals and the resolution incident repetitive demands. With the establishment of the premises, an analysis of the adversarial principle is made on prima facie judgments of the legal thesis firmed in the trial of repetitive cases, in view of the motivation of the court decision (speech of the case and law (speech of the precedents.

  13. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries

    NARCIS (Netherlands)

    Frost, J.H.; Finkel, E.J.; Norton, M.I.; Ariely, D.; Caprariello, P.A.; Eastwick, P.W.

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our

  14. What do Parties Want?

    DEFF Research Database (Denmark)

    Pedersen, Helene Helboe

    2012-01-01

    What parties want – policy, office or votes - is important to how they represent their voters, how they make strategic decisions and how they respond to external changes in society. What parties strive to accomplish is simply important to what they do. Moreover, our knowledge of what parties want...... is important to what we expect them to do. For instance, coalition theory assumes that parties have homogeneous goals, and hence are equally likely to join coalitions given the same circumstances. However, this article investigates this basic assumption of party goal homogeneity and finds that party goals do...

  15. Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

    OpenAIRE

    Sethi, Tegjyot Singh; Kantardzic, Mehmed

    2017-01-01

    While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication of attacks, has prompted the need for a data driven solution, with machine learning forming the core of many cybersecurity systems. Machine learning was not designed with security in mind, and the essential assumption of stationarity, requiri...

  16. Playing Multi-Action Adversarial Games: Online Evolutionary Planning versus Tree Search

    OpenAIRE

    Justesen, Niels; Mahlmann, Tobias; Risi, Sebastian; Togelius, Julian

    2017-01-01

    We address the problem of playing turn-based multi-action adversarial games, which include many strategy games with extremely high branching factors as players take multiple actions each turn. This leads to the breakdown of standard tree search methods, including Monte Carlo Tree Search (MCTS), as they become unable to reach a sufficient depth in the game tree. In this paper, we introduce Online Evolutionary Planning (OEP) to address this challenge, which searches for combinations of actions ...

  17. Low Membership in Czech Political Parties: Party Strategy or Structural Determinants?

    Czech Academy of Sciences Publication Activity Database

    Linek, Lukáš; Pecháček, Š.

    2007-01-01

    Roč. 23, č. 2 (2007), s. 259-275 ISSN 1352-3279 R&D Projects: GA MPS 1J004/04-DP1 Institutional research plan: CEZ:AV0Z70280505 Keywords : political parties * party membership * antiparty sentiments * party organization Subject RIV: AD - Politology ; Political Sciences

  18. Saliency detection by conditional generative adversarial network

    Science.gov (United States)

    Cai, Xiaoxu; Yu, Hui

    2018-04-01

    Detecting salient objects in images has been a fundamental problem in computer vision. In recent years, deep learning has shown its impressive performance in dealing with many kinds of vision tasks. In this paper, we propose a new method to detect salient objects by using Conditional Generative Adversarial Network (GAN). This type of network not only learns the mapping from RGB images to salient regions, but also learns a loss function for training the mapping. To the best of our knowledge, this is the first time that Conditional GAN has been used in salient object detection. We evaluate our saliency detection method on 2 large publicly available datasets with pixel accurate annotations. The experimental results have shown the significant and consistent improvements over the state-of-the-art method on a challenging dataset, and the testing speed is much faster.

  19. Application of adversarial risk analysis model in pricing strategies with remanufacturing

    Directory of Open Access Journals (Sweden)

    Liurui Deng

    2015-01-01

    Full Text Available Purpose: Purpose: This paper mainly focus on the application of adversarial risk analysis (ARA in pricing strategy with remanufacturing. We hope to obtain more realistic results than classical model. Moreover, we also wish that our research improve the development of ARA in pricing strategy of manufacturing or remanufacturing. Approach: In order to gain more actual research, combining adversarial risk analysis, we explore the pricing strategy with remanufacturing based on Stackelberg model. Especially, we build OEM’s 1-order ARA model and further study on manufacturers and remanufacturers’ pricing strategy. Findings: We find the OEM’s 1-order ARA model for the OEM’s product cost C. Besides, we get according manufacturers and remanufacturers’ pricing strategies. Besides, the pricing strategies based on 1-order ARA model have advantage over than the classical model regardless of OEMs and remanufacturers. Research implications: The research on application of ARA imply that we can get more actual results with this kind of modern risk analysis method and ARA can be extensively in pricing strategies of supply chain. Value: Our research improves the application of ARA in remanufacturing industry. Meanwhile, inspired by this analysis, we can also create different ARA models for different parameters. Furthermore, some results and analysis methods can be applied to other pricing strategies of supply chain.

  20. Parties heed (with caution): Public knowledge of and attitudes towards party finance in Britain.

    Science.gov (United States)

    vanHeerde-Hudson, Jennifer; Fisher, Justin

    2013-01-01

    Despite comprehensive reform ( Political Parties, Elections and Referendums Act ) and recent review (Phillips Review in 2007) of party finance in Britain, public opinion of party finance remains plagued by perceptions of corruption, undue influence from wealthy donors, carefree and wasteful spending and, more generally, from the perception that there is just 'too much money' in politics. In this article we argue that knowledge of and attitudes to party finance matter, not least because advocates of reform have cited public opinion as evidence for reform. However, because attitudes to party finance are part of a broader attitudinal structure, opinion-led reforms are unlikely to succeed in increasing public confidence. Using data generated from YouGov's online panel (N=2,008), we demonstrate that the public know little of the key provisions regulating party finance and attitudes to party finance can be explained along two underlying dimensions - Anti-Party Finance and Reformers . As such, we consider whether parties and politicians should be freed from the constraints of public opinion in reforming party finance.

  1. The Adversarial Principle and the5º Paragraph of the Article 307 of the TCE-ES Res. 261/2013

    Directory of Open Access Journals (Sweden)

    Rafael Ambrósio Gava

    2015-12-01

    Full Text Available This paper aims to analyze the implications of the adversarial principle in the administrative process that are judged by the TCE-ES under summary rite. More specifically, we examine if it is possible to judge the process merit without the accused's subpoena. Throughout the study, the characteristics of the Courts of Accounts are explained, according to the doctrine and jurisprudence, as well their prerogative of precautionary action, recognized by the theory of implied powers. In addition, the systematic of the summary procedure, by which develop the processes in which there are precautionary action, is studied, from the specific legislation. At last, the summary procedure is analyzed, specifically with respect to the art. 307, §5º, Res. TCE-ES 261/2013, from the perspective of the adversarial principle, understood, based on the doctrine teaching and according to the New Code of Civil Procedure, as the right of knowledge and of influence the debate. We demonstrated, based on literature and through a deductive argumentative reasoning, that the TEC -ES cannot do disregard the adversarial principle, otherwise there would be violation of this fundamental right.

  2. Translating agency reform through durable rhetorical styles: comparing official agency talk across consensus and adversarial contexts

    NARCIS (Netherlands)

    Smullen, A.

    2010-01-01

    This article directs attention to the role of ideational variables in shaping public management reform initiatives. It considers the contribution of both endogenous rhetorical styles and exogenous international fashions in explaining official agency talk in consensus and adversarial contexts.

  3. SegAN: Adversarial Network with Multi-scale L1 Loss for Medical Image Segmentation.

    Science.gov (United States)

    Xue, Yuan; Xu, Tao; Zhang, Han; Long, L Rodney; Huang, Xiaolei

    2018-05-03

    Inspired by classic Generative Adversarial Networks (GANs), we propose a novel end-to-end adversarial neural network, called SegAN, for the task of medical image segmentation. Since image segmentation requires dense, pixel-level labeling, the single scalar real/fake output of a classic GAN's discriminator may be ineffective in producing stable and sufficient gradient feedback to the networks. Instead, we use a fully convolutional neural network as the segmentor to generate segmentation label maps, and propose a novel adversarial critic network with a multi-scale L 1 loss function to force the critic and segmentor to learn both global and local features that capture long- and short-range spatial relationships between pixels. In our SegAN framework, the segmentor and critic networks are trained in an alternating fashion in a min-max game: The critic is trained by maximizing a multi-scale loss function, while the segmentor is trained with only gradients passed along by the critic, with the aim to minimize the multi-scale loss function. We show that such a SegAN framework is more effective and stable for the segmentation task, and it leads to better performance than the state-of-the-art U-net segmentation method. We tested our SegAN method using datasets from the MICCAI BRATS brain tumor segmentation challenge. Extensive experimental results demonstrate the effectiveness of the proposed SegAN with multi-scale loss: on BRATS 2013 SegAN gives performance comparable to the state-of-the-art for whole tumor and tumor core segmentation while achieves better precision and sensitivity for Gd-enhance tumor core segmentation; on BRATS 2015 SegAN achieves better performance than the state-of-the-art in both dice score and precision.

  4. Synthetic aperture radar ship discrimination, generation and latent variable extraction using information maximizing generative adversarial networks

    CSIR Research Space (South Africa)

    Schwegmann, Colin P

    2017-07-01

    Full Text Available such as Synthetic Aperture Radar imagery. To aid in the creation of improved machine learning-based ship detection and discrimination methods this paper applies a type of neural network known as an Information Maximizing Generative Adversarial Network. Generative...

  5. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    OpenAIRE

    Vieira, Aitor Couce; Houmb, Siv Hilde; Insua, David Rios

    2014-01-01

    Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  6. Third party processing

    International Nuclear Information System (INIS)

    Clark, S.

    1997-01-01

    The importance of Canada's natural gas industry to remain competitive on a global level was discussed. Third party processing is a tool that the Canadian gas industry can use to overcome the relative disadvantage of smaller, and therefore more expensive, gas processing plants in Canada, and to maintain, and even improve, its competitive position vis-a-vis its US counterparts. The principal role of a third party processor is to provide midstream services such as raw gas gathering, field compression, gas processing, sales gas transmission, and natural gas liquids fractionation. Some third party processors also provide marketing services. Third party processors add value to the gas producer by reducing risk, reducing cost, improving reliability, and improving netbacks. The many variables involved in determining the economic viability of third party processing, including the quantity and deliverability of the raw resource, facility capacity, capital investment, operating costs, technology, fee structures, operational reliability, and speed, among others, were examined and the significance of each variable was explained

  7. SEAPATH: A microcomputer code for evaluating physical security effectiveness using adversary sequence diagrams

    International Nuclear Information System (INIS)

    Darby, J.L.

    1986-01-01

    The Adversary Sequence Diagram (ASD) concept was developed by Sandia National Laboratories (SNL) to examine physical security system effectiveness. Sandia also developed a mainframe computer code, PANL, to analyze the ASD. The authors have developed a microcomputer code, SEAPATH, which also analyzes ASD's. The Authors are supporting SNL in software development of the SAVI code; SAVI utilizes the SEAPATH algorithm to identify and quantify paths

  8. With God on our side: Religious primes reduce the envisioned physical formidability of a menacing adversary.

    Science.gov (United States)

    Holbrook, Colin; Fessler, Daniel M T; Pollack, Jeremy

    2016-01-01

    The imagined support of benevolent supernatural agents attenuates anxiety and risk perception. Here, we extend these findings to judgments of the threat posed by a potentially violent adversary. Conceptual representations of bodily size and strength summarize factors that determine the relative threat posed by foes. The proximity of allies moderates the envisioned physical formidability of adversaries, suggesting that cues of access to supernatural allies will reduce the envisioned physical formidability of a threatening target. Across two studies, subtle cues of both supernatural and earthly social support reduced the envisioned physical formidability of a violent criminal. These manipulations had no effect on the perceived likelihood of encountering non-conflictual physical danger, raising the possibility that imagined supernatural support leads participants to view themselves not as shielded from encountering perilous situations, but as protected should perils arise. Copyright © 2015 Elsevier B.V. All rights reserved.

  9. Cryptography In The Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Salvail, Louis; Schaffner, Christian

    2005-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  10. Cryptography in the Bounded Quantum-Storage Model

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Serge, Fehr; Schaffner, Christian

    2008-01-01

    We initiate the study of two-party cryptographic primitives with unconditional security, assuming that the adversary's quantum memory is of bounded size. We show that oblivious transfer and bit commitment can be implemented in this model using protocols where honest parties need no quantum memory...

  11. About green political parties

    Directory of Open Access Journals (Sweden)

    Orlović Slobodan P.

    2015-01-01

    Full Text Available In this work the author refers to some legal and political questions in connection with green political parties. Those questions cover: the ideology of green political parties, their number and influence, both in general and in Serbia. The first part of work is generally speaking about political parties - their definition, ideology, role and action. Main thesis in this work is that green political parties, by their appearance, were something new on the political scene. But quickly, because of objective and subjective reasons, they were changing original ideas and were beginning to resemble to all other political parties. In this way, they lost their vanguard and political alternativeness.

  12. A Graphical Adversarial Risk Analysis Model for Oil and Gas Drilling Cybersecurity

    Directory of Open Access Journals (Sweden)

    Aitor Couce Vieira

    2014-04-01

    Full Text Available Oil and gas drilling is based, increasingly, on operational technology, whose cybersecurity is complicated by several challenges. We propose a graphical model for cybersecurity risk assessment based on Adversarial Risk Analysis to face those challenges. We also provide an example of the model in the context of an offshore drilling rig. The proposed model provides a more formal and comprehensive analysis of risks, still using the standard business language based on decisions, risks, and value.

  13. Political Parties and Innovation

    DEFF Research Database (Denmark)

    Bischoff, Carina Saxlund; Christiansen, Flemming Juul

    2017-01-01

    parties themselves as well their impact on potentially innovative public decisions. One major expectation is that hierarchical parties with centralized leadership make more efficient decisions but that sustainable innovation outcomes promoted by collaborative efforts are easier to obtain for decentralized...... political parties with participatory internal democratic processes....

  14. Political Market Orientation and Strategic Party Postures in Danish Political Parties

    DEFF Research Database (Denmark)

    Ormrod, Robert P.; Henneberg, Stephan

    2011-01-01

    Purpose – This paper investigates the relationship between the strategic postures and political market orientation profile of two Danish parties. Profile stability at the organisational level is used as a control variable. Design/methodology/approach – The strategic political postures of two Danish...... parties are derived using a self-typing study. Based on configuration theory, ideal organisational profiles to implement these studies are juxtaposed with the actual political market orientation profile for each party, gained from two datasets analysed using Partial Least Squares. Member activity levels...... Ideologist. Thus, Party A exhibits a mismatch between strategic orientation and implemented organisational profile, based on configuration theory. The results were generally stable across political activity levels. Originality/value – The study contributes to understanding the concept of market orientation...

  15. Intra-party democracy beyond aggregation

    DEFF Research Database (Denmark)

    Wolkenstein, Fabio

    2016-01-01

    , discussing several functions intra-party deliberation is said to serve in the democratic theory literature. It then goes on to explore the deliberative credentials of political discussion between party members, drawing on group interviews with party members in two Social Democratic parties in Germany...

  16. Political Market Orientation and Strategic Party Postures in Danish Political Parties

    DEFF Research Database (Denmark)

    Ormrod, Robert P.; Henneberg, Stephan

    2011-01-01

    Purpose – This paper investigates the relationship between the strategic postures and political market orientation profile of two Danish parties. Profile stability at the organisational level is used as a control variable. Design/methodology/approach – The strategic political postures of two Danish...... are used to control for organisational stability. Findings – The self-typing study revealed that Party A was perceived to follow a Relationship Builder posture, and Party B a Convinced Ideologist posture. However, both market orientation profiles resembled the organisational structures of a Convinced...... in the political sphere. More specifically it empirically links political market orientation as an issue of political marketing implementation on the one hand, and strategic postures of parties as a strategic issue on the other, following a configuration theory logic. Research limitations...

  17. Book Review: Training the Party: Party Adaptation and Elite Training in Reform-era China

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik

    2016-01-01

    Review of: Training the Party: Party Adaptation and Elite Training in Reform-era China. Charlotte P. Lee . Cambridge: Cambridge University Press, 2015. xii + 251 pp. $99.99. ISBN 978-1-107-09063-7......Review of: Training the Party: Party Adaptation and Elite Training in Reform-era China. Charlotte P. Lee . Cambridge: Cambridge University Press, 2015. xii + 251 pp. $99.99. ISBN 978-1-107-09063-7...

  18. Anti-Makeup: Learning A Bi-Level Adversarial Network for Makeup-Invariant Face Verification

    OpenAIRE

    Li, Yi; Song, Lingxiao; Wu, Xiang; He, Ran; Tan, Tieniu

    2017-01-01

    Makeup is widely used to improve facial attractiveness and is well accepted by the public. However, different makeup styles will result in significant facial appearance changes. It remains a challenging problem to match makeup and non-makeup face images. This paper proposes a learning from generation approach for makeup-invariant face verification by introducing a bi-level adversarial network (BLAN). To alleviate the negative effects from makeup, we first generate non-makeup images from makeu...

  19. Reconstruction of three-dimensional porous media using generative adversarial neural networks

    Science.gov (United States)

    Mosser, Lukas; Dubrule, Olivier; Blunt, Martin J.

    2017-10-01

    To evaluate the variability of multiphase flow properties of porous media at the pore scale, it is necessary to acquire a number of representative samples of the void-solid structure. While modern x-ray computer tomography has made it possible to extract three-dimensional images of the pore space, assessment of the variability in the inherent material properties is often experimentally not feasible. We present a method to reconstruct the solid-void structure of porous media by applying a generative neural network that allows an implicit description of the probability distribution represented by three-dimensional image data sets. We show, by using an adversarial learning approach for neural networks, that this method of unsupervised learning is able to generate representative samples of porous media that honor their statistics. We successfully compare measures of pore morphology, such as the Euler characteristic, two-point statistics, and directional single-phase permeability of synthetic realizations with the calculated properties of a bead pack, Berea sandstone, and Ketton limestone. Results show that generative adversarial networks can be used to reconstruct high-resolution three-dimensional images of porous media at different scales that are representative of the morphology of the images used to train the neural network. The fully convolutional nature of the trained neural network allows the generation of large samples while maintaining computational efficiency. Compared to classical stochastic methods of image reconstruction, the implicit representation of the learned data distribution can be stored and reused to generate multiple realizations of the pore structure very rapidly.

  20. Gendering transnational party politics

    DEFF Research Database (Denmark)

    Kantola, Johanna; Rolandsen-Agustín, Lise

    2016-01-01

    research traditions, we build toward an analytical framework to study gender and transnational party politics. Our empirical analysis focuses on two policy issues, the economic crisis and the sexual and reproductive health and rights, analyzing European Parliament reports, debates and voting on the issues...... from 2009 to 2014. By focusing on gender equality constructions and the way in which consensus and contestation are built around them within and between party groups, we argue that shared constructions about gender equality are issue specific and change over time. Consensus breaks down along the left......In this article, we analyze transnational party politics in the European Union from a gender perspective. This is a subject that has been neglected both by mainstream European studies on party politics and by gender scholars who work on political parties. Drawing on the insights of these two...

  1. School Censorship: It Comes in a Variety of Forms, Not All Overt

    Science.gov (United States)

    Martinson, David L.

    2008-01-01

    Publicity concerning school censorship too often centers on the clumsy, heavy-handed, and overt efforts of school administrators or other impact parties to control student speech or publications. In this article, the author contends that such obvious and oftentimes inept attempts at controlling student communication represent only the tip of the…

  2. 16 CFR 1507.11 - Party poppers.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 2 2010-01-01 2010-01-01 false Party poppers. 1507.11 Section 1507.11... FIREWORKS DEVICES § 1507.11 Party poppers. Party poppers (also known by other names such as “Champagne Party Poppers,” and “Party Surprise Poppers,”) shall not contain more than 0.25 grains of pyrotechnic...

  3. Jointly Optimize Data Augmentation and Network Training: Adversarial Data Augmentation in Human Pose Estimation

    OpenAIRE

    Peng, Xi; Tang, Zhiqiang; Yang, Fei; Feris, Rogerio; Metaxas, Dimitris

    2018-01-01

    Random data augmentation is a critical technique to avoid overfitting in training deep neural network models. However, data augmentation and network training are usually treated as two isolated processes, limiting the effectiveness of network training. Why not jointly optimize the two? We propose adversarial data augmentation to address this limitation. The main idea is to design an augmentation network (generator) that competes against a target network (discriminator) by generating `hard' au...

  4. Cognitive Targeting: A Coercive Air Power Theory for Conventional Escalation Control Against Nuclear Armed Adversaries

    Science.gov (United States)

    2016-06-01

    strategic,” in the cognitive targeting paradigm , are those that directly disable - in the strategic audience’s mind – the attractiveness or...This study analyses the applicability of three operational targeting paradigms to coerce a nuclear-armed adversary in a regional crisis, while...principles and elements of war and understand the coercive ability of utility targeting (a capabilities-based targeting paradigm , CBTP), axiological

  5. Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing

    Science.gov (United States)

    Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta

    2017-08-01

    This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.

  6. Motivated Reasoning and Political Parties: Evidence for Increased Processing in the Face of Party Cues

    DEFF Research Database (Denmark)

    Petersen, Michael Bang; Skov, Martin; Serritzlew, Søren

    2013-01-01

    . As part of the latter processes, the presence of party cues would make individuals engage in effortful motivated reasoning to produce arguments for the correctness of their party’s position. Following psychological research, we use response latency to measure processing effort and, in support......Extant research in political science has demonstrated that citizens’ opinions on policies are influenced by their attachment to the party sponsoring them. At the same time, little evidence exists illuminating the psychological processes through which such party cues are filtered. From...... the psychological literature on source cues, we derive two possible hypotheses: (1) party cues activate heuristic processing aimed at minimizing the processing effort during opinion formation, and (2) party cues activate group motivational processes that compel citizens to support the position of their party...

  7. Are the advocates of nuclear power and the adversaries listening to each other?

    International Nuclear Information System (INIS)

    Bernard, Jean-Francois

    1989-01-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting

  8. Are the advocates of nuclear power and the adversaries listening to each other?

    Energy Technology Data Exchange (ETDEWEB)

    Bernard, Jean-Francois [Electricite de France, Engineering and Construction Division, Sites-Environment-Information Branch, 22-30, avenue de Wagram, 75008, Paris (France)

    1989-07-01

    It's obvious that one cannot answer the question from the title with simple 'yes' or 'no'. If it seems that the nuclear advocates globaly, have the same point of view, and an homegeneous argumentation, it is not the same for the opponents to Nuclear Energy. We can classify these adversaries in 4 categories, according to the nature of their opposition: ideological, economical, political, that includes ideological, mystical. In reality, these 4 types of opposition are not equally represented in France. From 1974 to the present moment, the EDF, has tried to have a dialogue with them. Various resultswere achieved with the Ecologists, 'Economical opponents', 'political adversaries'. Theer was no dialogue with the 'mystical opponents', for a very simple reason 'Nuclear people' are the Devil himself and they did not wish to have anything to do with him. There can be no end to the discussion about the sex of angels. To conclude, it is believed that there has been a discussion in France. It did not lead to any sort of complete consensus, but there are some true positive results. Only one, the well-known opponent to nuclear energy, in the seventies, the President of 'The Friends of the Earth' he is, now, French 'Environment Vice-Minister' and he considers that, among the energy industries, the nuclear energy is, without doubt, the less polluting.

  9. Partis islamistes et démocratisation : expérience du Parti de la ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Partis islamistes et démocratisation : expérience du Parti de la justice et du développement (Turquie). En Turquie, les élections de novembre 2002 ont été remportées par un nouveau parti politique d'orientation islamiste, l'AKP, qui détient environ les deux tiers des sièges au Parlement. La victoire de l'AKP traduit ...

  10. Partying as Everyday Life

    DEFF Research Database (Denmark)

    Demant, Jakob; Østergaard, Jeanette

    2007-01-01

    situates the event in everyday life. By drawing on Maffesoli's (1996) concept of ‘sociality' and Lincoln's (2005) concept of zoning the spatial and social logic of the house, partying is analysed using both qualitative and quantitative material. The analysis suggests that the consumption of alcohol (i.......e. collective intoxication) is one way the parents' dining room is transformed creatively into a space for teenage partying. Hence, the social logic of a party is to consume alcohol collectively as it symbolises commitment to both the party and to the specific group of friends. Finally, attention is drawn...... to reaffirm friendship and is therefore an integrated part of adolescents' everyday life.  ...

  11. Protecting multi-party privacy in location-aware social point-of-interest recommendation

    KAUST Repository

    Wang, Weiqi; Liu, An; Li, Zhixu; Zhang, Xiangliang; Li, Qing; Zhou, Xiaofang

    2018-01-01

    Point-of-interest (POI) recommendation has attracted much interest recently because of its significant business potential. Data used in POI recommendation (e.g., user-location check-in matrix) are much more sparse than that used in traditional item (e.g., book and movie) recommendation, which leads to more serious cold start problem. Social POI recommendation has proved to be an effective solution, but most existing works assume that recommenders have access to all required data. This is very rare in practice because these data are generally owned by different entities who are not willing to share their data with others due to privacy and legal concerns. In this paper, we first propose PLAS, a protocol which enables effective POI recommendation without disclosing the sensitive data of every party getting involved in the recommendation. We formally show PLAS is secure in the semi-honest adversary model. To improve its performance. We then adopt the technique of cloaking area by which expensive distance computation over encrypted data is replaced by cheap operation over plaintext. In addition, we utilize the sparsity of check-ins to selectively publish data, thus reducing encryption cost and avoiding unnecessary computation over ciphertext. Experiments on two real datasets show that our protocol is feasible and can scale to large POI recommendation problems in practice.

  12. Protecting multi-party privacy in location-aware social point-of-interest recommendation

    KAUST Repository

    Wang, Weiqi

    2018-04-04

    Point-of-interest (POI) recommendation has attracted much interest recently because of its significant business potential. Data used in POI recommendation (e.g., user-location check-in matrix) are much more sparse than that used in traditional item (e.g., book and movie) recommendation, which leads to more serious cold start problem. Social POI recommendation has proved to be an effective solution, but most existing works assume that recommenders have access to all required data. This is very rare in practice because these data are generally owned by different entities who are not willing to share their data with others due to privacy and legal concerns. In this paper, we first propose PLAS, a protocol which enables effective POI recommendation without disclosing the sensitive data of every party getting involved in the recommendation. We formally show PLAS is secure in the semi-honest adversary model. To improve its performance. We then adopt the technique of cloaking area by which expensive distance computation over encrypted data is replaced by cheap operation over plaintext. In addition, we utilize the sparsity of check-ins to selectively publish data, thus reducing encryption cost and avoiding unnecessary computation over ciphertext. Experiments on two real datasets show that our protocol is feasible and can scale to large POI recommendation problems in practice.

  13. The cornucopia of meaningful leads: Applying deep adversarial autoencoders for new molecule development in oncology.

    Science.gov (United States)

    Kadurin, Artur; Aliper, Alexander; Kazennov, Andrey; Mamoshina, Polina; Vanhaelen, Quentin; Khrabrov, Kuzma; Zhavoronkov, Alex

    2017-02-14

    Recent advances in deep learning and specifically in generative adversarial networks have demonstrated surprising results in generating new images and videos upon request even using natural language as input. In this paper we present the first application of generative adversarial autoencoders (AAE) for generating novel molecular fingerprints with a defined set of parameters. We developed a 7-layer AAE architecture with the latent middle layer serving as a discriminator. As an input and output the AAE uses a vector of binary fingerprints and concentration of the molecule. In the latent layer we also introduced a neuron responsible for growth inhibition percentage, which when negative indicates the reduction in the number of tumor cells after the treatment. To train the AAE we used the NCI-60 cell line assay data for 6252 compounds profiled on MCF-7 cell line. The output of the AAE was used to screen 72 million compounds in PubChem and select candidate molecules with potential anti-cancer properties. This approach is a proof of concept of an artificially-intelligent drug discovery engine, where AAEs are used to generate new molecular fingerprints with the desired molecular properties.

  14. Promoting Party Politics in Emerging Democracies

    NARCIS (Netherlands)

    Burnell, P.; Gerrits, A.

    2010-01-01

    This opening section briefly introduces international political party support, that is, assistance to political parties by international organizations, mostly from the US and Europe, to strengthen individual political parties, to promote peaceful interaction between parties and to help to create a

  15. Departies: conceptualizing extended youth parties

    DEFF Research Database (Denmark)

    Fjær, Eivind Grip; Tutenges, Sébastien

    2017-01-01

    Every year, millions of young people travel away from home to party for days or weeks on end in permissive environments, such as music festivals, dance parties, and nightlife resorts. The studies that have been conducted on these extended youth parties have focused primarily on specific risk...

  16. Democracy, the Party, and Self-Emancipation

    NARCIS (Netherlands)

    Raekstad, P.

    2017-01-01

    The Party is once again the subject of sustained discussion among academics and popular movements. Jodi Dean’s most recent book, Crowds and Party, is an attempt to re-think the party form for contemporary politics after the experiences and lessons of Occupy. Crowds and Party is engaging and

  17. 'Meatball searching' - The adversarial approach to online information retrieval

    Science.gov (United States)

    Jack, R. F.

    1985-01-01

    It is proposed that the different styles of online searching can be described as either formal (highly precise) or informal with the needs of the client dictating which is most applicable at a particular moment. The background and personality of the searcher also come into play. Particular attention is focused on meatball searching which is a form of online searching characterized by deliberate vagueness. It requires generally comprehensive searches, often on unusual topics and with tight deadlines. It is most likely to occur in search centers serving many different disciplines and levels of client information sophistication. Various information needs are outlined as well as the laws of meatball searching and the adversarial approach. Traits and characteristics important to sucessful searching include: (1) concept analysis, (2) flexibility of thinking, (3) ability to think in synonyms and (4) anticipation of variant word forms and spellings.

  18. Latin American intra-party democracy

    Directory of Open Access Journals (Sweden)

    Aldo Adrián Martínez Hernández

    2017-12-01

    Full Text Available Research proposes to determine the level of internal democracy of political parties in Latin America from perception of its members, allowing the creation of an index that has parameters for the measurement and comparison of the parties according to its democratic features. At the same time, research supports designing a profile of the parties by subjecting to analysis the relationship between ideology and internal democracy, stressing that despite the differences between left and right, parties in Latin America do not have dichotomous democratic features, while maintaining low levels despite their ideological location.

  19. Party Members in Context. Social networks and local branches as context for party membership

    OpenAIRE

    Paulis, Emilien

    2018-01-01

    In this doctoral dissertation, I put party members and activists back in context. I stress theimportance of two contextual dimensions, often overlooked in the scientific literature. On theone hand, I put forward social network explanations of party membership and activism,emphasizing the importance of social interactions, relations and structures, which were scarcelyexplored as potential triggers. Like other forms of participation, party membership haspredominantly been portrayed through indi...

  20. Deep Convolutional Generative Adversarial Network for Procedural 3D Landscape Generation Based on DEM

    OpenAIRE

    Wulff-Jensen, Andreas; Rant, Niclas Nerup; Møller, Tobias Nordvig; Billeskov, Jonas Aksel

    2018-01-01

    This paper proposes a novel framework for improving procedural generation of 3D landscapes using machine learning. We utilized a Deep Convolutional Generative Adversarial Network (DC-GAN) to generate heightmaps. The network was trained on a dataset consisting of Digital Elevation Maps (DEM) of the alps. During map generation, the batch size and learning rate were optimized for the most efficient and satisfying map production. The diversity of the final output was tested against Perlin noise u...

  1. Challenges and Characteristics of Intelligent Autonomy for Internet of Battle Things in Highly Adversarial Environments

    OpenAIRE

    Kott, Alexander

    2018-01-01

    Numerous, artificially intelligent, networked things will populate the battlefield of the future, operating in close collaboration with human warfighters, and fighting as teams in highly adversarial environments. This paper explores the characteristics, capabilities and intelligence required of such a network of intelligent things and humans - Internet of Battle Things (IOBT). It will experience unique challenges that are not yet well addressed by the current generation of AI and machine lear...

  2. Occluded object reconstruction for first responders with augmented reality glasses using conditional generative adversarial networks

    OpenAIRE

    Yun, Kyongsik; Lu, Thomas; Chow, Edward

    2018-01-01

    Firefighters suffer a variety of life-threatening risks, including line-of-duty deaths, injuries, and exposures to hazardous substances. Support for reducing these risks is important. We built a partially occluded object reconstruction method on augmented reality glasses for first responders. We used a deep learning based on conditional generative adversarial networks to train associations between the various images of flammable and hazardous objects and their partially occluded counterparts....

  3. Court supervised institutional transformation in South Africa ...

    African Journals Online (AJOL)

    The traditional adversarial model of litigation in South Africa operates on the basis that two or more parties approach the court, each with its own desired outcome. The court is then obliged to decide in favour of one of the parties. A different model of litigation is emerging in South African law. This model involves actions ...

  4. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Science.gov (United States)

    Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-01-01

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants. PMID:29584679

  5. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries.

    Science.gov (United States)

    Zhu, Zhengqiu; Chen, Bin; Qiu, Sihang; Wang, Rongxiao; Chen, Feiran; Wang, Yiping; Qiu, Xiaogang

    2018-03-27

    Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP) game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i) The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii) Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker's parameters) are integrated into the extended CPEP model; (iii) Learning curve theory is employed to determine the attacker's observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  6. An Extended Chemical Plant Environmental Protection Game on Addressing Uncertainties of Human Adversaries

    Directory of Open Access Journals (Sweden)

    Zhengqiu Zhu

    2018-03-01

    Full Text Available Chemical production activities in industrial districts pose great threats to the surrounding atmospheric environment and human health. Therefore, developing appropriate and intelligent pollution controlling strategies for the management team to monitor chemical production processes is significantly essential in a chemical industrial district. The literature shows that playing a chemical plant environmental protection (CPEP game can force the chemical plants to be more compliant with environmental protection authorities and reduce the potential risks of hazardous gas dispersion accidents. However, results of the current literature strictly rely on several perfect assumptions which rarely hold in real-world domains, especially when dealing with human adversaries. To address bounded rationality and limited observability in human cognition, the CPEP game is extended to generate robust schedules of inspection resources for inspection agencies. The present paper is innovative on the following contributions: (i The CPEP model is extended by taking observation frequency and observation cost of adversaries into account, and thus better reflects the industrial reality; (ii Uncertainties such as attackers with bounded rationality, attackers with limited observation and incomplete information (i.e., the attacker’s parameters are integrated into the extended CPEP model; (iii Learning curve theory is employed to determine the attacker’s observability in the game solver. Results in the case study imply that this work improves the decision-making process for environmental protection authorities in practical fields by bringing more rewards to the inspection agencies and by acquiring more compliance from chemical plants.

  7. Party drugs - use and harm reduction.

    Science.gov (United States)

    Frei, Matthew

    2010-08-01

    Party drug use, the intermittent use of stimulants, ecstasy and so-called 'designer drugs' at dance parties or 'raves', is now part of the culture of many young Australians. This article discusses the risks associated with the use of 'party drugs' and describes an useful approach to general practitioner assessment and management of patients who may be using party drugs. Party drug use is associated with a range of harms, including risks associated with behaviour while drug affected, toxicity and overdose, mental health complications and physical morbidity. Multiple substance use, particularly combining sedatives, further amplifies risk. If GPs have some understanding of these drugs and their effects, they are well placed to provide an effective intervention in party drug users by supporting the reduction of harm.

  8. Adversarial life testing: A Bayesian negotiation model

    International Nuclear Information System (INIS)

    Rufo, M.J.; Martín, J.; Pérez, C.J.

    2014-01-01

    Life testing is a procedure intended for facilitating the process of making decisions in the context of industrial reliability. On the other hand, negotiation is a process of making joint decisions that has one of its main foundations in decision theory. A Bayesian sequential model of negotiation in the context of adversarial life testing is proposed. This model considers a general setting for which a manufacturer offers a product batch to a consumer. It is assumed that the reliability of the product is measured in terms of its lifetime. Furthermore, both the manufacturer and the consumer have to use their own information with respect to the quality of the product. Under these assumptions, two situations can be analyzed. For both of them, the main aim is to accept or reject the product batch based on the product reliability. This topic is related to a reliability demonstration problem. The procedure is applied to a class of distributions that belong to the exponential family. Thus, a unified framework addressing the main topics in the considered Bayesian model is presented. An illustrative example shows that the proposed technique can be easily applied in practice

  9. Sharpness-Aware Low-Dose CT Denoising Using Conditional Generative Adversarial Network.

    Science.gov (United States)

    Yi, Xin; Babyn, Paul

    2018-02-20

    Low-dose computed tomography (LDCT) has offered tremendous benefits in radiation-restricted applications, but the quantum noise as resulted by the insufficient number of photons could potentially harm the diagnostic performance. Current image-based denoising methods tend to produce a blur effect on the final reconstructed results especially in high noise levels. In this paper, a deep learning-based approach was proposed to mitigate this problem. An adversarially trained network and a sharpness detection network were trained to guide the training process. Experiments on both simulated and real dataset show that the results of the proposed method have very small resolution loss and achieves better performance relative to state-of-the-art methods both quantitatively and visually.

  10. Fine-Tuning Neural Patient Question Retrieval Model with Generative Adversarial Networks.

    Science.gov (United States)

    Tang, Guoyu; Ni, Yuan; Wang, Keqiang; Yong, Qin

    2018-01-01

    The online patient question and answering (Q&A) system attracts an increasing amount of users in China. Patient will post their questions and wait for doctors' response. To avoid the lag time involved with the waiting and to reduce the workload on the doctors, a better method is to automatically retrieve the semantically equivalent question from the archive. We present a Generative Adversarial Networks (GAN) based approach to automatically retrieve patient question. We apply supervised deep learning based approaches to determine the similarity between patient questions. Then a GAN framework is used to fine-tune the pre-trained deep learning models. The experiment results show that fine-tuning by GAN can improve the performance.

  11. Fair trial in international commercial arbitration

    Directory of Open Access Journals (Sweden)

    saleh khedri

    2015-12-01

    Full Text Available A fair hearing in the courts requires the principles of procedure. Because the arbitration is considered as private judgment, thus in arbitration hearing regarding to non-ceremonial proceedings, arbitrator or arbitration panel are bound to respect the principles of civil procedure in arbitration hearing. Equal treatment with parties of arbitration and Adversarial procedure are principles that arbitrator or arbitration panel obliged to satisfy them in proceeding whit action arbitration parties. Independence and impartiality are elements of Equal treatment and proper notice and give a full opportunity to presentation case are elements of adversarial procedure in Arbitration hearing that arbitrator or arbitration panel are bound to respect them in proceeding between action arbitration parties. Disclosure Obligation, Challenge to arbitrators competence, application for setting aside and refuse to recognition and enforcement of award are tools to satisfy compliance of principles of procedural civil in Arbitration hearing. In this paper, ways of satisfying principles of procedure and its sanctions has been considered.

  12. Which Party Gets the Mayoralty?

    DEFF Research Database (Denmark)

    Skjæveland, Asbjørn; Serritzlew, Søren

    2010-01-01

    expands the scope of these explanatory variables. However, the study also shows that being a large party is not sufficient for a party to have a good chance of winning the mayoralty. Furthermore, norms guiding appropriate behaviour seem important in addition to instrumental behaviour. It appears......In non-presidential multiparty systems, it is not only the voters but also coalition formation after the election that decides the government of the community. Some national-level studies investigate which parties are most likely to win the Prime Minister's office. The aim of this article...... is to investigate the same question at the local level:What makes a party more likely to win the post of mayor? The article finds that party size and change in size are important along with experience and ideological centrality. The results are similar to those obtained at the national level, and this study thus...

  13. Party brands and voting

    DEFF Research Database (Denmark)

    Nielsen, Sigge Winther; Larsen, Martin Vinæs

    2014-01-01

    heuristics and voting models. Next, the article measures the brand value of Danish parties by utilizing a representative association analysis. Finally, this measure is used to conduct the very first empirical analysis of a party brand's effect on voting behavior. Overall, the primary finding demonstrates...

  14. druGAN: An Advanced Generative Adversarial Autoencoder Model for de Novo Generation of New Molecules with Desired Molecular Properties in Silico.

    Science.gov (United States)

    Kadurin, Artur; Nikolenko, Sergey; Khrabrov, Kuzma; Aliper, Alex; Zhavoronkov, Alex

    2017-09-05

    Deep generative adversarial networks (GANs) are the emerging technology in drug discovery and biomarker development. In our recent work, we demonstrated a proof-of-concept of implementing deep generative adversarial autoencoder (AAE) to identify new molecular fingerprints with predefined anticancer properties. Another popular generative model is the variational autoencoder (VAE), which is based on deep neural architectures. In this work, we developed an advanced AAE model for molecular feature extraction problems, and demonstrated its advantages compared to VAE in terms of (a) adjustability in generating molecular fingerprints; (b) capacity of processing very large molecular data sets; and (c) efficiency in unsupervised pretraining for regression model. Our results suggest that the proposed AAE model significantly enhances the capacity and efficiency of development of the new molecules with specific anticancer properties using the deep generative models.

  15. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction

    Directory of Open Access Journals (Sweden)

    Juen Joshua

    2015-06-01

    Full Text Available The Tor anonymity network has been shown vulnerable to traffic analysis attacks by autonomous systems (ASes and Internet exchanges (IXes, which can observe different overlay hops belonging to the same circuit. We evaluate whether network path prediction techniques provide an accurate picture of the threat from such adversaries, and whether they can be used to avoid this threat. We perform a measurement study by collecting 17.2 million traceroutes from Tor relays to destinations around the Internet. We compare the collected traceroute paths to predicted paths using state-of-the-art path inference techniques. We find that traceroutes present a very different picture, with the set of ASes seen in the traceroute path differing from the predicted path 80% of the time. We also consider the impact that prediction errors have on Tor security. Using a simulator to choose paths over a week, our traceroutes indicate a user has nearly a 100% chance of at least one compromise in a week with 11% of total paths containing an AS compromise and less than 1% containing an IX compromise when using default Tor selection. We find modifying the path selection to choose paths predicted to be safe lowers total paths with an AS compromise to 0.14% but still presents a 5–11% chance of at least one compromise in a week while making 5% of paths fail, with 96% of failures due to false positives in path inferences. Our results demonstrate more measurement and better path prediction is necessary to mitigate the risk of AS and IX adversaries to Tor.

  16. Movements in Parties: OccupyPD

    Directory of Open Access Journals (Sweden)

    Donatella della Porta

    2015-03-01

    Full Text Available When the United States activists called for people to Occupy#everywhere, it is unlikely they were thinking of the headquarters of the Italian centre-left party. Parties and movements are often considered to be worlds apart. In reality, parties have been relevant players in movement politics, and movements have influenced parties, often through the double militancy of many of their members. OccupyPD testifies to a continuous fluidity at the movement-party border, but also to a blockage in the party’s interactions with society that started long before the economic crisis but drastically accelerated with it. In this paper we present the OccupyPD Movement as a case of interaction between party politics and social movement politics, and in particular between the base membership of a centre-left party and the broader anti-austerity movement that diffused from the US to Europe adopting similar forms of actions and claims. Second, by locating it within the context of the economic and democratic crisis that erupted in 2007, we understand its emergence as a reaction towards politics in times of crisis of responsibility, by which we mean a drastic drop in the capacity of the government to respond to citizens’ requests. To fulfil this double aim, we bridge social movement studies with research on party change, institutional trust and democratic theory, looking at some political effects of the economic crisis in terms of a specific form of legitimacy crisis, as well as citizens’ responses to it, with a particular focus on the political meaning of recent anti-austerity protests. In this analysis, we refer to both quantitative and qualitative data from secondary liter-ature and original in-depth interviews carried out with a sample of OccupyPD activists.

  17. Party Organizational Change: Formal Distribution of Power between National and Regional Levels in Italian Political Parties (1991-2012

    Directory of Open Access Journals (Sweden)

    Enrico Calossi

    2015-03-01

    Full Text Available In the last 20 years an increasing number of scholars have centred their attention on the relationships between party national structures and party sub-national branches. A relevant part of the specialized literature has interpreted party change as the by-product of the denationalization of party politics. The aim of this contribution is to investigate to what extent eight relevant Italian parties have followed patterns of organizational change, after the reforms of the municipal, provincial and regional election sys-tems; and the process of devolution of administrative powers begun during the Nineties. By focusing on two analytical dimensions (the level of involvement and the level of autonomy of party regional units, we analyse diachronically continuity and change in party formal organization, through an in-depth analysis of the statutes adopted from 1992 to 2012

  18. Creating Turbulent Flow Realizations with Generative Adversarial Networks

    Science.gov (United States)

    King, Ryan; Graf, Peter; Chertkov, Michael

    2017-11-01

    Generating valid inflow conditions is a crucial, yet computationally expensive, step in unsteady turbulent flow simulations. We demonstrate a new technique for rapid generation of turbulent inflow realizations that leverages recent advances in machine learning for image generation using a deep convolutional generative adversarial network (DCGAN). The DCGAN is an unsupervised machine learning technique consisting of two competing neural networks that are trained against each other using backpropagation. One network, the generator, tries to produce samples from the true distribution of states, while the discriminator tries to distinguish between true and synthetic samples. We present results from a fully-trained DCGAN that is able to rapidly draw random samples from the full distribution of possible inflow states without needing to solve the Navier-Stokes equations, eliminating the costly process of spinning up inflow turbulence. This suggests a new paradigm in physics informed machine learning where the turbulence physics can be encoded in either the discriminator or generator. Finally, we also propose additional applications such as feature identification and subgrid scale modeling.

  19. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates an...... an additive factor of order $\\Delta e^{\\Delta^2}$, where $\\Delta$ is the minimal gap of a problem instance. In the adversarial regime regret guarantee remains unchanged....

  20. An improved parametrization and analysis of the EXP3++ algorithm for stochastic and adversarial bandits

    DEFF Research Database (Denmark)

    Seldin, Yevgeny; Lugosi, Gábor

    2017-01-01

    We present a new strategy for gap estimation in randomized algorithms for multiarmed bandits and combine it with the EXP3++ algorithm of Seldin and Slivkins (2014). In the stochastic regime the strategy reduces dependence of regret on a time horizon from $(ln t)^3$ to $(ln t)^2$ and eliminates...... an additive factor of order $\\Delta e^{\\Delta^2}$, where $\\Delta$ is the minimal gap of a problem instance. In the adversarial regime regret guarantee remains unchanged....

  1. Material control study: a directed graph and fault tree procedure for adversary event set generation

    International Nuclear Information System (INIS)

    Lambert, H.E.; Lim, J.J.; Gilman, F.M.

    1978-01-01

    In work for the United States Nuclear Regulatory Commission, Lawrence Livermore Laboratory is developing an assessment procedure to evaluate the effectiveness of a potential nuclear facility licensee's material control (MC) system. The purpose of an MC system is to prevent the theft of special nuclear material such as plutonium and highly enriched uranium. The key in the assessment procedure is the generation and analysis of the adversary event sets by a directed graph and fault-tree methodology

  2. Picturing the Party: Instagram and Party Campaigning in the 2014 Swedish Elections

    Directory of Open Access Journals (Sweden)

    Kirill Filimonov

    2016-08-01

    Full Text Available This article explores Swedish parties’ activities on Instagram during the 2014 elections. Understanding party campaign communication as highly strategic, that is, communication to persuade and mobilize voters in order to win the elections, we ask whether Instagram was used to (1 broadcast campaign messages, (2 mobilize supporters, (3 manage the party’s image, and (4 amplify and complement other campaign material (i.e., hybrid campaign use. With this study, we follow previous studies on the use of digital communication platforms in the hands of campaigning political actors, but we direct our attention to a new platform. We conducted a content analysis of 220 party postings on Instagram, collected during the hot phase of the campaign. The result shows that the platform was mainly used for broadcasting rather than for mobilization. The image the parties were presenting leaned toward personalization with a strong presence of top candidates in their postings. Top candidates were primarily displayed in a political/professional context. Finally, half of the analyzed postings showed signs of hybridized campaign practices. The presented findings give a first glimpse on how political parties use and perform on Instagram.

  3. Nuclear opponents and party politics

    International Nuclear Information System (INIS)

    Tollmann, A.

    1987-01-01

    The question treated in this article is: what do the members of the Austrian parliament - of the different parties - against nuclear energy, in particular against nuclear installations in neighbour countries? Of special interest is the Green party, now also represented in the parliament. The conclusion is that even this party, though in principle definitely anti-nuclear, is of no help to nuclear opponents in general, and to the Working Group No to Zwentendorf in particular. (qui)

  4. On Adaptive vs. Non-adaptive Security of Multiparty Protocols

    DEFF Research Database (Denmark)

    Canetti, Ran; Damgård, Ivan Bjerre; Dziembowski, Stefan

    2001-01-01

    highlights of our results are: – - According to the definition of Dodis-Micali-Rogaway (which is set in the information-theoretic model), adaptive and non-adaptive security are equivalent. This holds for both honest-but-curious and Byzantine adversaries, and for any number of parties. – - According......Security analysis of multiparty cryptographic protocols distinguishes between two types of adversarialsettings: In the non-adaptive setting, the set of corrupted parties is chosen in advance, before the interaction begins. In the adaptive setting, the adversary chooses who to corrupt during...... the course of the computation. We study the relations between adaptive security (i.e., security in the adaptive setting) and non-adaptive security, according to two definitions and in several models of computation. While affirming some prevailing beliefs, we also obtain some unexpected results. Some...

  5. The art of negotiation. A delicate balance.

    Science.gov (United States)

    Rehberg, C; Sullivan, G

    1997-01-01

    Successful negotiation is the art of gentle persuasion, not a "winner-take-all" showdown. Accordingly, it is essential to begin the process with a positive outlook and with the goal of reaching an agreement that is acceptable to all parties involved. Although the term "opponent" is used in this article to describe the person or group with whom you are negotiating, it is not used in the adversarial context. It is important to maintain a non-adversarial relationship, to the extent possible.

  6. Mediation: The Wise Advocacy

    Directory of Open Access Journals (Sweden)

    Towseef Ahmad

    2016-01-01

    Full Text Available AbstractAdversarial litigation is not the only means of resolving disputes and settling of claims. There are various options. Alternative means of dispute resolution can save money and time, and can help to anchor and resolve the dispute while exploring valuable good offices, amicable approaches and facilitation. Mediation, as used in law, is a process of managing negotiation by a neutral third party in the form of Alternative Dispute Resolution (ADR, as a convenient way of resolving disputes between two or more parties with speediation processes. On the sidelines typically, a neutral third party, the mediator assists the parties to negotiate a settlement. The term “mediation” broadly refers to any instance in which a neutral third party helps others to reach an amicable and mutually acceptable agreement. More specifically, mediation has a structure, timetable and dynamic approaches that “ordinary” negotiations usually lack. The process helps the parties to flourish the healthy ideas which are different and distinct from the legal rights in a Court of law. It is well known in International Law also and disputants can submit their disputes to mediation in a variety of matters such as commercial, legal, diplomatic, workplace, community and family matters, which assumes a great significance and it is bricolaged within the framework of this article.Keywords: Adversarial, Litigation, Mediation, Negotiation and Amicable.

  7. Third party financing of renewable energy sources

    International Nuclear Information System (INIS)

    IDAE.

    1994-01-01

    IDAE (Institute of Energy Saving and Diversification) Hosted the Third party on financing renewable energy sources. The meeting was articulated into chapters: 1.- Experiences in the renewable energy field. 2.- Third party financing of small hydro-power projects. 3.- Third party financing of biomass projects. 4.- Third party financing of wind energy projects

  8. The niche party concept and its measurement

    OpenAIRE

    Meyer, Thomas M; Miller, Bernhard

    2015-01-01

    The concept of the niche party has become increasingly popular in analyses of party competition. Yet, existing approaches vary in their definitions and their measurement approaches. We propose using a minimal definition that allows us to compare political parties in terms of their ?nicheness?. We argue that the conceptual core of the niche party concept is based on issue emphasis and that a niche party emphasizes policy areas neglected by its rivals. Based on this definition, we propose a con...

  9. The niche party concept and its measurement.

    Science.gov (United States)

    Meyer, Thomas M; Miller, Bernhard

    2015-03-01

    The concept of the niche party has become increasingly popular in analyses of party competition. Yet, existing approaches vary in their definitions and their measurement approaches. We propose using a minimal definition that allows us to compare political parties in terms of their 'nicheness'. We argue that the conceptual core of the niche party concept is based on issue emphasis and that a niche party emphasizes policy areas neglected by its rivals. Based on this definition, we propose a continuous measure that allows for more fine-grained measurement of a party's 'nicheness' than the dominant, dichotomous approaches and thereby limits the risk of measurement error. Drawing on data collected by the Comparative Manifesto Project, we show that (1) our measure has high face validity and (2) exposes differences among parties that are not captured by alternative, static or dichotomous measures.

  10. 28 CFR 51.7 - Political parties.

    Science.gov (United States)

    2010-07-01

    ... THE VOTING RIGHTS ACT OF 1965, AS AMENDED General Provisions § 51.7 Political parties. Certain activities of political parties are subject to the preclearance requirement of section 5. A change affecting... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Political parties. 51.7 Section 51.7...

  11. Political parties and politics on the Internet: An analysis of the websites of Catalan political parties

    Directory of Open Access Journals (Sweden)

    Albert Padró-Solanet

    2008-02-01

    Full Text Available

    The article analyses the use of New Information and Communications Technologies (NICT by the political parties, going beyond approaches focusing on the potential of these technologies for political transformation and renovation. In order to do this a set of variables that characterise the strategic position of the Catalan parties is employed: ideology, organisation and position in the electoral market. The analysis shows three different forms of usage of the Internet. One group of parties (PSC, CDC-CiU uses it to promote participation and campaigning activities; a second group (ICV, Cs, to generate new resources, and finally, a third group (PSC, ERC uses it to build contact networks. The size, and to a lesser degree the type of organisation, stand out as the major explanatory variables. The major parties use the Internet to promote campaign activities and participation; in contrast, smaller parties tend to make use of the Internet to generate new sources of financing and workforce. Depending on the type of organisation, the parties of the masses seem to be more likely to use the Internet to set up and activate an extensive contact network which recreates the characteristic associative realm of these parties in cyberspace.

  12. How to hold an ethical pox party.

    Science.gov (United States)

    Jamrozik, Euzebiusz

    2018-04-01

    Pox parties are a controversial alternative to vaccination for diseases such as chickenpox. Such parties involve parents infecting non-immune children by exposing them to a contagious child. If successful, infection will usually lead to immunity, thus preventing infection later in life, which, for several vaccine-preventable diseases, is more severe than childhood infection. Some may consider pox parties more morally objectionable than opting out of vaccination through non-medical exemptions. In this paper, I argue that this is not the case. Pox parties involve immediate risk of harm for children and reduce future harms, whereas opting out of vaccination places children at long-term risk of harms that increase with time, at least for some pathogens. Regarding harm to others through onward transmission of infection, this can be easily prevented in the case of pox parties-given the relatively controlled timing of infection-by quarantining attendees after the party, whereas opting out of vaccination involves risks to others that are more difficult to control. I defend three criteria for an ethical pox party: (1) that the disease is sufficiently low risk, (2) that parents consent to their child's attendance and (3) that children exposed to infection are quarantined and isolated appropriately. I argue that, if these criteria are met, pox parties are morally preferable to non-vaccination; such parties involve less risk to non-consenting others and, for some pathogens in some cases, even involve less risk for the children who participate. Thus, policies that permit non-medical exemption to vaccination should also permit ethical pox parties. Alternatively, if pox parties are not permitted, then vaccination should be mandated for those without medical contraindication. © Article author(s) (or their employer(s) unless otherwise stated in the text of the article) 2018. All rights reserved. No commercial use is permitted unless otherwise expressly granted.

  13. Learning Physics-based Models in Hydrology under the Framework of Generative Adversarial Networks

    Science.gov (United States)

    Karpatne, A.; Kumar, V.

    2017-12-01

    Generative adversarial networks (GANs), that have been highly successful in a number of applications involving large volumes of labeled and unlabeled data such as computer vision, offer huge potential for modeling the dynamics of physical processes that have been traditionally studied using simulations of physics-based models. While conventional physics-based models use labeled samples of input/output variables for model calibration (estimating the right parametric forms of relationships between variables) or data assimilation (identifying the most likely sequence of system states in dynamical systems), there is a greater opportunity to explore the full power of machine learning (ML) methods (e.g, GANs) for studying physical processes currently suffering from large knowledge gaps, e.g. ground-water flow. However, success in this endeavor requires a principled way of combining the strengths of ML methods with physics-based numerical models that are founded on a wealth of scientific knowledge. This is especially important in scientific domains like hydrology where the number of data samples is small (relative to Internet-scale applications such as image recognition where machine learning methods has found great success), and the physical relationships are complex (high-dimensional) and non-stationary. We will present a series of methods for guiding the learning of GANs using physics-based models, e.g., by using the outputs of physics-based models as input data to the generator-learner framework, and by using physics-based models as generators trained using validation data in the adversarial learning framework. These methods are being developed under the broad paradigm of theory-guided data science that we are developing to integrate scientific knowledge with data science methods for accelerating scientific discovery.

  14. Institutionalizing dissent: a proposal for an adversarial system of pharmaceutical research.

    Science.gov (United States)

    Biddle, Justin

    2013-12-01

    There are serious problems with the way in which pharmaceutical research is currently practiced, many of which can be traced to the influence of commercial interests on research. One of the most significant is inadequate dissent, or organized skepticism. In order to ameliorate this problem, I develop a proposal that I call the "Adversarial Proceedings for the Evaluation of Pharmaceuticals," to be instituted within a regulatory agency such as the Food and Drug Administration for the evaluation of controversial new drugs and controversial drugs already in the market. This proposal is an organizational one based upon the "science court" proposal by Arthur Kantrowitz in the 1960s and 1970s. The primary benefit of this system is its ability to institutionalize dissent, thereby ensuring that one set of interests does not dominate all others.

  15. Intra-party policy entrepreneurship and party goals. The case of political parties’ climate policy preferences in Ireland

    DEFF Research Database (Denmark)

    Little, Conor

    2017-01-01

    This study contributes to the growing literature on the domestic politics of climate change by examining the climate policy preferences of Fianna Fáil, Fine Gael and the Labour Party over 20 years. Bringing the concept of ‘policy entrepreneurship’ into the study of intra-party politics, it uses...... who have engaged in policy entrepreneurship with the aim of strengthening their parties’ climate policy preferences. In instances where office-seeking incentives for climate policy have been strong, they have often contributed to changes in policy preferences, whether or not intra-party policy...... entrepreneurship has been present. Theoretically, the study argues that the concept of ‘policy entrepreneurship’ can be usefully borrowed from the public policy literature by researchers of party policy preferences and intra-party politics. Empirically, it adds to the small but growing body of research on climate...

  16. OFFSETTING TOMORROW’S ADVERSARY IN A CONTESTED ENVIRONMENT: DEFENDING EXPEDITIONARY ADVANCE BASES IN 2025 AND BEYOND

    Science.gov (United States)

    2017-04-06

    EABs enable the dispersal of key assets to cloud adversary targeting process while 8 providing the joint force proximity to the area of...environment, the denial of ISR capabilities is critical to maintaining an adversary’s uncertainty and cloud his situational awareness. To this task...James E. 2014. "Expeditionary Force 21." Expeditionary Force 21, Forward and Ready: Now and in the Future. Washington, DC: HQ USMC, March 4. Board

  17. Measurement device-independent quantum dialogue

    Science.gov (United States)

    Maitra, Arpita

    2017-12-01

    Very recently, the experimental demonstration of quantum secure direct communication (QSDC) with state-of-the-art atomic quantum memory has been reported (Zhang et al. in Phys Rev Lett 118:220501, 2017). Quantum dialogue (QD) falls under QSDC where the secrete messages are communicated simultaneously between two legitimate parties. The successful experimental demonstration of QSDC opens up the possibilities for practical implementation of QD protocols. Thus, it is necessary to analyze the practical security issues of QD protocols for future implementation. Since the very first proposal for QD by Nguyen (Phys Lett A 328:6-10, 2004), a large number of variants and extensions have been presented till date. However, all of those leak half of the secret bits to the adversary through classical communications of the measurement results. In this direction, motivated by the idea of Lo et al. (Phys Rev Lett 108:130503, 2012), we propose a measurement device-independent quantum dialogue scheme which is resistant to such information leakage as well as side-channel attacks. In the proposed protocol, Alice and Bob, two legitimate parties, are allowed to prepare the states only. The states are measured by an untrusted third party who may himself behave as an adversary. We show that our protocol is secure under this adversarial model. The current protocol does not require any quantum memory, and thus, it is inherently robust against memory attacks. Such robustness might not be guaranteed in the QSDC protocol with quantum memory (Zhang et al. 2017).

  18. Inheritance and the Dynamics of Party Identification

    OpenAIRE

    Kroh, Martin; Selb, Peter

    2009-01-01

    Extensive research efforts notwithstanding, scholars continue to disagree on the nature and meaning of party identification. Traditionalists conceive of partisanship as a largely affective attachment to a political party that emerges in childhood through parental influences and tends to persist throughout life. The revisionist conception of partisanship is that of a running tally of party utilities that is updated based on current party performance. We attempt to reconcile both schools of tho...

  19. A cyber-physical approach to secret key generation in smart environments

    OpenAIRE

    Barsocchi, Paolo; Chessa, Stefano; Martinovic, Ivan; Oligeri, Gabriele

    2011-01-01

    Encrypted communication in wireless sensor networks oftentimes requires additional randomness and frequent re-keying in order to avoid known-plain text attacks. Conventional approaches for shared secret generation suffer however from various disadvantages, such as necessity of a trusted third party, protocol scalability, and especially, the computational resources needed for performance-demanding public-key protocols. To appropriately respond to the increasing disproportions between a computa...

  20. Party-state relationship, an effect of the political competition. The party system and patronage in Romanian politics

    Directory of Open Access Journals (Sweden)

    Irina Lonean

    2012-06-01

    Full Text Available The article examines the party-state relationship in post-communist Romania. It shows the connections between the existence of patronage, corruption and the states’ weak administrative capacity, on one hand, and the dynamics of the political party system, as an explanatory variable, on the other hand. The instability of the political parties in Romania and their changing relations within the system make the electorates’ task of anticipating and sanctioning their politics impossible. Consequently, the political parties have the possibility of extracting resources from the state without being held accountable in elections, as an effect of their dynamic, but non-robust competition.

  1. Between Party, Parents and Peers

    DEFF Research Database (Denmark)

    Bregnbæk, Susanne

    2012-01-01

    This article explores the lived contradictions entailed in being a young member of the Chinese Communist Party (ccp) today. The focus is on how political and existential issues intersect. It explores party membership as a strategy for personal mobility among Beijing elite university students by p...

  2. Third-party online payment solutions in China

    OpenAIRE

    Yang, Qian

    2017-01-01

    The topic of this paper is third-party online payment solutions in China and the main purpose of this paper is to figure out the research question: What are the impacts of third-party online payment solutions on China? Generally speaking, the third-party online payment solutions, including mobile payments, usually used by customer who purchase online and usually used in transaction platform. However, in China, people can use third-party payment solutions in different platfor...

  3. Gender differences in Assessments of Party Leaders

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina; Hansen, Kasper Møller

    2015-01-01

    Is there a relationship between party leader gender and voters' assessments? Yes, according to theses on gender identity and stereotyping. A voter survey during the 2011 Danish general election allows for a comprehensive analysis of a less likely case with four male and four female party leaders...... of gender does not increase with age, actually, the opposite is the case among men since younger male voters have smaller sympathy for female party leaders. Furthermore, there is no support for the expectation that voters with more education or with higher levels of political interest and knowledge are more....... Female party leaders are assessed more positively by female voters than male voters both in regard to general party leader sympathy and assessment of specific characteristics, whereas it is not the case that male party leaders are assessed more positively by male voters than female voters. The impact...

  4. So Close But So Far: Voting Propensity and Party Choice for Left-�Wing Parties

    DEFF Research Database (Denmark)

    Bochsler, Daniel; Sciarini, Pascal

    2010-01-01

    While the bulk of the literature focuses on the vote for parties from different blocs, the purpose of our article is to study the vote for two parties that are ideologically very close to each other: The Social Democrats and the Greens in Switzerland. To that end, we develop a two-step model, where...... voters first make a selection of parties that are acceptable to them and then make their electoral choice out of this set of acceptable al- ternatives. We use voting propensities as a measure of the first, consideration step and we show that they strongly depend on the distance between voters and parties...... on the Left–Right scale. With regard to the second, choice stage of the electoral process we hypothesize about the factors that may account for the varying ability of the two par- ties to convert potential voters into real voters. Our empirical tests provide encourag- ing support for our hypotheses regarding...

  5. Complete Fairness in Secure Two-Party Computation

    DEFF Research Database (Denmark)

    Gordon, S. Dov; Hazay, Carmit; Katz, Jonathan

    2011-01-01

    In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees, informa...... for such functions must have round complexity super-logarithmic in the security parameter. Our results demonstrate that the question of completely fair secure computation without an honest majority is far from closed.......In the setting of secure two-party computation, two mutually distrusting parties wish to compute some function of their inputs while preserving, to the extent possible, various security properties such as privacy, correctness, and more. One desirable property is fairness which guarantees......-party setting. We demonstrate that this folklore belief is false by showing completely fair protocols for various nontrivial functions in the two-party setting based on standard cryptographic assumptions. We first show feasibility of obtaining complete fairness when computing any function over polynomial...

  6. Runtime party switch in an inter-organizational collaboration

    NARCIS (Netherlands)

    Pourmirza, S.

    2016-01-01

    During the execution of an inter-organizational business-to-business (B2B) collaboration, a collaborating party may drop out for technical reasons or for business reasons. In such a case, the leaving party must be replaced, at runtime, by a new party. Ideally, the new party can pick up where the old

  7. Stock Market Prediction on High-Frequency Data Using Generative Adversarial Nets

    Directory of Open Access Journals (Sweden)

    Xingyu Zhou

    2018-01-01

    Full Text Available Stock price prediction is an important issue in the financial world, as it contributes to the development of effective strategies for stock exchange transactions. In this paper, we propose a generic framework employing Long Short-Term Memory (LSTM and convolutional neural network (CNN for adversarial training to forecast high-frequency stock market. This model takes the publicly available index provided by trading software as input to avoid complex financial theory research and difficult technical analysis, which provides the convenience for the ordinary trader of nonfinancial specialty. Our study simulates the trading mode of the actual trader and uses the method of rolling partition training set and testing set to analyze the effect of the model update cycle on the prediction performance. Extensive experiments show that our proposed approach can effectively improve stock price direction prediction accuracy and reduce forecast error.

  8. 45 CFR 99.22 - Rights of parties.

    Science.gov (United States)

    2010-10-01

    ... 45 Public Welfare 1 2010-10-01 2010-10-01 false Rights of parties. 99.22 Section 99.22 Public Welfare DEPARTMENT OF HEALTH AND HUMAN SERVICES GENERAL ADMINISTRATION PROCEDURE FOR HEARINGS FOR THE CHILD CARE AND DEVELOPMENT FUND Hearing Procedures § 99.22 Rights of parties. All parties may: (a...

  9. When can we trust a third party?

    NARCIS (Netherlands)

    Hee, van K.M.; Sidorova, N.; Werf, van der J.M.E.M.; Koutny, M.; Aalst, van der W.M.P.; Yakovlev, A.

    2013-01-01

    Organizations often do not want to reveal the way a product is created or a service is delivered. As a consequence, if two organizations want to cooperate, they contact a trusted third party. Each specifies how it wants to communicate with the other party. The trusted third party then needs to

  10. 26 CFR 301.7430-5 - Prevailing party.

    Science.gov (United States)

    2010-04-01

    ... 26 Internal Revenue 18 2010-04-01 2010-04-01 false Prevailing party. 301.7430-5 Section 301.7430-5... Prevailing party. (a) In general. For purposes of an award of reasonable administrative costs under section... prevailing party only if— (1) The position of the Internal Revenue Service was not substantially justified...

  11. 6 CFR 13.17 - Rights of parties.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Rights of parties. 13.17 Section 13.17 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.17 Rights of parties. Except as otherwise limited by this part, all parties may: (a) Be accompanied...

  12. Protecting Clock Synchronization: Adversary Detection through Network Monitoring

    Directory of Open Access Journals (Sweden)

    Elena Lisova

    2016-01-01

    Full Text Available Nowadays, industrial networks are often used for safety-critical applications with real-time requirements. Such applications usually have a time-triggered nature with message scheduling as a core property. Scheduling requires nodes to share the same notion of time, that is, to be synchronized. Therefore, clock synchronization is a fundamental asset in real-time networks. However, since typical standards for clock synchronization, for example, IEEE 1588, do not provide the required level of security, it raises the question of clock synchronization protection. In this paper, we identify a way to break synchronization based on the IEEE 1588 standard, by conducting a man-in-the-middle (MIM attack followed by a delay attack. A MIM attack can be accomplished through, for example, Address Resolution Protocol (ARP poisoning. Using the AVISPA tool, we evaluate the potential to perform a delay attack using ARP poisoning and analyze its consequences showing both that the attack can, indeed, break clock synchronization and that some design choices, such as a relaxed synchronization condition mode, delay bounding, and using knowledge of environmental conditions, can make the network more robust/resilient against these kinds of attacks. Lastly, a Configuration Agent is proposed to monitor and detect anomalies introduced by an adversary performing attacks targeting clock synchronization.

  13. From Protest to Political Parties: Online Deliberation in New Parties in Spain

    Directory of Open Access Journals (Sweden)

    Rosa Borge Bravo

    2016-12-01

    Full Text Available The new parties that emerged following the 15-M movement and against the austerity measures in Spain want to build parties open to the participation and deliberation for all the citizenry. To what extent are these ideals being fulfilled? The aim of this article is to describe and assess some of the main online deliberative processes of the two most important parties, Podemos and Barcelona En Comú, following commonly accepted criteria in the literature for measuring online deliberation. Specifically, we have examined the two most-voted proposals from the online platform Plaza Podemos and the online development of the electoral programme of Barcelona En Comú. Thus, we have conducted a content analysis of 713 (Plaza Podemos and 563 (Barcelona En Comú posts. Both platforms meet the structural and technical criteria for fostering deliberation, but the external impact is high only in the case of Barcelona En Comú. The deliberative quality of the communication is good but not the criteria of reflexivity, inclusion and plurality.

  14. The Labour Party and British Republicanism

    Directory of Open Access Journals (Sweden)

    Kenneth O. MORGAN

    2003-10-01

    Full Text Available The famous detective, Sherlock Holmes, once solved a case by referring to “the dog that did not bark.” In the past 250 years of British history, republicanism is another dog that did not bark. This is particularly true of supposedly our most radical major political party, the Labour Party. Over the monarchy, as over constitutional matters generally, Labour’s instincts have been conservative. Even after 1997, when the party, led by Lord Irvine, has indeed embarked upon major constitutional ref...

  15. The Institutionalisation of the Romanian Party System

    Directory of Open Access Journals (Sweden)

    Clara Volintiru

    2012-12-01

    Full Text Available This paper explores the level of institutionalisation achieved by the Romanian political system since transitioning to democracy. Following through the key components of an institutionalised party system, the inquiry looks at the stability of interparty competition in Romania and the depth of its parties’ roots in society. These components are measured through such indicators as electoral volatility or the cohesiveness of the ideological preferences. Their levels suggest that the Romanian party system isn’t fully instituionalised, with fluctuating volatility and a rather incohesive ideological positioning of both voters and parties. This paper argues that in response to the double challenge of poor institutionalisation of the political parties and the party system as a whole, informal remedies, such as patronage of public jobs, or proprietary use of state resources, become highly attractive solutions for electoral success.

  16. Increased cooperation through immediate post contractual negotiation

    NARCIS (Netherlands)

    Meijers, Stephan; Doree, Andries G.; Boes, Johan

    2014-01-01

    Traditional contracting has been largely shown to cause adversarial relationships between client and contractor in the construction sector. This leads to claims during construction by contractors, which increase transaction costs for both parties in the form of policing and enforcement costs. In

  17. 7 CFR 955.91 - Additional parties.

    Science.gov (United States)

    2010-01-01

    ... Marketing Agreement § 955.91 Additional parties. After the effective date thereof, any handler may become a... Regulations of the Department of Agriculture (Continued) AGRICULTURAL MARKETING SERVICE (Marketing Agreements... then be effective as to such new contracting party. ...

  18. Playing Multi-Action Adversarial Games: Online Evolutionary Planning versus Tree Search

    DEFF Research Database (Denmark)

    Justesen, Niels; Mahlmann, Tobias; Risi, Sebastian

    2017-01-01

    We address the problem of playing turn-based multi-action adversarial games, which include many strategy games with extremely high branching factors as players take multiple actions each turn. This leads to the breakdown of standard tree search methods, including Monte Carlo Tree Search (MCTS......), as they become unable to reach a sufficient depth in the game tree. In this paper, we introduce Online Evolutionary Planning (OEP) to address this challenge, which searches for combinations of actions to perform during a single turn guided by a fitness function that evaluates the quality of a particular state....... We compare OEP to different MCTS variations that constrain the exploration to deal with the high branching factor in the turn-based multi-action game Hero Academy. While the constrained MCTS variations outperform the vanilla MCTS implementation by a large margin, OEP is able to search the space...

  19. Political Marketing Mix in Indonesia Parties

    Directory of Open Access Journals (Sweden)

    Freddy Simbolon

    2016-05-01

    Full Text Available The reform era has changed the paradigm of Indonesian politics. Multiparty system has demanded a political party to be able to compete for their constituents. Article aimed to convey a political marketing concept that can helppolitical parties in planning a strategy to win the election. Research method used descriptive method analysis. The results suggest that the approach of the marketing mix that includes the product, price, place, and promotion areapproaches that are very helpful in presenting a plan to win the marketing strategy of political parties in elections.

  20. Generative adversarial networks for brain lesion detection

    Science.gov (United States)

    Alex, Varghese; Safwan, K. P. Mohammed; Chennamsetty, Sai Saketh; Krishnamurthi, Ganapathy

    2017-02-01

    Manual segmentation of brain lesions from Magnetic Resonance Images (MRI) is cumbersome and introduces errors due to inter-rater variability. This paper introduces a semi-supervised technique for detection of brain lesion from MRI using Generative Adversarial Networks (GANs). GANs comprises of a Generator network and a Discriminator network which are trained simultaneously with the objective of one bettering the other. The networks were trained using non lesion patches (n=13,000) from 4 different MR sequences. The network was trained on BraTS dataset and patches were extracted from regions excluding tumor region. The Generator network generates data by modeling the underlying probability distribution of the training data, (PData). The Discriminator learns the posterior probability P (Label Data) by classifying training data and generated data as "Real" or "Fake" respectively. The Generator upon learning the joint distribution, produces images/patches such that the performance of the Discriminator on them are random, i.e. P (Label Data = GeneratedData) = 0.5. During testing, the Discriminator assigns posterior probability values close to 0.5 for patches from non lesion regions, while patches centered on lesion arise from a different distribution (PLesion) and hence are assigned lower posterior probability value by the Discriminator. On the test set (n=14), the proposed technique achieves whole tumor dice score of 0.69, sensitivity of 91% and specificity of 59%. Additionally the generator network was capable of generating non lesion patches from various MR sequences.

  1. Social praxis, party, and class relations today

    Directory of Open Access Journals (Sweden)

    Egni Malo

    2014-01-01

    Full Text Available Today’s political sociologists are once again interested in the study of the crisis of mass-based parties, anti-politics and anti-parliamentarism, crisis in the authority of the political class, prevailing corporate interests within republican institutions, and populism. Political sociology however, takes the party, as a construct of political sociology alone, without consideration upon its militancy and action, as the party, which objectifies the foundation of a State, and as a result the party becomes, simply an historical category. We approach the problem of the modern state from many angles; analysing the nature of a political party as such; the ideological dangers of determinism and spontaneism which a party necessarily must struggle with; the type of non-administrative internal regime which is necessary for a party to be effective and so on. The problem we seek to elaborate is the specific character of the collective action that makes possible the passage from a sectored, corporate and subordinate role of purely negative opposition, to a leading role of conscious action towards not merely a partial adjustment within the system, but posing the issue of the State in its entirety. In developing this theme – as a study of the real relations between the political party, the classes and the State – a two-fold consideration is devoted to the study of Machiavelli and Marx: first from the angle of the real relations between the two, as thinkers of revolutionary politics, of action; and secondly from a perspective which would derive from the Marxist doctrines an articulated system of contemporary politics, as found in The Prince.

  2. Terrorism and Political Parties

    DEFF Research Database (Denmark)

    Bourne, Angela

    In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army (IRA). More...... for realization of free speech rights and representation is also emphasized, and where proscription is seen as inimical to resolution of conflict underpinning violence. In the context of party competition, a winning coalition is required for one discourse to predominate. However, I also argued that both ideas...

  3. The Organizational Weapon: Ruling Parties in Authoritarian Regimes

    OpenAIRE

    Meng, Anne

    2016-01-01

    This project examines party building in authoritarian regimes. The overarching puzzle I seek to address is: why are some autocratic ruling parties stronger organizations than others? What explains variation in the institutional capacity of autocratic rule? The collection of three essays in this dissertation outline the strategic logic of party institutionalization, in addition to providing new and original ways in which to measure this key concept of authoritarian party strength. It tests pre...

  4. The doctrine of party autonomy in international commercial arbitration

    African Journals Online (AJOL)

    The freedom of parties to consensually execute arbitration agreement is known as the principle of party autonomy. The principle provides a right for the parties to international commercial arbitration to choose applicable substantive law and these laws when chosen shall govern the contractual relationship of the parties.

  5. Authoritarian Inheritance and Conservative Party-Building in Latin America

    OpenAIRE

    Loxton, James Ivor

    2014-01-01

    Beginning in the late 1970s, with the onset of the third wave of democratization, a host of new conservative parties emerged in Latin America. The trajectories of these parties varied tremendously. While some went on to enjoy long-term electoral success, others failed to take root. The most successful new conservative parties all shared a surprising characteristic: they had deep roots in former dictatorships. They were "authoritarian successor parties," or parties founded by high-level in...

  6. Improving the security of quantum protocols via commit-and-open

    NARCIS (Netherlands)

    I.B. Damgård (Ivan); S. Fehr (Serge); C. Luneman; L. Salvail (Louis); C. Schaffner (Christian)

    2009-01-01

    htmlabstractWe consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general compiler improving the security of such protocols: if the original protocol is secure against an almost honest adversary, then the

  7. The Chinese Communist Party in Reform

    DEFF Research Database (Denmark)

    Brødsgaard, Kjeld Erik; Yongnian, Zheng

    Contrary to the expectations of many people, China's recent economic growth has not led to the collapse of the Chinese Communist Party. In fact, the party has recently carried out a peaceful and orderly transition to the so-called fourth generation of leadership, has revitalised itself, and created...... a new, younger and better trained cadre corps. Despite this successful transformation, there continue to be many problems that the party will need to overcome if it is to remain in power, including pressures for democratization in both urban and rural areas, widespread corruption, the emergence of new...

  8. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    http://www.cern.ch/cern50/All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director-General would like to invite all the people working at CERN to celebrate the success of the organization. The party will be held in the cafeteria and on the terrace (if the weather permits) of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks, snacks and a surprise music show by the CERN Big Bang Orchestra! Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! Early closure of Restaurant No. 1 (Bldg. 501, Meyrin site): Friday 17 September at 2:00 p.m. On Friday, 17 September, Restaurant No. 1 (NOVAE) will close at 2:00 p.m. owing to the Golden Jubilee party for the CERN staff. No dinner will be served that evening.

  9. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    http://www.cern.ch/cern50/ All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director-General would like to invite all the people working at CERN to celebrate the success of the organization. Your Golden Jubilee Party Friday 17 September 2004 at 16:00 Restaurant 1, Main Building Programme Speech by Director-General Toast in honour of CERN Cocktails and ambient music Video projections of five decades of CERN and at 18:00 ... A surprise music show. Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! Early closure of Restaurant No. 1 (bldg. 501, Meyrin site): Friday 17 September at 2:00 p.m. On Friday, 17 September, Restaurant No. 1 (NOVAE) will close at 2:00 p.m. owing to the Golden Jubilee party for the CERN staff. No dinner will be served that evening.

  10. Political parties in the Sverdlovsk region: stages of development

    Directory of Open Access Journals (Sweden)

    Mukhametov Ruslan Salikhovich

    2013-12-01

    Full Text Available This article analyzes the processes of party building in the Russian Federation. On the example of a single region – the Sverdlovsk region – we study the evolution of political parties. The factors favoring the process of formation and functioning of regional political parties and political movements in the Middle Urals are identified and classified. Much attention is paid to such factors of development of the parties in the region as a party-electoral law and the electoral system view.

  11. Mothers' power assertion; children's negative, adversarial orientation; and future behavior problems in low-income families: early maternal responsiveness as a moderator of the developmental cascade.

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2015-02-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children's negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers' responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children's negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children's behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children's negative, adversarial orientation to future behavior problems was present when mothers' responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PsycINFO Database Record (c) 2015 APA, all rights reserved.

  12. Attack strategies on quantum cryptographic protocols

    International Nuclear Information System (INIS)

    Schauer, S.; Suda, M.

    2006-01-01

    Full text: Quantum key distribution (QKD) and quantum authentication (QA) have been a topic of extensive research in the last 20 years. In course of that many attacks on QKD and QA protocols have been studied. Among these, Zhang, Lee and Guo presented an attack on a QKD protocol using entanglement swapping. Based on that strategy we take a look at other protocols to inspect how much information an adversary may get if he shares entanglement with either one or both parties. We will present some protocols where an adversary can even get full information about the key using entanglement. (author)

  13. Cutting out the middleman: physicians can contract directly with employers--a viable alternative to adversarial managed care agreements.

    Science.gov (United States)

    Lester, Howard

    2002-01-01

    HMOs, PPOs, and other managed care "middlemen" control the means by which most physicians do business with employers. As physicians face dwindling reimbursements, greater practice restrictions, and increased pressure to sign adversarial middleman contracts, interest in direct contracting has grown. This article introduces direct contracting as an important alternative to commercial managed care agreements; cites the key advantages and process of direct contracting; and offers practical recommendations for helping physician practices successfully negotiate direct physician/employer agreements.

  14. Public funding of political parties when campaigns are informative

    DEFF Research Database (Denmark)

    Ortín, Ignacio Ortuño; Schultz, Christian

    dependence on vote shares induces fur- ther moderation and improves welfare. If parties are asymmetric, vote share dependent public funding bene…ts the large party and makes it moderate its candidate, while the smaller party reacts by choosing a more extremist candidate. On balance, however, if the parties......The paper considers public funding of political parties when some voters are poorly informed about parties’ candidates and campaigns are informative. For symmetric equilibria, it is shown that more pub- lic funding leads parties to chose more moderate candidates, and that an increase in the funding’s...... are not too asymmetric, an increase in vote share dependent funding improves welfare and increases the likelihood that a moderate candidate wins the election...

  15. 31 CFR 19.950 - Excluded Parties List System

    Science.gov (United States)

    2010-07-01

    ... 31 Money and Finance: Treasury 1 2010-07-01 2010-07-01 false Excluded Parties List System 19.950 Section 19.950 Money and Finance: Treasury Office of the Secretary of the Treasury GOVERNMENTWIDE DEBARMENT AND SUSPENSION (NONPROCUREMENT) Definitions § 19.950 Excluded Parties List System Excluded Parties...

  16. The Dark Side of Altruistic Third-Party Punishment

    Science.gov (United States)

    Leibbrandt, Andreas; Lopez-Perez, Raul

    2011-01-01

    This article experimentally studies punishment from unaffected third parties in ten different games. The authors show that third-party punishment exhibits several features that are arguably undesirable. First, third parties punish strongly a decider if she chooses a socially efficient or a Pareto efficient allocation and becomes the richest party…

  17. Features of modern security policy UK political parties

    Directory of Open Access Journals (Sweden)

    A. V. Stalovierova

    2015-12-01

    Full Text Available The security policy of the British coalition government of D. Cameron (2010-2015 is summarized; it’s been proved that political forces of Tory and Liberal Democrat should have compromised to carry out unanimous course in the scope of national security, and the problems of the security strategy on parliamentary elections in 2015 are analyzed, particularly the comparative analysis of the modern safety strategy of leading British parties is exercised. Under conditions of the appearance of new challenges and threats, transformation of international safety system, the questions of safety policy often become the object of attention of the British community and experts. The absence of cross-party consensus on most terms of safety strategy of the United Kingdom during the election campaign in 2015 makes the discussion about perspectives of the British safety policy still more urgent. During the election campaign there was no unity on any aspect of security subject between parties. First of all, Labourists, Liberal Democrats, Scottish National Party and Green Party made a statement about readiness to develop cooperation with the EU and the Conservatives and the UK Independence Party were on the side of the Eurosceptics. The opinions of the parties were also divided on military operations abroad, financing and force level. In terms of one-party government and presence of majority in the House of Commons, the Conservatives have opportunities to realize their own vision of British safety policy.

  18. The German Environmentalist Party - The Greens

    International Nuclear Information System (INIS)

    Mettke, J.R.

    1982-01-01

    The Greens are winning supporters throughout the FRG, quite a few of them are already members of the parliament of various lands. Will they cooperate with the established political parties in Bonn. Will they take over from the Free Democrats the role of holding the balance of power. In this book, Spiegel editors present their analyses of the changing concepts of the new political movement. The most outstanding members of the Environmentalist Party - the so-called Greens - define their position and state their opinions on the problems of coalition forming, and prominent members of the parties of the German Bundestag answer these statements. (orig.) [de

  19. Sex Parties: Female Teen Sexual Experimentation

    Science.gov (United States)

    Toscano, Sharyl Eve

    2006-01-01

    Adolescent participants in a study aimed at exploring the nature and characteristics of girls' dating relationships revealed the phenomenon of sex parties. These teens defined a "sex party" as an opportunity to engage in sexual contact outside of typical dating relationships. Sexual activity could involve actual intercourse, but usually involved…

  20. 76 FR 10926 - Self-Regulatory Organizations; Municipal Securities Rulemaking Board; Notice of Filing of...

    Science.gov (United States)

    2011-02-28

    ..., Chief Financial Officer dated September 8, 2010 (``Georgetown, Texas Letter''); and Portland Letter... the financial advisor are separate, adversarial roles and cannot be provided by the same party.'' One..., President and Chief Executive Officer dated September 29, 2010 (``D.A. Davidson Letter''); and J.J.B...

  1. Multiparty Computation from Threshold Homomorphic Encryption

    DEFF Research Database (Denmark)

    Cramer, Ronald; Damgård, Ivan Bjerre; Nielsen, Jesper Buus

    2001-01-01

    We introduce a new approach to multiparty computation (MPC) basing it on homomorphic threshold crypto-systems. We show that given keys for any sufficiently efficient system of this type, general MPC protocols for n parties can be devised which are secure against an active adversary that corrupts...

  2. PVV en SP: ideologische tegenstanders met dezelfde voedingsbodem?

    NARCIS (Netherlands)

    Veul, Ilva; Flache, Andreas; Venema, Simon

    2016-01-01

    The right-wing PVV and the left-wing SP are seen as populist parties who are fierce ideological adversaries in the Dutch political spectrum. We study the similarities and differences in municipal contexts that explain their electoral success. Results of the 2010 national elections at the

  3. Democracy as a Contested Concept in Postwar Western Europe: A Comparative Study of Political Debates in France, West Germany and Italy

    NARCIS (Netherlands)

    Corduwener, P.

    2016-01-01

    This article explores how political parties in France, West Germany, and Italy conceptualized democracy and challenged the conceptions of democracy of their political adversaries between the end of the 1940s and the early 1960s. It studies from a comparative perspective the different conceptions of

  4. 12 CFR 747.603 - Prevailing party.

    Science.gov (United States)

    2010-01-01

    ... 12 Banks and Banking 6 2010-01-01 2010-01-01 false Prevailing party. 747.603 Section 747.603 Banks... in NCUA Board Adjudications § 747.603 Prevailing party. An eligible applicant may be a “prevailing... dismissed. In appropriate situations an applicant may also have prevailed if the outcome of the proceeding...

  5. 6 CFR 13.13 - Parties to the hearing.

    Science.gov (United States)

    2010-01-01

    ... 6 Domestic Security 1 2010-01-01 2010-01-01 false Parties to the hearing. 13.13 Section 13.13 Domestic Security DEPARTMENT OF HOMELAND SECURITY, OFFICE OF THE SECRETARY PROGRAM FRAUD CIVIL REMEDIES § 13.13 Parties to the hearing. (a) The parties to the hearing will be the Defendant and the Authority...

  6. Judicial Reforms in Russia: 1864 to 2014

    Directory of Open Access Journals (Sweden)

    Irina Reshetnikova

    2015-01-01

    Full Text Available In 2014 we celebrate the 150th anniversary of the Judicial Reform in Russia. The 1860s are known as a time of major reforms in various spheres of life, one of them being the Judicial Reform adopted in 1864. Before 1864 civil procedure was considered to be the classical form of inquisitorial justice1 with active judges and passive parties. Inquisitorial procedure was a written process conducted in secret with no legal representatives in court, and with formal evaluation of evidence (otsenka dokazatel’stv. Instead of an inquisitorial procedure the Judicial Reform introduced an adversarial system with active parties and more or less passive judges, an open, oral (public process, legal representatives, and free evaluation of evidence. So, for Russian procedure it was a revolution as it happened in other countries of Europe, which turned away from an inquisitorial to an adversarial system of justice.

  7. Social Networks and Political Parties in Chile

    OpenAIRE

    Adler Lomnitz, Larissa

    2002-01-01

    This paper describes the origin and evolution of two Chilean political parties (the Radical Party and the Christian Democrat Party) through the analysis of the social networks that originated and composed them. The aim of this study is to propose a model of national political cultures on the basis of the structure of social networks related to power and of the symbol system, which legitimizes it. The structure of social networks, horizontal and vertical, are based on reciprocal or redistribut...

  8. Economic Beliefs and Party Preference

    OpenAIRE

    Michael W.M. Roos; Andreas Orland

    2014-01-01

    This paper reports the results of a questionnaire study used to explore the economic understanding, normative positions along the egalitarian-libertarian spectrum, and the party preferences of a large student sample. The aim of the study is both to find socio-economic determinants of normative and positive beliefs and to explore how beliefs about the economy influence party support. We find that positive beliefs of lay people differ systematically from those of economic experts. Positive beli...

  9. Internal party democracy as a factor of transitional societiy consolidation

    Directory of Open Access Journals (Sweden)

    O. L. Tupitzya

    2016-08-01

    The possibility of intra-party democracy appearance as a sustainable and well played phenomena can only be based on the formation of political parties as a competitive and dynamic structures that have a high degree of internal relationships and a clear understanding of a common goal that is shared by both the governing parties and the basis of parties and ordinary party members. Distribution of party members in top management, middle functional rank and ordinary members is an obvious consequence of the organizational functioning of any extensive and systematic organization.

  10. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director General would like to invite all staff working at CERN to celebrate the success of the organization. The party will be held on the terrace of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks and snacks. Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate!

  11. Matrix revolutions? An analysis of party organization and ICT use by political parties in the Republic of Ireland

    NARCIS (Netherlands)

    Wall, M.; Sudulich, M.L.

    2010-01-01

    This article investigates the characteristics of political parties' websites in the Republic of Ireland and seeks to evaluate whether parties' organizational structures influence the manner in which they present themselves online. Ireland has been chosen as a research environment because there is

  12. Direct and indirect welfare chauvinism as party strategies

    DEFF Research Database (Denmark)

    Careja, Romana; Elmelund-Præstekær, Christian; Klitgaard, Michael Baggesen

    2016-01-01

    negatively affect immigrants the most. Combining quantitative and qualitative analysis of labour market reforms in Denmark, where one of the most successful populist right-wing parties in Europe – the Danish People's Party – held a pivotal position in the period 2001–11, the article traces the intentions...... and deliberate policy-making strategies of the party. It shows that the distinction between direct and indirect chauvinism is a useful theoretical tool for understanding how the Danish People's Party can fulfill the expectations of both its electorate and its coalition partners, even if they point in different...

  13. Mothers’ Power Assertion, Children’s Negative, Adversarial Orientation, and Future Behavior Problems in Low-Income Families: Early Maternal Responsiveness as a Moderator of the Developmental Cascade

    Science.gov (United States)

    Kim, Sanghag; Kochanska, Grazyna

    2014-01-01

    Parental power assertion, a key dimension of family environment, generally sets in motion detrimental developmental cascades; however, evidence suggests that other qualities of parenting, such as responsiveness, can significantly moderate those processes. Mechanisms that account for such moderating effects are not fully understood. We propose a conceptual model of processes linking parental power assertion, parental responsiveness, children’s negative, adversarial, rejecting orientation toward the parent, and behavior problems. We test that model in a short-term longitudinal design involving 186 low-income, ethnically diverse mothers and their toddlers. When children were 30 months, the dyads were observed in multiple, lengthy, naturalistic laboratory interactions to assess behaviorally mothers’ responsiveness and their power-assertive control style. At 33 months, we observed behavioral indicators of children’s negative, adversarial, rejecting orientation toward the mothers in several naturalistic and standardized paradigms. At 40 months, mothers rated children’s behavior problems. The proposed moderated mediation sequence, tested using a new approach, PROCESS (Hayes, 2013), was supported. The indirect effect from maternal power assertion to children’s negative, adversarial orientation to future behavior problems was present when mothers’ responsiveness was either low or average but absent when mothers were highly responsive. This study elucidates a potential process that may link parental power assertion with behavior problems and highlights how positive aspects of parenting can moderate this process and defuse maladaptive developmental cascades. It also suggests possible targets for parenting intervention and prevention efforts. PMID:25401483

  14. Psychometric Analyses of the Birthday Party

    Science.gov (United States)

    Lee, Young-Sun

    2016-01-01

    The present research focuses on the psychometric properties of the Birthday Party measure for ages 3-5. The Birthday Party was developed to provide a reliable, valid, and engaging measure of early mathematical content--Number and Operation, Shape, Space, and Pattern--that can be given in either a short or a long form to English and Spanish…

  15. The gender of party leadership and its impact on voter's asessment

    DEFF Research Database (Denmark)

    Kosiara-Pedersen, Karina

    Even though most political parties are still male dominated, an increasing number of women reach the top position of party leader. Furthermore, party leadership is increasingly regarded as an important part of party images due to the personalization of politics. Does the gender of the party leader...... leader characteristics appreciated by men and women. If this holds, the gender of party leadership matters to women because they value woman party leaders higher, not because they value other characteristics than men....

  16. The Hobby Horse of the Party for the Animals

    NARCIS (Netherlands)

    Otjes, Simon

    2016-01-01

    Can a small, new political party increase the attention to nonhuman animal welfare? This paper traces the effect of the Party for the Animals on the Dutch parliament. This was the first animal advocacy party to enter parliament.

  17. STEM and the Evolution of the Astronomical Star Party

    Science.gov (United States)

    Day, B. H.; Munive, P.; Franco, J.; Jones, A. P.; Shaner, A. J.; Buxner, S.; Bleacher, L.

    2015-12-01

    The astronomical star party has long been a powerful and effective way to engage the public and enhance cohesiveness within the amateur astronomy community. Early star parties tended to be strictly small, local events. But with improvements in transportation, larger regional star parties became popular. These advanced the considerable capabilities for citizen science in the amateur community, shared technology and engineering innovations in the field of telescope making, and refined numerous mathematical techniques in areas such instrument design and ephemeris generation, covering the full breadth of STEM. Advancements in astrophotography showcased at these events brought the star party from STEM to STEAM. Now, the advent of social media, web streaming, and virtual presence has facilitated the phenomenon of very large, networked star parties with international scope. These mega star parties take public engagement to a new, far greater levels, giving a vastly larger and more diverse public the opportunity to directly participate in exciting first-hand STEM activities. This presentation will recount the evolution of the star party and will focus on two examples of large, multinational, networked star parties, International Observe the Moon Night and Noche de las Estrellas. We will look at lessons learned and ways to participate.

  18. Race, ideology, and the tea party: a longitudinal study.

    Directory of Open Access Journals (Sweden)

    Eric D Knowles

    Full Text Available The Tea Party movement, which rose to prominence in the United States after the election of President Barack Obama, provides an ideal context in which to examine the roles of racial concerns and ideology in politics. A three-wave longitudinal study tracked changes in White Americans' self-identification with the Tea Party, racial concerns (prejudice and racial identification, and ideologies (libertarianism and social conservatism over nine months. Latent Growth Modeling (LGM was used to evaluate potential causal relationships between Tea Party identification and these factors. Across time points, racial prejudice was indirectly associated with movement identification through Whites' assertions of national decline. Although initial levels of White identity did not predict change in Tea Party identification, initial levels of Tea Party identification predicted increases in White identity over the study period. Across the three assessments, support for the Tea Party fell among libertarians, but rose among social conservatives. Results are discussed in terms of legitimation theories of prejudice, the "racializing" power of political judgments, and the ideological dynamics of the Tea Party.

  19. Race, Ideology, and the Tea Party: A Longitudinal Study

    Science.gov (United States)

    Knowles, Eric D.; Lowery, Brian S.; Shulman, Elizabeth P.; Schaumberg, Rebecca L.

    2013-01-01

    The Tea Party movement, which rose to prominence in the United States after the election of President Barack Obama, provides an ideal context in which to examine the roles of racial concerns and ideology in politics. A three-wave longitudinal study tracked changes in White Americans’ self-identification with the Tea Party, racial concerns (prejudice and racial identification), and ideologies (libertarianism and social conservatism) over nine months. Latent Growth Modeling (LGM) was used to evaluate potential causal relationships between Tea Party identification and these factors. Across time points, racial prejudice was indirectly associated with movement identification through Whites’ assertions of national decline. Although initial levels of White identity did not predict change in Tea Party identification, initial levels of Tea Party identification predicted increases in White identity over the study period. Across the three assessments, support for the Tea Party fell among libertarians, but rose among social conservatives. Results are discussed in terms of legitimation theories of prejudice, the “racializing” power of political judgments, and the ideological dynamics of the Tea Party. PMID:23825630

  20. Turkish Political Market and the Perception of Political Parties

    Directory of Open Access Journals (Sweden)

    Cihat Polat

    2015-06-01

    Full Text Available This study attempts to describe the Turkish political market and determine where and how Turkish political parties are perceived by voters. The study uses a two-dimensional map to determine the voter perceptions of the parties in the Turkish political market based on a survey questionnaire applied to 400 young voters. It also investigates whether there are any major differences in the perception of parties in the political space based on voter ideologies. The study finds that young voters have clear perceptions of the positions of Turkish parties. It also finds that voter perceptions of parties vary based on voters’ ideological positions.

  1. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September. To mark CERN's 50th anniversary, the Director General would like to invite all staff working at CERN to celebrate the success of the organization. The party will be held on the terrace of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks and snacks! Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! http://www.cern.ch/cern50/

  2. Your Golden Jubilee Party!

    CERN Multimedia

    2004-01-01

    All staff are invited to the Golden Jubilee Staff Party on the evening of 17 September To mark CERN's 50th anniversary, the Director General would like to invite all staff working at CERN to celebrate the success of the organization. The party will be held on the terrace of the Main Building on 17 September at 4:00 pm. The event will include an address by the DG, music, film clips, drinks and snacks. Your effort, hard work and enthusiasm have been the key to CERN's success. The first of the main events celebrating the organization's Golden Jubilee is for you, so come along and celebrate! http://www.cern.ch/cern50/

  3. 13 CFR 120.920 - Required participation by the Third Party Lender.

    Science.gov (United States)

    2010-01-01

    ...) Third Party Loan collateral. Third Party Loans usually are collateralized by a first lien on the Project... BUSINESS LOANS Development Company Loan Program (504) Third Party Loans § 120.920 Required participation by the Third Party Lender. (a) Amount of Third Party Loans. A Project financing must include one or more...

  4. Crossing boundaries : Involving external parties in innovation

    NARCIS (Netherlands)

    Slot, J.H.

    2013-01-01

    To improve the return on investments in innovation, firms increasingly open up their new product development (NPD) processes by inviting external parties to participate. This dissertation focuses on the involvement of three different types of external parties in the NPD process: suppliers,

  5. Major trends in party system in Ukraine for 1998-2014 years

    Directory of Open Access Journals (Sweden)

    D. K. Nosenko

    2015-01-01

    Full Text Available The current party system of Ukraine, defined its main features and trends with regard of parliamentary elections 2014 was investigated. The classification, which distinguish the parliamentary system was determined. It is established that the party system has undergone significant changes compared to previous years. Thus, according to classification Mayra Ukrainian party system evolved from a secondary party system to a system of small parties because the two largest parties have 47.5% of votes in parliament. Meyer’s Index fell by almost a factor of 2, indicating that the party system became more competitive, the process of forming a coalition will be longer, and the stability of the government will be lower than in previous years. The calculated effective indices of the number of parties suggested Laakso, Taagepera and Golosov also show that the party system became more fragmented. Based on the analyzed results of parliamentary elections for 1998­2014 years, it has found that increasing or decreasing the percentage threshold of 1%, not significantly affected by the number of parties represented in Parliament; none of the parties could not be present in every convocation; there is uncertainty in electoral preferences.

  6. Modelling the dynamics of two political parties in the presence of switching.

    Science.gov (United States)

    Nyabadza, F; Alassey, Tobge Yawo; Muchatibaya, Gift

    2016-01-01

    This paper generalizes the model proposed by Misra, by considering switching between political parties. In the model proposed, the movements of members from political party B to political party C and vice versa, are considered but the net movement is considered by assuming that [Formula: see text] (a constant), which implies that the movement of members is either from party B to party C or from party C to party B. In this paper we remodel these movements through switching functions to capture how individuals switch between parties. The results provide a more comprehensive synopsis of the dynamics between two political parties.

  7. Third party objection and action against enforcement: Request for exclusion

    Directory of Open Access Journals (Sweden)

    Salma Marija

    2014-01-01

    Full Text Available This paper deals with a right of a third party to prevent enforcement on the basis of a claim and evidence that rights or assets seized in enforcement proceeding belong to him (third party and not to the enforcement debtor. In most of jurisdictions that were subject of analysis of this paper, this right of a third party is exercised by filing an objection to the court conducting enforcement proceedings. The claim of the third party is directed towards the enforcement creditor as well as against the enforcement debtor. In the event the claim of the third party is being contested, the court instructs the third party to initiate litigation proceedings for determining whether the third party is entitled to exclusion of such rights or assets from enforcement, especially if such third party holds property rights or some other rights over the assets that are being subject to enforcement proceedings. In majority of analyzed jurisdictions, enforcement proceedings are being suspended provided the third party, in the objection being filed makes prima facie likely, on the basis of credible evidence, that his assets were seized in the enforcement proceedings. However, according to the law of the Republic of Serbia, a credible objection of a third party does not result in suspension of enforcement proceedings, something that is being criticized in this paper. As a result of this provision of the law, a bona fide third party is forced to endure the enforcement although his claim has been made likely and subsequently confirmed in the litigation proceedings. The author, in particular, points to the legal consequences of mala fide enforcement creditor that knew that the assets that are being subject of the enforcement proceedings do not belong to the enforcement debtor. The author is of the opinion that, in such cases, the enforcement creditor should be obliged to pay to the third party damages that such party suffered as a result of enforcement proceedings being

  8. Public Funding of Political Parties

    DEFF Research Database (Denmark)

    Ortuno-Ortin, Ignacio; Schultz, Christian

    This paper concerns public funding of parties. Parteis receive public funds depending on their vote share. Funds finance electoral campaigns. Two cases are investigated. In the first, some voters are policy motivated and some are ?impressionable? ? their vote depends directly on campaign...... expenditures. In the second, campaigning is informative and all voters are policy motivated. Public funds increase policy convergence in both cases. The effect is larger, the more funding depends on vote shares. When campaigns are informative, there may be multiple euqilibria. Intuitively, a large party can...

  9. Bewitched - The Tea Party Movement

    DEFF Research Database (Denmark)

    Ashbee, Edward

    2011-01-01

    This article considers the development of the Tea Party movement, the character of its thinking and the nature of the interests and constituencies to which it is tied. The article suggests that despite the importance of ideas and interests, and the process of interaction between them, the movement....... The political friction that this creates has contributed to the anger that has characterised the movement. While the Tea Party movement may, as such, have only an ephemeral existence, independent conservatives are likely to remain a significant and potent constituency and will, within the institutional...

  10. A Response to Eze's critique of Wiredu's consensual democracy ...

    African Journals Online (AJOL)

    The question of what political system best suites post colonial/independent. African states remain alive and ever more pertinent particularly in the face of failed attempts at democratisation. Kwasi Wiredu notes that the adversarial nature of Western democratic practices along party political lines may not be well suited for ...

  11. 217 An International Multi-Disciplinary Journal, Ethiopia Vol. 4 (1 ...

    African Journals Online (AJOL)

    FIRST LADY

    An alternative structure exist when a party does not perceive sufficiently important interest .... Considering the grand strategies of the superpowers during the cold war,. Freiberg .... the two adversaries; how they construct and interpret reality; and the. “bounded ... to loss… it can only make people behave to avoid it. The only.

  12. Golkar Party's Political Communications the New Paradigm Bakrie Leadership 2009-2013

    Directory of Open Access Journals (Sweden)

    Khoiruddin Muchtar

    2013-11-01

    Full Text Available This study base on the efforts of the Golkar Party's to the process of interpretation, socialization, and implementation of the new paradigm, the paradigm guide to reformations Golkar Party's become to democratic, independent, solid, strong, foundamental, and responsive. How Golkar party's political communication about socialization and implementation of a new paradigm of Golkar Party's leadership Aburizal Bakrie-year period from 2009 to 2012.The aim of this research is to study and overview of the process of socialization and implementation new paradigm Golkar Party's of the Aburizal Bakrie’s leadership. This contect described to using constructivist paradigm through the theory of Performance of Communication and Structuration. Research using the case study method. Data obtained by participation observer, unstructured interviews, and documentary study. The data also collected from informants. The results of this research show: 1 The Golkar Party's has a very significant infrastructure, so the making easier to socialization new paradigm to internal party, but Golkar Party's can not erase stigma society as the New Order party. Socializing new paradigm Golkar Party's to be done in integrated, systematic and continuous addressed to all cadres of various levels from the center to the village. 2 the new paradigm Golkar Party's ideals as the basis and foundation values stand for the Golkar Party's, the implementation is faced with the reality of the condition of the various political considerations and the interests of power, so it can not shown the Golkar Party's political communication with the direction of the reality, Golkar Party's must be have to political communication with the role of multi faces.

  13. Flawed Political Party Primaries In Nigeria's Fourth Republic: The ...

    African Journals Online (AJOL)

    African Journal for the Psychological Study of Social Issues ... However, through an assessment of extant secondary data, this paper submits that the experience in the Peoples Democratic Party; the ruling party, during the 2007 General Elections was a case of deliberate imposition of candidates by powerful party leaders.

  14. Christmas party

    CERN Multimedia

    Staff Association

    2011-01-01

    The Christmas party organized by the Staff Association took place on Saturday 3 December. 200 children from 5 to 7 years old attended a magic show which filled them with wonder. Then they were served a snack in the Novae restaurant. Finally, just before their parents came to pick them up, Father Christmas gave them a present. The Staff Association wishes you a Merry Christmas and a Happy New Year!

  15. Party-political and electoral system of Uruguay

    Directory of Open Access Journals (Sweden)

    Samuel Decresci

    2015-06-01

    Full Text Available The Oriental Republic of Uruguay is seen by many as a pioneer among Latin American nations to modernize its state and its policy. Since the late nineteenth century to the twentieth, Uruguayan political actors operate significant changes such as the separation of church and state, labor regulation, divorce law, women's vote, etc. Because of this and the progressive modernization, it was called the “Switzerland of the Americas”. Today, it still stands out in this area by regularizing abortion, homoaffective marriage, liberalization and access to marijuana. Moreover, noteworthy that such measures were achieved largely because of governance that the executive enjoys in the midst of this political system. Thus, this work aims to analyze such Uruguayan political system. In short, a political system is understood by the government system, the electoral system and the party system. That said, it will be analyzed in the political scenario of the country, their characteristics, party and election rules, political parties, party dynamics and relations between the powers.

  16. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Faust, Sebastian; Hazay, Carmit

    2011-01-01

    We propose a 2-party UC-secure computation protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic...

  17. Third party financing of renewable energy sources

    International Nuclear Information System (INIS)

    1994-01-01

    The Institut of Energy Saving and Diversification (IDAE) hosted the third party on financing Renewable Energy Sources in Spain. The main aspects were : 1) Experiences in renewable energy. 2) Financing of small hydro-power projects. 3) Third party financing of biomass projects. 4) Financing of wind energy projects

  18. Party Governance and the Selection of Parliamentarians

    NARCIS (Netherlands)

    K.J. Beniers (Klaas)

    2005-01-01

    textabstractThis paper examines the incentives for a party leader in office and for a parties' rank-and-file to replace a sitting member of parliament. As to the leader's decision, we show that the leader prefers to replace a critical member of parliament who votes against the leader's policy. A

  19. Parties, rituals and symbolisms in schools

    Directory of Open Access Journals (Sweden)

    Ana Cecilia Valencia Aguirre

    2015-07-01

    Full Text Available This paper aims at analyzing school parties from interaction spaces and principals’ narratives in six schools in the state of Jalisco. A party is a ritual where participants share symbols related to imaginary –hence the importance of conducting an analysis for understanding institutions as a symbolic framework. A core argument is that established actors are configured from symbolic practices in the institutional space (schools. The repetition of these practices awash with symbolism leads to daily rituals or micro rituals that are ratified in institutions. Methodologically, interviews and non-participant observation in school interaction spaces were used. Based on the findings, it may be stated that the nuclear family, rooted in the Christian image in which authority is a central point, becomes a fundamental factor in shaping institutional life as well as the imaginary linked to school parties.

  20. A novel quantum solution to secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Wang, Pan-hong; Zhang, Shun

    2018-06-01

    Secure Two-Party Distance Computation is an important primitive of Secure Multiparty Computational Geometry that it involves two parties, where each party has a private point, and the two parties want to jointly compute the distance between their points without revealing anything about their respective private information. Secure Two-Party Distance Computation has very important and potential applications in settings of high secure requirements, such as privacy-preserving Determination of Spatial Location-Relation, Determination of Polygons Similarity, and so on. In this paper, we present a quantum protocol for Secure Two-Party Distance Computation by using QKD-based Quantum Private Query. The security of the protocol is based on the physical principles of quantum mechanics, instead of difficulty assumptions, and therefore, it can ensure higher security than the classical related protocols.

  1. Candidate nomination, intra-party democracy, and election violence in Africa

    DEFF Research Database (Denmark)

    Seeberg, Merete Bech; Wahman, Michael; Skaaning, Svend-Erik

    2018-01-01

    . When local-level or national-level competition between parties is low, as in much of Africa, electoral politics become a matter of intra-party rather than inter-party competition. Nominations are a part of the electoral process often left to the discretion of poorly institutionalized parties, free......This article introduces a special issue on candidate nomination, intra-party democracy, and election violence in Africa. Although a burgeoning literature on African democratization has focused on the topic of electoral violence, little attention has been given to violence during party nominations...... of the involvement of electoral management bodies and external monitors, and violence often results. Rather than developing an elaborate theoretical framework on the causes of nomination violence, our ambition in this introduction is to introduce the concept of nomination violence and situate it in the literatures...

  2. Secure multi-party quantum summation based on quantum Fourier transform

    Science.gov (United States)

    Yang, Hui-Yi; Ye, Tian-Yu

    2018-06-01

    In this paper, we propose a novel secure multi-party quantum summation protocol based on quantum Fourier transform, where the traveling particles are transmitted in a tree-type mode. The party who prepares the initial quantum states is assumed to be semi-honest, which means that she may misbehave on her own but will not conspire with anyone. The proposed protocol can resist both the outside attacks and the participant attacks. Especially, one party cannot obtain other parties' private integer strings; and it is secure for the colluding attack performed by at most n - 2 parties, where n is the number of parties. In addition, the proposed protocol calculates the addition of modulo d and implements the calculation of addition in a secret-by-secret way rather than a bit-by-bit way.

  3. Simple multi-party set reconciliation

    DEFF Research Database (Denmark)

    Mitzenmacher, Michael; Pagh, Rasmus

    2017-01-01

     set reconciliation: two parties A1A1 and A2A2 each hold a set of keys, named S1S1 and S2S2 respectively, and the goal is for both parties to obtain S1∪S2S1∪S2. Typically, set reconciliation is interesting algorithmically when sets are large but the set difference |S1−S2|+|S2−S1||S1−S2|+|S2−S1| is small...

  4. A contextual analysis of party system formation in Nigeria, 1960-2011

    Directory of Open Access Journals (Sweden)

    Aliyu Mukhtar Katsina

    2013-12-01

    Full Text Available This article investigates the parties and party systems in Nigeria since independence. The article argues that the country has witnessed four different types of party systems corresponding to the four democratisation attempts that saw the emergence of constitutional governments since 1960. Special focus is awarded to the transformations of the four party systems and developments in their various institutional designs including regulating the number of parties that participate in the electoral politics of the country. In trying to achieve its objective, the article adopts chronological and thematic approaches. Chronologically, the paper investigates these party systems in successive order beginning with the First Republic when the elements of party politics were first adopted in Nigeria. Thematically, the article focuses on those issues that influenced the formation and transformation of the party systems from the First Republic in 1960 to the present Fourth Republic.

  5. Hotel Overbooking and Cooperation with Third-Party Websites

    Directory of Open Access Journals (Sweden)

    Yufeng Dong

    2015-08-01

    Full Text Available Hotels cooperate with third-party websites to enhance their competitive position and attain sustainable development in the era of e-commerce. Furthermore, hotel managers overbook to hedge against last-minute cancellations and customer no-shows. This paper discusses pricing and overbooking strategies of a hotel in the context of cooperation with multiple third-party websites and analyzes how these strategies influence the cooperation process. The increase in profits resulting from the overbooking strategy is also examined. A model of a Stackelberg game between the hotel and third-party websites and a Nash game among the third-party websites are developed to analyze the process. Results indicate that the compensation coefficient has a slight influence on hotel pricing strategy, but causes a sharp decrease in overbooking level. As the hotel demands to lessen the probability of denying under higher compensation rate, the third-party websites would exert less sales effort to reduce the demand of online customers. Results also show that under a given market demand, hotel effort only serves to redistribute market shares among the hotel and third-party websites, without influencing hotel pricing and overbooking decisions. Specifically, the market shares of the third-party websites decrease in the effort level of the hotel resulting from an increase in the hotel market share. Finally, in the numerical example where one hotel and two websites are analyzed, hotel overbooking strategy improves hotel profit by 4.20%, whereas profit improvements for Websites 1 and 2 are as high as 5.26% and 5.21%, respectively. Managerial implications of the study are also provided.

  6. 75 FR 73014 - Notice of Public Meeting: Updating the Flight Instructor Renewal Process To Enhance Safety of Flight

    Science.gov (United States)

    2010-11-29

    ... confirmation of attendance and the number of members in the attending party. If we find that we are nearing... years. Even with the advent of new technologies to assist the GA pilot, there has been little... affect them. The meetings will be informal and non-adversarial. No individual will be subject to cross...

  7. Report of the 33rd Japanese Antarctic Research ExpeditionーActivities of the summer party(1991-1992and wintering party(1992ー

    Directory of Open Access Journals (Sweden)

    Mitsuo Fukuchi

    1996-03-01

    Full Text Available Summer activities in the 1991/92 austral summer and winter activities in 1992 of the 33rd Japanese Antarctic Research Expedition (JARE are described. The JARE-33 consisted of 16 members of the summer party and 37 members of the wintering party (one member of the wintering party returned with the summer party. Two Brazilian fish physiologists joined the summer party based on the exchange scientist program of the Antarctic Treaty. The icebreaker SHIRASE left Tokyo on 14 November 1991 and arrived at Breid Bay on 18 December, where the closing of Asuka Camp was completed. Then she headed to Syowa Station and arrived there on 4 January 1992. Transportation of cargo by helicopter to Syowa Station was carried out between 23 December 1991 and 18 January 1992. A total of 848t of cargo, including pipe transport of light oil (342kl and freight by oversnow vehicles (215t, were transported. A new central building was constructed from 23 December to 17 February as the start of an 8-year reintegration project of Syowa Station. Three generator engines of 200kVA capacity were overhauled. Concurrently, various research programs such as absolute gravity measurement and field surveys including inland oversnow traverse were performed. However, there were some problems with a super conducting gravity meter while the gravity meter was being tested for winter operation. Therefore, one scientist working on the gravity meter who planned to winter-over decided to leave Syowa Station with the gravity meter. all of the summer party left Syowa Station on 17 February and headed to Sydney, Australia, while oceanographic and marine biological observations were carried out on board. Members of the summer party of JARE-33 and the wintering party of JARE-32 returned to Narita by air on 27 March 1992. The wintering party of JARE-33 worked at Syowa Station from 1 February 1992 to 31 January 1993. The scientific research programs cover the following four major disciplines : (1 upper

  8. Church parties in the Arian controversy: problems of typologization

    Directory of Open Access Journals (Sweden)

    Georgy Zakharov

    2017-12-01

    Full Text Available The article is devoted to the problems of typologization of the church parties of the 4th century. This historical phenomenon arises within the framework of a long church conflict, called the Arian crisis. The designations of the church parties used by contemporaries are polemical concepts and do not correspond to the self-consciousness of their supporters. In the early Christian heresiological tradition and in the modern historiography, the basis of church parties’ classification is their theological position. However, it is necessary to take into account other consolidating factors, such as Eucharistic communion and church-political activity. The formation of church parties, as a rule, was directly related to the development of the synodal institution. Analysis of sources in the 4th century allows us to distinguish, in addition to the extensive currents - macro-parties - claiming a universal or regional consensus based on the heritage of one of the representative and authoritative councils, some small consolidated groups - micro-parties, which gather for little councils and constantly coordinate their actions within the ecclesiastical confrontation. Micro-parties could exist both within the limits of macro-party, in many respects determining the trends of it’s development, and beyond it’s boundaries. In the latter case, it is actually a marginal church group rallied around one or more extraordinary theologian, sometimes even without the episcopal rank.

  9. The value of political parties to representative democracy

    NARCIS (Netherlands)

    Kölln, Ann-Kristin

    2015-01-01

    Political parties play a major role in democratic processes around the world. Recent empirical research suggests that parties are increasingly less important to citizens. Simultaneously, classic and contemporary theories of representative democracy specifically still minimally incorporate accounts

  10. From Party Systems to Party Organizations: The Adaptation of Latin American Parties to Changing Environments De sistemas partidarios a la organización partidaria. La adaptación de partidos latinoamericanos a ambientes cambiantes

    Directory of Open Access Journals (Sweden)

    Laura Wills-Otero

    2009-04-01

    Full Text Available Review Article:Alcántara Sáez, Manuel (ed. (2008, Politicians and Politics in Latin America, Boulder: Lynne Rienner Publishers. Greene, Kenneth F. (2007, Why Dominant Parties Lose. Mexico’s Democratization in Comparative Perspective, New York: Cambridge University Press. Levitsky, Steven (2003, Transforming Labor-based Parties in Latin America: Argentine Peronism in Comparative Perspective, New York: Cambridge University Press. The study of party systems and political parties is one of the largest subfields in political science. Classic studies in advanced democracies focused primarily on party systems and developed theories about the causes and consequences of different types of systems. In recent years, new academic work begun to differentiate parties within systems by understanding their organizational structure, their internal dynamics, the different ways in which they interact with their constituencies, and the strategies that they use to attract voters. Studies show that parties within the same system behave and react differently given their internal conditions. This article reviews three scholarly books that deal with this issue. The works analyze the internal dynamics of Latin American political parties and their capacity to respond and adapt their structures when environmental challenges take place. Review Article:Alcántara Sáez, Manuel (ed. (2008, Politicians and Politics in Latin America, Boulder: Lynne Rienner Publishers. Greene, Kenneth F. (2007, Why Dominant Parties Lose. Mexico���s Democratization in Comparative Perspective, New York: Cambridge University Press. Levitsky, Steven (2003, Transforming Labor-based Parties in Latin America: Argentine Peronism in Comparative Perspective, New York: Cambridge University Press. El estudio de los sistemas de partidos y partidos políticos es una de las áreas más amplias en la ciencia política. Trabajos clásicos llevados a cabo en democracias avanzadas, enfocaron su atenci

  11. Monopolizing, Mutualizing, or Muddling Through: Factions and Party Management in Contemporary Thailand

    Directory of Open Access Journals (Sweden)

    Paul W. Chambers

    2010-01-01

    Full Text Available In democracies throughout the world, intra-party factions manifest themselves in parties and governments. Formal and informal institutions have, however, proved crucial in managing factionalism. This is especially true in Thailand’s emerging parliamentary democracy where the management of factionalism has become a major objective for Thai parties. This study explores factions and factionalism as well as how different types of parties try to manage intra-party dissension especially in the case of Thailand. The findings suggest that management style tends to be a function of a party’s organization, with parties which practice a collegial style tending to be the more successful in controlling intra-party cliques over time. At the same time, the most important tools which party leaderships can use to control factions are the careful use of constitutional provisions and manipulation of party finance.

  12. 11 CFR 109.37 - What is a “party coordinated communication”?

    Science.gov (United States)

    2010-01-01

    ... Provisions for Political Party Committees § 109.37 What is a “party coordinated communication”? (a) Definition. A political party communication is coordinated with a candidate, a candidate's authorized... paragraphs (a)(1), (a)(2), and (a)(3) of this section. (1) The communication is paid for by a political party...

  13. 25 CFR 11.906 - Rights of parties.

    Science.gov (United States)

    2010-04-01

    ... ORDER CODE Children's Court § 11.906 Rights of parties. (a) In all hearings and proceedings under §§ 11.900-11.1114 of this part the following rights will be observed unless modified by the particular... 25 Indians 1 2010-04-01 2010-04-01 false Rights of parties. 11.906 Section 11.906 Indians BUREAU...

  14. The 2014 Elections and the Brazilian Party System

    Directory of Open Access Journals (Sweden)

    Carlos Ranulfo Melo

    2015-04-01

    Full Text Available The Brazilian party system presents a paradox. Although the Workers Party (PT and the Brazilian Social Democratic Party (PSDB have controlled presidential elections for the last 20 years, their force at the other levels of electoral competition has not grown. The objective of this study is to undertake a discussion of this situation through the 2014 general elections. After attempting to explain why successive challengers have not been able to change the structure of competition for the Brazilian presidency, I will analyze the relation established between the pattern observed at this level and the other “connected” electoral disputes—both those for state executive and federal legislative office. The general conclusion is that even if the pattern continues, it is quite improbable that this will significantly impact the other levels of national political party competition.

  15. Third Party Liability governing Dangerous and Nuclear Activities

    International Nuclear Information System (INIS)

    Di Martino, Vittorio.

    1979-01-01

    The introductory chapters of this book analyse the concept of fault as a basis for third party liability and the evolution of jurisprudence and doctrine towards the concept of absolute liability. The following part covers the Italian system of liability for hazardous activities. The nuclear third party liability system is then analysed according to existing international conventions and nuclear legislation in several countries. The Appendix contains various legislative and regulatory texts on nuclear third party liability in Italy and in other countries which provide for special legislation in this field. (NEA) [fr

  16. Inequality and anti-globalization backlash by political parties

    NARCIS (Netherlands)

    Burgoon, B.

    2013-01-01

    Does income inequality increase political backlash against European and global integration? This paper reports research suggesting that it can. The article analyses party opposition to and support for trade openness, European Union integration and general internationalism of political party

  17. Sistema penal acusatorio en Veracruz/Adversarial criminal system in Veracruz

    Directory of Open Access Journals (Sweden)

    Jorge Alberto Pérez Tolentino (México

    2014-01-01

    Full Text Available El estudio y comprensión del nuevo Código de Procedimientos Penales de Veracruz resulta ineludible, en virtud de las nítidas diferencias existentes entre las figuras jurídicas que contiene el actual ordenamiento, en comparación con el anterior. Es preciso sistematizar, describir y analizar la estructura del sistema penal acusatorio, a efecto de estar en condiciones de evaluar y, en su caso, proponer las mejoras al sistema en cuestión. El contenido esquemático y sustancial del código, la visión y recepción que del mismo tienen los operadores jurídicos y la sociedad en general, son aspectos que cubre el presente documento. The study and understanding of the new Code of Criminal Procedure of Veracruz is unavoidable, by reason of the sharp differences between the legal concepts that contains the actual order, compared with the previous. Needs to be systematized, describe and analyze the structure of the adversarial criminal system, in order to be able to evaluate and, if necessary, propose improvements to the system in question. The schematic and substantial content of the code, viewing and welcome that the same have the legal practitioners and society in general, are aspects covered by herein.

  18. Role of political parties in the formation of civil society in Uzbekistan

    Directory of Open Access Journals (Sweden)

    Сирожжон Насипкулович Бердикулов

    2015-06-01

    Full Text Available The article considers the role of political parties in the development of civil society and the rule of law, as well as issues of political parties differ from other public organizations, the concept of a multi-party system, the importance of a multi-party system in ensuring political pluralism, inter-party competition, constructive opposition, the expression of the interests of the electorate, the space of political parties in parliament and local councils (soviets

  19. Overcoming the barrier of narrative adherence in conflicts through awareness of the psychological bias of naïve realism.

    Science.gov (United States)

    Nasie, Meytal; Bar-Tal, Daniel; Pliskin, Ruthie; Nahhas, Eman; Halperin, Eran

    2014-11-01

    One significant socio-psychological barrier for peaceful resolution of conflicts is each party's adherence to its own collective narrative. We hypothesized that raising awareness to the psychological bias of naïve realism and its identification in oneself would provide a path to overcoming this barrier, thus increasing openness to the adversary's narrative. We conducted three experimental studies in the context of the Israeli-Palestinian conflict. Studies 1 and 2, conducted among Jewish Israelis and Palestinian Israelis, respectively, revealed that participants with hawkish political ideology reported greater openness to the adversary's narrative when they were made aware of naïve realism bias. Study 3 revealed that hawkish participants at the baseline adhered to the ingroup narrative and resisted the adversary's narrative more than dovish participants. They were also more able to identify the bias in themselves upon learning about it. This identification may explain why the manipulation led to bias correction only among hawkish participants. © 2014 by the Society for Personality and Social Psychology, Inc.

  20. Third party bargaining and contract terms: a link over time?

    Science.gov (United States)

    Brooks, John M; Doucette, William R; Sorofman, Bernard A

    2002-01-01

    To evaluate whether prior pharmacy bargaining process strategies and pharmacy dependence on third parties affect the bargaining power of pharmacies in price negotiations with third parties. One-time survey. Random sample of 900 independent and small chain pharmacies in nine states: Colorado, Connecticut, Georgia, Kentucky, Minnesota, Oklahoma, Oregon, Pennsylvania, and Wisconsin. Two hundred sixteen of the returned surveys contained sufficient responses for this analysis. Survey data on pharmacy bargaining power and prior pharmacy bargaining strategies, pharmacy dependence, and market characteristics were analyzed using multiple regression in a previously developed and modified provider/third party bargaining model. Pharmacy bargaining power. Pharmacy bargaining power varied across our sample. Pharmacy bargaining power was positively related to whether a pharmacy previously bargained with the third parties, negatively related to prior requests for contract changes, and negatively related to the pharmacy's dependence on third parties in total. Pharmacy bargaining power is related to the bargaining strategies employed by pharmacies during the previous year and the dependence of pharmacies on third party payers in total. With the prevalence of "take-it-or-leave-it" contracts from third parties, prior pharmacy bargaining behavior may affect the initial terms of the contracts that pharmacies are offered.

  1. Évolution des partis politiques dans le monde arabe | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Orient et en Afrique du Nord subir diverses mutations. Le soutien dont bénéficiaient les partis nationalistes a diminué au profit des partis islamistes. Ce sont ces derniers qui sont désormais les plus dynamiques et les plus contestataires des partis ...

  2. Inequality and anti-globalization backlash by political parties

    NARCIS (Netherlands)

    Burgoon, B.

    2011-01-01

    Does inequality fuel anti-globalization backlash? This paper answers this question by analyzing how income inequality affects the embrace or eschew of globalization by political parties. It focuses on party opposition to and support for trade openness, European-Union integration, and general

  3. Creating A Nationwide Nonpartisan Initiative for Family Caregivers in Political Party Platforms.

    Science.gov (United States)

    Scribner, Ben; Lynn, Joanne; Walker, Victoria; Morgan, Les; Montgomery, Anne; Blair, Elizabeth; Baird, Davis; Goldschmidt, Barbara; Kirschenbaum, Naomi

    2017-06-01

    Policymakers have been slow to support family caregivers, and political agendas mostly fail to address the cost burdens, impact on employment and productivity, and other challenges in taking on long-term care tasks. This project set out to raise policymakers' awareness of family caregivers through proposals to Republican and Democratic party platforms during the 2016 political season. The Family Caregiver Platform Project (FCPP) reviewed the state party platform submission process for Democratic and Republican parties in all 50 states and the District of Columbia. We built a website to make each process understandable by caregiver advocates. We designed model submissions to help volunteers tailor a proposal and recruited caregiver advocates participating in their state process. Finally, we mobilized a ground operation in many states and followed the progress of submissions in each state, as well as the formation of the national platforms. In 39 states, at least one party, Republican or Democrat, hosted a state party platform process. As of September 2016 FCPP volunteers submitted proposals to 29 state parties in 22 states. Family caregiver language was added to eight state party platforms, one state party resolution, two bipartisan legislative resolutions, and one national party platform. The FCPP generated a non-partisan grassroots effort to educate and motivate policymakers to address caregiving issues and solutions. Democratic party leaders provided more opportunities to connect with political leaders, with seven Democratic parties and one Republican party, addressing family caregiver issues in their party platforms. © 2017, Copyright the Authors Journal compilation © 2017, The American Geriatrics Society.

  4. Political Parties and Popular Representation in Myanmar’s Democratisation Process

    Directory of Open Access Journals (Sweden)

    Kristian Stokke

    2015-01-01

    Full Text Available The article examines the role of political parties in Myanmar’s democratisation process. We argue that the substance of democratisation depends on popular representation through political parties but question their capacity to provide such representation. Examining capacity through the concept of party institutionalisation, we find that most parties have not been able to build effective organisational structures. However, we also find a degree of party institutionalisation in the form of rootedness in society. Political cleavages between those favouring authoritarian rule over democratic rule and Burman nationhood over ethnic notions of nationhood have produced divisions between state-centred parties associated with Myanmar’s authoritarian legacy and society-centred pro-democracy and ethnic parties. Although being less dichotomous than in the past, we argue that these cleavages continue to provide a basis for party identity and rootedness in society. We conclude that further development of political parties and popular representation will be shaped by the relations between parties, the state, and society – where individual parties are shaped according to their tendencies towards state-centred cartel parties or society-centred mass parties.

  5. Energy-political ideas of environmentalist parties in Western Europe

    International Nuclear Information System (INIS)

    Hrbek, R.

    1990-01-01

    By and large the green-alternative parties embrace the same energy policies: They reject nuclear energy, they demand a radically new approach to energy politics and they want to realise their programmes within a comprehensive restructuring of the political and economic order of the respective states. The reasons for this categorical NO to nuclear energy seen in its social and environmental compatibility. In the following we will explain how this type of party works and functions. The reasons for the formation of these parties and the profile of green-alternative parties on a national and international level are described in detail as well as the resonance in society and their chances of success in general. (orig./HSCH) [de

  6. The Effects of Sacred Value Networks Within an Evolutionary, Adversarial Game

    Science.gov (United States)

    McCalla, Scott G.; Short, Martin B.; Brantingham, P. Jeffrey

    2013-05-01

    The effects of personal relationships and shared ideologies on levels of crime and the formation of criminal coalitions are studied within the context of an adversarial, evolutionary game first introduced in Short et al. (Phys. Rev. E 82:066114, 2010). Here, we interpret these relationships as connections on a graph of N players. These connections are then used in a variety of ways to define each player's "sacred value network"—groups of individuals that are subject to special consideration or treatment by that player. We explore the effects on the dynamics of the system that these networks introduce, through various forms of protection from both victimization and punishment. Under local protection, these networks introduce a new fixed point within the game dynamics, which we find through a continuum approximation of the discrete game. Under more complicated, extended protection, we numerically observe the emergence of criminal coalitions, or "gangs". We also find that a high-crime steady state is much more frequent in the context of extended protection networks, in both the case of Erdős-Rényi and small world random graphs.

  7. 3D conditional generative adversarial networks for high-quality PET image estimation at low dose.

    Science.gov (United States)

    Wang, Yan; Yu, Biting; Wang, Lei; Zu, Chen; Lalush, David S; Lin, Weili; Wu, Xi; Zhou, Jiliu; Shen, Dinggang; Zhou, Luping

    2018-07-01

    Positron emission tomography (PET) is a widely used imaging modality, providing insight into both the biochemical and physiological processes of human body. Usually, a full dose radioactive tracer is required to obtain high-quality PET images for clinical needs. This inevitably raises concerns about potential health hazards. On the other hand, dose reduction may cause the increased noise in the reconstructed PET images, which impacts the image quality to a certain extent. In this paper, in order to reduce the radiation exposure while maintaining the high quality of PET images, we propose a novel method based on 3D conditional generative adversarial networks (3D c-GANs) to estimate the high-quality full-dose PET images from low-dose ones. Generative adversarial networks (GANs) include a generator network and a discriminator network which are trained simultaneously with the goal of one beating the other. Similar to GANs, in the proposed 3D c-GANs, we condition the model on an input low-dose PET image and generate a corresponding output full-dose PET image. Specifically, to render the same underlying information between the low-dose and full-dose PET images, a 3D U-net-like deep architecture which can combine hierarchical features by using skip connection is designed as the generator network to synthesize the full-dose image. In order to guarantee the synthesized PET image to be close to the real one, we take into account of the estimation error loss in addition to the discriminator feedback to train the generator network. Furthermore, a concatenated 3D c-GANs based progressive refinement scheme is also proposed to further improve the quality of estimated images. Validation was done on a real human brain dataset including both the normal subjects and the subjects diagnosed as mild cognitive impairment (MCI). Experimental results show that our proposed 3D c-GANs method outperforms the benchmark methods and achieves much better performance than the state

  8. 29 CFR 1425.6 - Use of third-party mediation assistance.

    Science.gov (United States)

    2010-07-01

    ... 29 Labor 4 2010-07-01 2010-07-01 false Use of third-party mediation assistance. 1425.6 Section 1425.6 Labor Regulations Relating to Labor (Continued) FEDERAL MEDIATION AND CONCILIATION SERVICE MEDIATION ASSISTANCE IN THE FEDERAL SERVICE § 1425.6 Use of third-party mediation assistance. If the parties...

  9. Two-party secret key distribution via a modified quantum secret sharing protocol.

    Science.gov (United States)

    Grice, W P; Evans, P G; Lawrie, B; Legré, M; Lougovski, P; Ray, W; Williams, B P; Qi, B; Smith, A M

    2015-03-23

    We present and demonstrate a novel protocol for distributing secret keys between two and only two parties based on N-party single-qubit Quantum Secret Sharing (QSS). We demonstrate our new protocol with N = 3 parties using phase-encoded photons. We show that any two out of N parties can build a secret key based on partial information from each other and with collaboration from the remaining N - 2 parties. Our implementation allows for an accessible transition between N-party QSS and arbitrary two party QKD without modification of hardware. In addition, our approach significantly reduces the number of resources such as single photon detectors, lasers and dark fiber connections needed to implement QKD.

  10. Effects and outcomes of third-party reproduction: parents.

    Science.gov (United States)

    Greenfeld, Dorothy A

    2015-09-01

    Third-party reproduction has introduced a host of changing family constellations. Research has shown that children conceived through third-party reproduction are doing well psychologically and developmentally, but what about their parents? How have they coped with the transition to third-party reproduction? Has the experience impacted their marital stability or the quality of their parenting? This review will address parents of children conceived through oocyte donation, parents of children conceived through gestational surrogacy, and gay male parents of children conceived through oocyte donation and gestational surrogacy. Copyright © 2015 American Society for Reproductive Medicine. Published by Elsevier Inc. All rights reserved.

  11. Political Party Financing and why it Matters in Tanzania | Walwa ...

    African Journals Online (AJOL)

    Among the key recommendations is that public funding for ongoing party activities and campaigns should be allocated by a mix of proportional rules and flat subsidies to all parties that meet reasonable thresholds and flat subsidies as refers here imply providing subsidies to all political parties on equal basis. The other key ...

  12. Crescent and Electoral Strength: Islamic Party Portrait of Reform Era In Indonesia

    Directory of Open Access Journals (Sweden)

    LILI ROMLI

    2013-12-01

    Full Text Available The establishment of Islamic political parties in the reform era in Indonesia after the fall of Suharto (1998, considered as resurgence of political stream. There are several factors that led to the revival of Islamic parties after the New Order, the theological factor, historical, sociological, and reform factor. The presence of Islamic political parties after the New Order was apparently diverse and fragmented. In the political elite of Islam itself in establishing a political party based on Islam and there is also based on nationality, and in establishing political party was using substantially approach and there is also that use formalistic approach. In the reform era elections, political Islam has failed, in which Islamic parties do not receive optimal support from voters Islam. The failure of Islamic parties in election of reform era is caused of factor among Muslims has been change the orientation of political views. Islamic parties in the reform era stuck in a political myth quantity, and Islamic parties are also fragmented and fractured in to small forces.

  13. Selfish third parties act as peacemakers by transforming conflicts and promoting cooperation.

    Science.gov (United States)

    Halevy, Nir; Halali, Eliran

    2015-06-02

    The tremendous costs of conflict have made humans resourceful not only at warfare but also at peacemaking. Although third parties have acted as peacemakers since the dawn of history, little is known about voluntary, informal third-party intervention in conflict. Here we introduce the Peacemaker Game, a novel experimental paradigm, to model and study the interdependence between disputants and third parties in conflict. In the game, two disputants choose whether to cooperate or compete and a third party chooses whether or not to intervene in the conflict. Intervention introduces side payments that transform the game disputants are playing; it also introduces risk for the third party by making it vulnerable to disputants' choices. Six experiments revealed three robust effects: (i) The mere possibility of third-party intervention significantly increases cooperation in interpersonal and intergroup conflicts; (ii) reducing the risk to third parties dramatically increases intervention rates, to everyone's benefit; and (iii) disputants' cooperation rates are consistently higher than third parties' intervention rates. These findings explain why, how, and when self-interested third parties facilitate peaceful conflict resolution.

  14. WMD Intent Identification and Interaction Analysis Using the Dark Web

    Science.gov (United States)

    2016-04-01

    understanding the intent and interaction patterns among adversarial parties. The basic research questions are grounded on computational linguistics ...relationships between the virtual and real measures. Research Hypotheses Based on the literature , several expectations were established regarding the...group’s geographic location, will have an influence on the 6 virtual behaviors of groups. Previous literature has suggested that certain social

  15. Mauritania: an authoritarian regime and the reconfiguration of the party system

    Directory of Open Access Journals (Sweden)

    Raquel Ojeda García

    2015-05-01

    Full Text Available This investigation raises the question of whether Mauritania should be considered an authoritarian regime. The explanatory variable used is not the only factor, but in Mauritania’s case it is one that has been given little attention. It is an analysis of the party system and its level of institutionalisation through five indicators: the social rooting of the parties; personalism and the profile of the leader; the level of volatility; the calling and participation of the opposition parties in the boycott of the elections and the ultimate acceptance by those parties of their results. It starts from the premise that representative democracy is built on a party political structure and draws conclusions about the low level of institutionalisation of the party system and the authoritarianism of the Mauritanian regime.

  16. Developing Product Lines with 3rd-party components

    NARCIS (Netherlands)

    De Jonge, M.

    2007-01-01

    The trends toward product line development and toward adopting more 3rd-party software are hard to combine. The reason is that productlines demand fine control over the software (e.g., for diversity management), while 3rd-party software (almost by definition) provides only little or no control. A

  17. Adversarial reasoning and resource allocation: the LG approach

    Science.gov (United States)

    Stilman, Boris; Yakhnis, Vladimir; Umanskiy, Oleg; Boyd, Ron

    2005-05-01

    Many existing automated tools purporting to model the intelligent enemy utilize a fixed battle plan for the enemy while using flexible decisions of human players for the friendly side. According to the Naval Studies Board, "It is an open secret and a point of distress ... that too much of the substantive content of such M&S has its origin in anecdote, ..., or a narrow construction tied to stereotypical current practices of 'doctrinally correct behavior.'" Clearly, such runs lack objectivity by being heavily skewed in favor of the friendly forces. Presently, the military branches employ a variety of game-based simulators and synthetic environments, with manual (i.e., user-based) decision-making, for training and other purposes. However, without an ability to automatically generate the best strategies, tactics, and COA, the games serve mostly to display the current situation rather than form a basis for automated decision-making and effective training. We solve the problem of adversarial reasoning as a gaming problem employing Linguistic Geometry (LG), a new type of game theory demonstrating significant increase in size in gaming problems solvable in real and near-real time. It appears to be a viable approach for solving such practical problems as mission planning and battle management. Essentially, LG may be structured into two layers: game construction and game solving. Game construction includes construction of a game called an LG hypergame based on a hierarchy of Abstract Board Games (ABG). Game solving includes resource allocation for constructing an advantageous initial game state and strategy generation to reach a desirable final game state in the course of the game.

  18. VIGAN: Missing View Imputation with Generative Adversarial Networks.

    Science.gov (United States)

    Shang, Chao; Palmer, Aaron; Sun, Jiangwen; Chen, Ko-Shin; Lu, Jin; Bi, Jinbo

    2017-01-01

    In an era when big data are becoming the norm, there is less concern with the quantity but more with the quality and completeness of the data. In many disciplines, data are collected from heterogeneous sources, resulting in multi-view or multi-modal datasets. The missing data problem has been challenging to address in multi-view data analysis. Especially, when certain samples miss an entire view of data, it creates the missing view problem. Classic multiple imputations or matrix completion methods are hardly effective here when no information can be based on in the specific view to impute data for such samples. The commonly-used simple method of removing samples with a missing view can dramatically reduce sample size, thus diminishing the statistical power of a subsequent analysis. In this paper, we propose a novel approach for view imputation via generative adversarial networks (GANs), which we name by VIGAN. This approach first treats each view as a separate domain and identifies domain-to-domain mappings via a GAN using randomly-sampled data from each view, and then employs a multi-modal denoising autoencoder (DAE) to reconstruct the missing view from the GAN outputs based on paired data across the views. Then, by optimizing the GAN and DAE jointly, our model enables the knowledge integration for domain mappings and view correspondences to effectively recover the missing view. Empirical results on benchmark datasets validate the VIGAN approach by comparing against the state of the art. The evaluation of VIGAN in a genetic study of substance use disorders further proves the effectiveness and usability of this approach in life science.

  19. Peoples Democratic Party in the Fourth Republic of Nigeria

    Directory of Open Access Journals (Sweden)

    Aliyu Mukhtar Katsina

    2016-06-01

    Full Text Available Their nature and functions make political parties central to democratic governance especially in the new democracies of Africa that face the challenge of building strong and enduring democratic institutions. It is accepted that the existing trend in most of these democracies of one big party dominating the political space weakens democracy and undermines its prospects for consolidation. Big parties—usually the ruling ones—exhibit tendencies such as absence of internal democracy that are antithetical to democratic governance. While observations such as these are incontestable, there is little understanding into the nature, character, ideology, and internal structure of big parties generally. In this article, I attempt to address this concern. Specifically, I examine the nature, structure, and ideology of the Peoples Democratic Party (PDP, Nigeria’s ruling party at the federal level with considerable strength at local level between 1999 and 2015. Relying on data obtained from multiple sources, I investigate the process of its formation, the nature of its ideology, internal organization, its electoral strength, and how absence of internal democracy contributed significantly to its defeat in 2015 general elections.

  20. Secure Two-Party Computation with Low Communication

    DEFF Research Database (Denmark)

    Damgård, Ivan Bjerre; Kölker, Jonas; Faust, Sebastian

    2012-01-01

    We propose a 2-party UC-secure protocol that can compute any function securely. The protocol requires only two messages, communication that is poly-logarithmic in the size of the circuit description of the function, and the workload for one of the parties is also only poly-logarithmic in the size...... on the knowledge of exponent in an RSA group, and build succinct zero-knowledge arguments in the CRS model....

  1. Asynchronous Multi-Party Computation with Quadratic Communication

    DEFF Research Database (Denmark)

    Hirt, Martin; Nielsen, Jesper Buus; Przydatek, Bartosz

    2008-01-01

    We present an efficient protocol for secure multi-party computation in the asynchronous model with optimal resilience. For n parties, up to t < n/3 of them being corrupted, and security parameter κ, a circuit with c gates can be securely computed with communication complexity O(cn^2k) bits, which...... circuit randomization due to Beaver (Crypto’91), and an abstraction of certificates, which can be of independent interest....

  2. Moral emotions as determinants of third-party punishment

    Directory of Open Access Journals (Sweden)

    Rob M. A. Nelissen

    2009-12-01

    Full Text Available Third-party punishment has recently received attention as an explanation for human altruism. Feelings of anger in response to norm violations are assumed to motivate third-party sanctions, yet there is only sparse and indirect support for this idea. We investigated the impact of both anger and guilt feelings on third-party sanctions. In two studies both emotions were independently manipulated. Results show that anger and guilt independently constitute sufficient but not necessary causes of punishment. Low levels of punishment are observed only when neither emotion is elicited. We discuss the implications of these findings for the functions of altruistic sanctions.

  3. Nationalism, territory and extremism in party politics

    DEFF Research Database (Denmark)

    Bourne, Angela

    In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army. More specifica......In the paper I address the empirical puzzle arising from different responses by political authorities in Spain and the UK to the existence of political parties integrated in the terrorist groups Euskadi Ta Askatasuna (ETA, Basque Homeland and Freedom) and the Irish Republican Army. More...... for realization of free speech rights and representation is also emphasized, and where proscription is seen as inimical to resolution of conflict underpinning violence. In the context of party competition, a winning coalition is required for one discourse to predominate. However, I also argued that both ideas...

  4. Recent tendency of Nuclear Third Party Legislation

    International Nuclear Information System (INIS)

    Gohara, Fumiaki

    1988-01-01

    Nuclear accidents in Three Mile Island and Chernobyl have a great influence on Nuclear Third Party Legislation of many countries. Nuclear Third Party Law of Japan is due to expire as at 31st, December, 1989, under the recent circumstances in which threre exist pros and cons to nuclear installations among people. This report describes the outline of Japanese Nuclear Law compared with foreign ones and the prospect of its revision. (author)

  5. Immigration politics Italian style: the paradoxical behaviour of mainstream and populist parties.

    Science.gov (United States)

    Perlmutter, T

    1996-01-01

    This article explores the role of electoral politics in managing immigration as a policy option in Italy. Italy was late in passing its first comprehensive immigration legislation (1990). A small, liberal party waged a campaign against the proposed immigration law. A party known for right-wing posturing did not mobilize against the law. These political postures were not anticipated by conventional wisdom. Conventional wisdom suggests that immigration should not be an electoral issue and that consensus solutions should be sought. It is argued that the Italian response supports the view that in a fragmented, multi-party system, minor parties will be more likely to mobilize. Two mass media studies were used as the basis for this article's analysis. The studies provide detailed evidence on party willingness to publicly discuss immigration and the ways the issues are framed. The Italian case illustrates the tendency for mainstream, pro-system parties to politicize the issue and extremist, anti-system parties to depoliticize it. The DC and PCI, as mass parties, behaved traditionally and supported moderately open immigration policies, but in closed forums. The minor parties had a stake in shifting electoral support, so the PSI took an outspoken stand and the PARI publicized its exclusion from the policy-making process and its support for more restrictive policies. It was the constituencies and the leadership structure that facilitated these strategies. The author differs from Betz's party analysis by arguing that party ideology may not be a useful guide for predicting stands on immigration, and that it is difficult to generalize about immigration.

  6. Tracing the territorial dynamics of party fragmentation in Mexico (1991-2015

    Directory of Open Access Journals (Sweden)

    Willibald SONNLEITNER

    2017-06-01

    Full Text Available Over the past decades, Mexican politics evolved from a closed, corporative and hegemonic-party authoritarianism, towards a more plural and competitive multi-party system. In the nineties, three relevant parties structured electoral politics. But this system soon fragmented and reached an average of 5.6 effective parties in 2015. What causes and drives political and partisan fragmentation in Mexico? Which have been the main temporal and territorial dynamics? How did they reshape Mexico’s electoral geography?

  7. FORMATION OF THE ENTITY'S ACCOUNTING POLICIES WITH REGARD TO RELATED PARTIES

    Directory of Open Access Journals (Sweden)

    B. Zasadnyi

    2015-10-01

    Full Text Available The article solved the problem concerning the development and practical application of accounting policies with regards to related parties. One element of the company’s accounting policies is to establish the principles of classification of related parties and their list considering materiality relations. In addition, the company must determine its related entities for the purposes of transfer pricing. Based the criteria definition and classification of related parties, proposed that the significance of the impact of one party to another based on the content of operations, their volume, the results and how such operations significantly affect the financial, investment and commercial activities. Only an analysis of all the factors together contribute to reliable estimates list of related parties. The critical analysis are made of methods for determining transfer prices for transactions, designed piece order of accounting policies, which reflected information about related parties.

  8. The Party-state Order

    DEFF Research Database (Denmark)

    Grünberg, Nis

    society through its legacy as a socialist work unit (danwei). Using Polanyi’s concept of embeddedness, the paper reveals how SOEs are split into two tiers each tasked with the respective objectives of economic development and political stability, and thus as Party-state organizations are used to flexibly...

  9. New Swiss legislation on nuclear third party liability

    International Nuclear Information System (INIS)

    Fischer, U.

    1981-10-01

    Following a description of the Paris Convention and Brussels Supplementary Convention system for nuclear third party liability and that prevailing until now in Switzerland, the paper reviews the new Swiss nuclear third party liability Bill prepared after a popular consultation. The new provisions are analysed and in particular, that providing for unlimited liability. (NEA) [fr

  10. Motive attribution asymmetry for love vs. hate drives intractable conflict.

    Science.gov (United States)

    Waytz, Adam; Young, Liane L; Ginges, Jeremy

    2014-11-04

    Five studies across cultures involving 661 American Democrats and Republicans, 995 Israelis, and 1,266 Palestinians provide previously unidentified evidence of a fundamental bias, what we term the "motive attribution asymmetry," driving seemingly intractable human conflict. These studies show that in political and ethnoreligious intergroup conflict, adversaries tend to attribute their own group's aggression to ingroup love more than outgroup hate and to attribute their outgroup's aggression to outgroup hate more than ingroup love. Study 1 demonstrates that American Democrats and Republicans attribute their own party's involvement in conflict to ingroup love more than outgroup hate but attribute the opposing party's involvement to outgroup hate more than ingroup love. Studies 2 and 3 demonstrate this biased attributional pattern for Israelis and Palestinians evaluating their own group and the opposing group's involvement in the current regional conflict. Study 4 demonstrates in an Israeli population that this bias increases beliefs and intentions associated with conflict intractability toward Palestinians. Finally, study 5 demonstrates, in the context of American political conflict, that offering Democrats and Republicans financial incentives for accuracy in evaluating the opposing party can mitigate this bias and its consequences. Although people find it difficult to explain their adversaries' actions in terms of love and affiliation, we suggest that recognizing this attributional bias and how to reduce it can contribute to reducing human conflict on a global scale.

  11. Imitating the newcomer. How, when and why established political parties imitate the policy positions and issue attention of new political parties in the electoral and parliamentary arena : the case of the Netherlands

    NARCIS (Netherlands)

    Otjes, Simon Pieter

    2012-01-01

    This thesis studies, how, when and why established political parties imitate new political parties. It examines new party effects on both the policy positions of established parties and the attention established political parties spend on issues. It examines this effect in both the electoral and

  12. Manipulating Morality: Third-Party Intentions Alter Moral Judgments by Changing Causal Reasoning.

    Science.gov (United States)

    Phillips, Jonathan; Shaw, Alex

    2015-08-01

    The present studies investigate how the intentions of third parties influence judgments of moral responsibility for other agents who commit immoral acts. Using cases in which an agent acts under some situational constraint brought about by a third party, we ask whether the agent is blamed less for the immoral act when the third party intended for that act to occur. Study 1 demonstrates that third-party intentions do influence judgments of blame. Study 2 finds that third-party intentions only influence moral judgments when the agent's actions precisely match the third party's intention. Study 3 shows that this effect arises from changes in participants' causal perception that the third party was controlling the agent. Studies 4 and 5, respectively, show that the effect cannot be explained by changes in the distribution of blame or perceived differences in situational constraint faced by the agent. © 2014 Cognitive Science Society, Inc.

  13. Party policy position of Die Linke. A continuation of the PDS?

    NARCIS (Netherlands)

    Coffé, H.R.; Plassa, R.

    2010-01-01

    In 2007, the German party Die Linke emerged as the result of the PDS (Party of Democratic Socialism; the successor of the Communist Party) merging with the WASG (Wahlalternative Arbeit und Soziale Gerechtigkeit; a break away left wing of the Social Democrats). This article compares the policy

  14. When does familiarity promote versus undermine interpersonal attraction? A proposed integrative model from erstwhile adversaries.

    Science.gov (United States)

    Finkel, Eli J; Norton, Michael I; Reis, Harry T; Ariely, Dan; Caprariello, Peter A; Eastwick, Paul W; Frost, Jeana H; Maniaci, Michael R

    2015-01-01

    This article began as an adversarial collaboration between two groups of researchers with competing views on a longstanding question: Does familiarity promote or undermine interpersonal attraction? As we explored our respective positions, it became clear that the limitations of our conceptualizations of the familiarity-attraction link, as well as the limitations of prior research, were masking a set of higher order principles capable of integrating these diverse conceptualizations. This realization led us to adopt a broader perspective, which focuses on three distinct relationship stages-awareness, surface contact, and mutuality-and suggests that the influence of familiarity on attraction depends on both the nature and the stage of the relationship between perceivers and targets. This article introduces the framework that emerged from our discussions and suggests directions for research to investigate its validity. © The Author(s) 2014.

  15. the doctrine of party autonomy in international commercial arbitration

    African Journals Online (AJOL)

    RAYAN_

    provoke discussions in many fora on the applicability of party autonomy in international ... questions, this article analyses the principle of party autonomy. The ultimate aim of .... 12 Odoe, (n 1) 48; English Arbitration Act 1996 s 6. 13 Odoe ibid ...

  16. The Finns Party: Euroscepticism, Euro Crisis, Populism and the Media

    Directory of Open Access Journals (Sweden)

    Juha Herkman

    2017-03-01

    Full Text Available In many European countries, populist right-wing parties have been most noticeable representatives of Euroscepticism. In Finland, the Finns Party (Perussuomalaiset has been a constant promoter of organisational Euroscepticism through its leader, Timo Soini. The party broke through in Finland’s ‘big bang elections’ of 2011, when the most debated issue was the European economic crisis, which was dominated by Eurosceptic Soini. Research concerning the relationship between the media, populism and Euroscepticism usually focus on national or European Parliament elections. This study analyses the media portrayal of the Eurosceptic Finns Party during times other than elections, focusing on the Finland’s overall Euro crisis press coverage in 2010–2012. The analysis shows that the populist Finns Party has been a minor player in that coverage, which was dominated by the Euro positive political and economic elites. Differences between newspapers indicate that journalistic routines and political context direct media coverage toward particular framings, even when the media proclaims itself politically independent and neutral.

  17. Trends in nuclear third party liability law

    International Nuclear Information System (INIS)

    Avossa, G.

    1992-01-01

    For some ten years now, nuclear third-party liability has been changing at an ever-faster pace, further accelerated by the Chernobyl catastrophe. Some of these changes are discussed in this article. A joint protocol drawn up by the International Atomic Energy Agency (IAEA) and the Nuclear Energy Agency (NEA) mutually extends the benefit of the special third-party liability system regarding nuclear damage instituted by virtue of previous Conventions and settles the conflicts of law likely to result from the simultaneous application of the two international instruments. Within the framework of the IAEA, a review procedure of the Convention of Vienna has been underway since 1989, in which the NEA has taken an integral part. At the outcome of the process underway, not only will the Convention of Vienna be revised, but so, indirectly but very rapidly, will the Conventions of Paris and Brussels. Ultimately, the entire field of nuclear third-party liability will be recast for decades to come. The texts under discussion are as yet nowhere near their final stage but two areas of consideration have already emerged, which will be discussed. Substantial modifications are made in nuclear third-party liability law. Secondly, the indemnification process for nuclear damage will be vastly modified, due to the subsidiary nature of government intervention and new obligations on operators to become members of a Nuclear Operator Pool. (author)

  18. A novel quantum scheme for secure two-party distance computation

    Science.gov (United States)

    Peng, Zhen-wan; Shi, Run-hua; Zhong, Hong; Cui, Jie; Zhang, Shun

    2017-12-01

    Secure multiparty computational geometry is an essential field of secure multiparty computation, which computes a computation geometric problem without revealing any private information of each party. Secure two-party distance computation is a primitive of secure multiparty computational geometry, which computes the distance between two points without revealing each point's location information (i.e., coordinate). Secure two-party distance computation has potential applications with high secure requirements in military, business, engineering and so on. In this paper, we present a quantum solution to secure two-party distance computation by subtly using quantum private query. Compared to the classical related protocols, our quantum protocol can ensure higher security and better privacy protection because of the physical principle of quantum mechanics.

  19. Password-only authenticated three-party key exchange proven secure against insider dictionary attacks.

    Science.gov (United States)

    Nam, Junghyun; Choo, Kim-Kwang Raymond; Paik, Juryon; Won, Dongho

    2014-01-01

    While a number of protocols for password-only authenticated key exchange (PAKE) in the 3-party setting have been proposed, it still remains a challenging task to prove the security of a 3-party PAKE protocol against insider dictionary attacks. To the best of our knowledge, there is no 3-party PAKE protocol that carries a formal proof, or even definition, of security against insider dictionary attacks. In this paper, we present the first 3-party PAKE protocol proven secure against both online and offline dictionary attacks as well as insider and outsider dictionary attacks. Our construct can be viewed as a protocol compiler that transforms any 2-party PAKE protocol into a 3-party PAKE protocol with 2 additional rounds of communication. We also present a simple and intuitive approach of formally modelling dictionary attacks in the password-only 3-party setting, which significantly reduces the complexity of proving the security of 3-party PAKE protocols against dictionary attacks. In addition, we investigate the security of the well-known 3-party PAKE protocol, called GPAKE, due to Abdalla et al. (2005, 2006), and demonstrate that the security of GPAKE against online dictionary attacks depends heavily on the composition of its two building blocks, namely a 2-party PAKE protocol and a 3-party key distribution protocol.

  20. Highs and lows: patterns of use, positive and negative effects of benzylpiperazine-containing party pills (BZP-party pills) amongst young people in New Zealand.

    Science.gov (United States)

    Butler, Rachael A; Sheridan, Janie L

    2007-11-19

    This study aimed to investigate patterns and context of use of BZP-party pills, function of use, and positive and negative effects experienced by a sample of New Zealand young people who had used the products. A qualitative study comprised of semi-structured interviews and group discussions. The sample included 58 young people aged 17-23 years who had used BZP-party pills in the previous 12 months. Young people were using these substances in a range of settings--primarily during weekend social occasions--particularly as part of the dance party culture. They were mostly used for their stimulant properties and to enhance socialisation, and were often taken in combination with other legal and illicit drugs. Young people had suffered a range of physical and emotional negative effects, although none of these was reported as being life-threatening or long-term. Many participants had reduced the frequency with which they used BZP-party pills due to adverse effects. Potentially risky behaviours identified included taking large doses, mixing BZP-party pills with alcohol and other substances, and driving whilst under the influence of BZP-party pills. Findings suggest that young people in this study were not suffering excessive or dangerous adverse effects. However, potentially risky use of these products raises the issue of the need for developing harm reduction interventions.

  1. Political Parties and the Institutionalization of Education: A Comparative Analysis of Party Manifestos

    Science.gov (United States)

    Jakobi, Anja P.

    2011-01-01

    Education has been featured prominently in recent election campaigns in different countries. This article explains this observation by the idea of a world culture and the global institutionalization of education. It compares party manifestors of 25 OECD countries from 1946 onward, analyzing how education developed in election campaigns over time…

  2. Jewish problem in the Polish Communist Party

    Directory of Open Access Journals (Sweden)

    Cimek Henryk

    2016-12-01

    Full Text Available Jews accounted for approx. 8-10% of the population of the Second Republic and in the communist movement (Polish Communist Party and Polish Communist Youth Union the rate was approx, 30%, while in subsequent years it much fluctuated. The percentage of Jews was the highest in the authorities of the party and in the KZMP. This had a negative impact on the position of the KPP on many issues, especially in its relation to the Second Republic.

  3. THE THIRD PARTY CERTIFICATION SYSTEM FOR ORGANIC PRODUCTS

    Directory of Open Access Journals (Sweden)

    Adina-Roxana MUNTEANU

    2015-12-01

    Full Text Available In the context of an increasing organic trade worldwide, the organic standards and the certification of the organic practices are ever more important and relevant for both business and consumers. The certification by third parties of the organic operators is meant to ensure the application of an organic standard. However, the documented fraud cases are proof that the current system can undergo further improvement. The current paper gives an overview of the mechanisms of certification and inspection worldwide and discusses the issues raised by third party certification of the organic operators in the European context. Moreover, the paper reviews the major arguments for the effectiveness of the third party certification and also points to the improvement possibilities of the systems.

  4. Multi-party arbitration in international trade: problems and solutions

    DEFF Research Database (Denmark)

    Siig, Kristina

    2007-01-01

    Legal disputes regarding international trade frequently involve more than two parties. This leads to problems, as the preferred means of dispute resolution within international trade - arbitration - tends to be ill-equipped to handle such disputes. The topic of the paper is arbitration as a means...... of dispute resolution in a multy-party set-up. Both the possible legal bases and the problems encountered are considere. It is concluded that arbitration is still the only real option to the parties in international business disputes and that many of the shortcomings  may be contered by skilful drafting...

  5. Billing third party payers for pharmaceutical care services.

    Science.gov (United States)

    Poirier, S; Buffington, D E; Memoli, G A

    1999-01-01

    To describe the steps pharmacists must complete when seeking compensation from third party payers for pharmaceutical care services. Government publications; professional publications, including manuals and newsletters; authors' personal experience. Pharmacists in increasing numbers are meeting with success in getting reimbursed by third party payers for patient care activities. However, many pharmacists remain reluctant to seek compensation because they do not understand the steps involved. Preparatory steps include obtaining a provider/supplier number, procuring appropriate claim forms, developing data collection and documentation systems, establishing professional fees, creating a marketing plan, and developing an accounting system. To bill for specific patient care services, pharmacists need to collect the patient's insurance information, obtain a statement of medical necessity from the patient's physician, complete the appropriate claim form accurately, and submit the claim with supporting documentation to the insurer. Although many claims from pharmacists are rejected initially, pharmacists who work with third party payers to understand the reasons for denial of payment often receive compensation when claims are resubmitted. Pharmacists who follow these guidelines for billing third party payers for pharmaceutical care services should notice an increase in the number of paid claims.

  6. The Puzzle of Democratic Monopolies: Single Party Dominance and Decline in India

    OpenAIRE

    Dasgupta, Aditya

    2016-01-01

    How to explain political monopolies in democratic institutional settings? Dominant parties in countries with robust formal democratic institutions are surprisingly frequent, yet poorly understood. Existing theories explain away the puzzle by characterizing dominant parties as `catch-all' parties that survive on the basis of historically imbued mass voter legitimacy. This dissertation develops a theory of how dominant parties in fact routinely win free and fair elections despite counter-majori...

  7. Partis politiques et médias en Grande-Bretagne : entre rivalité et complicité Political Parties and Media in Great Britain Rivals or Partners ?

    Directory of Open Access Journals (Sweden)

    Karine Rivière De Franco

    2005-01-01

    Full Text Available During the weeks preceding a General Election, British political parties try to convince the electorate to vote for them, but given the limited degree of direct communication, the parties need the media to transmit their messages. Their relationships are complex and behind an apparent antagonism, a real partnership sometimes develops. Indeed, political parties endeavour to influence the media in order to benefit from positive coverage, by resorting to political marketing, by hiring advisers, by giving the media the type of news that they need and by controlling press conferences and press releases. The media do not accept this manipulation and react by making independent political choices, by finding other sources of political news or by revealing the methods used by the political parties to convince voters. In other circumstances, the political parties and the media become partners, since the media enable the parties to transmit their messages without any external modification through electoral broadcasts and advertisements and sometimes they even take an active part in the parties’ electoral campaigns. Even if the political parties and the media need each other, they use and manipulate each other. During electoral campaigns, these relationships are not to be neglected because they can either facilitate or hinder the persuasion of the electorate.

  8. Corporate Governance and Related Parties Transactions - Evidence from Romanian Listed Companies

    Directory of Open Access Journals (Sweden)

    Iuliana Oana MIHAI

    2017-06-01

    Full Text Available The objective of this work is to offer contributions to improve the understanding of related party transactions. Our goal is to explore the role of related party transactions from the perspective of company�s corporate governance environment. Even though there is a growing interest in related party transactions, there is little academic literature to understand the nature of related party transactions and their economic consequences. Our study was conducted on a sample of 40 companies listed companies on Bucharest Stock Exchange activating in manuafacuring sector. Our objective was to analyse the way the companies follow the requirements of transparency of related party transaction. Based on our observations on companies� financial reports and companies web-sites, the level of transparency between these companies was reflected by an index estimated from producers� scores on Likert-type scales (one to five that showed to what extent they disclose or not disclose information such as relationship between parents and subsidiaries, key management personnel compensation, the value of transactions with related parties or separate disclosure for the group entities.

  9. Third party liability insurance for international transport of nuclear substances in countries party to the Paris Convention

    International Nuclear Information System (INIS)

    Lacroix, F.

    1977-01-01

    The number of international transports of radioactive materials has been increasing at an accelerating rate for several years. These transports are subject to specific safety rules which must be complied with in order to obtain nuclear third party liability cover. In general nuclear transports are insured under a policy which differs from that for installations. Transport policy criteria have been harmonized to some extent, in particular, in the frame of the OECD Nuclear Energy Agency. Certificates established by the competent national authorities testifying to the existence of insurance must in principle be approved by the countries crossed which are parties to the Paris Convention. (NEA) [fr

  10. Supreme matters: tea parties and the activism of restraint

    NARCIS (Netherlands)

    Kurzbauer, H.

    2010-01-01

    An essay on the impact of Tea Parties on the appointment of Supreme Court Justices. According to recently released statistics, one-fifth of all US citizens are Tea Party Supporters: predominately white conservatives convinced of the 'evils' of the Obama administration. Taking their cue from the

  11. ISLAMIC PARTIES AND THE POLITICS OF CONSTITUTIONALISM IN INDONESIA

    Directory of Open Access Journals (Sweden)

    Mukrimin Mukrimin

    2012-12-01

    Full Text Available This article examines the relationship between religion and the state in Indonesia by exploring how Islam is used by political parties to shape the politics. The study shows that Islamic politics is a complementary in both nationhood and statehood in Indonesia. From the early days of the new-born nation-state, Muslims in Indonesia had played significant role in shaping the nation; nonetheless, they have never dominated the political power. Fragmentation among Muslims themselves and internal political parties is among the reason why religious (Islamic parties failed in bringing religious identity to the state arena. Political subordination-inclusion-ignorance-confrontation is the circular game that features Islamic politics in Indonesia. The debatable issue on shari‘ah law, which is frequently used by Islamic parties, always becomes the core problem of the relation between Islam and the state. Even though Islam has played an important role in colouring the Indonesian politics, its existence remains complementary.

  12. The Differentiation of Parties through the Lens of an Electoral Campaign

    Directory of Open Access Journals (Sweden)

    Rossana Sampugnaro

    2015-03-01

    Full Text Available Parties restructure their organizations to prepare themselves for new challenges. In many cases, the changes involve a reduction of the subsystems structure, dropping the number of territorial units or finding leaner solutions and outsourcing of activities which were once fulfilled within the boundaries of the party organization. Specifically, the phenomenon of outsourcing concerns, on the one hand, aggregation of interests and policymaking and, on the other, electoral mobilization and management of political communication. Looking for new solutions – flexible, without a unique centre – can lead to a process of de-differentiation that characterizes organization in postmodern society: a new definition of levels of hierarchy and "transgression of boundaries", through a continuous exchange of resources with the environment, which is unpredictable and constantly changing. As in other organizations, parties en-courage the formation of horizontal links with new external actors - associations, informal groups, indi-viduals and influencers - in order to build networks that cooperate to exchange essential resources for the party itself. In this framework, the study aims to interpret de-differentiation in political parties from a specific point of view: the analysis of political campaigns as indicators of this process. The “outside campaign”, created by a set of non-party actors, is growing: the sector of organized interests, that, unlike in the past, is "de-aligned" from the political parties and does not respond to traditional socio-political cleavage, is present in parties and candidates’ campaigns with greater resources than was the case formerly.

  13. Choosing memories? Russian political parties as actors of historical policy

    Directory of Open Access Journals (Sweden)

    Anikin Daniil Alexandrovich

    2017-12-01

    Full Text Available The article takes an attempt to analyse the transformation of relations between the state power and political parties in Russia within the framework of implementation the politics of memory. On the basis of the content analysis, the article analyses the specifics of using the images of the past in the activities of the 7th State Duma’s political parties: mentioning the historical periods, frequency of mentions, the function of a statement containing positive, neutral or critical assessments of the past, the theme of the continuity of historical experience of the Russian statehood, ways of implementation of some elements of the politics of memory. To sum up, the stumbling block for the main parliamentary parties becomes the Soviet past concerning which there are only separate points of correlation of all political forces. Today we can talk about the process set by the parties to develop the systematic strategies for comprehending the past. The article also analyses the history of the political parties in the context of the politics of memory.

  14. Risk based approach and interactions between interested parties in ...

    African Journals Online (AJOL)

    pc

    2018-03-05

    Mar 5, 2018 ... interested parties in QSE management systems. Hanae DAHMAN EL ... relevant interested parties participating in the logistics chain and who contribute to the ... huge logistic crossroads of loads and flows: supply of aircraft in kerosene, ... Swissport which represents the global supplier of services to the ...

  15. 16 CFR 240.13 - Customer's and third party liability.

    Science.gov (United States)

    2010-01-01

    ... 16 Commercial Practices 1 2010-01-01 2010-01-01 false Customer's and third party liability. 240.13 Section 240.13 Commercial Practices FEDERAL TRADE COMMISSION GUIDES AND TRADE PRACTICE RULES GUIDES FOR ADVERTISING ALLOWANCES AND OTHER MERCHANDISING PAYMENTS AND SERVICES § 240.13 Customer's and third party...

  16. Reflexive intergroup bias in third-party punishment.

    Science.gov (United States)

    Yudkin, Daniel A; Rothmund, Tobias; Twardawski, Mathias; Thalla, Natasha; Van Bavel, Jay J

    2016-11-01

    Humans show a rare tendency to punish norm-violators who have not harmed them directly-a behavior known as third-party punishment. Research has found that third-party punishment is subject to intergroup bias, whereby people punish members of the out-group more severely than the in-group. Although the prevalence of this behavior is well-documented, the psychological processes underlying it remain largely unexplored. Some work suggests that it stems from people's inherent predisposition to form alliances with in-group members and aggress against out-group members. This implies that people will show reflexive intergroup bias in third-party punishment, favoring in-group over out-group members especially when their capacity for deliberation is impaired. Here we test this hypothesis directly, examining whether intergroup bias in third-party punishment emerges from reflexive, as opposed to deliberative, components of moral cognition. In 3 experiments, utilizing a simulated economic game, we varied participants' group relationship to a transgressor, measured or manipulated the extent to which they relied on reflexive or deliberative judgment, and observed people's punishment decisions. Across group-membership manipulations (American football teams, nationalities, and baseball teams) and 2 assessments of reflexive judgment (response time and cognitive load), reflexive judgment heightened intergroup bias, suggesting that such bias in punishment is inherent to human moral cognition. We discuss the implications of these studies for theories of punishment, cooperation, social behavior, and legal practice. (PsycINFO Database Record (c) 2016 APA, all rights reserved).

  17. Political party affiliation, political ideology and mortality.

    Science.gov (United States)

    Pabayo, Roman; Kawachi, Ichiro; Muennig, Peter

    2015-05-01

    Ecological and cross-sectional studies have indicated that conservative political ideology is associated with better health. Longitudinal analyses of mortality are needed because subjective assessments of ideology may confound subjective assessments of health, particularly in cross-sectional analyses. Data were derived from the 2008 General Social Survey-National Death Index data set. Cox proportional analysis models were used to determine whether political party affiliation or political ideology was associated with time to death. Also, we attempted to identify whether self-reported happiness and self-rated health acted as mediators between political beliefs and time to death. In this analysis of 32,830 participants and a total follow-up time of 498,845 person-years, we find that political party affiliation and political ideology are associated with mortality. However, with the exception of independents (adjusted HR (AHR)=0.93, 95% CI 0.90 to 0.97), political party differences are explained by the participants' underlying sociodemographic characteristics. With respect to ideology, conservatives (AHR=1.06, 95% CI 1.01 to 1.12) and moderates (AHR=1.06, 95% CI 1.01 to 1.11) are at greater risk for mortality during follow-up than liberals. Political party affiliation and political ideology appear to be different predictors of mortality. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted under a licence) please go to http://group.bmj.com/group/rights-licensing/permissions.

  18. Parties at the convention of the United Nations on climatic change and second meeting of the parties to the Kyoto protocol; Parties a la convention-cadre des Nations-Unies sur les changements climatiques et seconde reunion des parties au Protocole de Kyoto

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2006-07-01

    Kenya hosted the second meeting of the Parties to the Kyoto Protocol in conjunction with the twelfth session of the conference of the Parties to the climatic change convention, in Nairobi from 6 to 17 November 2006. This document presents in a first part the key areas discussed at Nairobi; in a second part the international framework with the consequences of the Kyoto protocol implementation; and in the last part the demonstrable progresses of the France in the policy effects, tendencies concerning the greenhouse gases and the respect of the commitments. (A.L.B.)

  19. Means of discourse manipulations in political party programs in Spain

    Directory of Open Access Journals (Sweden)

    Irina V. Smirnova

    2014-01-01

    Full Text Available Thanks to different mass media sources, members of any society are well aware of political developments and events and politicians. Every person has his or her own formed political beliefs and affirmations, interpreters other people's actions during political developments and evaluates events that take place. Political forces, in turn, see a person (a potential elector as an object of external information influence. This lets them use political communication when competing for the power. In the modern democratic society this competition is carried out via parliamentarian debates, politicians' speeches, examining political parties' programs, political agitation and voting. General audience-oriented political discourse implements its function of political information influence. As the goal of any political party's program (as an independent form of text in the system of political discourse is to win the elections and come to power, thus the audience influence function is one of the most fundamental and serve as the basis for the text. The text of a program itself is characterized by its persuasive orientation towards the audience, which reveal itself in such methods as convincing, argumentation, manipulation and evaluation. All the political programs pertain to parties which are at the power or which are in opposition. The main characteristic of oppositional programs is the criticism of the power, vice versa, the dominant party's programs confirm the correctness of their policy. All the political programs are multi-authored. The written form of any political program lets put into practice a detailed text analysis. This article presents the analysis of the texts of two leading Spanish political parties (the Spanish socialist worker's party and the people's party of Spain.

  20. 76 FR 69595 - Application of Third Party Testing Requirements; Reducing Third Party Testing Burdens

    Science.gov (United States)

    2011-11-08

    ... material change in the product's design or manufacturing process, including the sourcing of component parts...)) defines a ``children's product,'' in relevant part, as a consumer product designed or intended primarily... testing by a third party) be designed to show the similarity between the products? Also, sampling...

  1. Report of the ITER Council's Ways and Means Working Party

    International Nuclear Information System (INIS)

    1990-01-01

    Beginning in 1988 and continuing through 1990, the four Parties involved, under the auspices of the IAEA, have been cooperating in the ITER Conceptual Design Activities. In order to develop ways and means to comply with the objective of the cooperation, a Working Party was chartered by the Council in July, 1989. This report contains the outcome of the Working Party's effort to fulfil the Council's charge and subsequent additional guidance, which are also given in this document. 2 figs, 13 tabs

  2. Electoral system, pesonal votes, and party choice

    DEFF Research Database (Denmark)

    Thomsen, Søren Risbjerg

    Using local elections in Denmark as an example this paper shows that individual party choice is influenced both by individual level, municipality level, and national level characteristics. Some hypotheses about the effects of the electoral system on personal votes derived from a theory by Carey...... & Shugart (1995) are first tested using a fixed-effects model. The effect of the personal reputation of the candidates, measured by personal votes, on party choice is then tested using a multilevel multinomial logit model suggested by Rabe-Hesketh and Skrondal (2008). The paper shows that both the electoral...

  3. African Ruling Political Parties and the Making of 'Authoritarian ...

    African Journals Online (AJOL)

    appearing to be a 'reincarnation' of the one-party system and military rule that held sway for about three to four decades in Africa (from the 1960s). In the process of this transformation, African ruling parties have been grossly destabilising opposition and perceived dissenters through clientelism, patronage politics and ...

  4. Fast and maliciously secure two-party computation using the GPU

    DEFF Research Database (Denmark)

    Frederiksen, Tore Kasper; Nielsen, Jesper Buus

    2013-01-01

    We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two-party compu......-party computation in a financially feasible and practical setting by using a consumer grade CPU and GPU. Our protocol further uses some novel constructions in order to combine garbled circuits and an OT extension in a parallel and maliciously secure setting.......We describe, and implement, a maliciously secure protocol for two-party computation in a parallel computational model. Our protocol is based on Yao’s garbled circuit and an efficient OT extension. The implementation is done using CUDA and yields fast results for maliciously secure two...

  5. Implementation of two-party protocols in the noisy-storage model

    International Nuclear Information System (INIS)

    Wehner, Stephanie; Curty, Marcos; Schaffner, Christian; Lo, Hoi-Kwong

    2010-01-01

    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer, and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down-conversion sources. In addition, we analyze a modification of the protocols based on decoy states.

  6. Candidate nomination, intra-party democracy, and election violence in Africa

    DEFF Research Database (Denmark)

    Seeberg, Merete Bech; Wahman, Michael; Skaaning, Svend-Erik

    2018-01-01

    This article introduces a special issue on candidate nomination, intra-party democracy, and election violence in Africa. Although a burgeoning literature on African democratization has focused on the topic of electoral violence, little attention has been given to violence during party nominations...... of the involvement of electoral management bodies and external monitors, and violence often results. Rather than developing an elaborate theoretical framework on the causes of nomination violence, our ambition in this introduction is to introduce the concept of nomination violence and situate it in the literatures...... on intra-party democracy and election violence. We also offer new descriptive data on nomination rules and nomination violence across parties on the African continent. The data show that nomination violence is a prevalent problem across both democracies and electoral autocracies. However, the level...

  7. Political Culture, Values and Economic Utility: A Different Perspective on Norwegian Party-based Euroscepticism

    Directory of Open Access Journals (Sweden)

    Marianne S. Skinner

    2010-08-01

    Full Text Available Drawing on a content analysis of party manifestos and a survey of Norwegian MPs, this article examines the nuances in, and the causality of, the different Norwegian parties’ Euroscepticism. The study of the comparative party politics of Euroscepticism, which focuses on ideology and strategy, falls short of accounting for the Norwegian case, where, unlike other European countries, the parties’ Euroscepticism is exceptionally stable and appears across the political spectrum. Therefore, the article tests an alternative set of theories, drawn from the literature on opinion formation on European integration, to find a more suitable framework for analysing and explaining the motivation of Norwegian Euroscepticism. The analysis shows that Norwegian party-based Euroscepticism can be divided into three types when it comes to its strength and policy opposition, with the Centre Party and the Socialist Left Party on the ‘hardest’ end of the Euroscepticism scale, followed by the Christian Democratic Party and the Liberal Party, and finally, the Labour Party and the Progress Party. Furthermore, the analysis indicates that Norwegian Eurosceptic party stances on Europe are primarily driven by political values and political culture concerns, except for the Progress Party, which base its Eurosceptic motivation on economic utilitarianism and political culture.

  8. Protection of third parties. The protection of third parties affected by building or plant construction permits under the public construction law, the emission control law, or the atomic energy law

    International Nuclear Information System (INIS)

    Koenig, S.

    1993-01-01

    Building construction permits just like plant construction permits under the Federal Emission Control Act or the Atomic Energy Act are typical cases representing the administrative order with a dual effect, or an effect on third parties: decisions supporting the interests of the project owner always affect third parties. Third party protection therefore is a major topic of public construction law or the environmental protection law to be applied to industrial installations. Although actions brought by third parties have become something ordinary for the administrative courts, substantive third party protection continues to pose specific problems. The book in hand develops and explains a way out of the dilemma created by third party protection. The solutions presented are founded on a sound dogmatic basis and take into account the Federal Constitutional Court's rulings in matters of civil rights. The starting point adopted by the authors is the third party rights warranting protection, with the objective protection provided for by the law in general gaining effect as subjective rights as far as the protection is based on the civil rights of the constitution. The scope of protection affordable depends on the individual case and the reconciliation of terests of all parties concerned. The problem solutions set forth very extensively rely on the jurisdiction in matters of third party protection and on approaches published in the relevant literature, so that the book also may serve as a guide to current practice and a helpful source of reference for readers looking for information about the issue of third party protection. (orig./HP) [de

  9. Social Movements and New Forms of Political Organization: Podemos as a Hybrid Party

    Directory of Open Access Journals (Sweden)

    Daniela Chironi

    2017-05-01

    Full Text Available In recent years, the restructuring of the party systems in several European countries was accompanied or preceded by massive waves of anti-austerity protests. Although the causal relation between these mobilizations and the rise of new parties has already been assessed, the organizational features remain understudied. To fill this gap, here we analyse the impact of the cycle of anti-austerity and pro-real democracy protests which emerged in 2011 with the birth and organizational development of the Spanish party Podemos. Bridging two subfields of social and political sciences—movement studies and party studies—we pay particular attention to the dichotomy between horizontality and verticality within Podemos' organization. In particular, we address the issues of social movement effects as well as party foundation and organizational development. Our main findings suggest that movement mobilization played a large role in shaping Podemos' foundational choices, particularly with reference to the fundamental principles of the party and its strategic positioning. Podemos is also experimenting new democratic methods internally. Nonetheless, empirical analysis shows that, overall, the influence of movements' organizational models on the organizational structure of the party has been limited. Yet, the result is a “hybrid” party that finds a balance between the horizontalism of social movements and the efficiency of parties.

  10. Online network organization of Barcelona en Comú, an emergent movement-party.

    Science.gov (United States)

    Aragón, Pablo; Gallego, Helena; Laniado, David; Volkovich, Yana; Kaltenbrunner, Andreas

    2017-01-01

    The emerging grassroots party Barcelona en Comú won the 2015 Barcelona City Council election. This candidacy was devised by activists involved in the Spanish 15M movement to transform citizen outrage into political change. On the one hand, the 15M movement was based on a decentralized structure. On the other hand, political science literature postulates that parties develop oligarchical leadership structures. This tension motivates to examine whether Barcelona en Comú preserved a decentralized structure or adopted a conventional centralized organization. In this study we develop a computational methodology to characterize the online network organization of every party in the election campaign on Twitter. Results on the network of retweets reveal that, while traditional parties are organized in a single cluster, for Barcelona en Comú two well-defined groups co-exist: a centralized cluster led by the candidate and party accounts, and a decentralized cluster with the movement activists. Furthermore, results on the network of replies also shows a dual structure: a cluster around the candidate receiving the largest attention from other parties, and another with the movement activists exhibiting a higher predisposition to dialogue with other parties.

  11. Partying as Everyday Life

    DEFF Research Database (Denmark)

    Demant, Jakob; Østergaard, Jeanette

    2007-01-01

    situates the event in everyday life. By drawing on Maffesoli's (1996) concept of ‘sociality' and Lincoln's (2005) concept of zoning the spatial and social logic of the house, partying is analysed using both qualitative and quantitative material. The analysis suggests that the consumption of alcohol (i...... to reaffirm friendship and is therefore an integrated part of adolescents' everyday life.  ...

  12. Comparative Party System Analysis in Central and Eastern Europe: the Case of the Baltic States

    Directory of Open Access Journals (Sweden)

    Tõnis Saarts

    2011-11-01

    Full Text Available The nature of the party systems in Central and Eastern Europe (CEE has puzzled many scholars. High instability of the party systems and their specific evolution makes the application of theoretical models designed predominately for Western European party politics problematic. The paper puts forward the argument that we should further elaborate and specify the models for a small N comparative party system analysis in CEE countries and to incorporate some region specific components into the framework. The essential dimensions included into proposed comparative framework are as follows: (1 the stability of the party system, (2 party system fragmentation, (3 parties´ penetration into society, (4 the ideology and origins of the major parties, (5 the dominant cleavage constellations framing the party competition (6 the strength of the party organizations. The above-mentioned dimensions are expected to capture the most important aspects that make the difference between the party systems in general, and each dimension is complemented with the specific additional variables suitable for party system analysis in CEE in particular. The framework will be tested on the Baltic States, which party systems are often regarded to be very similar to each other. However, the analysis will demonstrate that based on the above-mentioned framework, very significant and noteworthy differences will be revealed.

  13. The Changing of Political Orientation of Masyumi Party During 1950-1959

    Directory of Open Access Journals (Sweden)

    Alfi Hafidh Ishaqro

    2017-06-01

    Full Text Available Through historical method, this article studies the Shifts in Political Ideological Orientation of Masyumi Party during the Liberal Democracy Era 1950–1959. The shifted orientations of Masyumi Party included a shif of orientation in its principle, form of government and the government executive system. The establishment of Masyumi Party was the apex of the Japanese concern in trying to map the axis of the powers of various groups in Indonesia. The formations of PUTERA, which bore the nationalist inclination and MIAI, which tended to accommodate urban Muslims were not attractive enough to win the hearts and empathy from the Indonesian native communities for its occupation in Indonesia. Masyumi Party made Islam as a its struggling principle, not only as a symbol but also tha ideology and spirits in conducting the various siyasah preaches within the scope of political struggles. Numerous internal dynamics were then occuring in the body Masymi Party. The Party’s change in its orientation began to be visible, indicated by the idea suggested by M. Natsir to formulate the Constitution or Law of General Election. The formation of the General Election Law made M. Natsir and Masyumi the symbol of the establishment and growth of democracy in the Republic of Indonesia, which became more evident when M. Natsir was ousted and the subsequent working cabinet heads failed to hold a General Election. And finally, at the end of 1955 under the leadership of Burhanuddin Harahap, who was himself a Masyumi figure, a general election was held for the first time. The political attitude shown by Masyumi indicated that Masumi Party had shifted its political orientation. Masyumi Party, which originally struggled to implement Islam by employing the Syura in forming a government was helplessly compromising its principle by following and combining itself into a democracy model the initiator of which was the leader of Masyumi Party itself. Such political behavioral changes

  14. Évolution des partis politiques dans le monde arabe | Page 4 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Orient et en Afrique du Nord subir diverses mutations. Le soutien dont bénéficiaient les partis nationalistes a diminué au profit des partis islamistes. Ce sont ces derniers qui sont désormais les plus dynamiques et les plus contestataires des partis ...

  15. Évolution des partis politiques dans le monde arabe | Page 2 | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Orient et en Afrique du Nord subir diverses mutations. Le soutien dont bénéficiaient les partis nationalistes a diminué au profit des partis islamistes. Ce sont ces derniers qui sont désormais les plus dynamiques et les plus contestataires des partis ...

  16. Costly third-party punishment in young children.

    Science.gov (United States)

    McAuliffe, Katherine; Jordan, Jillian J; Warneken, Felix

    2015-01-01

    Human adults engage in costly third-party punishment of unfair behavior, but the developmental origins of this behavior are unknown. Here we investigate costly third-party punishment in 5- and 6-year-old children. Participants were asked to accept (enact) or reject (punish) proposed allocations of resources between a pair of absent, anonymous children. In addition, we manipulated whether subjects had to pay a cost to punish proposed allocations. Experiment 1 showed that 6-year-olds (but not 5-year-olds) punished unfair proposals more than fair proposals. However, children punished less when doing so was personally costly. Thus, while sensitive to cost, they were willing to sacrifice resources to intervene against unfairness. Experiment 2 showed that 6-year-olds were less sensitive to unequal allocations when they resulted from selfishness than generosity. These findings show that costly third-party punishment of unfair behavior is present in young children, suggesting that from early in development children show a sophisticated capacity to promote fair behavior. Copyright © 2014 Elsevier B.V. All rights reserved.

  17. Tri-party agreement databases, access mechanism and procedures. Revision 2

    International Nuclear Information System (INIS)

    Brulotte, P.J.

    1996-01-01

    This document contains the information required for the Washington State Department of Ecology (Ecology) and the U.S. Environmental Protection Agency (EPA) to access databases related to the Hanford Federal Facility Agreement and Consent Order (Tri-Party Agreement). It identifies the procedure required to obtain access to the Hanford Site computer networks and the Tri-Party Agreement related databases. It addresses security requirements, access methods, database availability dates, database access procedures, and the minimum computer hardware and software configurations required to operate within the Hanford Site networks. This document supersedes any previous agreements including the Administrative Agreement to Provide Computer Access to U.S. Environmental Protection Agency (EPA) and the Administrative Agreement to Provide Computer Access to Washington State Department of Ecology (Ecology), agreements that were signed by the U.S. Department of Energy (DOE), Richland Operations Office (RL) in June 1990, Access approval to EPA and Ecology is extended by RL to include all Tri-Party Agreement relevant databases named in this document via the documented access method and date. Access to databases and systems not listed in this document will be granted as determined necessary and negotiated among Ecology, EPA, and RL through the Tri-Party Agreement Project Managers. The Tri-Party Agreement Project Managers are the primary points of contact for all activities to be carried out under the Tri-Party Agreement. Action Plan. Access to the Tri-Party Agreement related databases and systems does not provide or imply any ownership on behalf of Ecology or EPA whether public or private of either the database or the system. Access to identified systems and databases does not include access to network/system administrative control information, network maps, etc

  18. Between Confessionalism and Liberal Conservatism : The Christian Democratic Parties of Belgium and the Netherlands

    NARCIS (Netherlands)

    Lucardie, Anthonie; Ten Napel, Hans_Martien; Hanley, David

    1994-01-01

    According to Horner (1981), the Christian Democratic parties of the Low Countries are still confessional parties (Konjessionsparteien) , whereas their sister parties in Germany and Italy are evolving towards liberal conservative catch-all parties (Volksparteien). In this chapter Horner's thesis will

  19. The Analysis Of Political Marketing Mix In Influencing Image And Reputation Of Political Party And Their Impact Toward The Competitiveness Of Political Party The Survey Of Voters In West Java Province

    Directory of Open Access Journals (Sweden)

    Dedeh Maryani

    2015-08-01

    Full Text Available Abstract Recently in Indonesia public trust toward political parties has been decreasing. Most voters tend to be neutral they had better to choose to none. The Experts argued that political competitivness will be high when political parties apply the accurate marketing mix or enhance their image and reputation. The aim of this research is to show how far political marketing mix in influencing the image or the reputation of political party and their impact toward the competitivness of 10 political parties conducted in Province West Java. I use quantitative method with explanatory survey method design. The population in this research is all voters in West Java while the samples are about 400 persons with cluster random sampling. Data analysis in this research is descriptive with Parsial Least Square PLS hypothesis test. PLS describes political marketing mix toward the image and the reputation of political party and their impact toward the competitivness of political party. The result shows that independent variable X political marketing mix gives a positive and significant influence to intervening variables Y1 and Y2 the image and the reputation of political party and dependent variable Y3 political party competitivness their impact to the variable depend on it. The finding in this study is that marketing mix has high influence toward the competitiveness of political party by enhancing the image and the reputation of political party.

  20. 34 CFR 81.19 - Costs and fees of parties.

    Science.gov (United States)

    2010-07-01

    ... 34 Education 1 2010-07-01 2010-07-01 false Costs and fees of parties. 81.19 Section 81.19 Education Office of the Secretary, Department of Education GENERAL EDUCATION PROVISIONS ACT-ENFORCEMENT General Provisions § 81.19 Costs and fees of parties. The Equal Access to Justice Act, 5 U.S.C. 504...

  1. Are the advocates of nuclear power and the adversaries listening to each other? Does Dialogue have a chance? Introductory remarks by John A. Macpherson[Roundtable discussion on whether the advocates of nuclear power and the adversaries are listening to each other

    Energy Technology Data Exchange (ETDEWEB)

    Macpherson, John A [Atomic Energy of Canada Ltd., Mississauga, ON (Canada)

    1989-07-01

    Are the advocates of nuclear power and the adversaries listening to each other? Does dialogue have a chance? My short answer to both questions posed as the title for this discussion is 'no'. And I would add: There is no point in trying to bring opposite poles together, it requires too much investment for too little return. A nuclear dialogue will have a chance only it a distinction can be shown between physics and metaphysics, between chemistry and alchemy, and if the gap can be bridged between the polarized views of the world's societal needs which, incidentally, create the nuclear issue in the first place. This is a daunting task Movements in search of a cause have a passion for preaching rather than a love for listening.

  2. Third-party social evaluations of humans by monkeys and dogs.

    Science.gov (United States)

    Anderson, James R; Bucher, Benoit; Chijiiwa, Hitomi; Kuroshima, Hika; Takimoto, Ayaka; Fujita, Kazuo

    2017-11-01

    Developmental psychologists are increasingly interested in young children's evaluations of individuals based on third-party interactions. Studies have shown that infants react negatively to agents who display harmful intentions toward others, and to those who behave unfairly. We describe experimental studies of capuchin monkeys' and pet dogs' differential reactions to people who are helpful or unhelpful in third-party contexts, and monkeys' responses to people who behave unfairly in exchanges of objects with a third party. We also present evidence that capuchin monkeys monitor the context of failures to help and violations of reciprocity, and that intentionality is one factor underlying their social evaluations of individuals whom they see interacting with others. We conclude by proposing some questions for studies of nonhuman species' third party-based social evaluations. Copyright © 2017 Elsevier Ltd. All rights reserved.

  3. The Romanian Social Democratic Party versus the authoritarian monarchy

    Directory of Open Access Journals (Sweden)

    Florin Grecu

    2014-09-01

    Full Text Available The article approaches the Romanian social-democratic collaboration during 1938-1940 with the authoritarian monarch regime. Even though the party leaders had diverging political views, regards to the acceptance or the non-acceptance of the authoritarian regime, the influential PSDR members held leading positions within the single party and the corporate parliament and within the union structures. The positions were offered by the regime, so that the union leaders would stop instigating workers to go on strike, and to accept the governmental policies. The freedom of speech and the political actions were ceded to the monarch, who governed at the place of the political parties and he controlled the unions, by using the guilds.

  4. Generative Adversarial Networks-Based Semi-Supervised Learning for Hyperspectral Image Classification

    Directory of Open Access Journals (Sweden)

    Zhi He

    2017-10-01

    Full Text Available Classification of hyperspectral image (HSI is an important research topic in the remote sensing community. Significant efforts (e.g., deep learning have been concentrated on this task. However, it is still an open issue to classify the high-dimensional HSI with a limited number of training samples. In this paper, we propose a semi-supervised HSI classification method inspired by the generative adversarial networks (GANs. Unlike the supervised methods, the proposed HSI classification method is semi-supervised, which can make full use of the limited labeled samples as well as the sufficient unlabeled samples. Core ideas of the proposed method are twofold. First, the three-dimensional bilateral filter (3DBF is adopted to extract the spectral-spatial features by naturally treating the HSI as a volumetric dataset. The spatial information is integrated into the extracted features by 3DBF, which is propitious to the subsequent classification step. Second, GANs are trained on the spectral-spatial features for semi-supervised learning. A GAN contains two neural networks (i.e., generator and discriminator trained in opposition to one another. The semi-supervised learning is achieved by adding samples from the generator to the features and increasing the dimension of the classifier output. Experimental results obtained on three benchmark HSI datasets have confirmed the effectiveness of the proposed method , especially with a limited number of labeled samples.

  5. Financing of Political Parties and Electoral Campaigns in Republic of Macedonia

    Directory of Open Access Journals (Sweden)

    Farije ALIU

    2016-07-01

    Full Text Available Political party in the Republic of Macedonia began to operate after independence and the adoption of the Constitution in November 1991 and has since become an integral part of the political scene and the data from the Central Registry of the Republic of Macedonia registered political parties more than 50 political parties active in the current system. The electoral system in the country is set according to the proportional model where direct and free elections by secret ballot to elect members of Parliament and members of the municipal councils and the City of Skopje for four years, while according to the majority model is the selection of the President of the Republic for a term of five years and the election of mayors of municipalities and the City of Skopje for four years. The legal framework for the financing of political parties in the country is well developed. The main law governing the financing of political parties and their supervision law on financing of political parties and the amendments to the same law. The provisions contained in the law is comprehensive, addressing the financing of the regular activities of political parties and their supervision and demonstrate ensuring transparency and accountability in political financing and a ban on anonymous donations and donations from abroad and determine the rules for cap on private donations and prohibiting quid pro quo agreements. Some provisions relating to the financing of political parties included in the Law on Political Parties and certain provisions governing the various supervisory authorities, in particular the Law on Prevention of Corruption and the Law on State Audit footnote. The basic law that regulates elections is the Electoral Code. Under the provisions of the Electoral Code the political parties and election campaign organizers are required to submit financial reports to the authorities to ensure respect for the principles of transparency and accountability and are

  6. POLITICAL PARTIES AND THEIR ROLE IN SAFEGUARDING THE SUPREMACY OF THE CONSTITUTION

    Directory of Open Access Journals (Sweden)

    Silvia-Elena, OLARU

    2014-11-01

    Full Text Available Nowadays, the political scene of the world is stirred by political parties. The separate fronts of the Government, on the one side, and Parliament, on the other, are now obsolete notions, while political parties dominate social life, having become genuine states in state. Therefore, within the contemporary organization of the powers in state, the issues are assessed from a different perspective: traditional structures are maintained, while their functions evolve and transform rapidly. A modern society without political parties is unconceivable. Today, more than ever, political parties deserve their qualification of "engines of political life" and "reasons of the aging of the classical theory of the separation of powers"; at the same time, they must act within the boundaries set by law, namely by observing the principles of a democratic state and the constitutional order. When dealing with the theory of the separation of powers in state, we must keep in mind that, to a large extent, it was developed in a time in which political parties did not exist yet or were not in their modern form. The main problems were of institutional nature and referred to the various bodies, their competencies and the relationships between them. Unfortunately, in societies in transition, where authentic democracy is still developing, political parties - in some countries - perceive governing as a means of obtaining ministerial portfolios at all costs, irrespective of whether they have professionals for the field concerned or not. This often creates a governmental crisis, which usually leads to changing the incumbents and obtaining more positions in the new government. In this context, some of the incumbent parties set up all kinds of obstacles in order to limit the number of parties, and if this limitation fails, they manage to create legal provisions which discriminate among parties with seats in Parliament and those which are not represented, both in local and

  7. Intra-Campaign Changes in Voting Preferences: The Impact of Media and Party Communication

    Science.gov (United States)

    Johann, David; Königslöw, Katharina Kleinen-von; Kritzinger, Sylvia; Thomas, Kathrin

    2018-01-01

    An increasing number of citizens change and adapt their party preferences during the electoral campaign. We analyze which short-term factors explain intra-campaign changes in voting preferences, focusing on the visibility and tone of news media reporting and party canvassing. Our analyses rely on an integrative data approach, linking data from media content analysis to public opinion data. This enables us to investigate the relative impact of news media reporting as well as party communication. Inherently, we overcome previously identified methodological problems in the study of communication effects on voting behavior. Our findings reveal that campaigns matter: Especially interpersonal party canvassing increases voters’ likelihood to change their voting preferences in favor of the respective party, whereas media effects are limited to quality news outlets and depend on individual voters’ party ambivalence.

  8. Intra-Campaign Changes in Voting Preferences: The Impact of Media and Party Communication.

    Science.gov (United States)

    Johann, David; Königslöw, Katharina Kleinen-von; Kritzinger, Sylvia; Thomas, Kathrin

    2018-01-01

    An increasing number of citizens change and adapt their party preferences during the electoral campaign. We analyze which short-term factors explain intra-campaign changes in voting preferences, focusing on the visibility and tone of news media reporting and party canvassing. Our analyses rely on an integrative data approach, linking data from media content analysis to public opinion data. This enables us to investigate the relative impact of news media reporting as well as party communication. Inherently, we overcome previously identified methodological problems in the study of communication effects on voting behavior. Our findings reveal that campaigns matter: Especially interpersonal party canvassing increases voters' likelihood to change their voting preferences in favor of the respective party, whereas media effects are limited to quality news outlets and depend on individual voters' party ambivalence.

  9. [Ketamine as a party drug

    NARCIS (Netherlands)

    Vroegop, M.P.; Dongen, R.T.M. van; Vantroyen, B.; Kramers, C.

    2007-01-01

    Ketamine is a new party drug, which is easy to obtain. For this reason, it is possible that physicians will be increasingly confronted with users that have medical problems. Relatively few cases of ketamine intoxication with a fatal outcome have been reported thus far. Ketamine is very

  10. Changing the Rules of the Game : the development and reform of party law in Latin America

    NARCIS (Netherlands)

    Molenaar, F.F.

    2017-01-01

    Party law, or the legal regulation of political parties, has become a prominent feature of party systems. Some party laws are designed to have a much larger political impact than others. It remains unknown why some countries adopt party laws that have substantial implications for party

  11. Market Reform, Programmatic (DeAlignment and Party System Stability in Latin America

    Directory of Open Access Journals (Sweden)

    Kenneth M. ROBERTS

    2013-07-01

    Full Text Available Although democratic regimes in Latin America since the early 1980s have been surprisingly durable, party systems in much of the region continue to experience very high levels of electoral instability. A critical juncture approach to institutional change suggests that variation in party system stability is related to the impact of market liberalization in the 1980s and 90s on the programmatic alignment –or (dealignment– of partisan competition. Market reforms that were adopted by conservative leaders and opposed by a major leftist rival aligned party systems programmatically, allowing societal opposition to be channeled into institutionalized forms of competition that were highly stable in the post-adjustment era. By contrast, «bait-and-switch» reforms adopted by populist or leftist leaders were programmatically de-aligning for party systems, leaving them vulnerable to highly destabilizing reactive sequences in the aftermath to the reform process-including mass social protests, the demise of historic conservative parties, and the outflanking of traditional populist or leftist parties by more radical, anti-neoliberal outsiders. The political dynamics of market-based economic adjustment thus heavily conditioned the ways in which party systems would process the post-adjustment revival of populist and leftist alternatives in the region.

  12. Coalitions and Competition in Malaysia – Incremental Transformation of a Strong-party System

    OpenAIRE

    Meredith L. WEISS

    2013-01-01

    "The seeming entrenchment of a two-coalition system in Malaysia solidifies the centrality of strongly institutionalised parties in the polity. The primary parties in Malaysia reach deeply into society and nest within dense networks of both intra-party and external organisations. Given this order - which differentiates Malaysia from its neighbours in the region - political liberalisation, if it happens, should be expected largely via electoral politics, and, specifically, through inter-party c...

  13. Political parties and forestry relations in Turkey’s general elections in 2015

    Directory of Open Access Journals (Sweden)

    Erdoğan Atmış

    2016-07-01

    Full Text Available Political parties have important roles in the political decision making process on identifying the demand for public goods and services. In this context, political parties have significant impacts on identification and implementation of forestry policies. Their election manifestos/declarations have statements on forests and forestry, which are important sources of information for those parties' forestry policies. In this study, election manifestos of 11 parties that participated in the general elections that took place on June 7, 2015 and November 1, 2015 in Turkey were studied. Data were analysed with “Document Analyses” and “Content Analyses”, then evaluated under eight titles. As a result of these assessments, the conclusion was that; there are significant differences between the parties' approaches to forests: some of them consider the forest not as an entity but as a source of income, developing populist discourses that are sure to appeal to the general public, through ambitious or impossible promises. It can also be said that the political parties fail to base their views on forests on reliable data.

  14. House Parties: An Innovative Model for Outreach and Community-Based Health Education.

    Science.gov (United States)

    Anderson-Reeves, Timika; Goodman, Jacqueline; Bragg, Brian; Leruth, Chelsey

    2017-12-01

    Purpose To connect low resource communities to innovative services that address gaps in health access and knowledge. Description We describe the house party model, as a community-based workshop approach to health education developed by the Westside Healthy Start program (WHS) in Chicago, Illinois. Key elements of the WHS house party model include use of community health workers as facilitators, collaboration with participants and community-based organizations, referrals to health care and social services, and engagement strategies such as interactive activities, personal stories, and discussion. Assessment In 2014 and 2015, WHS completed 23 house parties with 271 participants, delivering education on relevant maternal and child health (MCH) topics. Participants demonstrated improvements in knowledge of several health-related areas. About half of participants were able to identify causes or signs of preterm labor prior to the house party, compared to over 80% after. In addition, 94% of participants rated the house party workshops "excellent" or "good". Conclusion House parties are a promising strategy for increasing knowledge about MCH topics and linking hard-to-reach populations to resources in the community.

  15. Hybrid-secure MPC 

    DEFF Research Database (Denmark)

    Lucas, Christoph; Raub, Dominik; Maurer, Ueli

    2010-01-01

    of the adversary, without being aware of the actual adversarial setting. Thus, hybrid-secure MPC protocols allow for graceful degradation of security. We present a hybrid-secure MPC protocol that provides an optimal trade-off between IT robustness and computational privacy: For any robustness parameter ρ ... obtain one MPC protocol that is simultaneously IT secure with robustness for up to t ≤ ρ actively corrupted parties, IT secure with fairness (no robustness) for up to t ... in the universal composability (UC) framework (based on a network of secure channels, a broadcast channel, and a common reference string). It achieves the bound on the trade-off between robustness and privacy shown by Ishai et al. [CRYPTO'06] and Katz [STOC'07], the bound on fairness shown by Cleve [STOC'86...

  16. Parliamentary committees in a party-centred context : structure, composition, functioning

    NARCIS (Netherlands)

    Mickler, T.A.

    2017-01-01

    Beyond the immediately visible plenum, parliaments are highly complex institutions. They work through various venues in which decisions are prepared or even taken. The two main institutions in this regard are parliamentary party groups, which comprise legislators who are elected under the same party

  17. Media cues and citizen support for right-wing populist parties

    NARCIS (Netherlands)

    Sheets, P.; Bos, L.; Boomgaarden, H.

    2013-01-01

    Right-wing populist parties are thriving across Europe. Usual explanations for the success of these parties are based on notions related to economics, national identity or cultural alienation. Some authors, however, have shown that the mass media also play a significant role. Whereas these studies

  18. On-line diagnosis and recovery of adversary attack using logic flowgraph methodology simulation

    International Nuclear Information System (INIS)

    Guarro, S.B.

    1986-01-01

    The Logic Flowgraph Methodology (LFM) allows the construction of special graph models for simulation of complex processes of causality, including feedback loops and sequential effects. Among the most notable features of LFM is the formal inclusion in its models of causality conditioning by logic switches imbedded in the modeled process, such as faults or modes of operation. The LFM model of a process is a graph structure that captures, in one synthetic representation, the relevant success and fault space characterization of that process. LFM is very similar to an artificial intelligence expert system shell. To illustrate the utilization of LFM, an application to the assessment and on-line monitoring of a material control facility is presented. The LFM models are used to model adversary action and control response, and to generate mini-diagnostic and recovery trees in real time, as well as reliability tress for off-line evaluation. Although the case study presented is for an imaginary facility, most of the conceptual elements that would be present in a real application have been retained in order to highlight the features and capabilities of the methodology

  19. Is supporting populist political parties a mental disorder?

    OpenAIRE

    McGowan, J.

    2015-01-01

    It’s just over a month until the UK general election and many Brits seem to have lost trust in their traditional politicos. Whether it’s the UK Independence Party (UKIP) scapegoating the European Union and immigrants, a rise in nationalism (the Scottish National party), or Russell Brand’s teenage anarchism, faith in facile, and sometimes ugly, solutions is on the march. It’s a huge relief, therefore, to hear that the editors of the DSM (the main reference book for psychiatric classification),...

  20. Ichthyoplankton Classification Tool using Generative Adversarial Networks and Transfer Learning

    KAUST Repository

    Aljaafari, Nura

    2018-04-15

    The study and the analysis of marine ecosystems is a significant part of the marine science research. These systems are valuable resources for fisheries, improving water quality and can even be used in drugs production. The investigation of ichthyoplankton inhabiting these ecosystems is also an important research field. Ichthyoplankton are fish in their early stages of life. In this stage, the fish have relatively similar shape and are small in size. The currently used way of identifying them is not optimal. Marine scientists typically study such organisms by sending a team that collects samples from the sea which is then taken to the lab for further investigation. These samples need to be studied by an expert and usually end needing a DNA sequencing. This method is time-consuming and requires a high level of experience. The recent advances in AI have helped to solve and automate several difficult tasks which motivated us to develop a classification tool for ichthyoplankton. We show that using machine learning techniques, such as generative adversarial networks combined with transfer learning solves such a problem with high accuracy. We show that using traditional machine learning algorithms fails to solve it. We also give a general framework for creating a classification tool when the dataset used for training is a limited dataset. We aim to build a user-friendly tool that can be used by any user for the classification task and we aim to give a guide to the researchers so that they can follow in creating a classification tool.

  1. 37 CFR 1.99 - Third-party submission in published application.

    Science.gov (United States)

    2010-07-01

    ... 37 Patents, Trademarks, and Copyrights 1 2010-07-01 2010-07-01 false Third-party submission in published application. 1.99 Section 1.99 Patents, Trademarks, and Copyrights UNITED STATES PATENT AND... Provisions Information Disclosure Statement § 1.99 Third-party submission in published application. (a) A...

  2. Media cues and citizen support for right-wing populist parties

    NARCIS (Netherlands)

    Sheets, P.; Bos, L.; Boomgaarden, H.G.

    2016-01-01

    Right-wing populist parties are thriving across Europe. Their success is usually attributed to demand-side voter factors and supply-side factors explaining differences in success between countries and parties, such as the role of the media. This study focuses on the interplay of these factors and

  3. A protocol for the secure two-party quantum scalar product

    Energy Technology Data Exchange (ETDEWEB)

    He, Li-Bao, E-mail: helibao@mail.ustc.edu.cn [National High Performance Computing Center, Department of Computer Science and Technology, USTC, Hefei 230027 (China); Suzhou Institute for Advanced Study, USTC, Suzhou 215123 (China); Huang, Liu-Sheng; Yang, Wei; Xu, Rui [National High Performance Computing Center, Department of Computer Science and Technology, USTC, Hefei 230027 (China); Suzhou Institute for Advanced Study, USTC, Suzhou 215123 (China)

    2012-03-19

    Secure scalar product serves as an important primitive for secure multi-party computation and has a wide application in different areas, such as statistical analysis, data mining, computational geometry, etc. How to collaboratively compute the correct scalar product result without leaking any participants' private information becomes the primary principle of designing secure scalar product schemes. In this Letter, we present a secure two-party quantum scalar product scheme via quantum entanglement and quantum measurement with the help of a non-colluding third party (TP). Furthermore, the scheme is proven to be secure under various kinds of outside attacks and participant attacks. -- Highlights: ► We extend the secure two-party scalar product to the quantum field. ► Our protocol is built upon quantum entanglement and quantum measurement. ► Communication cost is acceptable if the elements of participants' private vectors are not too sparse. ► Participants will leak no private information under the no-collusion model.

  4. A protocol for the secure two-party quantum scalar product

    International Nuclear Information System (INIS)

    He, Li-Bao; Huang, Liu-Sheng; Yang, Wei; Xu, Rui

    2012-01-01

    Secure scalar product serves as an important primitive for secure multi-party computation and has a wide application in different areas, such as statistical analysis, data mining, computational geometry, etc. How to collaboratively compute the correct scalar product result without leaking any participants' private information becomes the primary principle of designing secure scalar product schemes. In this Letter, we present a secure two-party quantum scalar product scheme via quantum entanglement and quantum measurement with the help of a non-colluding third party (TP). Furthermore, the scheme is proven to be secure under various kinds of outside attacks and participant attacks. -- Highlights: ► We extend the secure two-party scalar product to the quantum field. ► Our protocol is built upon quantum entanglement and quantum measurement. ► Communication cost is acceptable if the elements of participants' private vectors are not too sparse. ► Participants will leak no private information under the no-collusion model.

  5. The ICRP working party on bioassay interpretation

    International Nuclear Information System (INIS)

    Fry, F.A.; Lipsztein, J.L.; Birchall, A.

    2003-01-01

    In recent years there have been many developments in modelling the behaviour of radionuclides in the human body. The current generation of models are designed to be more 'realistic' than the previous generation of simple compartment models. The International Commission on Radiological Protection (ICRP) uses these models to produce dose coefficients and recognises that there is a need to give more guidance on how these models can be used to interpret bioassay data. A working party has been set up to address the issue. This paper describes some of the problems, some approaches to solving the problems and the progress of the ICRP working party. (author)

  6. Political Party Funding in Romania - One Step Forward, Two Steps Back?

    Directory of Open Access Journals (Sweden)

    Iulian Georgel Savenco

    2015-05-01

    Full Text Available Within political life, the determining role is given to political parties in their capacity as actors in the electoral campaign and in the race for political power. This is the reason for which we believe that the means of financing political parties and the electoral campaigns in which they partake is an important aspect within the electoral reform, as without an adequate funding their chances of winning the electoral race are drastically reduced. On the other hand, funding of political parties is of great interest as the lack of transparency which usually encircles this process can lead to a dangerous phenomenon, namely corruption. Throughout this article we present the current situation and critically analyze the changes which the Romanian legislature plans to apply to the political party financing law.

  7. Third Party Nuclear Liability: The Case of a Supplier in the United Kingdom

    OpenAIRE

    Thomas, A.; Heffron, R. J.

    2012-01-01

    The law surrounding third party nuclear liability is important to all parties in the nuclear supply chain whether they are providing decommissioning services, project management expertise or a new reactor. This paper examines third party nuclear liability, and in particular, in relation to a Supplier in the nuclear energy sector in the United Kingdom (UK). The term “Supplier” is used in this paper and, depending on the context, is intended to cover all parties in the supply chain providing se...

  8. 27 CFR 6.42 - Indirect inducement through third party arrangements.

    Science.gov (United States)

    2010-04-01

    ... TOBACCO TAX AND TRADE BUREAU, DEPARTMENT OF THE TREASURY LIQUORS âTIED-HOUSEâ Unlawful Inducements... other thing of value by an industry member to a third party, where the benefits resulting from such... value was furnished to a retailer by the third party without the knowledge or intent of the industry...

  9. The Political Parties and Political Participation in Rivers State, Nigeria

    African Journals Online (AJOL)

    The Political Parties and Political Participation in Rivers State, Nigeria: A Case Study of 2015 General Elections. Goddey Wilson. Abstract. The study reviewed the activities of the political parties and its impact on voters' participation in the political activities in Rivers State. In pursuit of this objective, the study generated ...

  10. The Influence of Cognitive Biases on Court Decisions. Contributions of Legal Psychology to the Adversary Criminal Proceedings

    Directory of Open Access Journals (Sweden)

    Paola Iliana De la Rosa Rodríguez

    2016-06-01

    Full Text Available The purpose of this paper is to disperse among the judiciary and society the psychological procedures involved in the decision-making process of judges since they are not only influenced by law but by previous ideas and values. It is worth questioning: in what extent their personal views and beliefs are the bases of verdicts? How can aversions and public opinion have an impact in the court decision? This paper analyzes and states the differences of the judicial role in the Mexican adversarial system and the inquisitorial models of justice. It also critiques the categories of the judicial officers and presents the circumstances that make an impact on judicial decisions, according to Psychology studies. It finally classifies cognitive biases and concludes that the more knowledge judges have about it, the more imparcial judgments will be.

  11. 76 FR 55261 - Safety Zone; Corporate Party on Hornblower Yacht, San Francisco, CA

    Science.gov (United States)

    2011-09-07

    ...-AA00 Safety Zone; Corporate Party on Hornblower Yacht, San Francisco, CA AGENCY: Coast Guard, DHS... Corporate Party on Hornblower Yacht. This temporary safety zone is established to ensure the safety of... Events will sponsor the Corporate Party on Hornblower Yacht on September 17, 2011, in the navigable...

  12. Feature Project--A Bookmaking Party.

    Science.gov (United States)

    Drury, Lori; And Others

    1984-01-01

    The teaching activities presented in this article focus on a bookmaking party, which gives children a format in which they can publish and share their activities in a formal way, provides them with books for recording their writing, and involves students, parents, and the community with children's writing. The paper describes the steps for…

  13. The transformation of southern California's residential photovoltaics market through third-party ownership

    International Nuclear Information System (INIS)

    Drury, Easan; Miller, Mackay; Macal, Charles M.; Graziano, Diane J.; Heimiller, Donna; Ozik, Jonathan; Perry IV, Thomas D.

    2012-01-01

    Third-party photovoltaics (PV) ownership is a rapidly growing market trend, where commercial companies own and operate customer-sited PV systems and lease PV equipment or sell PV electricity to the building occupant. Third-party PV companies can reduce or eliminate up-front adoption costs, reduce technology risk and complexity by monitoring system performance, and can repackage the PV value proposition by showing cost savings in the first month of ownership rather than payback times on the order of a decade. We find that the entrance of third-party business models in southern California residential PV markets has enticed a new demographic to adopt PV systems that is more highly correlated to younger, less affluent, and less educated populations than the demographics correlated to purchasing PV systems. By enticing new demographics to adopt PV, we find that third-party PV products are likely increasing total PV demand rather than gaining market share entirely at the expense of existing customer owned PV demand. We also find that mean population demographics are good predictors of third-party and customer owned PV adoption, and mean voting trends on California carbon policy (Proposition 23) are poor predictors of PV adoption. - Highlights: ► Third-party PV products increased residential PV demand in southern CA. ► Third-party PV products entice new demographic groups to adopt PV. ► Regional demographics are good predictors of PV demand. ► Regional voting trends on carbon policy are poor predictors of PV demand.

  14. Direct and indirect welfare chauvinism as party strategies

    DEFF Research Database (Denmark)

    Careja, Romana; Elmelund-Præstekær, Christian; Klitgaard, Michael Baggesen

    2016-01-01

    welfare chauvinism occurs as a result of legislative changes that explicitly exclude recipients from social protection or reduce the level thereof on the basis of ethnicity. Indirect welfare chauvinism is the result of policy measures that apply to both natives and immigrants, but which deliberately...... and deliberate policy-making strategies of the party. It shows that the distinction between direct and indirect chauvinism is a useful theoretical tool for understanding how the Danish People's Party can fulfill the expectations of both its electorate and its coalition partners, even if they point in different...

  15. Ecologies of ideologies: Explaining party entry and exit in West-European parliaments, 1945-2013.

    Science.gov (United States)

    van de Wardt, Marc; Berkhout, Joost; Vermeulen, Floris

    2017-06-01

    This study introduces a population-ecological approach to the entry and exit of political parties. A primary proposition of population ecology is that organizational entry and exit depends on the number of organizations already present: that is, density. We propose that political parties mainly experience competition from parties in the same ideological niche (left, centre, right). Pooled time-series analyses of 410 parties, 263 elections and 18 West-European countries largely support our expectations. We find that political parties are more likely to exit when density within their niche increases. Also there is competition between adjacent ideological niches, i.e. between centrist and right-wing niches. In contrast to our expectations, neither density nor institutional rules impact party entry. This raises important questions about the rationale of prospective entrants.

  16. Assessing the Influence of Political Parties on Public Opinion: The Challenge from Pretreatment Effects

    DEFF Research Database (Denmark)

    Slothuus, Rune

    2016-01-01

    Despite generations of research, political scientists have trouble pinpointing the influence of political parties on public opinion. Recently, scholars have made headway in exploring whether parties in fact shape policy preferences by relying on experimental designs. Yet, the evidence from...... this work is mixed. I argue that the typical experiment faces a design problem that likely minimizes the extent to which parties apparently matter. Because parties have policy reputations, experimental participants may already know from real-world exposure to political debate where the parties stand before...... they are told in the experiment—they are “pretreated.” This study investigates how real-world political context interferes with party cue stimulus in experiments. In two experiments I show that two types of “pretreatment” from outside the experiment—exposure-based and reputation-based—dramatically moderate...

  17. Web party effect: a cocktail party effect in the web environment.

    Science.gov (United States)

    Rigutti, Sara; Fantoni, Carlo; Gerbino, Walter

    2015-01-01

    In goal-directed web navigation, labels compete for selection: this process often involves knowledge integration and requires selective attention to manage the dizziness of web layouts. Here we ask whether the competition for selection depends on all web navigation options or only on those options that are more likely to be useful for information seeking, and provide evidence in favor of the latter alternative. Participants in our experiment navigated a representative set of real websites of variable complexity, in order to reach an information goal located two clicks away from the starting home page. The time needed to reach the goal was accounted for by a novel measure of home page complexity based on a part of (not all) web options: the number of links embedded within web navigation elements weighted by the number and type of embedding elements. Our measure fully mediated the effect of several standard complexity metrics (the overall number of links, words, images, graphical regions, the JPEG file size of home page screenshots) on information seeking time and usability ratings. Furthermore, it predicted the cognitive demand of web navigation, as revealed by the duration judgment ratio (i.e., the ratio of subjective to objective duration of information search). Results demonstrate that focusing on relevant links while ignoring other web objects optimizes the deployment of attentional resources necessary to navigation. This is in line with a web party effect (i.e., a cocktail party effect in the web environment): users tune into web elements that are relevant for the achievement of their navigation goals and tune out all others.

  18. 17 CFR 201.210 - Parties, limited participants and amici curiae.

    Science.gov (United States)

    2010-04-01

    ... protection of investors or consumers, may be admitted as a party upon the filing of a written motion setting... proceeding may be in the public interest or for the protection of investors, may be admitted as a party upon... affecting the person's interests: (1) Procedure. Motions for leave to participate shall be in writing, shall...

  19. Implementing Democratic Equality in Political Parties

    DEFF Research Database (Denmark)

    Bolleyer, Nicole; von Nostitz, Felix-Christopher; Little, Conor

    2015-01-01

    This article theorises and empirically assesses some important intra-organisational implications of maximising democratic equality in political parties both between followers and members and between members and elites. They include weak member commitment, passivity of the rank-and-file membership...

  20. Parties at the convention of the United Nations on climatic change and second meeting of the parties to the Kyoto protocol

    International Nuclear Information System (INIS)

    2006-01-01

    Kenya hosted the second meeting of the Parties to the Kyoto Protocol in conjunction with the twelfth session of the conference of the Parties to the climatic change convention, in Nairobi from 6 to 17 November 2006. This document presents in a first part the key areas discussed at Nairobi; in a second part the international framework with the consequences of the Kyoto protocol implementation; and in the last part the demonstrable progresses of the France in the policy effects, tendencies concerning the greenhouse gases and the respect of the commitments. (A.L.B.)

  1. Social Class and Party Identification During the Clinton, Bush, and Obama Presidencies

    Directory of Open Access Journals (Sweden)

    Stephen L. Morgan

    2017-08-01

    Full Text Available Through an analysis of the 1994 through 2016 General Social Surveys, this article demonstrates that a substantial proportion of eligible voters within the working class turned away from solid identification with either the Democratic Party or the Republican Party during the Obama presidency. Even before the 2016 election cycle commenced, conditions were uncharacteristically propitious for a Republican candidate who could appeal to prospective voters in the working class, especially those who had not voted in recent presidential elections but could be mobilized to vote. These findings support the contested position that variation in party identification is a genuine leading indicator of electoral outcomes and perhaps also, in this case, of party realignment.

  2. Social Networks and Political Parties in Chile

    Directory of Open Access Journals (Sweden)

    Adler Lomnitz, Larissa

    2002-09-01

    Full Text Available This paper describes the origin and evolution of two Chilean political parties (the Radical Party and the Christian Democrat Party through the analysis of the social networks that originated and composed them. The aim of this study is to propose a model of national political cultures on the basis of the structure of social networks related to power and of the symbol system, which legitimizes it. The structure of social networks, horizontal and vertical, are based on reciprocal or redistributive forms of exchange, on what is being exchanged and on the articulation between networks. In every society there are symmetrical and asymmetrical exchanges, which produce horizontal and vertical networks. These networks interact among themselves to form the social fabric. The dominance of some over others and how they combine, delineate the character of the political culture (authoritarian vs. egalitarian. Chile is a multiparty country within which there are cohorts of horizontal groups of friends, who informally exercise a central control over their members and create invisible boundaries setting them apart from others, in which leadership is under constrains. The result is both a strong presidential system based on an almost fanatic legitimacy, combined with factionalism and a strong parliamentary system.

  3. Measuring the effects of social media participation on political party communities

    NARCIS (Netherlands)

    Effing, Robin; van Hillegersberg, Jos; Huibers, T.; Reddick, C.; Aikins, S.K.

    2012-01-01

    Political parties can potentially benefit from Social Media to shape interactions between their members. This chapter presents the Social Media Participation Model (SMPM), which measures the effects of Social Media Participation on political party communities. As people and politicians increasingly

  4. Political Party Development in the Arab World | Page 2 | CRDI ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    Iraqi Communist Party [Arabic language]. Documents. í€ l'épreuve du gouvernement urbain, les transformations du Parti de la Justice et du développement au Maroc. Documents. Rassemblement yéménite pour la réforme (al-Islâh) : la difficile construction d'un projet d'alternance. Documents. Socialist Union of Popular ...

  5. 78 FR 44090 - Formaldehyde; Third-Party Certification Framework for the Formaldehyde Standards for Composite...

    Science.gov (United States)

    2013-07-23

    ... Formaldehyde; Third-Party Certification Framework for the Formaldehyde Standards for Composite Wood Products..., concerning a third-party certification framework for the formaldehyde standards for composite wood products... Environmental protection, Composite wood products, Formaldehyde, Reporting and recordkeeping, Third-party...

  6. Third-party punishment increases cooperation in children through (misaligned) expectations and conditional cooperation.

    Science.gov (United States)

    Lergetporer, Philipp; Angerer, Silvia; Glätzle-Rützler, Daniela; Sutter, Matthias

    2014-05-13

    The human ability to establish cooperation, even in large groups of genetically unrelated strangers, depends upon the enforcement of cooperation norms. Third-party punishment is one important factor to explain high levels of cooperation among humans, although it is still somewhat disputed whether other animal species also use this mechanism for promoting cooperation. We study the effectiveness of third-party punishment to increase children's cooperative behavior in a large-scale cooperation game. Based on an experiment with 1,120 children, aged 7 to 11 y, we find that the threat of third-party punishment more than doubles cooperation rates, despite the fact that children are rarely willing to execute costly punishment. We can show that the higher cooperation levels with third-party punishment are driven by two components. First, cooperation is a rational (expected payoff-maximizing) response to incorrect beliefs about the punishment behavior of third parties. Second, cooperation is a conditionally cooperative reaction to correct beliefs that third party punishment will increase a partner's level of cooperation.

  7. Looking Under the Hood of Third-Party Punishment Reveals Design for Personal Benefit.

    Science.gov (United States)

    Krasnow, Max M; Delton, Andrew W; Cosmides, Leda; Tooby, John

    2016-03-01

    Third-party intervention, such as when a crowd stops a mugger, is common. Yet it seems irrational because it has real costs but may provide no personal benefits. In a laboratory analogue, the third-party-punishment game, third parties ("punishers") will often spend real money to anonymously punish bad behavior directed at other people. A common explanation is that third-party punishment exists to maintain a cooperative society. We tested a different explanation: Third-party punishment results from a deterrence psychology for defending personal interests. Because humans evolved in small-scale, face-to-face social worlds, the mind infers that mistreatment of a third party predicts later mistreatment of oneself. We showed that when punishers do not have information about how they personally will be treated, they infer that mistreatment of other people predicts mistreatment of themselves, and these inferences predict punishment. But when information about personal mistreatment is available, it drives punishment. This suggests that humans' punitive psychology evolved to defend personal interests. © The Author(s) 2016.

  8. Two-party quantum key agreement based on four-particle GHZ states

    Science.gov (United States)

    He, Ye-Feng; Ma, Wen-Ping

    2016-04-01

    Based on four-particle GHZ states, the double CNOT operation and the delayed measurement technique, a two-party quantum key agreement (QKA) protocols is proposed. The double CNOT operation makes each four-particle GHZ state collapse into two independent quantum states without any entanglement. Furthermore, one party can directly know the two quantum states and the other party can be aware of the two quantum states by using the corresponding measurement. According to the initial states of the two quantum states, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Then the protocol achieves the fair establishment of a shared key. The security analysis shows that the new protocol can resist against participant attacks, the Trojan horse attacks and other outsider attacks. Furthermore, the new protocol also has no information leakage problem and has high qubit efficiency.

  9. REFLECTIONS ON WAGAR ' S WORLD PARTY

    Directory of Open Access Journals (Sweden)

    Albert Bergesen

    2015-08-01

    Full Text Available Our task is to reflect upon Wagar's idea of a world party. In case such reflections are affected by the recent historical situation of the collapse of communism/existing socialism in 1989 and the implications this has for visions of progressive politics going into the 21st century. This event colors most political thinking, although for many the response has been that existing socialism was not real socialism, or that existing socialism was but the Stalinist deformation that, if avoided in the future, the 1917 project could again be resumed and human history and social relations remade anew. I don't see it that way. What existing socialism stood for in terms of the role of a vanguard party taking state power for the larger good is, now after the fall, I think off the board as a realistic program that can be sold to anyone.

  10. Ecologies of Ideologies: Explaining Party Entry and Exit in West-European Parliaments, 1945-2013

    OpenAIRE

    van de Wardt, M.; Berkhout, J.; Vermeulen, F.

    2017-01-01

    This study introduces a population-ecological approach to the entry and exit of political parties. A primary proposition of population ecology is that organizational entry and exit depends on the number of organizations already present: that is, density. We propose that political parties mainly experience competition from parties in the same ideological niche (left, centre, right). Pooled time-series analyses of 410 parties, 263 elections and 18 West-European countries largely support our exp...

  11. Partnering efforts at the Paducah Gaseous Diffusion Plant

    International Nuclear Information System (INIS)

    Warren, C.B.

    1995-01-01

    Before individuals or agencies can effectively work together to solve common problems, they must first agree on exactly what those problems are and establish common goals and methods that will lead to mutually acceptable solutions. Then, they must make a conscientious effort to form a cohesive team that focuses on the established goals and deemphasize traditional roles, which may in some instances be considered adversarial. This kind of teamwork/partnering process can be more difficult, though not impossible, to achieve in cases where there are traditional (real or imagined) adversarial relationships between the parties, i.e. regulator vs. regulated. The US Department of Energy Site Office (DOE) at Paducah, Kentucky, the Kentucky Department of Environmental Protection (KDEP) and the US Environmental Protection Agency, Region IV (EPA) have made t strides toward teamwork and partnering at DOE's Paducah Gaseous Diffusion Plant. They have accomplished this in a number of ways, which will be discussed in greater detail but first and foremost, the agencies agreed up front that they had mutual goals and interests. These goals are to protect public health and the environment in a cost-effective and timely manner, taking care to make the wisest use of public resources (tax dollars); to evaluate and minimize risks, and to achieve ''Win-Win'' for all parties concerned

  12. The Soviet Union and the Socialist and Social Democratic Parties of Western Europe.

    Science.gov (United States)

    1986-02-01

    British forces, Craxi stated, "Those missiles are not on the moon," Corriere della Sera, May 30, 1985. • 7 .- P.- N" It.- ’j -9.’-V 1.r". k7 17- -. W...Party (PIP) Progressive Labor Party of St. Lucia (PLP) People’s Electoral Movement (MEP), Venezuela Consultative Parties-in-Exile Bulgarian Social

  13. Italy's green party: on the road to success

    International Nuclear Information System (INIS)

    Rosenbaum, A.

    1988-01-01

    Italy's Green Party (Lista Verde) does not consider itself a political party but it is changing the environmental consciousness of the nation. There are new eight popular television shows covering environmental problems and a national weekly newspaper devotes a regular column to ecology. Environmental associations, including the Environmental League, have been started in the 1980s. The Greens have also succeeded in halting Italy's nuclear power programme. In a national referendum held in 1987 almost 80% of the voters agreed with the Greens' views. No fewer than 14 more popular referenda are planned throughout Italy on environmental issues. (UK)

  14. Ideology, Party Systems and Corruption Voting in European Democracies

    DEFF Research Database (Denmark)

    Charron, Nicholas; Bågenholm, Andreas

    2016-01-01

    What is the impact of corruption on citizens' voting behavior? There is a growing literature on an increasingly ubiquitous puzzle in many democratic countries: that corrupt officials continue to be re-elected by voters. In this study we address this issue with a novel theory and newly collected...... original survey data for 24 European countries. The crux of the argument is that voters' ideology is a salient factor in explaining why citizens would continue voting for their preferred party despite the fact that it has been involved in a corruption scandal. Developing a theory of supply (number...... of effective parties) and demand (voters must have acceptable ideological alternatives to their preferred party), we posit that there is a U-shaped relationship between the likelihood of corruption voting and where voters place themselves on the left/right spectrum. The further to the fringes, the more likely...

  15. 28 CFR 513.35 - Accounting/nonaccounting of disclosures to third parties.

    Science.gov (United States)

    2010-07-01

    ... 28 Judicial Administration 2 2010-07-01 2010-07-01 false Accounting/nonaccounting of disclosures... and Procedures § 513.35 Accounting/nonaccounting of disclosures to third parties. Accounting/nonaccounting of disclosures to third parties shall be made in accordance with Department of Justice regulations...

  16. 77 FR 31086 - Requirements Pertaining to Third Party Conformity Assessment Bodies

    Science.gov (United States)

    2012-05-24

    ... 22030 (April 20, 2011). Third Party Testing for Certain Children's Products; Toys: Requirements for... Bodies to Assess Conformity With the Limits on Phthalates in Children's Toys and Child Care Articles, 76... initiatives, including program development for third party testing of children's products. The commenter...

  17. 77 FR 31073 - Audit Requirements for Third Party Conformity Assessment Bodies

    Science.gov (United States)

    2012-05-24

    ... 1112 and 1118 Audit Requirements for Third Party Conformity Assessment Bodies and Requirements... PRODUCT SAFETY COMMISSION 16 CFR Part 1112 [CPSC Docket No. CPSC-2009-0061] Audit Requirements for Third... rule establishing requirements for the periodic audit of third party conformity assessment bodies as a...

  18. When Two of the Same Are Needed: A Multilevel Model of Intragroup Ethnic Party Competition

    DEFF Research Database (Denmark)

    Bochsler, Daniel

    2012-01-01

    diversification of minority groups. In states with multiple levels of governments, intra-ethnic rival parties emerge if minorities are local majorities in certain regions. Intra-ethnic party competition is limited, however, through the national electoral system, and especially high legal thresholds can restrict......Parties of ethno-regional minorities have been created in a large number of ethnically diverse countries, but sometimes one such party is not enough. While previous work has investigated the consequences of intragroup party competition, this study looks at the causes of internal political...

  19. An effective materials control and accountability audit program

    International Nuclear Information System (INIS)

    Carnival, G.; Jewell, D.L.; Roberts, N.J.

    1988-01-01

    An audit can be an extremely useful tool to assist both the DOE auditors and the contractor in performing their respective jobs. All too often audits are viewed as an adversarial meeting where one side tries to hide what it is doing and/or the other side attempts to ''nail'' someone. This adversarial relationship is often caused by misunderstandings of the purpose and uses of the audit. The authors have presented a scheme that will lead to a more productive audit from the perspective of both sides. If a procedure similar to the one outlined in this paper is in place and observed by all parties to the audit, it will produce both a useful product and a meaningful evaluation of the degree to which the contractor is adhering to established and generally accepted policies and practices

  20. Exploring the ‘ultimate’ step in the mediatization of political parties

    DEFF Research Database (Denmark)

    Ørsten, Mark; Willig, Ida; Pedersen, Leif Hemming

    Previous studies exploring the fourth dimension of mediatization, that is to say the extent to which political parties adjust their perceptions and behaviour to news media logic, have focused on three steps of structural change that political parties may take as a response to the increasing......, parties may begin to especially focus on candidates who are skilled in communicating with the news media (Strömbäck & Van Alest, 2013).So far, research into the fourth dimension of mediatization in Denmark has focused mostly on the first two steps (Blach-Ørsten, 2016; Elmelund-Præstekær & Hopmann, 2016...

  1. Quantum solution to a class of two-party private summation problems

    Science.gov (United States)

    Shi, Run-Hua; Zhang, Shun

    2017-09-01

    In this paper, we define a class of special two-party private summation (S2PPS) problems and present a common quantum solution to S2PPS problems. Compared to related classical solutions, our solution has advantages of higher security and lower communication complexity, and especially it can ensure the fairness of two parties without the help of a third party. Furthermore, we investigate the practical applications of our proposed S2PPS protocol in many privacy-preserving settings with big data sets, including private similarity decision, anonymous authentication, social networks, secure trade negotiation, secure data mining.

  2. Vote Buying or Campaign Promises? Electoral Strategies When Party Credibility is Limited

    OpenAIRE

    Hanusch, Marek; Keefer, Philip; Vlaicu, Razvan

    2016-01-01

    What explains significant variation across countries in the use of vote buying instead of campaign promises to secure voter support? This paper explicitly models the tradeoff parties face between engaging in vote buying and making campaign promises, and explores the distributional consequences of this decision, in a setting where party credibility can vary. When parties are less credible they spend more on vote buying and target vote buying more heavily toward groups that do not believe campa...

  3. Ordinance on nuclear third party liability (ORCN)

    International Nuclear Information System (INIS)

    1983-12-01

    The Ordinance exempts from the application of the 1983 Act on Nuclear Third Party Liability some substances with low radiation effects. It determines the amount of private insurance cover and defines the risks that insurers may exclude from cover. It establishes a special fund for nuclear damage made up of contributions from the nuclear operators. Specifications are given on the amount of the contributions and their conditions, as well as on administration of the fund. The Ordinance repeals the Ordinance of 13 June 1960 on funds for delayed atomic damage, the Order of 19 December 1960 on contributions to the fund for delayed atomic damage and the Ordinance of 30 November 1981 on cover for third party liability resulting from nuclear power plant operation [fr

  4. Being a potentially responsible party

    International Nuclear Information System (INIS)

    Ronan, J.T.

    1989-01-01

    This paper reports on CERCLA II- ability for the unlucky potentially responsible parties (PRPs) which is a Draconian form of strict, joint and several liability with limited statutory defenses that in most cases are impossible to establish. CERCLA vigorously employs these legal concepts, stretching a PRP's financial exposure to the limits necessary to meet the enormous financial costs of remediation

  5. Multi-party quantum key agreement with five-qubit brown states

    Science.gov (United States)

    Cai, Tao; Jiang, Min; Cao, Gang

    2018-05-01

    In this paper, we propose a multi-party quantum key agreement protocol with five-qubit brown states and single-qubit measurements. Our multi-party protocol ensures each participant to contribute equally to the agreement key. Each party performs three single-qubit unitary operations on three qubits of each brown state. Finally, by measuring brown states and decoding the measurement results, all participants can negotiate a shared secret key without classical bits exchange between them. With the analysis of security, our protocol demonstrates that it can resist against both outsider and participant attacks. Compared with other schemes, it also possesses a higher information efficiency. In terms of physical operation, it requires single-qubit measurements only which weakens the hardware requirements of participant and has a better operating flexibility.

  6. Contextualizing Intergroup Contact: Do Political Party Cues Enhance Contact Effects?

    DEFF Research Database (Denmark)

    Sønderskov, Kim Mannemar; Thomsen, Jens Peter Frølund

    2015-01-01

    This article examines intergroup contact effects in different political contexts. We expand on previous efforts of social psychologists by incorporating the messages of political parties as a contextual trigger of group membership awareness in contact situations. We argue that the focus among...... political parties on us-them categorizations heightens the awareness of group memberships. This focus in turn enhances the positive intergroup contact effect by stimulating majority members to perceive contacted persons as prototypical outgroup members. A multilevel analysis of 22 countries and almost 37......,000 individuals confirms that the ability of intergroup contact to reduce antiforeigner sentiment increases when political parties focus intensively on immigration issues and cultural differences. Specifically, both workplace contact and interethnic friendship become more effective in reducing antiforeigner...

  7. The Drastic Outcomes from Voting Alliances in Three-Party Democratic Voting (1990 → 2013)

    Science.gov (United States)

    Galam, Serge

    2013-04-01

    The drastic effect of local alliances in three-party competition is investigated in democratic hierarchical bottom-up voting. The results are obtained analytically using a model which extends a sociophysics frame introduced in 1986 (Galam in J. Math. Phys. 30:426, 1986) and 1990 (Galam in J. Stat. Phys. 61:943, 1990) to study two-party systems and the spontaneous formation of democratic dictatorship. It is worth stressing that the 1990 paper was published in the Journal of Statistical Physics, the first paper of its kind in this journal. It was shown how a minority in power can preserve its leadership using bottom-up democratic elections. However such a bias holds only down to some critical value of minimum support. The results were used latter to explain the sudden collapse of European communist parties in the nineties. The extension to three-party competition reveals the mechanisms by which a very small minority party can get a substantial representation at higher levels of the hierarchy when the other two competing parties are big. Additional surprising results are obtained, which enlighten the complexity of three-party democratic bottom-up voting. In particular, the unexpected outcomes of local voting alliances are singled out. Unbalanced democratic situations are exhibited with strong asymmetries between the actual bottom support of a party and its associated share of power at the top leadership. Subtle strategies are identified for a party to maximize its hold on the top leadership. The results are also valid to describe opinion dynamics with three competing opinions.

  8. Generative adversarial networks recover features in astrophysical images of galaxies beyond the deconvolution limit

    Science.gov (United States)

    Schawinski, Kevin; Zhang, Ce; Zhang, Hantian; Fowler, Lucas; Santhanam, Gokula Krishnan

    2017-05-01

    Observations of astrophysical objects such as galaxies are limited by various sources of random and systematic noise from the sky background, the optical system of the telescope and the detector used to record the data. Conventional deconvolution techniques are limited in their ability to recover features in imaging data by the Shannon-Nyquist sampling theorem. Here, we train a generative adversarial network (GAN) on a sample of 4550 images of nearby galaxies at 0.01 < z < 0.02 from the Sloan Digital Sky Survey and conduct 10× cross-validation to evaluate the results. We present a method using a GAN trained on galaxy images that can recover features from artificially degraded images with worse seeing and higher noise than the original with a performance that far exceeds simple deconvolution. The ability to better recover detailed features such as galaxy morphology from low signal to noise and low angular resolution imaging data significantly increases our ability to study existing data sets of astrophysical objects as well as future observations with observatories such as the Large Synoptic Sky Telescope (LSST) and the Hubble and James Webb space telescopes.

  9. Similarity in husbands and wives party family preference in the Netherlands

    NARCIS (Netherlands)

    Coffé, Hilde R.; Need, Ariana

    2010-01-01

    Using insights from theories on marital homogamy and political behaviour, this research examines the tendency of husbands and wives to vote for the same party family. It disentangles the extent to which similarity in party family preference can be explained by (1) partners choosing one another

  10. Political parties and the EU in national election campaigns: who talks about Europe, and how?

    DEFF Research Database (Denmark)

    Senninger, Roman; Wagner, Markus

    2015-01-01

    addressed as well as their framing. We argue that issue-based strategies and government participation may provide important reasons why parties only mobilize selectively on EU issues. We test our expectations using data from party press releases in Austrian general election campaigns in 2008 and 2013. We......This paper examines political party mobilization on European Union issues during national election campaigns. We consider which actors talk about the EU, specifically which parties and which actors within parties, as well as how these actors talk about the EU, specifically the types of EU issues...

  11. The Changing of Political Orientation of Masyumi Party During 1950-1959

    Directory of Open Access Journals (Sweden)

    Alfi Hafidh Ishaqro

    2017-06-01

    The formation of the General Election Law made M. Natsir and Masyumi the symbol of the establishment and growth of democracy in the Republic of Indonesia, which became more evident when M. Natsir was ousted and the subsequent working cabinet heads failed to hold a General Election. And finally, at the end of 1955 under the leadership of Burhanuddin Harahap, who was himself a Masyumi figure, a general election was held for the first time. The political attitude shown by Masyumi indicated that Masumi Party had shifted its political orientation. Masyumi Party, which originally struggled to implement Islam by employing the Syura in forming a government was helplessly compromising its principle by following and combining itself into a democracy model the initiator of which was the leader of Masyumi Party itself. Such political behavioral changes were associated with the reasoning of the then leaders of Masyumi Party, who tended to accommodative and excessively compromising.

  12. Local Party Labor Center in Radzyń Podlaski (1982–1989 – an element of the organization structure of the Polish United Workers' Party, documents creator, archival fonds

    Directory of Open Access Journals (Sweden)

    Dariusz Magier

    2017-05-01

    Full Text Available Local Party Labor Centers were created in January 1982, in connection with reorganization of assignments of the Polish United Workers’ Party in the new socio-political situation after the declaration of martial law in Poland. The article present this element of the complex bureaucratic structure, holding dictatorial authority in the party, by describing its political history and documentary legacy from the archival perspective. The laboratory example is the Local Party Labor Center in Radzyń Podlaski. The author set himself a task to describe what was the role of the Center in the Polish communist party – a formation so characteristic for the last decade of existence of the Party. The LPLCs were not elective statutory bodies of the PUWP, but they were a bureaucratic structure, that served an advisory and coordination function towards basic levels of the communist party. The LPLC in Radzyń Podlaski was one of four such formations created in the Bielsk Podlaski Voivodeship, and its area of action were counties from the period before the administrative reform in 1975. The scope of the Center were district committees of the PUWP situated in Czemierniki, Drelów, Kąkolewnica, Komarówka Podlaska, Międzyrzec Podlaski, Ulan, Wohyń; the Town Committee in Międzyrzec Podlaski and the Town-Distric Committee in Radzyń Podlaski. Archival materials of theLPLC in Radzyń Podlaski were transmitted on September 2, 1992 with documentation created by the County, the District, the Town and the Town-Disctrict Committee from 1950 to 1989. The materials were scattered. In 2007–2008 fonds of this documentation were recognized and in 2011 the materials of the LPLC were arranged and described in the State Archive in Lublin, Branch in Radzyń Podlaski. 

  13. Web party effect: a cocktail party effect in the web environment

    Directory of Open Access Journals (Sweden)

    Sara Rigutti

    2015-03-01

    Full Text Available In goal-directed web navigation, labels compete for selection: this process often involves knowledge integration and requires selective attention to manage the dizziness of web layouts. Here we ask whether the competition for selection depends on all web navigation options or only on those options that are more likely to be useful for information seeking, and provide evidence in favor of the latter alternative. Participants in our experiment navigated a representative set of real websites of variable complexity, in order to reach an information goal located two clicks away from the starting home page. The time needed to reach the goal was accounted for by a novel measure of home page complexity based on a part of (not all web options: the number of links embedded within web navigation elements weighted by the number and type of embedding elements. Our measure fully mediated the effect of several standard complexity metrics (the overall number of links, words, images, graphical regions, the JPEG file size of home page screenshots on information seeking time and usability ratings. Furthermore, it predicted the cognitive demand of web navigation, as revealed by the duration judgment ratio (i.e., the ratio of subjective to objective duration of information search. Results demonstrate that focusing on relevant links while ignoring other web objects optimizes the deployment of attentional resources necessary to navigation. This is in line with a web party effect (i.e., a cocktail party effect in the web environment: users tune into web elements that are relevant for the achievement of their navigation goals and tune out all others.

  14. Web party effect: a cocktail party effect in the web environment

    Science.gov (United States)

    Gerbino, Walter

    2015-01-01

    In goal-directed web navigation, labels compete for selection: this process often involves knowledge integration and requires selective attention to manage the dizziness of web layouts. Here we ask whether the competition for selection depends on all web navigation options or only on those options that are more likely to be useful for information seeking, and provide evidence in favor of the latter alternative. Participants in our experiment navigated a representative set of real websites of variable complexity, in order to reach an information goal located two clicks away from the starting home page. The time needed to reach the goal was accounted for by a novel measure of home page complexity based on a part of (not all) web options: the number of links embedded within web navigation elements weighted by the number and type of embedding elements. Our measure fully mediated the effect of several standard complexity metrics (the overall number of links, words, images, graphical regions, the JPEG file size of home page screenshots) on information seeking time and usability ratings. Furthermore, it predicted the cognitive demand of web navigation, as revealed by the duration judgment ratio (i.e., the ratio of subjective to objective duration of information search). Results demonstrate that focusing on relevant links while ignoring other web objects optimizes the deployment of attentional resources necessary to navigation. This is in line with a web party effect (i.e., a cocktail party effect in the web environment): users tune into web elements that are relevant for the achievement of their navigation goals and tune out all others. PMID:25802803

  15. The legislative consequences of internal conflict and inter-party divisions

    Directory of Open Access Journals (Sweden)

    Matthias Haber

    2015-06-01

    Full Text Available Governments must respond quickly to pressing economic and societal problems. However, institutional rules, public opinion and unanticipated world events often delay the legislative process. Building on theories of legislative decision-making and intra-party politics, this paper shows that the speed at which bills pass is also driven by the governing party’s internal cohesiveness and its ideological distance to the opposition. Governing parties that are internally divided have greater difficulty in forming the legislative majorities necessary to pass laws quickly, especially if their preferences are further away from the opposition. I test these hypotheses using a novel collection of laws passed in the UK Parliament and conference speeches given by Labour and Conservative party members over a 10-year period. I use automated text classification techniques to determine the relative location of actors’ preferences and the level of intra-party disagreement. I then predict the duration of lawmaking based on the government’s recent internal level of conflict and its distance to the opposition. The results complement mounting evidence that parties’ internal policy divisions hold important implications for parties’ performance in government.

  16. Constituents of political cognition: Race, party politics, and the alliance detection system.

    Science.gov (United States)

    Pietraszewski, David; Curry, Oliver Scott; Petersen, Michael Bang; Cosmides, Leda; Tooby, John

    2015-07-01

    Research suggests that the mind contains a set of adaptations for detecting alliances: an alliance detection system, which monitors for, encodes, and stores alliance information and then modifies the activation of stored alliance categories according to how likely they will predict behavior within a particular social interaction. Previous studies have established the activation of this system when exposed to explicit competition or cooperation between individuals. In the current studies we examine if shared political opinions produce these same effects. In particular, (1) if participants will spontaneously categorize individuals according to the parties they support, even when explicit cooperation and antagonism are absent, and (2) if party support is sufficiently powerful to decrease participants' categorization by an orthogonal but typically-diagnostic alliance cue (in this case the target's race). Evidence was found for both: Participants spontaneously and implicitly kept track of who supported which party, and when party cross-cut race-such that the race of targets was not predictive of party support-categorization by race was dramatically reduced. To verify that these results reflected the operation of a cognitive system for modifying the activation of alliance categories, and not just socially-relevant categories in general, an identical set of studies was also conducted with in which party was either crossed with sex or age (neither of which is predicted to be primarily an alliance category). As predicted, categorization by party occurred to the same degree, and there was no reduction in either categorization by sex or by age. All effects were replicated across two sets of between-subjects conditions. These studies provide the first direct empirical evidence that party politics engages the mind's systems for detecting alliances and establish two important social categorization phenomena: (1) that categorization by age is, like sex, not affected by alliance

  17. Quantum Security of Cryptographic Primitives

    OpenAIRE

    Gagliardoni, Tommaso

    2017-01-01

    We call quantum security the area of IT security dealing with scenarios where one or more parties have access to quantum hardware. This encompasses both the fields of post-quantum cryptography (that is, traditional cryptography engineered to be resistant against quantum adversaries), and quantum cryptography (that is, security protocols designed to be natively run on a quantum infrastructure, such as quantum key distribution). Moreover, there exist also hybrid models, where traditional crypto...

  18. Partisan heart and/or rational mind? Party identification, political knowledge and electoral turnout

    Directory of Open Access Journals (Sweden)

    Pavlović Zoran

    2018-01-01

    Full Text Available This paper aims at analysing the relationship between positive and negative party identification and political knowledge, as well as their interplay in regard to electoral turnout. The data from the Serbian 2012 post-election public opinion survey on the nationally representative probability-based sample of voting age citizens were used (N = 1568. The data show that political knowledge is significantly and positively correlated both with positive and negative party identification. Citizens who are more knowledgeable and positively identified are also more likely to vote. However, it is shown that the influence of political knowledge on electoral turnout is moderated only by positive party identification. Political knowledge significantly predicts turnout only in the group of citizens without positive party identification. Being negatively identified with a political party does not modify the relationship between political knowledge and turnout. The results are discussed in terms of the Michigan model of party identification and cognitive mobilisation thesis. The roles of affective and cognitive motivation in electoral participation are additionally stressed and debated. [Project of the Serbian Ministry of Education, Science and Technological Development, Grant no. 47010

  19. Mediated Leader Effects: The Impact of Newspapers’ Portrayal of Party Leadership on Electoral Support

    NARCIS (Netherlands)

    Aaldering, L.; van der Meer, T.; van der Brug, W.

    2018-01-01

    Conventional wisdom holds that party leaders matter in democratic elections. As very few voters have direct contact with party leaders, media are voters’ primary source of information about these leaders and, thus, the likely origin of leader effects on party support. Our study focuses on these

  20. THE ADVERSARIAL SYSTEM AND THE BEST INTERESTS OF THE CHILD IN DIVORCE LITIGATION: SOME THOUGHTS REGARDING COLLABORATIVE LAW AS A MEANS TO RESOLVE PARENTAL DISPUTES

    Directory of Open Access Journals (Sweden)

    JA Robinson

    2016-03-01

    Full Text Available In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be considered under upon divorce. Collaborative Law is suggested as a means to bear in mind. The fact that current practice of lawyer negotiations in respect of divorce is not too far removed from Collaborative Law may lead to practitioners readily accepting the concept.

  1. Political parties Foundations and Politicization Processes in Brazil: action domain, amalgams and ambivalences

    Directory of Open Access Journals (Sweden)

    Eliana Tavares dos Reis

    2017-12-01

    Full Text Available The article analyzes the space of party foundations in Brazil. This field of action is perceived as a vehicle and a reflection of processes of politicization.The work is based on two axis: 1 the (structural and sociographic configuration of these party sectors and its relative autonomy or dependence according to the party organizations; 2 the possible intersections between political logic and domain and intellectuals from the exploitation of this specific area. It presents data on the creation and the creation chronology of party foundations, its organizational structure (websites, offices, sectors, tasks/roles divisions; requirements of various experts, products such as books, magazines, courses, incomes; etc. from information available on the internet as well as the social, political and cultural profiles of its presidents and former presidents. It was also examined the case of the Perseu Abramo Foundation of the Workers Party.

  2. Social democracy : A comparative account of the left-wing party family

    NARCIS (Netherlands)

    Keman, Hans

    2017-01-01

    The Social Democratic party family is a central part of political life in the West. This book focuses on this party family as well as a unique political force in the industrialised world. It provides a critical comparative survey of when, where, how and why Social Democracy developed within

  3. 18 CFR 37.5 - Obligations of Transmission Providers and Responsible Parties.

    Science.gov (United States)

    2010-04-01

    ... 18 Conservation of Power and Water Resources 1 2010-04-01 2010-04-01 false Obligations of Transmission Providers and Responsible Parties. 37.5 Section 37.5 Conservation of Power and Water Resources... ACCESS SAME-TIME INFORMATION SYSTEMS § 37.5 Obligations of Transmission Providers and Responsible Parties...

  4. Political Market Orientation: A Framework for Understanding Relationship Structures in Political Parties

    DEFF Research Database (Denmark)

    Ormrod, Robert P.; Savigny, Heather

    2012-01-01

    This article is motivated by the growing need to integrate the current political science and marketing literature in order to provide a deeper understanding of the behaviour of political actors and their relationships with relevant stakeholder groups. In our article, we demonstrate how Ormrod...... strive for contextual sensitivity. By adopting this approach it is hoped that the fears noted by political scientists that political marketing is solely concerned with applying standard management models to political parties with the resulting emphasis on communication tactics at election time, together......’s conceptual model of political market orientation complements political science models of party organization by drawing attention to the competing interests of stakeholders in shaping party strategy and organizational structure. We treat parties as a multitude of actors rather than as monolithic entities...

  5. The energy policy message of the Hamburg SPD party congress

    International Nuclear Information System (INIS)

    Heller, W.

    2007-01-01

    On October 26-28 this year, the Social Democratic (SPD) party congress was held in Hamburg; its new party platform, the so-called ''Hamburg Program,'' constitutes a landmark for the party. The Program's chapter on ''Sustainable Progress and Qualitative Growth'' refers to energy policy in the section about ''Turning Point in Energy Policy; Environmental Protection.'' Emphasis is given to the fact that energy, like air and water, is a basis of life of our civilization, and that the present ways of wasting energy and resources have no future. For this reason, the turnaround in energy policy initiated by the SPD must be advanced in the key issue of switching from non-renewable to renewable energy resources and from polluting to non-polluting resources. The ultimate goal is a solar age. As far as nuclear power is concerned, the Social Democratic Party finds that nuclear fission appeared to many as the big hope for energy available forever, but that these hopes cannot come true. To put it in a nutshell: The SPD is fast embarking on the road into a solar age. The party does see the growing world population and the rising energy requirement as well as the resulting challenges. However, its energy policy concept is too rigidly focused on Germany and the country's pioneering role. At the present time, nuclear power stands no chance in the SPD, although the Hamburg declaration includes a cautious reminder of the fact that, until 1986, the SPD was among the proponents of nuclear power. (orig.)

  6. Sub-linear, Secure Comparison With Two Non-Colluding Parties

    DEFF Research Database (Denmark)

    Toft, Tomas

    2011-01-01

    The classic problem in the field of secure computation is Yao’s millionaires’ problem; we consider two new protocols solving a variation of this: a number of parties, P1, . . . , Pn, securely hold two - bit values, x and y – e.g. x and y could be encrypted or secret shared. They wish to obtain...... a bit stating whether x is greater than y using only secure arithmetic; this should be done without revealing any information, even the output should remain secret. The present setting is special in the sense that it is assumed that two specific parties, referred to as Alice and Bob, are non......-colluding. Though this assumption is not satisfied in general, it clearly is for the main example of this work: two-party computation based on Paillier encryption. The first solution requires O(log()(κ + loglog())) secure arithmetic operations in O(log()) rounds, where κ is a correctness parameter. The second...

  7. 40 CFR Appendix E to Subpart A of... - Article 5 Parties

    Science.gov (United States)

    2010-07-01

    ... 40 Protection of Environment 17 2010-07-01 2010-07-01 false Article 5 Parties E Appendix E to Subpart A of Part 82 Protection of Environment ENVIRONMENTAL PROTECTION AGENCY (CONTINUED) AIR PROGRAMS... Appendix E to Subpart A of Part 82—Article 5 Parties Afghanistan, Albania, Algeria, Angola, Antigua...

  8. ParTIES: a toolbox for Paramecium interspersed DNA elimination studies.

    Science.gov (United States)

    Denby Wilkes, Cyril; Arnaiz, Olivier; Sperling, Linda

    2016-02-15

    Developmental DNA elimination occurs in a wide variety of multicellular organisms, but ciliates are the only single-celled eukaryotes in which this phenomenon has been reported. Despite considerable interest in ciliates as models for DNA elimination, no standard methods for identification and characterization of the eliminated sequences are currently available. We present the Paramecium Toolbox for Interspersed DNA Elimination Studies (ParTIES), designed for Paramecium species, that (i) identifies eliminated sequences, (ii) measures their presence in a sequencing sample and (iii) detects rare elimination polymorphisms. ParTIES is multi-threaded Perl software available at https://github.com/oarnaiz/ParTIES. ParTIES is distributed under the GNU General Public Licence v3. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  9. Economic Conditions affect Support for Prime Minister Parties in Scandinavia

    DEFF Research Database (Denmark)

    Larsen, Martin Vinæs

    2016-01-01

    between unemployment, economic growth and support for prime minister parties is re-examined in two datasets. The first is a dataset of Scandinavian elections, and the second is a yearly Danish vote function, which was constructed using election polls. Across both datasets, it is found that if one simply......Previous research has not been able to identify a relationship between objective economic indicators and support for governing parties in the Scandinavian countries. This is potentially problematic, as it suggests that political leaders are not held electorally accountable for the economic...... correlates support for the prime minister's party with economic conditions, there is no relationship; however, if one specifies a statistical model, which takes the Scandinavian context into account, it is possible to identify a statistically significant effect of economic conditions on electoral support...

  10. Social media, parties, and political inequalities

    NARCIS (Netherlands)

    Jacobs, K.T.E.; Spierings, C.H.B.M.

    2016-01-01

    This book examines how social media have transformed politics in established democracies. Specifically, the authors examine the influence of the unique qualities of social media on the power balance between and within parties. They present a general theory as well as an in-depth case study of the

  11. Capuchin Monkeys Judge Third-Party Reciprocity

    Science.gov (United States)

    Anderson, James R.; Takimoto, Ayaka; Kuroshima, Hika; Fujita, Kazuo

    2013-01-01

    Increasing interest is being shown in how children develop an understanding of reciprocity in social exchanges and fairness in resource distribution, including social exchanges between third parties. Although there are descriptions of reciprocity on a one-to-one basis in other species, whether nonhumans detect reciprocity and violations of…

  12. Ecologies of ideologies: Explaining party entry and exit in West-European parliaments, 1945–2013

    Science.gov (United States)

    Berkhout, Joost; Vermeulen, Floris

    2016-01-01

    This study introduces a population-ecological approach to the entry and exit of political parties. A primary proposition of population ecology is that organizational entry and exit depends on the number of organizations already present: that is, density. We propose that political parties mainly experience competition from parties in the same ideological niche (left, centre, right). Pooled time-series analyses of 410 parties, 263 elections and 18 West-European countries largely support our expectations. We find that political parties are more likely to exit when density within their niche increases. Also there is competition between adjacent ideological niches, i.e. between centrist and right-wing niches. In contrast to our expectations, neither density nor institutional rules impact party entry. This raises important questions about the rationale of prospective entrants. PMID:29046613

  13. Electrophysiological correlates of cocktail-party listening.

    Science.gov (United States)

    Lewald, Jörg; Getzmann, Stephan

    2015-10-01

    Detecting, localizing, and selectively attending to a particular sound source of interest in complex auditory scenes composed of multiple competing sources is a remarkable capacity of the human auditory system. The neural basis of this so-called "cocktail-party effect" has remained largely unknown. Here, we studied the cortical network engaged in solving the "cocktail-party" problem, using event-related potentials (ERPs) in combination with two tasks demanding horizontal localization of a naturalistic target sound presented either in silence or in the presence of multiple competing sound sources. Presentation of multiple sound sources, as compared to single sources, induced an increased P1 amplitude, a reduction in N1, and a strong N2 component, resulting in a pronounced negativity in the ERP difference waveform (N2d) around 260 ms after stimulus onset. About 100 ms later, the anterior contralateral N2 subcomponent (N2ac) occurred in the multiple-sources condition, as computed from the amplitude difference for targets in the left minus right hemispaces. Cortical source analyses of the ERP modulation, resulting from the contrast of multiple vs. single sources, generally revealed an initial enhancement of electrical activity in right temporo-parietal areas, including auditory cortex, by multiple sources (at P1) that is followed by a reduction, with the primary sources shifting from right inferior parietal lobule (at N1) to left dorso-frontal cortex (at N2d). Thus, cocktail-party listening, as compared to single-source localization, appears to be based on a complex chronology of successive electrical activities within a specific cortical network involved in spatial hearing in complex situations. Copyright © 2015 Elsevier B.V. All rights reserved.

  14. The Connection Between the Woman’s Christian Temperance Union and the Prohibition Party

    Directory of Open Access Journals (Sweden)

    Adam Chamberlain

    2016-12-01

    Full Text Available Scholars have long been interested in the complementary relationships forged by membership groups and political parties. The post-bellum period presents an opportunity to consider these connections using a case study of two groups concerned with the ills of alcohol, the Woman’s Christian Temperance Union (WCTU and the Prohibition Party. Our analysis of presidential elections from 1876 to 1900 reveals that—although women were disenfranchised at the time—the WCTU’s organization and infrastructure was essential to early Prohibition Party success. In 1884, the first election after the two created a formal alliance in 1882, the strength of the WCTU helped the party grow its voter base. However, the two slowly diverged over how to achieve prohibition, and this relationship dissipated; there is little evidence of any significant connection between the groups after 1884. This supports the proposition that a shared means of accomplishing goals is an essential element of an effective group–party partnership.

  15. DSHEA's third-party literature exemption; mail order sales, direct marketing, and Internet use.

    Science.gov (United States)

    Raubicheck, C J

    1999-01-01

    This article examines ways in which marketers of dietary supplements can make use of the "third-party literature" section of the Dietary Supplement Health and Education Act of 1994 (DSHEA). This provision permits persons or entities, other than manufacturers or distributors, to distribute to consumers certain publications in connection with the sale of particular supplements. These publications may include statements about the therapeutic benefits of such products without subjecting the products to regulation by the Food and Drug Administration (FDA) as unapproved new drugs. Specifically, this article addresses the following: Can a dietary supplement manufacturer or distributor send third-party literature about a dietary supplement to a customer in a mail order sales transaction? Can third-party literature be disseminated by mail with dietary supplement catalogues only? Can third-party literature be disseminated by sales representatives engaged in direct marketing of dietary supplements? Can third-party literature appear on the Internet? The answer appears to be affirmative in each of these situations.

  16. CosmoQuest: Virtual Star Parties as a Conduit to Citizen Science Research

    Science.gov (United States)

    Lewis, Scott; Gugliucci, N. E.; Gay, P. L.; Amateur Astronomer Team; Commentator Team

    2013-01-01

    CosmoQuest has created an environment that actively engages the public through online star parties while building a growing virtual research center that allows individuals anywhere in the world to participate in and contribute to scientific research. Utilizing the infrastructure of Google+ and YouTube, CosmoQuest has brought optical observational astronomy into homes across the world. Every week astronomers - amateur and professional - meet to share live sky images and to discuss the science behind their beauty during Virtual Star parties. A wide array of optics and digital detectors from varied locations collaborate in a fashion not possible in the standard public star party. Every viewer is able to virtually look through the imaging telescope simultaneously while the equipment owner doesn’t need to worry about accidental mishandling by the public. Digital cameras and CCDs also allow longer exposures of deep-sky objects, something not typical in a standard star party event. Our diversity of equipment - ranging from hand-guided Dobsonian telescopes to 16” Schmidt-Cassegrain telescopes on Paramounts - give viewers the opportunity to experience the sky through different systems. Additional Star Parties focus on special astronomical events, such as eclipses and transits. The annular eclipse of 20 May, 2012 brought together astronomers, space enthusiasts and a curious public into a Google+ Hangout On Air to celebrate the event while advocating safe observing methods and explaining the science behind the phenomenon. Public photos of the eclipse were shared live in the broadcast while video of the event was streamed for thousands of viewers to enjoy. Other special event star parties have focused on the Super Moon, Eros Opposition, and the Venus Transit. In this poster we review the technology behind star parties and the reach of these events.

  17. Twitter-Based Analysis of the Dynamics of Collective Attention to Political Parties.

    Science.gov (United States)

    Eom, Young-Ho; Puliga, Michelangelo; Smailović, Jasmina; Mozetič, Igor; Caldarelli, Guido

    2015-01-01

    Large-scale data from social media have a significant potential to describe complex phenomena in the real world and to anticipate collective behaviors such as information spreading and social trends. One specific case of study is represented by the collective attention to the action of political parties. Not surprisingly, researchers and stakeholders tried to correlate parties' presence on social media with their performances in elections. Despite the many efforts, results are still inconclusive since this kind of data is often very noisy and significant signals could be covered by (largely unknown) statistical fluctuations. In this paper we consider the number of tweets (tweet volume) of a party as a proxy of collective attention to the party, identify the dynamics of the volume, and show that this quantity has some information on the election outcome. We find that the distribution of the tweet volume for each party follows a log-normal distribution with a positive autocorrelation of the volume over short terms, which indicates the volume has large fluctuations of the log-normal distribution yet with a short-term tendency. Furthermore, by measuring the ratio of two consecutive daily tweet volumes, we find that the evolution of the daily volume of a party can be described by means of a geometric Brownian motion (i.e., the logarithm of the volume moves randomly with a trend). Finally, we determine the optimal period of averaging tweet volume for reducing fluctuations and extracting short-term tendencies. We conclude that the tweet volume is a good indicator of parties' success in the elections when considered over an optimal time window. Our study identifies the statistical nature of collective attention to political issues and sheds light on how to model the dynamics of collective attention in social media.

  18. Twitter-Based Analysis of the Dynamics of Collective Attention to Political Parties.

    Directory of Open Access Journals (Sweden)

    Young-Ho Eom

    Full Text Available Large-scale data from social media have a significant potential to describe complex phenomena in the real world and to anticipate collective behaviors such as information spreading and social trends. One specific case of study is represented by the collective attention to the action of political parties. Not surprisingly, researchers and stakeholders tried to correlate parties' presence on social media with their performances in elections. Despite the many efforts, results are still inconclusive since this kind of data is often very noisy and significant signals could be covered by (largely unknown statistical fluctuations. In this paper we consider the number of tweets (tweet volume of a party as a proxy of collective attention to the party, identify the dynamics of the volume, and show that this quantity has some information on the election outcome. We find that the distribution of the tweet volume for each party follows a log-normal distribution with a positive autocorrelation of the volume over short terms, which indicates the volume has large fluctuations of the log-normal distribution yet with a short-term tendency. Furthermore, by measuring the ratio of two consecutive daily tweet volumes, we find that the evolution of the daily volume of a party can be described by means of a geometric Brownian motion (i.e., the logarithm of the volume moves randomly with a trend. Finally, we determine the optimal period of averaging tweet volume for reducing fluctuations and extracting short-term tendencies. We conclude that the tweet volume is a good indicator of parties' success in the elections when considered over an optimal time window. Our study identifies the statistical nature of collective attention to political issues and sheds light on how to model the dynamics of collective attention in social media.

  19. 19 CFR 10.589 - Certification for goods exported to a Party.

    Science.gov (United States)

    2010-04-01

    ... such other medium or format approved by the Party's customs authority for that purpose) to CBP upon... 19 Customs Duties 1 2010-04-01 2010-04-01 false Certification for goods exported to a Party. 10.589 Section 10.589 Customs Duties U.S. CUSTOMS AND BORDER PROTECTION, DEPARTMENT OF HOMELAND SECURITY...

  20. Star Parties in Mexico extended to Colombia and China

    Science.gov (United States)

    Torres-Peimbert, Silvia; Franco, José

    2016-10-01

    The preparation for The International Year of Astronomy 2009 stirred our interest in preparing star parties in Mexico. The lunar eclipse of February 20th 2008 was the perfect event for the first massive observation in Mexico City that attracted over 25,000 people. To accompany this event there were additional attractions: a massive astronomical lecture, more than 100 telescopes were set up for people to watch the sky, exhibits of astronomical images, children hands-on projects, rock concert, dance performance, and chats with astronomers. Already in 2009 a collective program was organized to involve more than 30 sites in Mexico to hold star parties at the same time once a year. These star parties were more in the spirit of science fairs, that include lectures, astronomy exhibits, children projects, as well as concerts and other cultural displays. The scope of each one of them depended on the local support from volunteers and from the local authorities. After the International Year of Astronomy the group that organized these star parties decided to continue its activities. The main attraction in these fairs has been the opportunity to see the Moon, Jupiter and Saturn (if observable) through a telescope. For this program the presence of the amateur astronomers has been crucial. They have brought their instruments to the sites and have generously taught the public how to look through the telescopes and pointed out to the interesting features on the sky.